Essays about: "Binaries"

Showing result 1 - 5 of 69 essays containing the word Binaries.

  1. 1. Goddess, Lover, Mother, Witch : Feminist Revisionist Mythmaking and Feminine Morphology of Narrative in Madeline Miller’s Circe

    University essay from Malmö universitet/Institutionen för konst, kultur och kommunikation (K3)

    Author : Wiktoria Grzybowska; [2023]
    Keywords : feminism; feminist literary theory; greek mythology; feminist mythmaking; revisionism; Circe; Madeline Miller; The Odyssey;

    Abstract : This thesis aims to position Circe by Madeline Miller as an example of feminist revisionist mythmaking and investigate some of the novel’s revisionary practices. I thus begin by introducing the project of feminist revisionism, as conceptualized by several different feminist thinkers. READ MORE

  2. 2. Decompiling Go : Using metadata to improve decompilation readability

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Mattias Grenfeldt; [2023]
    Keywords : Decompilation; Go; Runtime Metadata; Reverse Engineering; Dekompilering; Go; Körtidsmetadata; Reverse Engineering;

    Abstract : Malware written in Go is on the rise, and yet, tools for investigating Go programs, such as decompilers, are limited. A decompiler takes a compiled binary and tries to recover its source code. Go is a high-level language that requires runtime metadata to implement many of its features, such as garbage collection and polymorphism. READ MORE

  3. 3. Breaking WebAssembly Crypto Miner Detection by Obfuscation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gustav Ekner; [2023]
    Keywords : Computer Security; WebAssembly; Crypto mining; Code Obfuscation; Browsers; Datasäkerhet; WebAssembly; Kryptovalutautvinning; Kodobfuskering; Webbläsare;

    Abstract : Blockchain-based cryptocurrencies is a fairly new concept with a worldwide spread, and there is a massive amount of currencies. Several of them involve so-called currency mining, a feature of Proof-of-Work based blockchains. READ MORE

  4. 4. Intermediate-mass black hole binary as an origin of super-massive black holes

    University essay from Lunds universitet/Astrofysik; Lunds universitet/Fysiska institutionen

    Author : Isabelle Signe Maj Maria Thord; [2023]
    Keywords : Intermediate-mass black holes; binary; merger; hardening; encounters; Physics and Astronomy;

    Abstract : Galactic nuclei contain super-massive black holes (SMBHs), nuclear stellar clusters (NSCs), or both. In the NSC, intermediate-mass black holes (IMBHs) are likely to reside and form highly eccentric binaries. Over time, the orbit of a binary could harden via interaction with surrounding low-mass stars. READ MORE

  5. 5. The Efficacy of Forward-Edge Control-Flow Integrity in Mitigating Memory Corruption Vulnerabilities : The Case of the Android Stack

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Viktor Olofsson; [2023]
    Keywords : control-flow integrity; CFI; control-flow graph; CFG; memory corruption; Android; vulnerability; android vulnerability; computer security;

    Abstract : Memory corruption is one of the oldest and most prominent problems in the field of computer security. In order to protect the vulnerabilities that arise from memory corruption, a mitigation technique called Control-flow Integrity (CFI) was developed. READ MORE