Essays about: "Compiler security"
Showing result 1 - 5 of 9 essays containing the words Compiler security.
-
1. Functional Programming Languages and the JVM : Comparing Functional Language Compilation Techniques for the JVM
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Because of its security, high availability, and automatic memory management, the JVM (Java Virtual Machine) is a desirable execution environment. However, since the JVM was originally made for Java, which is an objectoriented language, it is hard for languages with other paradigms to run on it. READ MORE
-
2. Diverse Double-Compiling to Harden Cryptocurrency Software
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : A trusting trust attack is a special case of a software supply-chain attack. The project in this report, named diverse double-compiling for cryptocurrency (DDC4CC), demonstrates and explains a defense for cryptocurrency software against trusting trust attacks. READ MORE
-
3. ROP-chain generation using Genetic Programming : GENROP
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Return Oriented Programming (ROP) is the de-facto technique used to exploit most of today’s native-code vulnerabilities hiding in old and newly developed software alike. By reusing bits and pieces of already existing code (gadgets), ROP can be used to bypass the ever-present Write ⊕ eXecute (W⊕X) security feature, which enforces memory to only be marked as either executable or writable; never both at the same time. READ MORE
-
4. Pattern Matching for Non-inductive Types in Code-generating Haskell EDSLs
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Internet of Things (IoT) devices are becoming increasingly common in the modern home, as are IoT-related security vulnerabilities. There are reasons to believe that many of these vulnerabilities were caused by programming errors made possible due to working in a low-level programming language. READ MORE
-
5. Investigation of dynamic control ML algorithms on existing and future Arm microNPU systems
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : In this thesis, dynamically controlled machine learning algorithms running on state of the art Arm microNPUs, with an attached Cortex-M CPU, were investigated. The machine learning framework used was Tensorflow and different subsets of it, such as Tensorflow Lite micro. READ MORE