Essays about: "Compiler security"

Showing result 1 - 5 of 9 essays containing the words Compiler security.

  1. 1. Functional Programming Languages and the JVM : Comparing Functional Language Compilation Techniques for the JVM

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Asta Olofsson; [2023]
    Keywords : Compilation; Functional Programming; Java; Kompilering; Funktionell Programmering; Java;

    Abstract : Because of its security, high availability, and automatic memory management, the JVM (Java Virtual Machine) is a desirable execution environment. However, since the JVM was originally made for Java, which is an objectoriented language, it is hard for languages with other paradigms to run on it. READ MORE

  2. 2. Diverse Double-Compiling to Harden Cryptocurrency Software

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Niklas Rosencrantz; [2023]
    Keywords : Trusting trust; Compiler security; Software Supply Chain; Trojan Horse; Cryptocurrency; Datasäkerhet; kompilator; datavirus; kryptovaluta; Trojansk häst;

    Abstract : A trusting trust attack is a special case of a software supply-chain attack. The project in this report, named diverse double-compiling for cryptocurrency (DDC4CC), demonstrates and explains a defense for cryptocurrency software against trusting trust attacks. READ MORE

  3. 3. ROP-chain generation using Genetic Programming : GENROP

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Jonatan Branting; [2022]
    Keywords : return oriented programming; genetic programming; binary exploitation; ROP; GP;

    Abstract : Return Oriented Programming (ROP) is the de-facto technique used to exploit most of today’s native-code vulnerabilities hiding in old and newly developed software alike. By reusing bits and pieces of already existing code (gadgets), ROP can be used to bypass the ever-present Write ⊕ eXecute (W⊕X) security feature, which enforces memory to only be marked as either executable or writable; never both at the same time. READ MORE

  4. 4. Pattern Matching for Non-inductive Types in Code-generating Haskell EDSLs

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Thomas Li; [2021-09-20]
    Keywords : haskell; haski; edsl; pattern matching; embedded domain-specific languages; functional programming;

    Abstract : Internet of Things (IoT) devices are becoming increasingly common in the modern home, as are IoT-related security vulnerabilities. There are reasons to believe that many of these vulnerabilities were caused by programming errors made possible due to working in a low-level programming language. READ MORE

  5. 5. Investigation of dynamic control ML algorithms on existing and future Arm microNPU systems

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Joel Åhlund; David Cordesius; [2021]
    Keywords : Dynamic control; NPU; MTCNN; Machine learning; Neural networks; Technology and Engineering;

    Abstract : In this thesis, dynamically controlled machine learning algorithms running on state of the art Arm microNPUs, with an attached Cortex-M CPU, were investigated. The machine learning framework used was Tensorflow and different subsets of it, such as Tensorflow Lite micro. READ MORE