Securing untrusted code via compiler-agnostic binary rewriting.
Richard WartellVishwath MohanKevin W. HamlenZhiqiang LinPublished in: ACSAC (2012)
Keyphrases
- code generation
- error correcting
- java virtual machine
- source code
- general purpose
- instruction scheduling
- industry standard
- binary codes
- privacy preserving
- error correcting codes
- third party
- programming language
- logical operations
- programs written
- software systems
- rewrite rules
- rewriting rules
- address space
- program code
- java bytecode
- datalog programs
- non binary
- error correction
- data integration
- database management systems
- gray code
- data management
- distributed memory machines