Map
Index
Random
Help
th

Quote: oblivious hashing is a hash function over assignments and control flows; verify software protection by hashing security-sensitive code paths

topics > all references > references c-d > QuoteRef: chenY10_2002 , p. abstract



Topic:
hash table and hash functions
Topic:
software maintenance by patching
Topic:
monitored variable

Quotation Skeleton

We describe a novel software verification primitive called … implicit representation of a hash value based on … of the code. … [p. 406] hashing assignments and control flows captures most … Using the comma operator [of C] and a temporary … [syntactic] transformation lets us intercept the value of assignment, and at … [p. 410] [For example,] Prior to shipping a protected application, … run the given function on the specified inputs, …   Google-1   Google-2

Copyright clearance needed for quotation.

Additional Titles

Quote: use C's comma operator to syntactically add code to assignments while preserving C semantics

Related Topics up

Topic: hash table and hash functions (41 items)
Topic: software maintenance by patching (26 items)
Topic: monitored variable (27 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.