SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 2 Issue 5 ǁ May. 2014 ǁ PP.42-44
www.ijres.org 42 | Page
Secure Programming Language Cs
M.A. Malkov
Russian Research Center for Artificial Intelligence
Abstract: This is a preliminary communication on the computer language Cs, which provides the full security
of a computer. We call the security internal. The language inherits the syntax of language C++ but with the new
rules of declaration of arrays, with an extension of cycle operations, and without pointers, goto, and functions
like calloc-free (allocation-deallocation of memory). The language can provide external security (from cyber-
attacks), if its operation system changes the incoming programs in accordance with standards of Cs. And if its
Internet provider is special.
I. Introduction
There are internal and external computer securities. The internal security protects data and programs if
programs created by a language are executed. The external security provides protection against spyware,
viruses, and the other cyber-attacks.
We offer the programming language Cs for the internal security. In particular, Cs provides protection
against wrong addresses and infinite loops.
The language can be used to provide the more deep internal security and the external security, too. For
that its operating system must permit only programs created by the language.
This means that the system is closed for programs not created by the language. So it is necessarily to
create all existing programs anew. This is a very difficult problem. But we can overcome this by compositing a
program which remakes existing programs in accordance with the standards of the language. This program must
be used by the operation system to change programs incoming from Internet.
All users of the language must use its operating system and a special processor. The processor provides
additional computer security and accelerates execution of programs. The motherboard is special too, since it
provides additional security. More detailed information about the processor and the motherboard is out of the
communication.
II. Syntax of language
The language inherits the syntax of programming language C++ [1] but pointers and functions like
calloc-free (allocation-deallocation of memory) are excluded and rules of declaration of data arrays are changed.
Some additional changes must be done, too.
The pointers are excluded since they give unrestricted access to any part of memory. But there are
implicit pointers, they are names of data and programs. These pointers are dereferenced at executions. If values
of a pointer are pointers, i.e. values of a name are names, then the pointer is dereferenced twice. The
programming language Ruby [2] does not contain explicit pointers, too.
The functions of allocation-deallocation lead to random distribution of memory. They must be removed
too, since memory for data and programs is automatically allocated if a program begins a block and deallocated
if the program leaves the block, or is allocated-deallocated in accordance with the memory classes static, extern
or with modifier public, the modifier is used as additional memory class. This allows allocating continuous areas
of memory for data and programs. As a result, the control of security of data and programs becomes simpler.
The rules are changed for declarations of data arrays with variable length. The new rules of the
declarations demand to indicate not only maximal length of arrays but to indicate the variable containing current
length of the first component of arrays. This allows interrupting a program if an address is outside of an array,
i.e. this ensures the security of data and programs. Furthermore, arrays can be operated entirely without detailing
its structure.
It is enough to specify the length of the first component of arrays since, by rules of the language C++,
the length of the remaining components is fixed.
This is an example of declaring a data array: int m, M[1000,m] [2]={0,1}. The array is declared such
that the current value of the first component equals 1 (m=1), the current length of the array equals 1*2 bytes, the
maximal length is 1000*2 bytes. If one writes a new value of the array he must use m as the first component.
The operators goto, while, do-while are excluded, the operator for can replace while and do-while
operators. The operator for has the additional fourth field containing the maximal number of cycling. By default
the number equals 1 000 000. Hence infinite loops are excluded.
Secure programming language Cs
www.ijres.org 43 | Page
III. Compiler of language
At mathematical point of view, each class of language C++ is an algebra since the class contains a set
(data) and operations on this set (programs). A project is an algebra too, and classes are, in fact, subalgebras of
the project. The compiler allocates each algebra a part of RAM. This part contains an instruction area and a data
area. The instruction area is inaccessible for changing by its instructions and takes a continuous part of memory.
The data area is available for changing and also occupies a continuous part of memory. All these will allow
controlling the security of instructions and data with minimal expense of time.
The compiler provides relative addresses of instructions and data. The address 0 of instructions is an
address of instruction area beginning, the address 0 of data is an address of data area beginning. Programs will
be interrupted if an address is out of data area or out of array area.
The compiler gives a relative address of memory. The operation system gives a real address of memory
and places data area direct after program area.
The compiler must identify program errors as much as possible. All existing algorithms must be used.
IV. Operational system
The operational system (OS) is constructed only by means of the language. OS is an algebra too, the
compiler allocates OS not only relative, but also a real memory. In this case, the compiler performs a simple
function of OS.
OS performs the basic functions of operational systems, in particular organizes execution of programs
in multitasking mode, allocates real memory for compiled program, works with external devices, provides a
library of utilities, and so on. OS does not interfere with inner workings of programs and not collect information
about the inner workings. But OS interrupts programs and then removes them if an address is wrong or by a user
request.
OS increases a data area on request of an algebra. If the increase is not possible OS performs garbage
collection by moving algebras in memory.
OS allocates memory for the algebra of the system designer. Only the site of the designer has access to
this algebra.
V. Site of designer
The designer is a very big collective of programmers since the designer must create immense volume
of soft. This site is a server for all users of the language system.
The site provides users of the system with new programs and with corrections of existing programs. All
programs are tested for safety and put into the library by a special program.
The site is an Internet provider. It provides users with unlimited Internet connection. The site performs
only protection against cyber-attacks such as DDOS. For that the site records all users of the security system and
their subscribes. The site blocks all unregistered subscribers during a cyber-attack. The blocking is partial since
a cyber-attack can be organized by using only subscribers of users of the security system. In this case, the site
does not block users (registered and unregistered) identified by a random selection.
VI. Other properties of language
The other properties are used to simplify programs. Then some properties of C++ become unnecessary
but they can be used by one if he likes them.
The operator if is unnecessary, it is replaced by the operation ?: . The second and third operands of the
operation can contain any operators, in particular the operator for. The third operand can be absent.
The language C++ is functional. Every operator has a value, the value can be void. If a sequence of
operators is closed by parenthesis then a value of the sequence is a value of the last operator. But a sequence of
operators for functions has values for every operator. The property is used by every two-placed operation in Cs.
So there are a sequence of values for every two place operation ° : (X1,...,Xn) °(Y1,...,Yn)=(X1°Y1,...,Xn°Yn). But
there is only one value if a symbol ° stands before a sequence: °(Z1,...,Zn)=Z1°…°Zn. For example,
&&((X1,X2,X3)||(Y1,Y2,Y3)) =(X1||Y1)&&(X2||Y2)&&(X3||Y3).
Dots are used to construct a sequence of values with some step. If the step equals 1 then one use the
construction a,…,b for the sequence a,a+1,…,b if b≤ a, and the sequence is empty if b>a. For example, int
m,n=1000,a[m,n]={b,…,c}; . If a step does not equal 1, then one use the construction a,b,…,c for the sequence
a,a+(b-a),a+2*(b-a),…,a+m*(b-a) where a+m*(b-a)≤c<a+(m+1)(b-a).
Labels in Cs have from 1 to 8 any symbols except : . The labels can be used as commentaries before
blocks or operators. Then they have no reference. But there are labels that have references. In addition to C++,
the labels can be used in the operators continue, break and switch. Then the operator switch is used like continue
if continue will be out of a cycle. For example, switch(a+b), break(?). And there are arrays of labels, they are
used by the same operators.
Secure programming language Cs
www.ijres.org 44 | Page
In Cs definitions of data can be added by pointing out data length. For example, int 5bit X, 1000byte Y,
100 Z; float 1000.10 F;, here X has length of 5 bit, Y has length of 1000 bytes, Z has length of 100 decimal
digits, F has mantissa of 1000 decimal digits and exponent of 10 decimal digits, so 10-10
<F<1010
.
New types are introduced only by using specifier typedef. In particular the definition: typedef struct X
{int x; float f;};, introduces the new type, the definition: struct X, Y {int x; float f;}; , does not introduce a
type.
Definitions of classes are replaced by definitions of structures, components of the structures can be
programs. The definitions do not differ from definitions of classes.
The priorities (ranges) of operations &, | and ^ are changed. They have the same priority, which follows
after the priority of operations << and >>. For example, one can use the expression a | b>>c!=d instead of the
expression (a | b>>c ) != d.
An arithmetic expression can not be Boolean. This allows the compiler to find more mistakes in
programs. So one must use the expression x==0 instead of !x.
Non-recursive functions are executed more simple and without any additional time of .their execution.
These functions can be used instead of inline functions without additional memory requested by inline functions.
The type char is used only as an array of characters without the symbol 0 in the end. The type cannot
be used as an array of integers of length 8. Instead the type int 1byte must be used. The new type string is used
as an array of characters with the symbol 0 in the end. The operation + is used to concatenate data of types
char and string.
If one inputs data he can point out to execute some operators without waiting end of the imputation.
The sequence of the operators must be ended by the operator wait; .
References
[1] B. Stroustrup, The C++ programming language, fourth edition, Addison-Wesley, 2013.
[2] David Thomas, Chad Fowler, Andrew Hunt, Programming Ruby: The Pragmatic Programmer’s Guide, second edition, Addison-
Wesley, 2004.

More Related Content

What's hot

PPT on Data Science Using Python
PPT on Data Science Using PythonPPT on Data Science Using Python
PPT on Data Science Using PythonNishantKumar1179
 
Python introduction towards data science
Python introduction towards data sciencePython introduction towards data science
Python introduction towards data sciencedeepak teja
 
Introduction To Programming with Python
Introduction To Programming with PythonIntroduction To Programming with Python
Introduction To Programming with PythonSushant Mane
 
Python Basics
Python BasicsPython Basics
Python BasicsPooja B S
 
Basic Concepts in Python
Basic Concepts in PythonBasic Concepts in Python
Basic Concepts in PythonSumit Satam
 
Python programming lanuguage
Python programming lanuguagePython programming lanuguage
Python programming lanuguageBurhan Ahmed
 
Introduction to python programming
Introduction to python programmingIntroduction to python programming
Introduction to python programmingSrinivas Narasegouda
 
11 Unit 1 Chapter 03 Data Handling
11   Unit 1 Chapter 03 Data Handling11   Unit 1 Chapter 03 Data Handling
11 Unit 1 Chapter 03 Data HandlingPraveen M Jigajinni
 
isa architecture
isa architectureisa architecture
isa architectureAJAL A J
 
Python 3 Programming Language
Python 3 Programming LanguagePython 3 Programming Language
Python 3 Programming LanguageTahani Al-Manie
 
PYTHON NOTES
PYTHON NOTESPYTHON NOTES
PYTHON NOTESNi
 
Chapter Seven(1)
Chapter Seven(1)Chapter Seven(1)
Chapter Seven(1)bolovv
 
Introduction to Python
Introduction to Python Introduction to Python
Introduction to Python C. ASWINI
 
Python programming
Python programmingPython programming
Python programmingsaroja20
 
Chapter Eight(1)
Chapter Eight(1)Chapter Eight(1)
Chapter Eight(1)bolovv
 
Python programming
Python programmingPython programming
Python programmingsaroja20
 

What's hot (20)

PPT on Data Science Using Python
PPT on Data Science Using PythonPPT on Data Science Using Python
PPT on Data Science Using Python
 
Python introduction towards data science
Python introduction towards data sciencePython introduction towards data science
Python introduction towards data science
 
Introduction To Programming with Python
Introduction To Programming with PythonIntroduction To Programming with Python
Introduction To Programming with Python
 
Python Basics
Python BasicsPython Basics
Python Basics
 
Scientific Python
Scientific PythonScientific Python
Scientific Python
 
Basic Concepts in Python
Basic Concepts in PythonBasic Concepts in Python
Basic Concepts in Python
 
COA-QUESTION-BANK.pdf
COA-QUESTION-BANK.pdfCOA-QUESTION-BANK.pdf
COA-QUESTION-BANK.pdf
 
Python programming
Python programmingPython programming
Python programming
 
Chapter2.1 2-mikroprocessor
Chapter2.1 2-mikroprocessorChapter2.1 2-mikroprocessor
Chapter2.1 2-mikroprocessor
 
Python programming lanuguage
Python programming lanuguagePython programming lanuguage
Python programming lanuguage
 
Introduction to python programming
Introduction to python programmingIntroduction to python programming
Introduction to python programming
 
11 Unit 1 Chapter 03 Data Handling
11   Unit 1 Chapter 03 Data Handling11   Unit 1 Chapter 03 Data Handling
11 Unit 1 Chapter 03 Data Handling
 
isa architecture
isa architectureisa architecture
isa architecture
 
Python 3 Programming Language
Python 3 Programming LanguagePython 3 Programming Language
Python 3 Programming Language
 
PYTHON NOTES
PYTHON NOTESPYTHON NOTES
PYTHON NOTES
 
Chapter Seven(1)
Chapter Seven(1)Chapter Seven(1)
Chapter Seven(1)
 
Introduction to Python
Introduction to Python Introduction to Python
Introduction to Python
 
Python programming
Python programmingPython programming
Python programming
 
Chapter Eight(1)
Chapter Eight(1)Chapter Eight(1)
Chapter Eight(1)
 
Python programming
Python programmingPython programming
Python programming
 

Viewers also liked

Uncertainties in the Determination of the W Boson Mass
Uncertainties in the Determination of the W Boson MassUncertainties in the Determination of the W Boson Mass
Uncertainties in the Determination of the W Boson MassIJRES Journal
 
Synthesis, Characterization and Study of Antioxidant Activities of Some New P...
Synthesis, Characterization and Study of Antioxidant Activities of Some New P...Synthesis, Characterization and Study of Antioxidant Activities of Some New P...
Synthesis, Characterization and Study of Antioxidant Activities of Some New P...IJRES Journal
 
Application Of The Three-In-One Control Platform Based On OPC In The Lifting-...
Application Of The Three-In-One Control Platform Based On OPC In The Lifting-...Application Of The Three-In-One Control Platform Based On OPC In The Lifting-...
Application Of The Three-In-One Control Platform Based On OPC In The Lifting-...IJRES Journal
 
Sintering of Silica-Nickel Nanocomposites
Sintering of Silica-Nickel NanocompositesSintering of Silica-Nickel Nanocomposites
Sintering of Silica-Nickel NanocompositesIJRES Journal
 
Implementation of the trinity of the control system based on OPC
Implementation of the trinity of the control system based on OPCImplementation of the trinity of the control system based on OPC
Implementation of the trinity of the control system based on OPCIJRES Journal
 
Wine from Water Melon Juice Using Palm Wine Yeast Isolate
Wine from Water Melon Juice Using Palm Wine Yeast IsolateWine from Water Melon Juice Using Palm Wine Yeast Isolate
Wine from Water Melon Juice Using Palm Wine Yeast IsolateIJRES Journal
 
The effect of disturbance factor on the stability of tunnels (Case study: Tun...
The effect of disturbance factor on the stability of tunnels (Case study: Tun...The effect of disturbance factor on the stability of tunnels (Case study: Tun...
The effect of disturbance factor on the stability of tunnels (Case study: Tun...IJRES Journal
 
Jaw crusher kinematics simulation and analysis
Jaw crusher kinematics simulation and analysisJaw crusher kinematics simulation and analysis
Jaw crusher kinematics simulation and analysisIJRES Journal
 
Effect of LVOF Sprayed Coating in Oxidation & Hot Corrosion Performance of Bo...
Effect of LVOF Sprayed Coating in Oxidation & Hot Corrosion Performance of Bo...Effect of LVOF Sprayed Coating in Oxidation & Hot Corrosion Performance of Bo...
Effect of LVOF Sprayed Coating in Oxidation & Hot Corrosion Performance of Bo...IJRES Journal
 
A High Order Continuation Based On Time Power Series Expansion And Time Ratio...
A High Order Continuation Based On Time Power Series Expansion And Time Ratio...A High Order Continuation Based On Time Power Series Expansion And Time Ratio...
A High Order Continuation Based On Time Power Series Expansion And Time Ratio...IJRES Journal
 
High Step-Up Converter with Voltage Multiplier Module for Renewable Energy Sy...
High Step-Up Converter with Voltage Multiplier Module for Renewable Energy Sy...High Step-Up Converter with Voltage Multiplier Module for Renewable Energy Sy...
High Step-Up Converter with Voltage Multiplier Module for Renewable Energy Sy...IJRES Journal
 
Introduction to WEDM and Constant Tension Control
Introduction to WEDM and Constant Tension ControlIntroduction to WEDM and Constant Tension Control
Introduction to WEDM and Constant Tension ControlIJRES Journal
 
Experimental Comparison of Trajectory Planning Algorithms for Wheeled Mobile ...
Experimental Comparison of Trajectory Planning Algorithms for Wheeled Mobile ...Experimental Comparison of Trajectory Planning Algorithms for Wheeled Mobile ...
Experimental Comparison of Trajectory Planning Algorithms for Wheeled Mobile ...IJRES Journal
 
Mobile Cloud Computing: Academic Services for Palestinian Higher Education In...
Mobile Cloud Computing: Academic Services for Palestinian Higher Education In...Mobile Cloud Computing: Academic Services for Palestinian Higher Education In...
Mobile Cloud Computing: Academic Services for Palestinian Higher Education In...IJRES Journal
 
Experimental Study of Sulphate Attack on Neutralized Red Mud
Experimental Study of Sulphate Attack on Neutralized Red MudExperimental Study of Sulphate Attack on Neutralized Red Mud
Experimental Study of Sulphate Attack on Neutralized Red MudIJRES Journal
 
Empirical Investigation of Indoor/NLOS Propagation at Millimeter Wave Bands F...
Empirical Investigation of Indoor/NLOS Propagation at Millimeter Wave Bands F...Empirical Investigation of Indoor/NLOS Propagation at Millimeter Wave Bands F...
Empirical Investigation of Indoor/NLOS Propagation at Millimeter Wave Bands F...IJRES Journal
 
A Simple and Robust Algorithm for the Detection of QRS Complexes
A Simple and Robust Algorithm for the Detection of QRS ComplexesA Simple and Robust Algorithm for the Detection of QRS Complexes
A Simple and Robust Algorithm for the Detection of QRS ComplexesIJRES Journal
 
A Mathematical Model for the Enhancement of Stress Induced Hypoglycaemia by A...
A Mathematical Model for the Enhancement of Stress Induced Hypoglycaemia by A...A Mathematical Model for the Enhancement of Stress Induced Hypoglycaemia by A...
A Mathematical Model for the Enhancement of Stress Induced Hypoglycaemia by A...IJRES Journal
 
Heart Disease Prediction Using Data Mining Techniques
Heart Disease Prediction Using Data Mining TechniquesHeart Disease Prediction Using Data Mining Techniques
Heart Disease Prediction Using Data Mining TechniquesIJRES Journal
 

Viewers also liked (19)

Uncertainties in the Determination of the W Boson Mass
Uncertainties in the Determination of the W Boson MassUncertainties in the Determination of the W Boson Mass
Uncertainties in the Determination of the W Boson Mass
 
Synthesis, Characterization and Study of Antioxidant Activities of Some New P...
Synthesis, Characterization and Study of Antioxidant Activities of Some New P...Synthesis, Characterization and Study of Antioxidant Activities of Some New P...
Synthesis, Characterization and Study of Antioxidant Activities of Some New P...
 
Application Of The Three-In-One Control Platform Based On OPC In The Lifting-...
Application Of The Three-In-One Control Platform Based On OPC In The Lifting-...Application Of The Three-In-One Control Platform Based On OPC In The Lifting-...
Application Of The Three-In-One Control Platform Based On OPC In The Lifting-...
 
Sintering of Silica-Nickel Nanocomposites
Sintering of Silica-Nickel NanocompositesSintering of Silica-Nickel Nanocomposites
Sintering of Silica-Nickel Nanocomposites
 
Implementation of the trinity of the control system based on OPC
Implementation of the trinity of the control system based on OPCImplementation of the trinity of the control system based on OPC
Implementation of the trinity of the control system based on OPC
 
Wine from Water Melon Juice Using Palm Wine Yeast Isolate
Wine from Water Melon Juice Using Palm Wine Yeast IsolateWine from Water Melon Juice Using Palm Wine Yeast Isolate
Wine from Water Melon Juice Using Palm Wine Yeast Isolate
 
The effect of disturbance factor on the stability of tunnels (Case study: Tun...
The effect of disturbance factor on the stability of tunnels (Case study: Tun...The effect of disturbance factor on the stability of tunnels (Case study: Tun...
The effect of disturbance factor on the stability of tunnels (Case study: Tun...
 
Jaw crusher kinematics simulation and analysis
Jaw crusher kinematics simulation and analysisJaw crusher kinematics simulation and analysis
Jaw crusher kinematics simulation and analysis
 
Effect of LVOF Sprayed Coating in Oxidation & Hot Corrosion Performance of Bo...
Effect of LVOF Sprayed Coating in Oxidation & Hot Corrosion Performance of Bo...Effect of LVOF Sprayed Coating in Oxidation & Hot Corrosion Performance of Bo...
Effect of LVOF Sprayed Coating in Oxidation & Hot Corrosion Performance of Bo...
 
A High Order Continuation Based On Time Power Series Expansion And Time Ratio...
A High Order Continuation Based On Time Power Series Expansion And Time Ratio...A High Order Continuation Based On Time Power Series Expansion And Time Ratio...
A High Order Continuation Based On Time Power Series Expansion And Time Ratio...
 
High Step-Up Converter with Voltage Multiplier Module for Renewable Energy Sy...
High Step-Up Converter with Voltage Multiplier Module for Renewable Energy Sy...High Step-Up Converter with Voltage Multiplier Module for Renewable Energy Sy...
High Step-Up Converter with Voltage Multiplier Module for Renewable Energy Sy...
 
Introduction to WEDM and Constant Tension Control
Introduction to WEDM and Constant Tension ControlIntroduction to WEDM and Constant Tension Control
Introduction to WEDM and Constant Tension Control
 
Experimental Comparison of Trajectory Planning Algorithms for Wheeled Mobile ...
Experimental Comparison of Trajectory Planning Algorithms for Wheeled Mobile ...Experimental Comparison of Trajectory Planning Algorithms for Wheeled Mobile ...
Experimental Comparison of Trajectory Planning Algorithms for Wheeled Mobile ...
 
Mobile Cloud Computing: Academic Services for Palestinian Higher Education In...
Mobile Cloud Computing: Academic Services for Palestinian Higher Education In...Mobile Cloud Computing: Academic Services for Palestinian Higher Education In...
Mobile Cloud Computing: Academic Services for Palestinian Higher Education In...
 
Experimental Study of Sulphate Attack on Neutralized Red Mud
Experimental Study of Sulphate Attack on Neutralized Red MudExperimental Study of Sulphate Attack on Neutralized Red Mud
Experimental Study of Sulphate Attack on Neutralized Red Mud
 
Empirical Investigation of Indoor/NLOS Propagation at Millimeter Wave Bands F...
Empirical Investigation of Indoor/NLOS Propagation at Millimeter Wave Bands F...Empirical Investigation of Indoor/NLOS Propagation at Millimeter Wave Bands F...
Empirical Investigation of Indoor/NLOS Propagation at Millimeter Wave Bands F...
 
A Simple and Robust Algorithm for the Detection of QRS Complexes
A Simple and Robust Algorithm for the Detection of QRS ComplexesA Simple and Robust Algorithm for the Detection of QRS Complexes
A Simple and Robust Algorithm for the Detection of QRS Complexes
 
A Mathematical Model for the Enhancement of Stress Induced Hypoglycaemia by A...
A Mathematical Model for the Enhancement of Stress Induced Hypoglycaemia by A...A Mathematical Model for the Enhancement of Stress Induced Hypoglycaemia by A...
A Mathematical Model for the Enhancement of Stress Induced Hypoglycaemia by A...
 
Heart Disease Prediction Using Data Mining Techniques
Heart Disease Prediction Using Data Mining TechniquesHeart Disease Prediction Using Data Mining Techniques
Heart Disease Prediction Using Data Mining Techniques
 

Similar to Secure Programming Language Cs

Information security and programming language s C
Information security and programming language s CInformation security and programming language s C
Information security and programming language s CIJRES Journal
 
PRINCE PRESENTATION(1).pptx
PRINCE PRESENTATION(1).pptxPRINCE PRESENTATION(1).pptx
PRINCE PRESENTATION(1).pptxSajalKesharwani2
 
BIT204 1 Software Fundamentals
BIT204 1 Software FundamentalsBIT204 1 Software Fundamentals
BIT204 1 Software FundamentalsJames Uren
 
Interoduction to c++
Interoduction to c++Interoduction to c++
Interoduction to c++Amresh Raj
 
Possibility of arbitrary code execution by Step-Oriented Programming by Hiroa...
Possibility of arbitrary code execution by Step-Oriented Programming by Hiroa...Possibility of arbitrary code execution by Step-Oriented Programming by Hiroa...
Possibility of arbitrary code execution by Step-Oriented Programming by Hiroa...CODE BLUE
 
Possibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented ProgrammingPossibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented Programmingkozossakai
 
Dotnetintroduce 100324201546-phpapp02
Dotnetintroduce 100324201546-phpapp02Dotnetintroduce 100324201546-phpapp02
Dotnetintroduce 100324201546-phpapp02Wei Sun
 
SPCC:System programming and compiler construction
SPCC:System programming and compiler constructionSPCC:System programming and compiler construction
SPCC:System programming and compiler constructionmohdumaira1
 
C basic questions&amp;ansrs by shiva kumar kella
C basic questions&amp;ansrs by shiva kumar kellaC basic questions&amp;ansrs by shiva kumar kella
C basic questions&amp;ansrs by shiva kumar kellaManoj Kumar kothagulla
 
Programming in c++
Programming in c++Programming in c++
Programming in c++MalarMohana
 
Programming in c++
Programming in c++Programming in c++
Programming in c++sujathavvv
 
Data structure week 1
Data structure week 1Data structure week 1
Data structure week 1karmuhtam
 
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdf
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdfAERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdf
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdfssuserb3a23b
 

Similar to Secure Programming Language Cs (20)

Information security and programming language s C
Information security and programming language s CInformation security and programming language s C
Information security and programming language s C
 
PRINCE PRESENTATION(1).pptx
PRINCE PRESENTATION(1).pptxPRINCE PRESENTATION(1).pptx
PRINCE PRESENTATION(1).pptx
 
Introduction to ‘C’ Language
Introduction to ‘C’ LanguageIntroduction to ‘C’ Language
Introduction to ‘C’ Language
 
BIT204 1 Software Fundamentals
BIT204 1 Software FundamentalsBIT204 1 Software Fundamentals
BIT204 1 Software Fundamentals
 
C Tutorials
C TutorialsC Tutorials
C Tutorials
 
Bcsl 031 solve assignment
Bcsl 031 solve assignmentBcsl 031 solve assignment
Bcsl 031 solve assignment
 
Mp lab manual
Mp lab manualMp lab manual
Mp lab manual
 
Interoduction to c++
Interoduction to c++Interoduction to c++
Interoduction to c++
 
Possibility of arbitrary code execution by Step-Oriented Programming by Hiroa...
Possibility of arbitrary code execution by Step-Oriented Programming by Hiroa...Possibility of arbitrary code execution by Step-Oriented Programming by Hiroa...
Possibility of arbitrary code execution by Step-Oriented Programming by Hiroa...
 
Possibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented ProgrammingPossibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented Programming
 
Dotnetintroduce 100324201546-phpapp02
Dotnetintroduce 100324201546-phpapp02Dotnetintroduce 100324201546-phpapp02
Dotnetintroduce 100324201546-phpapp02
 
SPCC:System programming and compiler construction
SPCC:System programming and compiler constructionSPCC:System programming and compiler construction
SPCC:System programming and compiler construction
 
C with lab
C with labC with lab
C with lab
 
C basic questions&amp;ansrs by shiva kumar kella
C basic questions&amp;ansrs by shiva kumar kellaC basic questions&amp;ansrs by shiva kumar kella
C basic questions&amp;ansrs by shiva kumar kella
 
Programming in c++
Programming in c++Programming in c++
Programming in c++
 
Programming in c++
Programming in c++Programming in c++
Programming in c++
 
Data structure week 1
Data structure week 1Data structure week 1
Data structure week 1
 
C program full materials.pdf
C program  full materials.pdfC program  full materials.pdf
C program full materials.pdf
 
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdf
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdfAERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdf
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdf
 
Erlang, an overview
Erlang, an overviewErlang, an overview
Erlang, an overview
 

More from IJRES Journal

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...IJRES Journal
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...IJRES Journal
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityIJRES Journal
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...IJRES Journal
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesIJRES Journal
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresIJRES Journal
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...IJRES Journal
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodIJRES Journal
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionIJRES Journal
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningIJRES Journal
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchIJRES Journal
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowIJRES Journal
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...IJRES Journal
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsIJRES Journal
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalIJRES Journal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...IJRES Journal
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...IJRES Journal
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesIJRES Journal
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...IJRES Journal
 

More from IJRES Journal (20)

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil properties
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their Structures
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible Rod
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioning
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision Workbench
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and Now
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirs
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound Signal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubes
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Secure Programming Language Cs

  • 1. International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 www.ijres.org Volume 2 Issue 5 ǁ May. 2014 ǁ PP.42-44 www.ijres.org 42 | Page Secure Programming Language Cs M.A. Malkov Russian Research Center for Artificial Intelligence Abstract: This is a preliminary communication on the computer language Cs, which provides the full security of a computer. We call the security internal. The language inherits the syntax of language C++ but with the new rules of declaration of arrays, with an extension of cycle operations, and without pointers, goto, and functions like calloc-free (allocation-deallocation of memory). The language can provide external security (from cyber- attacks), if its operation system changes the incoming programs in accordance with standards of Cs. And if its Internet provider is special. I. Introduction There are internal and external computer securities. The internal security protects data and programs if programs created by a language are executed. The external security provides protection against spyware, viruses, and the other cyber-attacks. We offer the programming language Cs for the internal security. In particular, Cs provides protection against wrong addresses and infinite loops. The language can be used to provide the more deep internal security and the external security, too. For that its operating system must permit only programs created by the language. This means that the system is closed for programs not created by the language. So it is necessarily to create all existing programs anew. This is a very difficult problem. But we can overcome this by compositing a program which remakes existing programs in accordance with the standards of the language. This program must be used by the operation system to change programs incoming from Internet. All users of the language must use its operating system and a special processor. The processor provides additional computer security and accelerates execution of programs. The motherboard is special too, since it provides additional security. More detailed information about the processor and the motherboard is out of the communication. II. Syntax of language The language inherits the syntax of programming language C++ [1] but pointers and functions like calloc-free (allocation-deallocation of memory) are excluded and rules of declaration of data arrays are changed. Some additional changes must be done, too. The pointers are excluded since they give unrestricted access to any part of memory. But there are implicit pointers, they are names of data and programs. These pointers are dereferenced at executions. If values of a pointer are pointers, i.e. values of a name are names, then the pointer is dereferenced twice. The programming language Ruby [2] does not contain explicit pointers, too. The functions of allocation-deallocation lead to random distribution of memory. They must be removed too, since memory for data and programs is automatically allocated if a program begins a block and deallocated if the program leaves the block, or is allocated-deallocated in accordance with the memory classes static, extern or with modifier public, the modifier is used as additional memory class. This allows allocating continuous areas of memory for data and programs. As a result, the control of security of data and programs becomes simpler. The rules are changed for declarations of data arrays with variable length. The new rules of the declarations demand to indicate not only maximal length of arrays but to indicate the variable containing current length of the first component of arrays. This allows interrupting a program if an address is outside of an array, i.e. this ensures the security of data and programs. Furthermore, arrays can be operated entirely without detailing its structure. It is enough to specify the length of the first component of arrays since, by rules of the language C++, the length of the remaining components is fixed. This is an example of declaring a data array: int m, M[1000,m] [2]={0,1}. The array is declared such that the current value of the first component equals 1 (m=1), the current length of the array equals 1*2 bytes, the maximal length is 1000*2 bytes. If one writes a new value of the array he must use m as the first component. The operators goto, while, do-while are excluded, the operator for can replace while and do-while operators. The operator for has the additional fourth field containing the maximal number of cycling. By default the number equals 1 000 000. Hence infinite loops are excluded.
  • 2. Secure programming language Cs www.ijres.org 43 | Page III. Compiler of language At mathematical point of view, each class of language C++ is an algebra since the class contains a set (data) and operations on this set (programs). A project is an algebra too, and classes are, in fact, subalgebras of the project. The compiler allocates each algebra a part of RAM. This part contains an instruction area and a data area. The instruction area is inaccessible for changing by its instructions and takes a continuous part of memory. The data area is available for changing and also occupies a continuous part of memory. All these will allow controlling the security of instructions and data with minimal expense of time. The compiler provides relative addresses of instructions and data. The address 0 of instructions is an address of instruction area beginning, the address 0 of data is an address of data area beginning. Programs will be interrupted if an address is out of data area or out of array area. The compiler gives a relative address of memory. The operation system gives a real address of memory and places data area direct after program area. The compiler must identify program errors as much as possible. All existing algorithms must be used. IV. Operational system The operational system (OS) is constructed only by means of the language. OS is an algebra too, the compiler allocates OS not only relative, but also a real memory. In this case, the compiler performs a simple function of OS. OS performs the basic functions of operational systems, in particular organizes execution of programs in multitasking mode, allocates real memory for compiled program, works with external devices, provides a library of utilities, and so on. OS does not interfere with inner workings of programs and not collect information about the inner workings. But OS interrupts programs and then removes them if an address is wrong or by a user request. OS increases a data area on request of an algebra. If the increase is not possible OS performs garbage collection by moving algebras in memory. OS allocates memory for the algebra of the system designer. Only the site of the designer has access to this algebra. V. Site of designer The designer is a very big collective of programmers since the designer must create immense volume of soft. This site is a server for all users of the language system. The site provides users of the system with new programs and with corrections of existing programs. All programs are tested for safety and put into the library by a special program. The site is an Internet provider. It provides users with unlimited Internet connection. The site performs only protection against cyber-attacks such as DDOS. For that the site records all users of the security system and their subscribes. The site blocks all unregistered subscribers during a cyber-attack. The blocking is partial since a cyber-attack can be organized by using only subscribers of users of the security system. In this case, the site does not block users (registered and unregistered) identified by a random selection. VI. Other properties of language The other properties are used to simplify programs. Then some properties of C++ become unnecessary but they can be used by one if he likes them. The operator if is unnecessary, it is replaced by the operation ?: . The second and third operands of the operation can contain any operators, in particular the operator for. The third operand can be absent. The language C++ is functional. Every operator has a value, the value can be void. If a sequence of operators is closed by parenthesis then a value of the sequence is a value of the last operator. But a sequence of operators for functions has values for every operator. The property is used by every two-placed operation in Cs. So there are a sequence of values for every two place operation ° : (X1,...,Xn) °(Y1,...,Yn)=(X1°Y1,...,Xn°Yn). But there is only one value if a symbol ° stands before a sequence: °(Z1,...,Zn)=Z1°…°Zn. For example, &&((X1,X2,X3)||(Y1,Y2,Y3)) =(X1||Y1)&&(X2||Y2)&&(X3||Y3). Dots are used to construct a sequence of values with some step. If the step equals 1 then one use the construction a,…,b for the sequence a,a+1,…,b if b≤ a, and the sequence is empty if b>a. For example, int m,n=1000,a[m,n]={b,…,c}; . If a step does not equal 1, then one use the construction a,b,…,c for the sequence a,a+(b-a),a+2*(b-a),…,a+m*(b-a) where a+m*(b-a)≤c<a+(m+1)(b-a). Labels in Cs have from 1 to 8 any symbols except : . The labels can be used as commentaries before blocks or operators. Then they have no reference. But there are labels that have references. In addition to C++, the labels can be used in the operators continue, break and switch. Then the operator switch is used like continue if continue will be out of a cycle. For example, switch(a+b), break(?). And there are arrays of labels, they are used by the same operators.
  • 3. Secure programming language Cs www.ijres.org 44 | Page In Cs definitions of data can be added by pointing out data length. For example, int 5bit X, 1000byte Y, 100 Z; float 1000.10 F;, here X has length of 5 bit, Y has length of 1000 bytes, Z has length of 100 decimal digits, F has mantissa of 1000 decimal digits and exponent of 10 decimal digits, so 10-10 <F<1010 . New types are introduced only by using specifier typedef. In particular the definition: typedef struct X {int x; float f;};, introduces the new type, the definition: struct X, Y {int x; float f;}; , does not introduce a type. Definitions of classes are replaced by definitions of structures, components of the structures can be programs. The definitions do not differ from definitions of classes. The priorities (ranges) of operations &, | and ^ are changed. They have the same priority, which follows after the priority of operations << and >>. For example, one can use the expression a | b>>c!=d instead of the expression (a | b>>c ) != d. An arithmetic expression can not be Boolean. This allows the compiler to find more mistakes in programs. So one must use the expression x==0 instead of !x. Non-recursive functions are executed more simple and without any additional time of .their execution. These functions can be used instead of inline functions without additional memory requested by inline functions. The type char is used only as an array of characters without the symbol 0 in the end. The type cannot be used as an array of integers of length 8. Instead the type int 1byte must be used. The new type string is used as an array of characters with the symbol 0 in the end. The operation + is used to concatenate data of types char and string. If one inputs data he can point out to execute some operators without waiting end of the imputation. The sequence of the operators must be ended by the operator wait; . References [1] B. Stroustrup, The C++ programming language, fourth edition, Addison-Wesley, 2013. [2] David Thomas, Chad Fowler, Andrew Hunt, Programming Ruby: The Pragmatic Programmer’s Guide, second edition, Addison- Wesley, 2004.