Sciweavers

326 search results - page 2 / 66
» Automatic binary deobfuscation
Sort
View
PEPM
2010
ACM
14 years 2 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...
ESORICS
2011
Springer
12 years 5 months ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller
ACCV
2010
Springer
13 years 20 days ago
Face Recognition with Decision Tree-Based Local Binary Patterns
Many state-of-the-art face recognition algorithms use image descriptors based on features known as Local Binary Patterns (LBPs). While many variations of LBP exist, so far none of ...
Daniel Maturana, Domingo Mery, Alvaro Soto
BMVC
2010
13 years 19 days ago
"How old are you?" : Age Estimation with Tensors of Binary Gaussian Receptive Maps
In this paper we describe experiments with a method to automatically estimate human age from facial images. This system extends recent results with the use of a tensorial represen...
John A. Ruiz-Hernandez, James L. Crowley, Augustin...
BMCBI
2011
12 years 9 months ago
BICEPP: an example-based statistical text mining method for predicting the binary characteristics of drugs
Background: The identification of drug characteristics is a clinically important task, but it requires much expert knowledge and consumes substantial resources. We have developed ...
Frank P. Y. Lin, Stephen Anthony, Thomas M. Polase...