Sciweavers

12 search results - page 2 / 3
» Barrier Slicing and Chopping
Sort
View
SIGSOFT
1994
ACM
13 years 9 months ago
A New Model of Program Dependences for Reverse Engineering
A dependence model for reverse engineering should treat procedures in a modular fashion and should be fine-grained, distinguishing dependences that are due to different variables....
Daniel Jackson, Eugene J. Rollins
SCAM
2007
IEEE
14 years 1 days ago
Barrier Slicing for Remote Software Trusting
Remote trusting aims at verifying the “healthy” execution of a program running on an untrusted client that communicates with a trusted server via network connection. After giv...
Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, C...
SCAM
2007
IEEE
14 years 1 days ago
Statement-Level Cohesion Metrics and their Visualization
Slice-based metrics for cohesion have been defined and examined for years. However, if a module with low cohesion has been identified, the metrics cannot help the maintainer to ...
Jens Krinke
FASE
2009
Springer
14 years 17 days ago
Control Dependence for Extended Finite State Machines
Abstract. Though there has been nearly three decades of work on program slicing, there has been comparatively little work on slicing for state machines. One of the primary challeng...
Kelly Androutsopoulos, David Clark, Mark Harman, Z...
NDSS
2009
IEEE
14 years 15 days ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee