Sciweavers

15 search results - page 2 / 3
» Disassembly of Executable Code Revisited
Sort
View
ACMSE
2006
ACM
13 years 10 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
IWMM
2000
Springer
90views Hardware» more  IWMM 2000»
13 years 8 months ago
Compact Garbage Collection Tables
Garbage collection tables for finding pointers on the stack can be represented in 20-25% of the space previously reported. Live pointer information is often the same at many call ...
David Tarditi
CGO
2010
IEEE
13 years 11 months ago
Parameterized tiling revisited
Tiling, a key transformation for optimizing programs, has been widely studied in literature. Parameterized tiled code is important for auto-tuning systems since they often execute...
Muthu Manikandan Baskaran, Albert Hartono, Sanket ...
VIROLOGY
2008
104views more  VIROLOGY 2008»
13 years 4 months ago
Malware behaviour analysis
Several malware analysis techniques suppose that the disassembled code of a piece of malware is available, which is however not always possible. This paper proposes a flexible and ...
Gérard Wagener, Radu State, Alexandre Dulau...
LCPC
2007
Springer
13 years 11 months ago
Revisiting SIMD Programming
Massively parallel SIMD array architectures are making their way into embedded processors. In these architectures, a number of identical processing elements having small private st...
Anton Lokhmotov, Benedict R. Gaster, Alan Mycroft,...