Sciweavers

848 search results - page 170 / 170
» Understanding Obfuscated Code
Sort
View
CCS
2011
ACM
12 years 5 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...
GI
2005
Springer
13 years 11 months ago
Wissensarten und Techniken im Anforderungsmanagement
: Das Anforderungsmanagement ist eine wissensintensive Aktivität bei der Entwicklung von Anwendungssystemen. In diesem Beitrag werden Wissensarten und typische Probleme im Rahmen ...
Matthias Goeken
DAC
1999
ACM
13 years 9 months ago
Panel: What is the Proper System on Chip Design Methodology
ion model or flexible PCB solutions cannot offer a valid solution for the next millinium SoCs . James G. Dougherty, Integrated Systems Silicon LTD, Belfast, Northern Ireland ISS an...
Richard Goering, Pierre Bricaud, James G. Doughert...