Sciweavers

DMS
2010
147views Multimedia» more  DMS 2010»
13 years 2 months ago
Towards Security-aware Program Visualization for Analyzing In-lined Reference Monitors
In-lined Reference Monitoring frameworks are an emerging technology for enforcing security policies over untrusted, mobile, binary code. However, formulating correct policy specifi...
Aditi Patwardhan, Kevin W. Hamlen, Kendra Cooper
TCOM
2010
77views more  TCOM 2010»
13 years 2 months ago
Interblock memory for turbo coding
—We investigate a binary code, which is implemented by serially concatenating a multiplexer, a multilevel delay processor, and a signal mapper to a binary turbo encoder. To achie...
Chia-Jung Yeh, Yeong-Luh Ueng, Mao-Chao Lin, Ming-...
TIT
2002
78views more  TIT 2002»
13 years 4 months ago
Improved upper bounds on sizes of codes
Let ( ) denote the maximum possible number of codewords in a binary code of length and minimum Hamming distance . For large values of , the best known upper bound, for fixed , is t...
Beniamin Mounits, Tuvi Etzion, Simon Litsyn
CORR
2006
Springer
127views Education» more  CORR 2006»
13 years 4 months ago
On the Peak-to-Mean Envelope Power Ratio of Phase-Shifted Binary Codes
The peak-to-mean envelope power ratio (PMEPR) of a code employed in orthogonal frequencydivision multiplexing (OFDM) systems can be reduced by permuting its coordinates and by rot...
Kai-Uwe Schmidt
WETICE
1999
IEEE
13 years 8 months ago
Static Analysis of Binary Code to Isolate Malicious Behaviors
In this paper, we address the problem of static slicing on binary executables for the purposes of the malicious code detection in COTS components. By operating directly on binary ...
J. Bergeron, Mourad Debbabi, M. M. Erhioui, B&eacu...
WCRE
2002
IEEE
13 years 9 months ago
Analysis of Virtual Method Invocation for Binary Translation
The University of Queensland Binary Translator (UQBT ) is a static binary translation framework that allows for the translation of binary, executable programs, from one architectu...
Jens Tröger, Cristina Cifuentes
PASTE
2010
ACM
13 years 9 months ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu
NSPW
2003
ACM
13 years 9 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
PASTE
2005
ACM
13 years 10 months ago
LANCET: a nifty code editing tool
This paper presents Lancet, a multi-platform software visualization tool that enables the inspection of programs at the binary code level. Implemented on top of the linktime rewri...
Ludo Van Put, Bjorn De Sutter, Matias Madou, Bruno...
COMPSAC
2005
IEEE
13 years 10 months ago
Autonomous Hot Patching for Web-Based Applications
Patching technologies are commonly applied to improve the dependability of software after release. This paper proposes an autonomous hot patching (AHP) framework to fully automate...
Hai Huang, Wei-Tek Tsai, Yinong Chen