Sciweavers

326 search results - page 2 / 66
» Automatic binary deobfuscation
Sort
View
127
Voted
PEPM
2010
ACM
15 years 10 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...
147
Voted
ESORICS
2011
Springer
14 years 26 days ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller
137
Voted
ACCV
2010
Springer
14 years 8 months ago
Face Recognition with Decision Tree-Based Local Binary Patterns
Many state-of-the-art face recognition algorithms use image descriptors based on features known as Local Binary Patterns (LBPs). While many variations of LBP exist, so far none of ...
Daniel Maturana, Domingo Mery, Alvaro Soto
124
Voted
BMVC
2010
14 years 8 months ago
"How old are you?" : Age Estimation with Tensors of Binary Gaussian Receptive Maps
In this paper we describe experiments with a method to automatically estimate human age from facial images. This system extends recent results with the use of a tensorial represen...
John A. Ruiz-Hernandez, James L. Crowley, Augustin...
137
Voted
BMCBI
2011
14 years 4 months ago
BICEPP: an example-based statistical text mining method for predicting the binary characteristics of drugs
Background: The identification of drug characteristics is a clinically important task, but it requires much expert knowledge and consumes substantial resources. We have developed ...
Frank P. Y. Lin, Stephen Anthony, Thomas M. Polase...