Sciweavers

1245 search results - page 164 / 249
» Binary Sparse Coding
Sort
View
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 10 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
DATE
2008
IEEE
156views Hardware» more  DATE 2008»
15 years 9 months ago
Transparent Reconfigurable Acceleration for Heterogeneous Embedded Applications
Embedded systems are becoming increasingly complex. Besides the additional processing capabilities, they are characterized by high diversity of computational models coexisting in ...
Antonio Carlos Schneider Beck, Mateus B. Rutzig, G...
QEST
2007
IEEE
15 years 9 months ago
A Productivity Centered Tools Framework for Application Performance Tuning
Our productivity centered performance tuning framework for HPC applications comprises of three main components: (1) a versatile source code, performance metrics, and performance d...
Hui-Fang Wen, Simone Sbaraglia, Seetharami Seelam,...
ACSAC
2006
IEEE
15 years 9 months ago
Known/Chosen Key Attacks against Software Instruction Set Randomization
Instruction Set Randomization (ISR) has been proposed as a form of defense against binary code injection into an executing program. One proof-of-concept implementation is Randomiz...
Yoav Weiss, Elena Gabriela Barrantes
IPPS
2006
IEEE
15 years 9 months ago
Techniques supporting threadprivate in OpenMP
This paper presents the alternatives available to support threadprivate data in OpenMP and evaluates them. We show how current compilation systems rely on custom techniques for im...
Xavier Martorell, Marc González, Alejandro ...