Sciweavers

3456 search results - page 153 / 692
» Byte Code Engineering
Sort
View
ACSAC
2007
IEEE
15 years 9 months ago
Spector: Automatically Analyzing Shell Code
Detecting the presence of buffer overflow attacks in network messages has been a major focus. Only knowing whether a message contains an attack, however, is not always enough to m...
Kevin Borders, Atul Prakash, Mark Zielinski
IWPC
2003
IEEE
15 years 8 months ago
Facilitating Program Comprehension by Mining Association Rules from Source Code
Program comprehension is an important part of software maintenance, especially when program structure is complex and documentation is unavailable or outdated. Data mining can prod...
Christos Tjortjis, Loukas Sinos, Paul J. Layzell
IWPC
1999
IEEE
15 years 7 months ago
Recovery of Jump Table Case Statements from Binary Code
One of the fundamental problems with the static analysis of binary (executable) code is that7 of recognizing, in a machine-independent way, the target addresses of n-conditional b...
Cristina Cifuentes, Mike Van Emmerik
GECCO
2008
Springer
116views Optimization» more  GECCO 2008»
15 years 4 months ago
Evolving similarity functions for code plagiarism detection
Students are often asked to submit electronic copies of their program code as part of assessment in computer science courses. To counter code plagiarism, educational institutions ...
Victor Ciesielski, Nelson Wu, Seyed M. M. Tahaghog...
TSE
2010
235views more  TSE 2010»
14 years 9 months ago
DECOR: A Method for the Specification and Detection of Code and Design Smells
Abstract-- Code and design smells are poor solutions to recurring implementation and design problems. They may hinder the evolution of a system by making it hard for software engin...
Naouel Moha, Yann-Gaël Guéhéneu...