Sciweavers

3456 search results - page 60 / 692
» Byte Code Engineering
Sort
View
IWPC
2006
IEEE
15 years 8 months ago
Understanding Obfuscated Code
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code l...
Matias Madou, Ludo Van Put, Koen De Bosschere
ASPLOS
2011
ACM
14 years 5 months ago
Sponge: portable stream programming on graphics engines
Graphics processing units (GPUs) provide a low cost platform for accelerating high performance computations. The introduction of new programming languages, such as CUDA and OpenCL...
Amir Hormati, Mehrzad Samadi, Mark Woh, Trevor N. ...
APSEC
2002
IEEE
15 years 7 months ago
On Detection of Gapped Code Clones using Gap Locations
It is generally said that code clone is one of the factors to make software maintenance difficult. A code clone is a code portion in source files that is identical or similar to...
Yasushi Ueda, Toshihiro Kamiya, Shinji Kusumoto, K...
ICSE
2010
IEEE-ACM
15 years 7 months ago
Improved social trustability of code search results
Search is a fundamental activity in software development. However, to search source code efficiently, it is not sufficient to implement a traditional full text search over a base ...
Florian S. Gysin
ACSC
2006
IEEE
15 years 8 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi