Sciweavers

1027 search results - page 170 / 206
» Callgraph properties of executables
Sort
View
TSE
2010
148views more  TSE 2010»
15 years 2 months ago
Program Behavior Discovery and Verification: A Graph Grammar Approach
—Discovering program behaviors and functionalities can ease program comprehension and verification. Existing program analysis approaches have used text mining algorithms to infer...
Chunying Zhao, Jun Kong, Kang Zhang
150
Voted
ACSAC
2010
IEEE
15 years 2 months ago
Analyzing and improving Linux kernel memory protection: a model checking approach
Code injection continues to pose a serious threat to computer systems. Among existing solutions, W X is a notable approach to prevent the execution of injected code. In this paper...
Siarhei Liakh, Michael C. Grace, Xuxian Jiang
ECAI
2010
Springer
15 years 1 months ago
Behavior-Oriented Commitment-based Protocols
Ever since the seminal work of Searle, two components of interaction protocols have been identified: constitutive rules, defining the meaning of actions and regulative rules, defin...
Matteo Baldoni, Cristina Baroglio, Elisa Marengo
FPL
2010
Springer
170views Hardware» more  FPL 2010»
15 years 1 months ago
IP Based Configurable SIMD Massively Parallel SoC
Significant advances in the field of configurable computing have enabled parallel processing within a single FieldProgrammable Gate Array (FPGA) chip. This paper presents the imple...
Mouna Baklouti, Mohamed Abid, Philippe Marquet, Je...
QEST
2010
IEEE
15 years 1 months ago
Information Hiding in Probabilistic Concurrent Systems
Information hiding is a general concept which refers to the goal of preventing an adversary to infer secret information from the observables. Anonymity and Information Flow are exa...
Miguel E. Andrés, Catuscia Palamidessi, Pet...