Sciweavers

2957 search results - page 61 / 592
» Code analysis and CS-XML
Sort
View
CCS
2011
ACM
13 years 9 months ago
The power of procrastination: detection and mitigation of execution-stalling malicious code
Malware continues to remain one of the most important security problems on the Internet today. Whenever an anti-malware solution becomes popular, malware authors typically react p...
Clemens Kolbitsch, Engin Kirda, Christopher Kruege...
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 4 months ago
On Bit Error Robustness of Trellis Source Codes
— Trellis codes based on linear congruential recursions have recently been introduced as powerful source codes. For a modest computational complexity they offer excellent rate di...
Tomas Eriksson, Norbert Goertz
JIT
1999
Springer
123views Database» more  JIT 1999»
15 years 2 months ago
Byte Code Engineering
The term “Java” is used to denote two different concepts: the language itself and the related execution environment, the Java Virtual Machine (JVM), which executes byte code in...
Markus Dahm
DIMVA
2009
14 years 11 months ago
Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks
Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode), some researc...
Makoto Shimamura, Kenji Kono
PASTE
2010
ACM
15 years 2 months ago
Expect the unexpected: error code mismatches between documentation and the real world
Inaccurate documentation can mislead programmers and cause software to fail in unexpected ways. We examine mismatches between documented and actual error codes returned by 42 Linu...
Cindy Rubio-González, Ben Liblit