Sciweavers

533 search results - page 11 / 107
» Control flow based obfuscation
Sort
View
ICCD
2002
IEEE
152views Hardware» more  ICCD 2002»
15 years 8 months ago
Register Binding Based Power Management for High-level Synthesis of Control-Flow Intensive Behaviors
A circuit or circuit component that does not contain any spurious switching activity, i.e., activity that is not required by its specified functionality, is called perfectly power...
Lin Zhong, Jiong Luo, Yunsi Fei, Niraj K. Jha
ER
2005
Springer
93views Database» more  ER 2005»
15 years 5 months ago
Pattern-Based Analysis of the Control-Flow Perspective of UML Activity Diagrams
Petia Wohed, Wil M. P. van der Aalst, Marlon Dumas...
ESORICS
2003
Springer
15 years 5 months ago
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection
In this paper, we describe a novel approach to policy-based intrusion detection. The model we propose checks legality of information flows between objects in the system, according...
Jacob Zimmermann, Ludovic Mé, Christophe Bi...