Sciweavers

96 search results - page 7 / 20
» Exploiting and Protecting Dynamic Code Generation
Sort
View
CACM
2008
131views more  CACM 2008»
14 years 10 months ago
Exterminator: Automatically correcting memory errors with high probability
Programs written in C and C++ are susceptible to memory errors, including buffer overflows and dangling pointers. These errors, which can lead to crashes, erroneous execution, and...
Gene Novark, Emery D. Berger, Benjamin G. Zorn
ICIP
2005
IEEE
15 years 12 months ago
Error-resilient video transmission using multiple embedded Wyner-Ziv descriptions
This paper proposes systematic lossy error protection of video waveforms using multiple embedded Wyner-Ziv video descriptions. A video signal transmitted over an error-prone chann...
Shantanu Rane, Anne Aaron, Bernd Girod
CCS
2010
ACM
14 years 10 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
86
Voted
TACAS
2009
Springer
122views Algorithms» more  TACAS 2009»
15 years 5 months ago
Test Input Generation for Programs with Pointers
Software testing is an essential process to improve software quality in practice. Researchers have proposed several techniques to automate parts of this process. In particular, sym...
Dries Vanoverberghe, Nikolai Tillmann, Frank Piess...
NECO
2008
114views more  NECO 2008»
14 years 10 months ago
A Sparse Generative Model of V1 Simple Cells with Intrinsic Plasticity
Current models for the learning of feature detectors work on two time scales: on a fast time scale the internal neurons' activations adapt to the current stimulus; on a slow ...
Cornelius Weber, Jochen Triesch