Sciweavers

2673 search results - page 319 / 535
» Guided Static Analysis
Sort
View
ACSAC
2007
IEEE
15 years 11 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves
IEEEPACT
2007
IEEE
15 years 11 months ago
Component-Based Lock Allocation
The allocation of lock objects to critical sections in concurrent programs affects both performance and correctness. Recent work explores automatic lock allocation, aiming primari...
Richard L. Halpert, Christopher J. F. Pickett, Cla...
AIRWEB
2007
Springer
15 years 11 months ago
A Taxonomy of JavaScript Redirection Spam
Redirection spam presents a web page with false content to a crawler for indexing, but automatically redirects the browser to a different web page. Redirection is usually immediat...
Kumar Chellapilla, Alexey Maykov
FMCO
2007
Springer
103views Formal Methods» more  FMCO 2007»
15 years 11 months ago
Safety Guarantees from Explicit Resource Management
We present a language and a program analysis that certifies the safe use of flexible resource management idioms, in particular advance reservation or “block booking” of costl...
David Aspinall, Patrick Maier, Ian Stark
IWMM
2007
Springer
122views Hardware» more  IWMM 2007»
15 years 11 months ago
Overlooking roots: a framework for making nondeferred reference-counting garbage collection fast
Numerous optimizations exist for improving the performance of nondeferred reference-counting (RC) garbage collection. Their designs are ad hoc, intended to exploit different count...
Pramod G. Joisha