Sciweavers

1629 search results - page 108 / 326
» Infeasible Code Detection
Sort
View
EDCC
2006
Springer
15 years 1 months ago
Automatically Finding and Patching Bad Error Handling
Bad error handling is the cause of many service outages. We address this problem by a novel approach to detect and patch bad error handling automatically. Our approach uses error ...
Martin Süßkraut, Christof Fetzer
ACSC
2006
IEEE
15 years 4 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
ICCD
2007
IEEE
152views Hardware» more  ICCD 2007»
15 years 1 months ago
Compiler-assisted architectural support for program code integrity monitoring in application-specific instruction set processors
As application-specific instruction set processors (ASIPs) are being increasingly used in mobile embedded systems, the ubiquitous networking connections have exposed these systems...
Hai Lin, Xuan Guan, Yunsi Fei, Zhijie Jerry Shi
ICIP
2008
IEEE
15 years 4 months ago
Buffer constrained rate control for low bitrate dual-frame video coding
In dual-frame video coding, one long-term reference (LTR) and one short-term reference (STR) frames are used for motion estimation and compensation. In previous work, it was shown...
Mayank Tiwari, Theodore Groves, Pamela C. Cosman
ACSAC
2007
IEEE
15 years 4 months ago
Spector: Automatically Analyzing Shell Code
Detecting the presence of buffer overflow attacks in network messages has been a major focus. Only knowing whether a message contains an attack, however, is not always enough to m...
Kevin Borders, Atul Prakash, Mark Zielinski