Sciweavers

1629 search results - page 80 / 326
» Infeasible Code Detection
Sort
View
DIMVA
2009
14 years 11 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
CVIU
2004
118views more  CVIU 2004»
14 years 9 months ago
Differential video coding of face and gesture events in presentation videos
Currently, bandwidth limitations pose a major challenge for delivering high-quality multimedia information over the Internet to users. In this research, we aim to provide a better...
Robin Tan, James W. Davis
ICASSP
2011
IEEE
14 years 1 months ago
Equiangular tight frame fingerprinting codes
We show that equiangular tight frames (ETFs) are particularly well suited as additive fingerprint designs against Gaussian averaging collusion attacks when the number of users is...
Dustin G. Mixon, Christopher J. Quinn, Negar Kiyav...
ICC
2009
IEEE
116views Communications» more  ICC 2009»
15 years 4 months ago
Markov Chain Monte Carlo Detection Methods for High SNR Regimes
—Statistical detectors that are based on Markov chain Monte Carlo (MCMC) simulators have emerged as promising low-complexity solutions to both multiple-input multipleoutput (MIMO...
Salam Akoum, Ronghui Peng, Rong-Rong Chen, Behrouz...
SIGSOFT
2004
ACM
15 years 10 months ago
Testing static analysis tools using exploitable buffer overflows from open source code
Five modern static analysis tools (ARCHER, BOON, PolySpace C Verifier, Splint, and UNO) were evaluated using source code examples containing 14 exploitable buffer overflow vulnera...
Misha Zitser, Richard Lippmann, Tim Leek