Sciweavers

1629 search results - page 97 / 326
» Infeasible Code Detection
Sort
View
ISSTA
2012
ACM
13 years 10 days ago
Detecting inconsistencies via universal reachability analysis
Recent research has suggested that a large class of software bugs fall into the category of inconsistencies, or cases where two pieces of program code make incompatible assumption...
Aaron Tomb, Cormac Flanagan
WCRE
2008
IEEE
15 years 4 months ago
Detecting Clones in Business Applications
A business application automates a collection of business processes. A business process describes how a set of logically related tasks are executed, ordered and managed by followi...
Jin Guo, Ying Zou
GLOBECOM
2006
IEEE
15 years 4 months ago
Blind Multiuser Detection in Multirate CDMA Transmissions Using Fluctuations of Correlation Estimators
Abstract— This paper deals with the problem of blind multiuser detection in multirate direct-sequence code division multiple access (DS-CDMA). Direct-Sequence Spread Spectrum (DS...
C. Nsiala Nzeza, R. Gautier, G. Burel
RAID
2007
Springer
15 years 4 months ago
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode
Network-level emulation has recently been proposed as a method for the accurate detection of previously unknown polymorphic code injection attacks. In this paper, we extend network...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
SP
2006
IEEE
234views Security Privacy» more  SP 2006»
15 years 3 months ago
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Krügel, Engin Ki...