Sciweavers

817 search results - page 50 / 164
» Malware behaviour analysis
Sort
View
CCS
2010
ACM
14 years 10 months ago
Platform-independent programs
Given a single program (i.e., bit string), one may assume that the program's behaviors can be determined by first identifying the native runtime architecture and then executi...
Sang Kil Cha, Brian Pak, David Brumley, Richard Ja...
ESORICS
2011
Springer
13 years 11 months ago
Linear Obfuscation to Combat Symbolic Execution
Abstract. Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful t...
Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao
MICCAI
2005
Springer
16 years 21 days ago
Subject Specific Finite Element Modelling of the Levator Ani
Understanding of the dynamic behaviour of the levator ani is important to the assessment of pelvic floor dysfunction. Whilst shape modelling allows the depiction of 3D morphologica...
Su-Lin Lee, Ara Darzi, Guang-Zhong Yang
DATE
2006
IEEE
66views Hardware» more  DATE 2006»
15 years 5 months ago
On test conditions for the detection of open defects
The impact of test conditions on the detectability of open defects is investigated. We performed an inductive fault analysis on representative standard gates. The simulation resul...
Bram Kruseman, Manuel Heiligers
APSEC
2005
IEEE
15 years 5 months ago
Model Checking Interrupt-Dependent Software
Embedded control programs are hard to analyse because their behaviour depends on how they interact with hardware devices. In particular, embedded code typically uses interrupts to...
Colin J. Fidge, Phil Cook