Sciweavers

817 search results - page 53 / 164
» Malware behaviour analysis
Sort
View
BIBM
2008
IEEE
106views Bioinformatics» more  BIBM 2008»
15 years 1 months ago
Invariance Kernel of Biological Regulatory Networks
: The analysis of Biological Regulatory Network (BRN) leads to compute the set of the possible behaviours of the biological components. These behaviours are seen as trajectories an...
Jamil Ahmad, Olivier Roux
JLP
2007
98views more  JLP 2007»
14 years 11 months ago
Tempus fugit: How to plug it
Secret or private information may be leaked to an external attacker through the timing behaviour of the system running the untrusted code. After introducing a formalisation of thi...
Alessandra Di Pierro, Chris Hankin, Igor Siveroni,...
TPHOL
2008
IEEE
15 years 6 months ago
Formal Reasoning About Causality Analysis
Systems that can immediately react to their inputs may suffer from cyclic dependencies between their actions and the corresponding trigger conditions. For this reason, causality an...
Jens Brandt, Klaus Schneider
ICFEM
1998
Springer
15 years 4 months ago
A Process Algebra Based Verification of a Production System
Studying industrial systems by simulation enables the designer to study the dynamic behaviour and to determine some characteristics of the system. Unfortunately, simulation also h...
J. J. T. Kleijn, J. E. Rooda, Michel A. Reniers
VIROLOGY
2010
179views more  VIROLOGY 2010»
14 years 10 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet