Sciweavers

2520 search results - page 355 / 504
» Model-checking behavioral programs
Sort
View
121
Voted
ACSAC
2006
IEEE
15 years 8 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
93
Voted
CSMR
2006
IEEE
15 years 8 months ago
Object-Oriented Legacy System Trace-based Logic Testing
When reengineering legacy systems, it is crucial to assess if the legacy behavior has been preserved or how it changed due to the reengineering effort. Ideally if a legacy system ...
Stéphane Ducasse, Tudor Gîrba, Roel W...
ICRA
2006
IEEE
99views Robotics» more  ICRA 2006»
15 years 8 months ago
A Whole-body Control Framework for Humanoids Operating in Human Environments
Abstract— Tomorrow’s humanoids will operate in human environments, where efficient manipulation and locomotion skills, and safe contact interactions will be critical design fa...
Luis Sentis, Oussama Khatib
153
Voted
IEEEARES
2006
IEEE
15 years 8 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
RTAS
2006
IEEE
15 years 8 months ago
Network-Code Machine: Programmable Real-Time Communication Schedules
Distributed hard real-time systems require guaranteed communication. One common approach is to restrict network access by enforcing a time-division multiple access (TDMA) schedule...
Sebastian Fischmeister, Oleg Sokolsky, Insup Lee