Sciweavers

1490 search results - page 256 / 298
» Monitoring Mobile Code
Sort
View
INFOCOM
2010
IEEE
14 years 10 months ago
Malicious Shellcode Detection with Virtual Memory Snapshots
Abstract—Malicious shellcodes are segments of binary code disguised as normal input data. Such shellcodes can be injected into a target process’s virtual memory. They overwrite...
Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champi...
KBSE
2010
IEEE
14 years 10 months ago
Reducing estimation uncertainty with continuous assessment: tracking the "cone of uncertainty"
Accurate software cost and schedule estimations are essential especially for large software projects. However, once the required efforts have been estimated, little is done to rec...
Pongtip Aroonvatanaporn, Chatchai Sinthop, Barry W...
MODELS
2010
Springer
14 years 10 months ago
Inferring Meta-models for Runtime System Data from the Clients of Management APIs
Abstract. A new trend in runtime system monitoring is to utilize MOFbased techniques in analyzing the runtime system data. Approaches and tools have been proposed to automatically ...
Hui Song, Gang Huang, Yingfei Xiong, Franck Chauve...
ERSHOV
2009
Springer
14 years 9 months ago
From Dynamic to Static and Back: Riding the Roller Coaster of Information-Flow Control Research
Abstract. Historically, dynamic techniques are the pioneers of the area of information flow in the 70's. In their seminal work, Denning and Denning suggest a static alternativ...
Andrei Sabelfeld, Alejandro Russo
AOSD
2011
ACM
14 years 3 months ago
Applying dependability aspects on top of "aspectized" software layers
Dynamic platforms where components can be loaded at runtime can introduce risks to applications stability if components are not previously known before deployment. It may be neede...
Kiev Gama, Didier Donsez