Sciweavers

180 search results - page 22 / 36
» Precise interprocedural analysis using random interpretation
Sort
View
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 4 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
CSFW
2011
IEEE
13 years 9 months ago
Dynamic Enforcement of Knowledge-Based Security Policies
—This paper explores the idea of knowledge-based security policies, which are used to decide whether to answer queries over secret data based on an estimation of the querier’s ...
Piotr Mardziel, Stephen Magill, Michael Hicks, Mud...
FMOODS
2003
14 years 11 months ago
A Rewriting Based Model for Probabilistic Distributed Object Systems
Concurrent and distributed systems have traditionally been modelled using nondeterministic transitions over configurations. The minism provides an abstraction over scheduling, net...
Nirman Kumar, Koushik Sen, José Meseguer, G...
ISSTA
2010
ACM
14 years 11 months ago
Perturbing numerical calculations for statistical analysis of floating-point program (in)stability
Writing reliable software is difficult. It becomes even more difficult when writing scientific software involving floating-point numbers. Computers provide numbers with limite...
Enyi Tang, Earl T. Barr, Xuandong Li, Zhendong Su
POPL
2004
ACM
15 years 10 months ago
Symbolic transfer function-based approaches to certified compilation
We present a framework for the certification of compilation and of compiled programs. Our approach uses a symbolic transfer functions-based representation of programs, so as to ch...
Xavier Rival