Sciweavers

1760 search results - page 134 / 352
» Program Analysis Using Weighted Pushdown Systems
Sort
View
VIROLOGY
2008
121views more  VIROLOGY 2008»
15 years 4 months ago
Constructing malware normalizers using term rewriting
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-pro...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
CL
1999
Springer
15 years 4 months ago
An execution scheme for interactive problem-solving in concurrent constraint logic programming languages
Van Emden's incremental queries address the inadequacy of current Prolog-style querying mechanism in most logic programming systems for interactive problem-solving. In the co...
Jimmy Ho-Man Lee, Ho-fung Leung
ICICS
2004
Springer
15 years 10 months ago
Hydan: Hiding Information in Program Binaries
We present a scheme to steganographically embed information in x86 program binaries. We define sets of functionally-equivalent instructions, and use a key-derived selection proces...
Rakan El-Khalil, Angelos D. Keromytis
CC
2006
Springer
125views System Software» more  CC 2006»
15 years 8 months ago
Path-Based Reuse Distance Analysis
Abstract. Profiling can effectively analyze program behavior and provide critical information for feedback-directed or dynamic optimizations. Based on memory profiling, reuse dista...
Changpeng Fang, Steve Carr, Soner Önder, Zhen...
ACSD
2008
IEEE
102views Hardware» more  ACSD 2008»
15 years 11 months ago
Performing causality analysis by bounded model checking
Synchronous systems can immediately react to the inputs of their environment which may lead to so-called causality cycles between actions and their trigger conditions. Systems wit...
Klaus Schneider, Jens Brandt