Sciweavers

2409 search results - page 24 / 482
» Reverse engineering the Internet
Sort
View
106
Voted
NDSS
2008
IEEE
15 years 5 months ago
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have rec...
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zh...
102
Voted
WCRE
1993
IEEE
15 years 3 months ago
A Practical Program Transformation System for Reverse Engineering
Program transformation systems provide one means of formally deriving a program from its speci cation. The main advantage of this development method is that the executable program...
M. Ward, K. Bennett
WCRE
2008
IEEE
15 years 5 months ago
Data Model Reverse Engineering in Migrating a Legacy System to Java
Central to any legacy migration project is the translation of the data model. Decisions made here will have strong implications to the rest of the translation. Some legacy languag...
Mariano Ceccato, Thomas Roy Dean, Paolo Tonella, D...
115
Voted
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 5 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
120
Voted
WCRE
1999
IEEE
15 years 3 months ago
Chava: Reverse Engineering and Tracking of Java Applets
Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available, their focus ...
Jeffrey L. Korn, Yih-Farn Chen, Eleftherios Koutso...