Sciweavers

981 search results - page 33 / 197
» Semantics-aware trace analysis
Sort
View
130
Voted
JSW
2007
120views more  JSW 2007»
15 years 1 months ago
Constraint-based Model Transformation: Tracing the Preservation of Semantic Properties
Abstract— We present and evaluate a novel constraintbased model transformation approach that implements a preservation-centric view. The proposed framework comprises formal prese...
Thomas Triebsees
WISA
2010
Springer
14 years 11 months ago
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations
In this paper we present two attacks that exploit cache events, which are visible in some side channel, to derive a secret key used in an implementation of AES. The first is an imp...
Jean-François Gallais, Ilya Kizhvatov, Mich...
139
Voted
PAM
2010
Springer
15 years 8 months ago
Network DVR: A Programmable Framework for Application-Aware Trace Collection
Network traces are essential for a wide range of network applications, including traffic analysis, network measurement, performance monitoring, and security analysis. Existing cap...
Chia-Wei Chang, Alexandre Gerber, Bill Lin, Subhab...
111
Voted
INDIASE
2009
ACM
15 years 8 months ago
Computing dynamic clusters
When trying to reverse engineer software, execution trace analysis is increasingly used. Though, by using this technique we are quickly faced with an enormous amount of data that ...
Philippe Dugerdil, Sebastien Jossi
105
Voted
WCRE
2009
IEEE
15 years 8 months ago
NTrace: Function Boundary Tracing for Windows on IA-32
—For a long time, dynamic tracing has been an enabling technique for reverse engineering tools. Tracing can not only be used to record the control flow of a particular component...
Johannes Passing, Alexander Schmidt, Martin von L&...