Sciweavers

707 search results - page 36 / 142
» Some Comments on the Coding of Programs
Sort
View
CONCURRENCY
2007
100views more  CONCURRENCY 2007»
14 years 11 months ago
An instrumentation technique for online analysis of multithreaded programs
Runtime verification of multithreaded systems, that is, the process of finding errors in multithreaded systems as they execute, is the theme of this paper. The major goal of the...
Grigore Rosu, Koushik Sen
95
Voted
JSC
2010
106views more  JSC 2010»
14 years 9 months ago
Verifying pointer safety for programs with unknown calls
We study the automated verification of pointer safety for heap-manipulating imperative programs with unknown procedure calls. Given a Hoare-style partial correctness specificati...
Chenguang Luo, Florin Craciun, Shengchao Qin, Guan...
ICICS
2004
Springer
15 years 4 months ago
Hydan: Hiding Information in Program Binaries
We present a scheme to steganographically embed information in x86 program binaries. We define sets of functionally-equivalent instructions, and use a key-derived selection proces...
Rakan El-Khalil, Angelos D. Keromytis
SIGCSE
2010
ACM
182views Education» more  SIGCSE 2010»
15 years 5 months ago
Frances: a tool for understanding code generation
Compiler and programming language implementation courses are integral parts of many computer science curricula. However, the range of topics necessary to teach in such a course ar...
Tyler Sondag, Kian L. Pokorny, Hridesh Rajan
CCS
2008
ACM
15 years 1 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia