Sciweavers

416 search results - page 31 / 84
» Some new approaches for preventing software tampering
Sort
View
WCRE
2009
IEEE
15 years 6 months ago
Automatic Static Unpacking of Malware Binaries
—Current malware is often transmitted in packed or encrypted form to prevent examination by anti-virus software. To analyze new malware, researchers typically resort to dynamic c...
Kevin Coogan, Saumya K. Debray, Tasneem Kaochar, G...
86
Voted
KBSE
2008
IEEE
15 years 6 months ago
Composition of Qualitative Adaptation Policies
In a highly dynamic environment, software systems requires a capacity of self-adaptation to fit the environment and the user needs evolution, which increases the software archite...
Franck Chauvel, Olivier Barais, Isabelle Borne, Je...
ICSE
2009
IEEE-ACM
14 years 9 months ago
Fourth international workshop on sharing and reusing architectural knowledge (SHARK 2009)
Architectural knowledge has been recognized by the software architecture community as a self-contained research area in software architecture, and brought along some promising res...
Patricia Lago, Paris Avgeriou, Philippe Kruchten
ERSHOV
2003
Springer
15 years 4 months ago
On the Possibility of Provably Secure Obfuscating Programs
By obfuscation we mean any efficient semantic-preserving transformation of computer programs aimed at bringing a program into such a form, which impedes the understanding of its al...
Nikolay P. Varnovsky, Vladimir A. Zakharov
ICRA
2007
IEEE
138views Robotics» more  ICRA 2007»
15 years 6 months ago
Adaptive Embedded Roadmaps For Sensor Networks
Abstract— In this paper, we propose a new approach to wireless sensor network assisted navigation while avoiding moving dangers. Our approach relies on an embedded roadmap in the...
Gazihan Alankus, Nuzhet Atay, Chenyang Lu, O. Bur&...