Sciweavers

787 search results - page 50 / 158
» Source code analysis and manipulation
Sort
View
SIGSOFT
2007
ACM
15 years 10 months ago
RELAY: static race detection on millions of lines of code
Data races occur when multiple threads are about to access the same piece of memory, and at least one of those accesses is a write. Such races can lead to hard-to-reproduce bugs t...
Jan Wen Voung, Ranjit Jhala, Sorin Lerner
TWC
2008
184views more  TWC 2008»
14 years 9 months ago
Distributed Space-Frequency Coding over Broadband Relay Channels
Abstract--Designing diversity achieving schemes over the wireless broadband fading relay channels is crucial to achieve higher diversity gains. These gains are achieved by exploiti...
Karim G. Seddik, K. J. Ray Liu
JOT
2010
113views more  JOT 2010»
14 years 8 months ago
SOA Web Security and Applications
entional vulnerability detection fails to extend its generic form to an abstract level in coping with particular type of string validation. Consequently the security bypasses key ...
Raymond Wu, Masayuki Hisada
CC
2004
Springer
127views System Software» more  CC 2004»
15 years 3 months ago
Analyzing Memory Accesses in x86 Executables
This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of the work is to recover intermediate representations that are similar to those that can be c...
Gogul Balakrishnan, Thomas W. Reps
DSOM
2003
Springer
15 years 3 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung