Sciweavers

785 search results - page 76 / 157
» Static Analysis of Android Programs
Sort
View
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
15 years 6 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
ISSTA
1991
ACM
15 years 6 months ago
Dynamic Slicing in the Presence of Unconstrained Pointers
Program slices are useful in debugging. Most work on program slicing to date has concentrated on nding slices of programs involving only scalar variables. Pointers and composite v...
Hiralal Agrawal, Richard A. DeMillo, Eugene H. Spa...
PASTE
2010
ACM
15 years 7 months ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu
DAC
2005
ACM
15 years 4 months ago
How accurately can we model timing in a placement engine?
This paper presents a novel placement algorithm for timing optimization based on a new and powerful concept, which we term differential timing analysis. Recognizing that accurate ...
Amit Chowdhary, Karthik Rajagopal, Satish Venkates...
TCAD
2008
181views more  TCAD 2008»
15 years 2 months ago
A Survey of Automated Techniques for Formal Software Verification
The quality and the correctness of software is often the greatest concern in electronic systems. Formal verification tools can provide a guarantee that a design is free of specific...
Vijay D'Silva, Daniel Kroening, Georg Weissenbache...