Sciweavers

981 search results - page 127 / 197
» Symbolic pointer analysis
Sort
View
NDSS
2008
IEEE
15 years 4 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
VTC
2008
IEEE
122views Communications» more  VTC 2008»
15 years 4 months ago
Asymptotic Analysis of Space-Time Codes in Non-Gaussian Noise and Interference
— In this paper, we provide a framework for the asymptotic performance analysis of space–time codes (STCs) in correlated Ricean fading and non–Gaussian noise and interference...
Ali Nezampour, Robert Schober, Yao Ma
97
Voted
COMPSAC
2007
IEEE
15 years 4 months ago
A Static Analysis Framework For Detecting SQL Injection Vulnerabilities
Recently SQL Injection Attack (SIA) has become a major threat to Web applications. Via carefully crafted user input, attackers can expose or manipulate the back-end database of a ...
Xiang Fu, Xin Lu, Boris Peltsverger, Shijun Chen, ...
FROCOS
2007
Springer
15 years 4 months ago
Towards an Automatic Analysis of Web Service Security
Web services send and receive messages in XML syntax with some parts hashed, encrypted or signed, according to the WS-Security standard. In this paper we introduce a model to forma...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
FSTTCS
2005
Springer
15 years 3 months ago
Reachability Analysis of Multithreaded Software with Asynchronous Communication
We introduce asynchronous dynamic pushdown networks (ADPN), a new model for multithreaded programs in which pushdown systems communicate via shared memory. ADPN generalizes both CP...
Ahmed Bouajjani, Javier Esparza, Stefan Schwoon, J...