Sciweavers

4716 search results - page 555 / 944
» Tangible functional programming
Sort
View
WCRE
2010
IEEE
14 years 10 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
IFM
2010
Springer
183views Formal Methods» more  IFM 2010»
14 years 9 months ago
Certified Absence of Dangling Pointers in a Language with Explicit Deallocation
Safe is a first-order eager functional language with facilities for programmer controlled destruction and copying of data structures. It provides also regions, i.e. disjoint parts...
Javier de Dios, Manuel Montenegro, Ricardo Pe&ntil...
DIMVA
2011
14 years 3 months ago
What's Clicking What? Techniques and Innovations of Today's Clickbots
Abstract. With the widespread adoption of Internet advertising, fraud has become a systemic problem. While the existence of clickbots—malware specialized for conducting click-fra...
Brad Miller, Paul Pearce, Chris Grier, Christian K...
LCTRTS
2011
Springer
14 years 2 months ago
An approach to improving the structure of error-handling code in the linux kernel
nguage does not provide any abstractions for exception handling or other forms of error handling, leaving programmers to devise their own conventions for detecting and handling er...
Suman Saha, Julia L. Lawall, Gilles Muller
ICFP
2009
ACM
16 years 13 days ago
A concurrent ML library in concurrent Haskell
rrent ML, synchronization abstractions can be defined and passed as values, much like functions in ML. This mechanism admits a powerful, modular style of concurrent programming, c...
Avik Chaudhuri