Sciweavers

88 search results - page 8 / 18
» The effectiveness of source code obfuscation: An experimenta...
Sort
View
124
Voted
ESORICS
2002
Springer
15 years 11 months ago
TINMAN: A Resource Bound Security Checking System for Mobile Code
Resource security pertains to the prevention of unauthorized usage of system resources that may not directly cause corruption or leakage of information. A common breach of resource...
Aloysius K. Mok, Weijiang Yu
ACSAC
2009
IEEE
15 years 6 months ago
Detecting Software Theft via System Call Based Birthmarks
—Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which ...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
83
Voted
IWPC
1998
IEEE
15 years 3 months ago
Design Pattern Recovery in Object-Oriented Software
An approach to recover object oriented design patterns from design and code is presented. The pattern recovery process is based on a multi-stage filtering strategy to avoid combin...
Giuliano Antoniol, Roberto Fiutem, L. Cristoforett...
126
Voted
PRDC
2005
IEEE
15 years 5 months ago
On Automating Failure Mode Analysis and Enhancing its Integrity
This paper reports our experience on the development of a design-for-safety (DFS) workbench called Risk Assessment and Management Environment (RAME) for microelectronic avionics s...
Kam S. Tso, Ann T. Tai, Savio N. Chau, Leon Alkala...
TCAD
2002
107views more  TCAD 2002»
14 years 11 months ago
Value-sensitive automatic code specialization for embedded software
The objective of this work is to create a framework for the optimization of embedded software. We present algorithms and a tool flow to reduce the computational effort of programs,...
Eui-Young Chung, Luca Benini, Giovanni De Micheli,...