Sciweavers

1805 search results - page 104 / 361
» Understanding Code Mobility
Sort
View
86
Voted
SIGCSE
2009
ACM
150views Education» more  SIGCSE 2009»
16 years 2 months ago
Dereferee: exploring pointer mismanagement in student code
Dynamic memory management and the use of pointers are critical topics in teaching the C++ language. They are also some of the most difficult for students to grasp properly. The re...
Anthony Allevato, Manuel A. Pérez-Qui&ntild...
121
Voted
ACSAC
2006
IEEE
15 years 8 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
90
Voted
IMC
2006
ACM
15 years 8 months ago
Finding diversity in remote code injection exploits
Remote code injection exploits inflict a significant societal cost, and an active underground economy has grown up around these continually evolving attacks. We present a method...
Justin Ma, John Dunagan, Helen J. Wang, Stefan Sav...
IUI
2005
ACM
15 years 7 months ago
Metafor: visualizing stories as code
Every program tells a story. Programming, then, is the art of constructing a story about the objects in the program and what they do in various situations. So-called programming l...
Hugo Liu, Henry Lieberman
SOFTVIS
2005
ACM
15 years 7 months ago
CVSscan: visualization of code evolution
During the life cycle of a software system, the source code is changed many times. We study how developers can be enabled to get insight in these changes, in order to understand t...
Lucian Voinea, Alexandru Telea, Jarke J. van Wijk