Sciweavers

848 search results - page 170 / 170
» Understanding Obfuscated Code
Sort
View
CCS
2011
ACM
14 years 1 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...
88
Voted
GI
2005
Springer
15 years 6 months ago
Wissensarten und Techniken im Anforderungsmanagement
: Das Anforderungsmanagement ist eine wissensintensive Aktivität bei der Entwicklung von Anwendungssystemen. In diesem Beitrag werden Wissensarten und typische Probleme im Rahmen ...
Matthias Goeken
121
Voted
DAC
1999
ACM
15 years 5 months ago
Panel: What is the Proper System on Chip Design Methodology
ion model or flexible PCB solutions cannot offer a valid solution for the next millinium SoCs . James G. Dougherty, Integrated Systems Silicon LTD, Belfast, Northern Ireland ISS an...
Richard Goering, Pierre Bricaud, James G. Doughert...