Sciweavers

848 search results - page 92 / 170
» Understanding Obfuscated Code
Sort
View
ATAL
2000
Springer
15 years 6 months ago
Layered Disclosure: Revealing Agents' Internals
A perennial challenge in creating and using complex autonomous agents is following their choices of actions as the world changes dynamically and understanding why they act as they ...
Patrick Riley, Peter Stone, Manuela M. Veloso
140
Voted
ICECCS
1998
IEEE
123views Hardware» more  ICECCS 1998»
15 years 6 months ago
Applying Slicing Technique to Software Architectures
Software architecture is receiving increasingly attention as a critical design level for software systems. As software architecture design resources (in the form of architectural ...
Jianjun Zhao
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
15 years 6 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
118
Voted
DSN
2008
IEEE
15 years 4 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
166
Voted
ISCAPDCS
2008
15 years 3 months ago
LinSched: The Linux Scheduler Simulator
The Linux kernel 2.6.23 scheduler includes substantial changes that may entice researchers with no prior interest in Linux to attempt to understand or modify its behavior. Often, ...
John M. Calandrino, Dan P. Baumberger, Tong Li, Je...