Sciweavers

1953 search results - page 45 / 391
» codes 2010
Sort
View
WCRE
2010
IEEE
14 years 8 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
CORR
2010
Springer
135views Education» more  CORR 2010»
14 years 9 months ago
Constant-Weight Gray Codes for Local Rank Modulation
We consider the local rank-modulation scheme in which a sliding window going over a sequence of real-valued variables induces a sequence of permutations. The local rankmodulation, ...
Moshe Schwartz
TIT
2010
103views Education» more  TIT 2010»
14 years 4 months ago
Performance bounds for erasure, list and decision feedback schemes with linear block codes
A message independence property and some new performance upper bounds are derived in this work for erasure, list and decision-feedback schemes with linear block codes transmitted ...
Eran Hof, Igal Sason, Shlomo Shamai
ECEASST
2010
14 years 4 months ago
MySQL4OCL: A Stored Procedure-Based MySQL Code Generator for OCL
In this paper we introduce a MySQL code generator for a significant subset of OCL expressions which is based on the use of stored procedures for mapping OCL iterators. Our code gen...
Marina Egea, Carolina Dania, Manuel Clavel
WISEC
2010
ACM
14 years 7 months ago
Efficient code diversification for network reprogramming in sensor networks
As sensors in a network are mostly homogeneous in software and hardware, a captured sensor can easily expose its code and data to attackers and further threaten the whole network....
Qijun Gu