Sciweavers

3901 search results - page 683 / 781
» software 2008
Sort
View
ICTAI
2008
IEEE
15 years 10 months ago
Discovering Program's Behavioral Patterns by Inferring Graph-Grammars from Execution Traces
Frequent patterns in program executions represent recurring sequences of events. These patterns can be used to reveal the hidden structures of a program, and ease the comprehensio...
Chunying Zhao, Keven Ates, Jun Kong, Kang Zhang
117
Voted
IEEEARES
2008
IEEE
15 years 10 months ago
A Lightweight Security Analyzer inside GCC
This paper describes the design and implementation of a lightweight static security analyzer that exploits the compilation process of the gcc compiler. The tool is aimed at giving...
Davide Pozza, Riccardo Sisto
IEEEARES
2008
IEEE
15 years 10 months ago
Detecting Bots Based on Keylogging Activities
—A bot is a piece of software that is usually installed on an infected machine without the user’s knowledge. A bot is controlled remotely by the attacker under a Command and Co...
Yousof Al-Hammadi, Uwe Aickelin
IEEEARES
2008
IEEE
15 years 10 months ago
Intensive Programme on Information and Communication Security
IT Security is a problem that can only be addressed and taught holistically. Just as broad as the field of ICT itself, IT Security is an integral part of all network and software ...
Christian Schläger, Ludwig Fuchs, Günthe...
125
Voted
IEEEPACT
2008
IEEE
15 years 10 months ago
The PARSEC benchmark suite: characterization and architectural implications
This paper presents and characterizes the Princeton Application Repository for Shared-Memory Computers (PARSEC), a benchmark suite for studies of Chip-Multiprocessors (CMPs). Prev...
Christian Bienia, Sanjeev Kumar, Jaswinder Pal Sin...