Sciweavers

121 search results - page 5 / 25
» An evaluation of reverse engineering tool capabilities
Sort
View
C3S2E
2008
ACM
13 years 10 months ago
Towards a mutation-based automatic framework for evaluating code clone detection tools
In the last decade, a great many code clone detection tools have been proposed. Such a large number of tools calls for a quantitative comparison, and there have been several attem...
Chanchal Kumar Roy, James R. Cordy
DRM
2007
Springer
14 years 2 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
EMSOFT
2004
Springer
14 years 1 months ago
Exploiting prescriptive aspects: a design time capability
Aspect oriented programming (AOP), when used well, has many advantages. Aspects are however, programming-time constructs, i.e., they relate to source code. Previously, we develope...
John A. Stankovic, Prashant Nagaraddi, Zhendong Yu...
PROFES
2001
Springer
14 years 10 days ago
A Family-Oriented Software Development Process for Engine Controllers
This paper presents a family-based software development process for aero-engine control software. The process uses a “family capability” derived from family analysis of the emb...
Karen Allenby, Simon Burton, Darren L. Buttle, Joh...
CCS
2008
ACM
13 years 10 months ago
Towards experimental evaluation of code obfuscation techniques
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...