Sciweavers

326 search results - page 11 / 66
» Automatic binary deobfuscation
Sort
View
PLDI
2004
ACM
14 years 1 months ago
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams
This paper presents the ļ¬rst scalable context-sensitive, inclusionbased pointer alias analysis for Java programs. Our approach to context sensitivity is to create a clone of a m...
John Whaley, Monica S. Lam
ICPP
2002
IEEE
14 years 17 days ago
Software Caching using Dynamic Binary Rewriting for Embedded Devices
A software cache implements instruction and data caching entirely in software. Dynamic binary rewriting offers a means to specialize the software cache miss checks at cache miss t...
Chad Huneycutt, Joshua B. Fryman, Kenneth M. Macke...
EUROSYS
2010
ACM
14 years 4 months ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverā€...
Vitaly Chipounov, George Candea
CIVR
2008
Springer
166views Image Analysis» more  CIVR 2008»
13 years 9 months ago
A probabilistic ranking framework using unobservable binary events for video search
Recent content-based video retrieval systems combine output of concept detectors (also known as high-level features) with text obtained through automatic speech recognition. This ...
Robin Aly, Djoerd Hiemstra, Arjen P. de Vries, Fra...
ICIP
2006
IEEE
14 years 9 months ago
Automatic Video Genre Categorization using Hierarchical SVM
This paper presents an automatic video genre categorization scheme based on the hierarchical ontology on video genres. Ten computable spatio-temporal features are extracted to dis...
Xun Yuan, Wei Lai, Tao Mei, Xian-Sheng Hua, Xiuqin...