Sciweavers

326 search results - page 11 / 66
» Automatic binary deobfuscation
Sort
View
PLDI
2004
ACM
15 years 7 months ago
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams
This paper presents the first scalable context-sensitive, inclusionbased pointer alias analysis for Java programs. Our approach to context sensitivity is to create a clone of a m...
John Whaley, Monica S. Lam
ICPP
2002
IEEE
15 years 7 months ago
Software Caching using Dynamic Binary Rewriting for Embedded Devices
A software cache implements instruction and data caching entirely in software. Dynamic binary rewriting offers a means to specialize the software cache miss checks at cache miss t...
Chad Huneycutt, Joshua B. Fryman, Kenneth M. Macke...
121
Voted
EUROSYS
2010
ACM
15 years 11 months ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverā€...
Vitaly Chipounov, George Candea
138
Voted
CIVR
2008
Springer
166views Image Analysis» more  CIVR 2008»
15 years 4 months ago
A probabilistic ranking framework using unobservable binary events for video search
Recent content-based video retrieval systems combine output of concept detectors (also known as high-level features) with text obtained through automatic speech recognition. This ...
Robin Aly, Djoerd Hiemstra, Arjen P. de Vries, Fra...
ICIP
2006
IEEE
16 years 3 months ago
Automatic Video Genre Categorization using Hierarchical SVM
This paper presents an automatic video genre categorization scheme based on the hierarchical ontology on video genres. Ten computable spatio-temporal features are extracted to dis...
Xun Yuan, Wei Lai, Tao Mei, Xian-Sheng Hua, Xiuqin...