Sciweavers

326 search results - page 12 / 66
» Automatic binary deobfuscation
Sort
View
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
14 years 2 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
IJON
2006
103views more  IJON 2006»
13 years 7 months ago
Evolutionary system for automatically constructing and adapting radial basis function networks
This article presents a new system for automatically constructing and training radial basis function networks based on original evolutionary computing methods. This system, called...
Daniel Manrique, Juan Rios, Alfonso Rodrígu...
JMM2
2006
101views more  JMM2 2006»
13 years 7 months ago
Automatic Detection of Targets Using Center-Surround Difference and Local Thresholding
This paper proposes a new target detection method in low contrast forward looking infrared (FLIR) images. Automatic detection of small targets in remotely sensed images is a diffic...
Sun-Gu Sun, Dong-Min Kwak
KDD
2012
ACM
188views Data Mining» more  KDD 2012»
11 years 10 months ago
A probabilistic model for multimodal hash function learning
In recent years, both hashing-based similarity search and multimodal similarity search have aroused much research interest in the data mining and other communities. While hashing-...
Yi Zhen, Dit-Yan Yeung
EDCC
2006
Springer
13 years 11 months ago
Automatically Finding and Patching Bad Error Handling
Bad error handling is the cause of many service outages. We address this problem by a novel approach to detect and patch bad error handling automatically. Our approach uses error ...
Martin Süßkraut, Christof Fetzer