Sciweavers

326 search results - page 8 / 66
» Automatic binary deobfuscation
Sort
View
ICIP
2008
IEEE
14 years 2 months ago
Multi-object tracking using binary masks
In this paper, we introduce a new method for tracking multiple objects. The method combines Kalman filtering and the Expectation Maximization (EM) algorithm in a novel way to dea...
Sami Huttunen, Janne Heikkilä
WEBI
2004
Springer
14 years 29 days ago
Eliciting Truthful Feedback for Binary Reputation Mechanisms
Reputation mechanisms offer an efficient way of building the necessary level of trust in electronic markets. Feedback about an agent’s past behavior can be aggregated into a me...
Radu Jurca, Boi Faltings
TKDE
2002
133views more  TKDE 2002»
13 years 7 months ago
Binary Rule Generation via Hamming Clustering
The generation of a set of rules underlying a classification problem is performed by applying a new algorithm, called Hamming Clustering (HC). It reconstructs the and-or expressio...
Marco Muselli, Diego Liberati
OSDI
2008
ACM
14 years 8 months ago
Binary Translation Using Peephole Superoptimizers
We present a new scheme for performing binary translation that produces code comparable to or better than existing binary translators with much less engineering effort. Instead of...
Sorav Bansal, Alex Aiken
PASTE
2010
ACM
14 years 21 days ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu