Sciweavers

12697 search results - page 20 / 2540
» Call for Papers
Sort
View
ISW
2004
Springer
14 years 1 months ago
Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks
The ICAT statistics over the past few years have shown at least one out of every five CVE and CVE candidate vulnerabilities have been due to buffer overflows. This constitutes a si...
Mark Foster, Joseph N. Wilson, Shigang Chen
PLDI
1996
ACM
13 years 12 months ago
Target-Sensitive Construction of Diagnostic Programs for Procedure Calling Sequence Generators
Building compilers that generate correct code is difficult. In this paper we present a compiler testing technique that closes the gap between actual compiler implementations and c...
Mark W. Bailey, Jack W. Davidson
FUIN
2006
81views more  FUIN 2006»
13 years 7 months ago
Redundant Call Elimination via Tupling
Redundant call elimination has been an important program optimisation process as it can produce super-linear speedup in optimised programs. In this paper, we investigate use of the...
Wei-Ngan Chin, Siau-Cheng Khoo, Neil Jones
ICMLA
2010
13 years 5 months ago
Bayesian Classification of Flight Calls with a Novel Dynamic Time Warping Kernel
Abstract--In this paper we propose a probabilistic classification algorithm with a novel Dynamic Time Warping (DTW) kernel to automatically recognize flight calls of different spec...
Theodoros Damoulas, Samuel Henry, Andrew Farnswort...
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
14 years 29 days ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...