Sciweavers

533 search results - page 13 / 107
» Control flow based obfuscation
Sort
View
PDPTA
2004
15 years 3 months ago
Achieving Flow Level QoS in Cut-Through Networks Through Admission Control and DiffServ
Cluster networks will serve as the future access networks for multimedia streaming, massive multiplayer online gaming, e-commerce, network storage etc. And for those application ar...
Frank Olaf Sem-Jacobsen, Sven-Arne Reinemo, Tor Sk...
MASCOTS
2001
15 years 3 months ago
On Class-Based Isolation of UDP, Short-Lived and Long-Lived TCP Flows
The congestion control mechanisms of TCP make it vulnerable in an environment where flows with different congestionsensitivity compete for scarce resources. With the increasing am...
Selma Yilmaz, Ibrahim Matta
SAM
2000
102views Hardware» more  SAM 2000»
15 years 3 months ago
Test Generation Based On Control And Data Dependencies Within Multi-Process SDL Specifications
Control and data flow aspects of a distributed system can be identified through the analysis of control and data dependencies that exist not only within processes, but also across...
Olaf Henniger, Hasan Ural
IFIP
2010
Springer
14 years 9 months ago
Cryptographic Enforcement of Role-Based Access Control
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, usin...
Jason Crampton
VIROLOGY
2010
179views more  VIROLOGY 2010»
15 years 19 days ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet