Sciweavers

533 search results - page 14 / 107
» Control flow based obfuscation
Sort
View
AAAI
1993
15 years 3 months ago
Generating Quasi-symbolic Representation of Three-Dimensional Flow
Understanding flow in the three-dimensional phase space is challenging both to human experts and to current computer science technology. To break through the barrier, we are build...
Toyoaki Nishida
114
Voted
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 8 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
ACSAC
2007
IEEE
15 years 8 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda
PAMI
2012
13 years 4 months ago
Altered Fingerprints: Analysis and Detection
—The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that the...
Soweon Yoon, Jianjiang Feng, Anil K. Jain
IEEESCC
2006
IEEE
15 years 8 months ago
Control the Flow: How to Safely Compose Streaming Services into Business Processes
Although workflow languages are widely used for composing discrete services, these are not suitable for stream based interactions. In this paper we address the problem of how to ...
Biörn Biörnstad, Cesare Pautasso, Gustav...