Sciweavers

533 search results - page 20 / 107
» Control flow based obfuscation
Sort
View
WCRE
2006
IEEE
15 years 8 months ago
Mining Control Flow Graphs for Crosscutting Concerns
Aspect mining tries to identify crosscutting concerns in existing systems and thus supports the adaption to an aspect-oriented design. This paper describes an automatic static asp...
Jens Krinke
CBSE
2006
Springer
15 years 4 months ago
Using a Lightweight Workflow Engine in a Plugin-Based Product Line Architecture
This paper presents a software product line architecture where applications are assembled by installing a set of plugins on a common software base. In this architecture, the softwa...
Humberto Cervantes, Sonia Charleston-Villalobos
PADL
2011
Springer
14 years 5 months ago
Joinads: A Retargetable Control-Flow Construct for Reactive, Parallel and Concurrent Programming
Modern challenges led to a design of a wide range of programming models for reactive, parallel and concurrent programming, but these are often t to encode in general purpose langua...
Tomas Petricek, Don Syme
DIMVA
2006
15 years 3 months ago
Detecting Self-mutating Malware Using Control-Flow Graph Matching
Next generation malware will by be characterized by the intense use of polymorphic and metamorphic techniques aimed at circumventing the current malware detectors, based on pattern...
Danilo Bruschi, Lorenzo Martignoni, Mattia Monga
129
Voted
CORR
2006
Springer
189views Education» more  CORR 2006»
15 years 2 months ago
Node-Based Optimal Power Control, Routing, and Congestion Control in Wireless Networks
Abstract--In wireless networks, important network functionalities such as power control, rate allocation, routing, and congestion control must be optimized in a coherent and integr...
Yufang Xi, Edmund M. Yeh