Sciweavers

533 search results - page 51 / 107
» Control flow based obfuscation
Sort
View
179
Voted
ISW
2010
Springer
15 years 13 days ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
134
Voted
DAC
2006
ACM
16 years 3 months ago
State encoding of large asynchronous controllers
A novel method to solve the state encoding problem in Signal Transition Graphs is presented. It is based on the structural theory of Petri nets and can be applied to large specifi...
Josep Carmona, Jordi Cortadella
132
Voted
INFOCOM
2000
IEEE
15 years 7 months ago
Scalable TCP Congestion Control
— The packet losses imposed by IP networks can cause long and erratic recovery delays, since senders must often use conservative loss detection and retransmission mechanisms. Thi...
Robert Morris
112
Voted
COMCOM
2004
92views more  COMCOM 2004»
15 years 2 months ago
Benefits of traffic engineering using QoS routing schemes and network controls
We demonstrate the benefits of traffic engineering by studying three realistic network models derived from an actual service provider network. We evaluate traffic engineering in t...
Shekhar Srivastava, Balaji Krithikaivasan, Cory C....
112
Voted
ICFP
2003
ACM
16 years 2 months ago
Iterative-free program analysis
Program analysis is the heart of modern compilers. Most control flow analyses are reduced to the problem of finding a fixed point in a certain transition system, and such fixed po...
Mizuhito Ogawa, Zhenjiang Hu, Isao Sasano