Sciweavers

1636 search results - page 109 / 328
» Detecting similar software applications
Sort
View
WWW
2009
ACM
16 years 5 months ago
Using static analysis for Ajax intrusion detection
We present a static control-flow analysis for JavaScript programs running in a web browser. Our analysis tackles numerous challenges posed by modern web applications including asy...
Arjun Guha, Shriram Krishnamurthi, Trevor Jim
145
Voted
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
16 years 5 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
136
Voted
SOSP
2007
ACM
16 years 1 months ago
MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs
Software defects significantly reduce system dependability. Among various types of software bugs, semantic and concurrency bugs are two of the most difficult to detect. This pape...
Shan Lu, Soyeon Park, Chongfeng Hu, Xiao Ma, Weiha...
BMCBI
2006
127views more  BMCBI 2006»
15 years 4 months ago
PathogenMIPer: a tool for the design of molecular inversion probes to detect multiple pathogens
Background: Here we describe PathogenMIPer, a software program for designing molecular inversion probe (MIP) oligonucleotides for use in pathogen identification and detection. The...
Sreedevi Thiyagarajan, Miloslav Karhanek, Michael ...
MM
2006
ACM
155views Multimedia» more  MM 2006»
15 years 10 months ago
Robust voting algorithm based on labels of behavior for video copy detection
This paper presents an efficient approach for copies detection in a large videos archive consisting of several hundred of hours. The video content indexing method consists of ext...
Julien Law-To, Olivier Buisson, Valérie Gou...