Sciweavers

1636 search results - page 42 / 328
» Detecting similar software applications
Sort
View
LPAR
2004
Springer
14 years 2 months ago
Entanglement - A Measure for the Complexity of Directed Graphs with Applications to Logic and Games
We propose a new parameter for the complexity of finite directed graphs which measures to what extent the cycles of the graph are intertwined. This measure, called entanglement, i...
Dietmar Berwanger, Erich Grädel
WORM
2003
13 years 10 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
IJISEC
2006
106views more  IJISEC 2006»
13 years 8 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
COMPSAC
2007
IEEE
14 years 3 months ago
A Virtual Machine-Based Programming Environment for Rapid Sensor Application Development
In recent years, TinyOS and nesC are gradually becoming the de facto software development platform for implementing sensor applications. However, developing sensor applications is...
Jui-Nan Lin, Jiun-Long Huang
ICST
2008
IEEE
14 years 3 months ago
Relationships between Test Suites, Faults, and Fault Detection in GUI Testing
Software-testing researchers have long sought recipes for test suites that detect faults well. In the literature, empirical studies of testing techniques abound, yet the ideal tec...
Jaymie Strecker, Atif M. Memon