Sciweavers

189 search results - page 8 / 38
» Dynamic Reverse Code Generation for Backward Execution
Sort
View
DSOM
2003
Springer
14 years 18 days ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
VEE
2005
ACM
140views Virtualization» more  VEE 2005»
14 years 28 days ago
Planning for code buffer management in distributed virtual execution environments
Virtual execution environments have become increasingly useful in system implementation, with dynamic translation techniques being an important component for performance-critical ...
Shukang Zhou, Bruce R. Childers, Mary Lou Soffa
ICSM
2002
IEEE
14 years 9 days ago
Static and Dynamic C++ Code Analysis for the Recovery of the Object Diagram
When a software system enters the maintenance phase, the availability of accurate and consistent information about its organization can help alleviate the difficulties of program...
Paolo Tonella, Alessandra Potrich
WCRE
2006
IEEE
14 years 1 months ago
Extracting Output Formats from Executables
We describe the design and implementation of FFE/x86 (File-Format Extractor for x86), an analysis tool that works on stripped executables (i.e., neither source code nor debugging ...
Junghee Lim, Thomas W. Reps, Ben Liblit
ACSAC
2008
IEEE
14 years 1 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh