Sciweavers

420 search results - page 37 / 84
» Dynamic program analysis of Microsoft Windows applications
Sort
View
146
Voted
IEEEARES
2009
IEEE
15 years 9 months ago
Capturing Information Flow with Concatenated Dynamic Taint Analysis
Dynamic taint analysis (DTA) is a technique used for tracking information flow by propagating taint propagation across memory locations during program execution. Most implementat...
Hyung Chan Kim, Angelos D. Keromytis, Michael Covi...
252
Voted
STOC
2003
ACM
193views Algorithms» more  STOC 2003»
16 years 2 months ago
Space efficient dynamic stabbing with fast queries
In dynamic stabbing, we operate on a dynamic set of intervals. A stabbing query asks for an interval containing a given point. This basic problem encodes problems such as method l...
Mikkel Thorup
129
Voted
WORM
2003
15 years 3 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
143
Voted
CORR
2010
Springer
180views Education» more  CORR 2010»
14 years 12 months ago
XSB: Extending Prolog with Tabled Logic Programming
The paradigm of Tabled Logic Programming (TLP) is now supported by a number of Prolog systems, including XSB, YAP Prolog, B-Prolog, Mercury, ALS, and Ciao. The reasons for this ar...
Terrance Swift, David Scott Warren
93
Voted
WICON
2008
15 years 4 months ago
Programming in mobile ad hoc networks
The possibility for spontaneous ad hoc networks between mobile devices has been increasing as small devices become more capable of hosting useful networked applications. These app...
Justin Collins, Rajive Bagrodia