Sciweavers

817 search results - page 28 / 164
» Malware behaviour analysis
Sort
View
SAS
2007
Springer
128views Formal Methods» more  SAS 2007»
14 years 3 months ago
Magic-Sets Transformation for the Analysis of Java Bytecode
Denotational static analysis of Java bytecode has a nice and clean compositional definition and an efficient implementation with binary decision diagrams. But it models only the f...
Étienne Payet, Fausto Spoto
ASPLOS
2006
ACM
14 years 3 months ago
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
Log-based recovery and replay systems are important for system reliability, debugging and postmortem analysis/recovery of malware attacks. These systems must incur low space and p...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
HPCN
1995
Springer
14 years 1 months ago
A model-driven tool for performance measurement and analysis of parallel programs
The performance of parallel computing systems is strongly dependent on the runtime behaviour of parallel programs. This paper describes a new approach to measure and analyze the ru...
Xiandeng Huang, Christoph Steigner
DAGSTUHL
2006
13 years 11 months ago
Static Analysis of a Model of the LDL Degradation Pathway
BioAmbients is a derivative of mobile ambients that has shown promise of describing interesting features of the behaviour of biological systems. As for other ambient calculi static...
Henrik Pilegaard, Hanne Riis Nielson, Flemming Nie...
WCRE
2009
IEEE
14 years 4 months ago
NTrace: Function Boundary Tracing for Windows on IA-32
—For a long time, dynamic tracing has been an enabling technique for reverse engineering tools. Tracing can not only be used to record the control flow of a particular component...
Johannes Passing, Alexander Schmidt, Martin von L&...