Sciweavers

85 search results - page 10 / 17
» Mimimorphism: a new approach to binary code obfuscation
Sort
View
ICEC
1994
68views more  ICEC 1994»
13 years 8 months ago
Extended Forking Genetic Algorithm for Order Representation (O-FGA)
There are two types of GAs with difference of their representation of strings. They are the binary coded GA and the order-based GA. We've already proposed a new type of binar...
Shigeyoshi Tsutsui, Yoshiji Fujimoto, Isao Hayashi
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
13 years 11 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
CCS
2007
ACM
13 years 11 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
NIPS
2007
13 years 8 months ago
Near-Maximum Entropy Models for Binary Neural Representations of Natural Images
Maximum entropy analysis of binary variables provides an elegant way for studying the role of pairwise correlations in neural populations. Unfortunately, these approaches suffer f...
Matthias Bethge, Philipp Berens
CORR
2007
Springer
154views Education» more  CORR 2007»
13 years 7 months ago
Distributed Arithmetic Coding for the Asymmetric Slepian-Wolf problem
Distributed source coding schemes are typically based on the use of channels codes as source codes. In this paper we propose a new paradigm, termed “distributed arithmetic codin...
Marco Grangetto, Enrico Magli, Gabriella Olmo