Sciweavers

85 search results - page 5 / 17
» Mimimorphism: a new approach to binary code obfuscation
Sort
View
SOSP
2003
ACM
14 years 4 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...
TACAS
2012
Springer
275views Algorithms» more  TACAS 2012»
12 years 2 months ago
Pushdown Model Checking for Malware Detection
The number of malware is growing extraordinarily fast. Therefore, it is important to have efficient malware detectors. Malware writers try to obfuscate their code by different tec...
Fu Song, Tayssir Touili
TIT
1998
158views more  TIT 1998»
13 years 7 months ago
Modulation and Coding for Linear Gaussian Channels
—Shannon’s determination of the capacity of the linear Gaussian channel has posed a magnificent challenge to succeeding generations of researchers. This paper surveys how this...
G. David Forney Jr., Gottfried Ungerboeck
GLOBECOM
2008
IEEE
14 years 1 months ago
Scalable Redundancy for Sensors-to-Sink Communication
—In this paper, we present a new technique that uses deterministic binary network coding in a distributed manner to enhance the resiliency of Sensor-to-Base information flow aga...
Osameh M. Al-Kofahi, Ahmed E. Kamal
OSDI
2008
ACM
14 years 7 months ago
Binary Translation Using Peephole Superoptimizers
We present a new scheme for performing binary translation that produces code comparable to or better than existing binary translators with much less engineering effort. Instead of...
Sorav Bansal, Alex Aiken