Sciweavers

1186 search results - page 15 / 238
» On Designing an Experiment to Evaluate a Reverse Engineering...
Sort
View
ACSC
2006
IEEE
14 years 4 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi
EUROSYS
2010
ACM
14 years 7 months ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driver...
Vitaly Chipounov, George Candea
IWPC
2003
IEEE
14 years 3 months ago
Observing and Measuring Cognitive Support: Steps Toward Systematic Tool Evaluation and Engineering
A key desideratum for many software comprehension tools is to reduce the mental burdens of software engineers. That is, the tools should support cognition. This key benefit is di...
Andrew Walenstein
GECCO
2010
Springer
173views Optimization» more  GECCO 2010»
13 years 10 months ago
Superstate identification for state machines using search-based clustering
State machines are a popular method of representing a syshigh level of abstraction that enables developers to gain an overview of the system they represent and quickly understand ...
Mathew Hall, Phil McMinn, Neil Walkinshaw
BIOCOMP
2008
13 years 11 months ago
Reverse Engineering Module Networks by PSO-RNN Hybrid Modeling
Background: Inferring a gene regulatory network (GRN) from high throughput biological data is often an under-determined problem and is a challenging task due to the following reas...
Yuji Zhang, Jianhua Xuan, Benildo de los Reyes, Ro...