Sciweavers

988 search results - page 7 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
AAAI
1996
13 years 10 months ago
Estimating the Absolute Position of a Mobile Robot Using Position Probability Grids
In order to re-use existing models of the environment mobile robots must be able to estimate their position and orientation in such models. Most of the existing methods for positi...
Wolfram Burgard, Dieter Fox, Daniel Hennig, Timo S...
ICPR
2010
IEEE
14 years 1 months ago
Detecting Altered Fingerprints
Abstract--The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring t...
Jianjiang Feng, Anil Jain, Arun Ross
ACSAC
2004
IEEE
14 years 16 days ago
Static Analyzer of Vicious Executables (SAVE)
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
Andrew H. Sung, Jianyun Xu, Patrick Chavez, Sriniv...
CORR
2006
Springer
77views Education» more  CORR 2006»
13 years 8 months ago
Prioritizing Software Inspection Results using Static Profiling
Static software checking tools are useful as an additional automated software inspection step that can easily be integrated in the development cycle and assist in creating secure,...
Cathal Boogerd, Leon Moonen
WCRE
2003
IEEE
14 years 2 months ago
An Experimentation Framework for Evaluating Disassembly and Decompilation Tools for C++ and Java
The inherent differences between C++ and Java programs dictate that the methods used for reverse engineering their compiled executables will be languagespecific. This paper looks ...
Lori Vinciguerra, Linda M. Wills, Nidhi Kejriwal, ...