Sciweavers

4067 search results - page 701 / 814
» Programs for Applying Symmetries
Sort
View
RAID
2010
Springer
13 years 8 months ago
Hybrid Analysis and Control of Malware
Abstract. Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ....
Kevin A. Roundy, Barton P. Miller
RFIDSEC
2010
13 years 8 months ago
Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones
NFC is a standardised technology providing short-range RFID communication channels for mobile devices. Peer-to-peer applications for mobile devices are receiving increased interest...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
RULEML
2010
Springer
13 years 8 months ago
Visualizing Logical Dependencies in SWRL Rule Bases
Rule bases are common in many business rule applications, clinical decision support programs, and other types of intelligent systems. As the size of the rule bases grows and the in...
Saeed Hassanpour, Martin J. O'Connor, Amar K. Das
RV
2010
Springer
141views Hardware» more  RV 2010»
13 years 8 months ago
Aspect-Oriented Instrumentation with GCC
We present the InterAspect instrumentation framework for GCC, a widely used compiler infrastructure. The addition of plugin support in the latest release of GCC makes it an attract...
Justin Seyster, Ketan Dixit, Xiaowan Huang, Radu G...
SEKE
2010
Springer
13 years 8 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li