Sciweavers

146 search results - page 26 / 30
» Putting Pointer Analysis to Work
Sort
View
EUROSYS
2008
ACM
14 years 5 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
CIVR
2007
Springer
144views Image Analysis» more  CIVR 2007»
14 years 2 months ago
Image retrieval on large-scale image databases
Online image repositories such as Flickr contain hundreds of millions of images and are growing quickly. Along with that the needs for supporting indexing, searching and browsing ...
Eva Hörster, Rainer Lienhart, Malcolm Slaney
LREC
2010
246views Education» more  LREC 2010»
13 years 10 months ago
Q-WordNet: Extracting Polarity from WordNet Senses
This paper presents Q-WordNet, a lexical resource consisting of WordNet senses automatically annotated by positive and negative polarity. Polarity classification amounts to decide...
Rodrigo Agerri, Ana García-Serrano
ASIACRYPT
2010
Springer
13 years 6 months ago
The World Is Not Enough: Another Look on Second-Order DPA
In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation analysi...
François-Xavier Standaert, Nicolas Veyrat-C...
CCS
2006
ACM
14 years 9 days ago
EXE: automatically generating inputs of death
This paper presents EXE, an effective bug-finding tool that automatically generates inputs that crash real code. Instead of running code on manually or randomly constructed input,...
Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, ...