Sciweavers

181 search results - page 29 / 37
» Reverse Engineering Method Stereotypes
Sort
View
ACSAC
2007
IEEE
14 years 1 months ago
Spector: Automatically Analyzing Shell Code
Detecting the presence of buffer overflow attacks in network messages has been a major focus. Only knowing whether a message contains an attack, however, is not always enough to m...
Kevin Borders, Atul Prakash, Mark Zielinski
ATAL
2005
Springer
14 years 1 months ago
Comprehending agent software
Software comprehension (understanding software structure and behavior) is essential for developing, maintaining, and improving software. This is particularly true of agent-based s...
Dung N. Lam, K. Suzanne Barber
GECCO
2006
Springer
253views Optimization» more  GECCO 2006»
13 years 11 months ago
A novel approach to optimize clone refactoring activity
Achieving a high quality and cost-effective tests is a major concern for software buyers and sellers. Using tools and integrating techniques to carry out low cost testing are chal...
Salah Bouktif, Giuliano Antoniol, Ettore Merlo, Ma...
ECCV
1998
Springer
14 years 9 months ago
Faithful Least-Squares Fitting of Spheres, Cylinders, Cones and Tori for Reliable Segmentation
Abstract. This paper addresses a problem arising in the reverse engineering of solid models from depth-maps. We wish to identify and fit surfaces of known type wherever these are a...
A. David Marshall, Gábor Lukács, Ral...
DSN
2008
IEEE
14 years 1 months ago
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
Many threats that plague today’s networks (e.g., phishing, botnets, denial of service attacks) are enabled by a complex ecosystem of attack programs commonly called malware. To ...
Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, M...