Sciweavers

677 search results - page 7 / 136
» Reverse Engineering Super-Repositories
Sort
View
CCS
2008
ACM
13 years 9 months ago
Tupni: automatic reverse engineering of input formats
Recent work has established the importance of automatic reverse engineering of protocol or file format specifications. However, the formats reverse engineered by previous tools ha...
Weidong Cui, Marcus Peinado, Karl Chen, Helen J. W...
ICSM
1994
IEEE
13 years 11 months ago
Domain-Retargetable Reverse Engineering II: Personalized User Interfaces
The user interface is an integral part of any application. This is especially true for reverse engineering environments, since the understanding process depends both on the user&#...
Scott R. Tilley
WCRE
2010
IEEE
13 years 6 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
DIMVA
2011
12 years 11 months ago
Reverse Social Engineering Attacks in Online Social Networks
Social networks are some of the largest and fastest growing online services today. Facebook, for example, has been ranked as the second most visited site on the Internet, and has b...
Danesh Irani, Marco Balduzzi, Davide Balzarotti, E...
IUI
2012
ACM
12 years 3 months ago
Automatic reverse engineering of interactive dynamic web applications to support adaptation across platforms
The effort and time required to develop user interface models has been one of the main limitations to the adoption of model-based approaches, which enable intelligent processing o...
Federico Bellucci, Giuseppe Ghiani, Fabio Patern&o...