Sciweavers

677 search results - page 112 / 136
» Reverse Engineering
Sort
View
129
Voted
DSN
2008
IEEE
15 years 9 months ago
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
Many threats that plague today’s networks (e.g., phishing, botnets, denial of service attacks) are enabled by a complex ecosystem of attack programs commonly called malware. To ...
Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, M...
116
Voted
ECBS
2007
IEEE
144views Hardware» more  ECBS 2007»
15 years 9 months ago
DP-Miner: Design Pattern Discovery Using Matrix
Design patterns document expert design experience in software system development. They have been applied in many existing software systems. However, pattern information is general...
Jing Dong, Dushyant S. Lad, Yajing Zhao
145
Voted
SMI
2007
IEEE
194views Image Analysis» more  SMI 2007»
15 years 9 months ago
Robust Smooth Feature Extraction from Point Clouds
Defining sharp features in a given 3D model facilitates a better understanding of the surface and aids visualizations, reverse engineering, filtering, simplification, non-photo...
Joel Daniels II, Linh K. Ha, Tilo Ochotta, Cl&aacu...
121
Voted
ACSC
2006
IEEE
15 years 8 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
120
Voted
SP
2006
IEEE
193views Security Privacy» more  SP 2006»
15 years 8 months ago
Analysis of the Linux Random Number Generator
Linux is the most popular open source project. The Linux random number generator is part of the kernel of all Linux distributions and is based on generating randomness from entrop...
Zvi Gutterman, Benny Pinkas, Tzachy Reinman