Sciweavers

494 search results - page 59 / 99
» Static Analysis for Guarded Code
Sort
View
CCS
2007
ACM
14 years 22 days ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
KBSE
2007
IEEE
14 years 3 months ago
Parseweb: a programmer assistant for reusing open source code on the web
Programmers commonly reuse existing frameworks or libraries to reduce software development efforts. One common problem in reusing the existing frameworks or libraries is that the...
Suresh Thummalapenta, Tao Xie
EDCC
2006
Springer
14 years 13 days ago
Automatically Finding and Patching Bad Error Handling
Bad error handling is the cause of many service outages. We address this problem by a novel approach to detect and patch bad error handling automatically. Our approach uses error ...
Martin Süßkraut, Christof Fetzer
CADE
2010
Springer
13 years 10 months ago
Multi-Prover Verification of Floating-Point Programs
Abstract. In the context of deductive program verification, supporting floatingpoint computations is tricky. We propose an expressive language to formally specify behavioral proper...
Ali Ayad, Claude Marché
INFOCOM
2006
IEEE
14 years 2 months ago
Looking at Large Networks: Coding vs. Queueing
— Traditionally, network buffer resources have been used at routers to queue transient packets to prevent packet drops. In contrast, we propose a scheme for large multi-hop netwo...
Sandeep Bhadra, Sanjay Shakkottai