Sciweavers

981 search results - page 127 / 197
» Symbolic pointer analysis
Sort
View
NDSS
2008
IEEE
14 years 4 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
VTC
2008
IEEE
122views Communications» more  VTC 2008»
14 years 4 months ago
Asymptotic Analysis of Space-Time Codes in Non-Gaussian Noise and Interference
— In this paper, we provide a framework for the asymptotic performance analysis of space–time codes (STCs) in correlated Ricean fading and non–Gaussian noise and interference...
Ali Nezampour, Robert Schober, Yao Ma
COMPSAC
2007
IEEE
14 years 4 months ago
A Static Analysis Framework For Detecting SQL Injection Vulnerabilities
Recently SQL Injection Attack (SIA) has become a major threat to Web applications. Via carefully crafted user input, attackers can expose or manipulate the back-end database of a ...
Xiang Fu, Xin Lu, Boris Peltsverger, Shijun Chen, ...
FROCOS
2007
Springer
14 years 4 months ago
Towards an Automatic Analysis of Web Service Security
Web services send and receive messages in XML syntax with some parts hashed, encrypted or signed, according to the WS-Security standard. In this paper we introduce a model to forma...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
FSTTCS
2005
Springer
14 years 3 months ago
Reachability Analysis of Multithreaded Software with Asynchronous Communication
We introduce asynchronous dynamic pushdown networks (ADPN), a new model for multithreaded programs in which pushdown systems communicate via shared memory. ADPN generalizes both CP...
Ahmed Bouajjani, Javier Esparza, Stefan Schwoon, J...