Sciweavers

298 search results - page 13 / 60
» Towards experimental evaluation of code obfuscation techniqu...
Sort
View
ATAL
2008
Springer
13 years 10 months ago
Towards bidirectional distributed matchmaking
Matchmaking is the process of introducing two or more agents to each other. Current matchmaking techniques are unidirectional and fail to address large-scale and highly dynamic sy...
Victor Shafran, Gal A. Kaminka, Sarit Kraus, Claud...
MAM
2006
124views more  MAM 2006»
13 years 8 months ago
Design optimization and space minimization considering timing and code size via retiming and unfolding
The increasingly complicated DSP processors and applications with strict timing and code size constraints require design automation tools to consider multiple optimizations such a...
Qingfeng Zhuge, Chun Xue, Zili Shao, Meilin Liu, M...
ACSAC
2009
IEEE
14 years 3 months ago
Detecting Software Theft via System Call Based Birthmarks
—Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which ...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
ESERNET
2003
Springer
14 years 1 months ago
Functional Testing, Structural Testing, and Code Reading: What Fault Type Do They Each Detect?
The origin of the study described here is the experiment performed by Basili and Selby, further replicated by Kamsties and Lott, and once again by Wood et al. These experiments inv...
Natalia Juristo Juzgado, Sira Vegas
USENIX
2007
13 years 11 months ago
Dynamic Spyware Analysis
Spyware is a class of malicious code that is surreptitiously installed on victims’ machines. Once active, it silently monitors the behavior of users, records their web surfing ...
Manuel Egele, Christopher Kruegel, Engin Kirda, He...