Sciweavers

848 search results - page 10 / 170
» Understanding Obfuscated Code
Sort
View
CEAS
2008
Springer
13 years 10 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
MSR
2005
ACM
14 years 2 months ago
Using a clone genealogy extractor for understanding and supporting evolution of code clones
Programmers often create similar code snippets or reuse existing code snippets by copying and pasting. Code clones —syntactically and semantically similar code snippets—can ca...
Miryung Kim, David Notkin
KBSE
2007
IEEE
14 years 3 months ago
A dynamic birthmark for java
Code theft is a threat for companies that consider code as a core asset. A birthmark can help them to prove code theft by identifying intrinsic properties of a program. Two progra...
David Schuler, Valentin Dallmeier, Christian Lindi...
CHI
2010
ACM
14 years 3 months ago
Code bubbles: a working set-based interface for code understanding and maintenance
Developers spend significant time reading and navigating code fragments spread across multiple locations. The filebased nature of contemporary IDEs makes it prohibitively difficul...
Andrew Bragdon, Robert C. Zeleznik, Steven P. Reis...
ISW
2000
Springer
14 years 11 days ago
Towards a Practical Secure Framework for Mobile Code Commerce
Securing the mobile code commerce is not an easy task at all. We propose in this paper a framework to tackle this problem. In a first step, we analyse the general issues that must ...
Gaël Hachez, Laurent Den Hollander, Mehrdad J...