Sciweavers

848 search results - page 18 / 170
» Understanding Obfuscated Code
Sort
View
ETS
2002
IEEE
150views Hardware» more  ETS 2002»
13 years 8 months ago
Assessing group learning and shared understanding in technology-mediated interaction
Without shared understanding, hardly any group learning takes place. Though much has been written about the essence of shared understanding, less is known about how to assess the ...
Ingrid Mulder, Janine Swaak, Joseph Kessels
APCCM
2008
13 years 10 months ago
A Practical Guide to Testing the Understandability of Notations
Model-driven development is the process of creating models of a software system and transforming them into source code. Since the stepwise transformations can be done automaticall...
Susanne Patig
WWW
2010
ACM
14 years 3 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...
CCS
2007
ACM
14 years 24 days ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
DSOM
2003
Springer
14 years 2 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung