Sciweavers

848 search results - page 24 / 170
» Understanding Obfuscated Code
Sort
View
TDSC
2010
191views more  TDSC 2010»
13 years 7 months ago
SigFree: A Signature-Free Buffer Overflow Attack Blocker
—We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet se...
Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu
WCRE
2009
IEEE
14 years 3 months ago
SQUAD: Software Quality Understanding through the Analysis of Design
—Object-oriented software quality models usually use metrics of classes and of relationships among classes to assess the quality of systems. However, software quality does not de...
Foutse Khomh
AOSD
2007
ACM
14 years 25 days ago
Using natural language program analysis to locate and understand action-oriented concerns
Most current software systems contain undocumented high-level ideas implemented across multiple files and modules. When developers perform program maintenance tasks, they often wa...
David Shepherd, Zachary P. Fry, Emily Hill, Lori L...
ASPLOS
2009
ACM
14 years 9 months ago
Understanding software approaches for GPGPU reliability
Even though graphics processors (GPUs) are becoming increasingly popular for general purpose computing, current (and likely near future) generations of GPUs do not provide hardwar...
Martin Dimitrov, Mike Mantor, Huiyang Zhou
OOPSLA
2007
Springer
14 years 3 months ago
Understanding the value of program analysis tools
It is difficult to determine the cost effectiveness of program analysis tools because we cannot evaluate them in the same environment where we will be using the tool. Tool evalua...
Ciera Jaspan, I-Chin Chen, Anoop Sharma