Sciweavers

848 search results - page 30 / 170
» Understanding Obfuscated Code
Sort
View
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
14 years 15 days ago
On evolving buffer overflow attacks using genetic programming
In this work, we employed genetic programming to evolve a "white hat" attacker; that is to say, we evolve variants of an attack with the objective of providing better de...
Hilmi Günes Kayacik, Malcolm I. Heywood, A. N...
TSE
2008
91views more  TSE 2008»
13 years 8 months ago
Privately Finding Specifications
Buggy software is a reality and automated techniques for discovering bugs are highly desirable. A specification describes the correct behavior of a program. For example, a file mus...
Westley Weimer, Nina Mishra
VIROLOGY
2008
104views more  VIROLOGY 2008»
13 years 8 months ago
Malware behaviour analysis
Several malware analysis techniques suppose that the disassembled code of a piece of malware is available, which is however not always possible. This paper proposes a flexible and ...
Gérard Wagener, Radu State, Alexandre Dulau...
ASPLOS
2008
ACM
13 years 11 months ago
Understanding and visualizing full systems with data flow tomography
It is not uncommon for modern systems to be composed of a variety of interacting services, running across multiple machines in such a way that most developers do not really unders...
Shashidhar Mysore, Bita Mazloom, Banit Agrawal, Ti...
POPL
2000
ACM
14 years 1 months ago
Semantics-Preserving Procedure Extraction
Procedure extraction is an important program transformation that can be used to make programs easier to understand and maintain, to facilitate code reuse, and to convert “monoli...
Raghavan Komondoor, Susan Horwitz