Sciweavers

848 search results - page 34 / 170
» Understanding Obfuscated Code
Sort
View
CSMR
2005
IEEE
14 years 2 months ago
Clustering Data Retrieved from Java Source Code to Support Software Maintenance: A Case Study
Data mining is a technology recently used in support of software maintenance in various contexts. Our works focuses on achieving a high level understanding of Java systems without...
Dimitris Rousidis, Christos Tjortjis
DIMVA
2009
13 years 10 months ago
Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks
Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode), some researc...
Makoto Shimamura, Kenji Kono
KBSE
2008
IEEE
14 years 3 months ago
Semi-Automating Pragmatic Reuse Tasks
Developers undertaking a pragmatic reuse task must collect and reason about information that is spread throughout the source code of a system before they can understand the scope ...
Reid Holmes, Robert J. Walker
ADAEUROPE
2006
Springer
14 years 2 months ago
Bauhaus - A Tool Suite for Program Analysis and Reverse Engineering
The maintenance and evolution of critical software with high requirements for reliability is an extremely demanding, time consuming and expensive task. Errors introduced by ad-hoc ...
Aoun Raza, Gunther Vogel, Erhard Plödereder
MSR
2009
ACM
14 years 1 months ago
Automatic labeling of software components and their evolution using log-likelihood ratio of word frequencies in source code
As more and more open-source software components become available on the internet we need automatic ways to label and compare them. For example, a developer who searches for reusa...
Adrian Kuhn