Sciweavers

848 search results - page 40 / 170
» Understanding Obfuscated Code
Sort
View
ISSA
2008
13 years 10 months ago
A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code
Malicious software is prevalent in many forms with the potential for many types of malware to be downloaded while browsing the Internet using an unprotected system. The potential ...
Leonard Shand, Theodore Tryfonas
ECEASST
2007
78views more  ECEASST 2007»
13 years 8 months ago
Lightweight Visualisations of COBOL Code for Supporting Migration to SOA
In this age of complex business landscapes, many enterprises turn to SOA for aligning their IT portfolio with their business. Because of the enormous business risk involved with r...
Joris Van Geet, Serge Demeyer
WCRE
2010
IEEE
13 years 7 months ago
Visually Supporting Source Code Changes Integration: The Torch Dashboard
—Automatic and advanced merging algorithms help programmers to merge their modifications in main development repositories. However, there is little support to help release maste...
Veroonica Uquillas Gomez, Stéphane Ducasse,...
TCC
2009
Springer
117views Cryptology» more  TCC 2009»
14 years 9 months ago
Towards a Theory of Extractable Functions
Extractable functions are functions where any adversary that outputs a point in the range of the function is guaranteed to "know" a corresponding preimage. Here, knowledg...
Ran Canetti, Ronny Ramzi Dakdouk
SCAM
2006
IEEE
14 years 2 months ago
Bug Classification Using Program Slicing Metrics
In this paper, we introduce 13 program slicing metrics for C language programs. These metrics use program slice information to measure the size, complexity, coupling, and cohesion...
Kai Pan, Sunghun Kim, E. James Whitehead Jr.