Sciweavers

848 search results - page 47 / 170
» Understanding Obfuscated Code
Sort
View
INFSOF
2002
65views more  INFSOF 2002»
13 years 8 months ago
The documentary structure of source code
Many tools designed to help programmers view and manipulate source code exploit the formal structure of the programming language. Language-based tools use information derived via ...
Michael L. Van de Vanter
ICALT
2006
IEEE
14 years 2 months ago
ANNANN - Next Steps for Scaffolding Learning About Programs
It is difficult for a student to learn how to program and to build an understanding of the rationale which underpins the development of a program’s componentparts. Conventional ...
Su White, Clare J. Hooper, Leslie Carr, Timothy P....
ICIP
2000
IEEE
14 years 10 months ago
Finite Precision Wavelets for Image Coding: Lossy and Lossless Compression Performance Evaluation
This paper investigates the robustness of the wavelet transform, implemented by means of the Lifting Scheme (LS), with respect to numerical errors in the representation and calcul...
Marco Grangetto, Enrico Magli, Gabriella Olmo
ACSAC
2005
IEEE
14 years 2 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
ESSOS
2009
Springer
14 years 23 days ago
Idea: Measuring the Effect of Code Complexity on Static Analysis Results
Abstract. To understand the effect of code complexity on static analysis, thirty-five format string vulnerabilities were studied. We analyzed two code samples for each vulnerabilit...
James Walden, Adam Messer, Alex Kuhl