Sciweavers

84 search results - page 15 / 17
» Zero-Knowledge and Code Obfuscation
Sort
View
TSE
2008
91views more  TSE 2008»
13 years 7 months ago
Privately Finding Specifications
Buggy software is a reality and automated techniques for discovering bugs are highly desirable. A specification describes the correct behavior of a program. For example, a file mus...
Westley Weimer, Nina Mishra
VIROLOGY
2008
104views more  VIROLOGY 2008»
13 years 7 months ago
Malware behaviour analysis
Several malware analysis techniques suppose that the disassembled code of a piece of malware is available, which is however not always possible. This paper proposes a flexible and ...
Gérard Wagener, Radu State, Alexandre Dulau...
CAV
2011
Springer
216views Hardware» more  CAV 2011»
12 years 11 months ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
13 years 11 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
ICDE
2007
IEEE
193views Database» more  ICDE 2007»
14 years 8 months ago
Categorization and Optimization of Synchronization Dependencies in Business Processes
requirement. Furthermore, programming using sequence constructs normally produce nested structures and The current approachfor modeling synchronization in scattered code, especiall...
Qinyi Wu, Calton Pu, Akhil Sahai, Roger S. Barga