咨询与建议

限定检索结果

文献类型

  • 36 篇 期刊文献
  • 20 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 58 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 53 篇 工学
    • 47 篇 计算机科学与技术...
    • 25 篇 软件工程
    • 9 篇 电气工程
    • 5 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 建筑学
  • 4 篇 理学
    • 4 篇 数学
    • 2 篇 统计学(可授理学、...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 58 篇 control flow ana...
  • 7 篇 static analysis
  • 7 篇 data flow analys...
  • 3 篇 languages
  • 3 篇 program analysis
  • 3 篇 abstract interpr...
  • 3 篇 theory
  • 2 篇 continuation
  • 2 篇 linear logic
  • 2 篇 eta expansion
  • 2 篇 program slicing
  • 2 篇 algorithms
  • 2 篇 bioambients
  • 2 篇 systems biology
  • 2 篇 data mining
  • 2 篇 process calculus
  • 2 篇 decompilation
  • 2 篇 type flaw attack...
  • 2 篇 proofnet
  • 2 篇 software testing

机构

  • 3 篇 univ pisa dipart...
  • 3 篇 tech univ denmar...
  • 2 篇 brandeis univ wa...
  • 2 篇 univ pisa dipart...
  • 2 篇 univ pisa dipart...
  • 2 篇 univ pisa dipart...
  • 1 篇 univ sassari dip...
  • 1 篇 univ sci & techn...
  • 1 篇 linköping univer...
  • 1 篇 univ victoria de...
  • 1 篇 univ london impe...
  • 1 篇 roskilde univ ro...
  • 1 篇 amirkabir univ t...
  • 1 篇 hong kong polyte...
  • 1 篇 zhejiang gongsha...
  • 1 篇 univ sci & techn...
  • 1 篇 univ szeged dept...
  • 1 篇 gebze inst techn...
  • 1 篇 georgia inst tec...
  • 1 篇 northeastern uni...

作者

  • 9 篇 bodei chiara
  • 5 篇 degano pierpaolo
  • 3 篇 alam shahid
  • 3 篇 nielson flemming
  • 2 篇 mairson harry g.
  • 2 篇 van horn david
  • 2 篇 brodo linda
  • 2 篇 traore issa
  • 2 篇 thorup m
  • 2 篇 gao han
  • 2 篇 priami corrado
  • 2 篇 nielson hanne ri...
  • 2 篇 alstrup s
  • 2 篇 lauridsen pw
  • 2 篇 horspool r. nige...
  • 1 篇 hankin chris
  • 1 篇 mao jian
  • 1 篇 chung cm
  • 1 篇 saha seemanta
  • 1 篇 di lorenzo giusy

语言

  • 49 篇 英文
  • 7 篇 其他
  • 1 篇 德文
  • 1 篇 中文
检索条件"主题词=Control Flow Analysis"
58 条 记 录,以下是11-20 订阅
排序:
A consistency-guaranteed approach for Internet of Things software refactoring
收藏 引用
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS 2020年 第1期16卷
作者: Zhang, Yang Sun, Shixin Zhang, Dongwen Qiu, Jing Tian, Zhihong Hebei Univ Sci & Technol Sch Informat Sci & Engn Shijiazhuang Hebei Peoples R China Guangzhou Univ Cyberspace Inst Adv Technol Guangzhou 510006 Guangdong Peoples R China
The software architecture of Internet of Things defines the component model and interconnection topology of Internet of Things systems. Refactoring is a systematic practice of improving a software structure without al... 详细信息
来源: 评论
Execution anomaly detection in large-scale systems through console log analysis
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2018年 143卷 172-186页
作者: Bao, Liang Li, Qian Lu, Peiyao Lu, Jie Ruan, Tongxiao Zhang, Ke XiDian Univ Sch Software Xian 710071 Shaanxi Peoples R China Xi An Jiao Tong Univ Sch Econ & Finance Xian 710061 Shaanxi Peoples R China
Execution anomaly detection is important for development, maintenance and performance tuning in large-scale systems. System console logs are the significant source of troubleshooting and problem diagnosis. However, ma... 详细信息
来源: 评论
DroidNative: Automating and optimizing detection of Android native code malware variants
收藏 引用
COMPUTERS & SECURITY 2017年 65卷 230-246页
作者: Alam, Shahid Qu, Zhengyang Riley, Ryan Chen, Yan Rastogi, Vaibhav Gebze Tech Univ Dept Comp Engn Gebze Turkey Northwestern Univ Dept Elect Engn & Comp Sci Evanston IL USA Qatar Univ Dept Comp Sci & Engn Doha Qatar Univ Wisconsin Madison Dept Comp Sci Madison WI USA
According to the Symantec and F-Secure threat reports, mobile malware development in 2013 and 2014 has continued to focus almost exclusively (similar to 99%) on the Android platform. Malware writers are applying steal... 详细信息
来源: 评论
Checking global usage of resources handled with local policies
收藏 引用
SCIENCE OF COMPUTER PROGRAMMING 2017年 第Part1期133卷 20-50页
作者: Bodei, Chiara Viet Dung Dinh Ferrari, Gian-Luigi Univ Pisa Dipartimento Informat Pisa Italy
We present a methodology to reason about resource usage (acquisition, release, revision, and so on) and, in particular, to predict bad usage of resources. Keeping in mind the interplay between local and global informa... 详细信息
来源: 评论
Privilege Escalation Detecting in Android Applications  3
Privilege Escalation Detecting in Android Applications
收藏 引用
3rd International Conference on Big Data Computing and Communications (BIGCOM)
作者: Zhong, Xingqiu Zeng, Fanping Cheng, Zhichao Xie, Niannian Qin, Xiaoxia Guo, Shuli Univ Sci & Technol China Sch Comp Sci & Technol Hefei Anhui Peoples R China Anhui Prov Key Lab Software Comp & Commun Hefei Anhui Peoples R China
As the most popular mobile operating system, there are large amount of applications developed for Android. Considering security issues, developers are forced to declare relative permissions in manifest file when they ... 详细信息
来源: 评论
Context-aware security: Linguistic mechanisms and static analysis
收藏 引用
JOURNAL OF COMPUTER SECURITY 2016年 第4期24卷 427-477页
作者: Bodei, Chiara Degano, Pierpaolo Galletta, Letterio Salvatori, Francesco Univ Pisa Dipartimento Informat Pisa Italy
Adaptive systems improve their efficiency by modifying their behaviour to respond to changes in their operational environment. Also, security must adapt to these changes and policy enforcement becomes dependent on the... 详细信息
来源: 评论
A framework for metamorphic malware analysis and real-time detection
收藏 引用
COMPUTERS & SECURITY 2015年 48卷 212-233页
作者: Alam, Shahid Horspool, R. Nigel Traore, Issa Sogukpinar, Ibrahim Univ Victoria Dept Comp Sci Victoria BC V8P5C2 Canada Univ Victoria Dept Elect & Comp Engn Victoria BC V8P5C2 Canada Gebze Inst Technol Dept Comp Engn TR-41400 Gebze Kocaeli Turkey
Metamorphism is a technique that mutates the binary code using different obfuscations. It is difficult to write a new metamorphic malware and in general malware writers reuse old malware. To hide detection the malware... 详细信息
来源: 评论
control flow analysis for Brane Calculi
收藏 引用
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE 2009年 第C期227卷 59-75页
作者: Bodei, Chiara Bracciali, Andrea Chiarugi, Davide Univ Pisa Dipartimento Informat I-56127 Pisa Italy Univ Siena Dipartimento Sci Matemat Informat I-53100 Siena Italy
We introduce a control flow analysis for Brane Calculi. This verification technique allows properties regarding the behaviour of biological systems to be checked. This is an approximate technique that focusses on the ... 详细信息
来源: 评论
A control flow analysis for Beta-binders with and without static compartments
收藏 引用
THEORETICAL COMPUTER SCIENCE 2009年 第33-34期410卷 3110-3127页
作者: Bodei, Chiara Univ Pisa Dipartimento Informat I-56127 Pisa Italy
We introduce a control flow analysis, that statically approximates the dynamic behaviour of processes, expressed in the Beta-binders calculus and in an extended version of the calculus modelling static compartments. O... 详细信息
来源: 评论
SymWalker: Symbolic Execution in Routines of Binary Code  10
SymWalker: Symbolic Execution in Routines of Binary Code
收藏 引用
10th International Conference on Computational Intelligence and Security CIS 2014
作者: Ma, Jinxin Dong, Guowei Zhang, Puhan Guo, Tao China Informat Technol Secur Evaluat Ctr Beijing Peoples R China
Detecting vulnerabilities in binary codes is one of the most difficult problems due to the lack of type information and symbols. We propose a novel tool to perform symbolic execution inside the routines of binary code... 详细信息
来源: 评论