咨询与建议

限定检索结果

文献类型

  • 36 篇 期刊文献
  • 21 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 59 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 54 篇 工学
    • 48 篇 计算机科学与技术...
    • 25 篇 软件工程
    • 9 篇 电气工程
    • 6 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 建筑学
  • 4 篇 理学
    • 4 篇 数学
    • 2 篇 统计学(可授理学、...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 59 篇 control flow ana...
  • 8 篇 data flow analys...
  • 7 篇 static analysis
  • 3 篇 languages
  • 3 篇 program analysis
  • 3 篇 abstract interpr...
  • 3 篇 theory
  • 2 篇 continuation
  • 2 篇 linear logic
  • 2 篇 eta expansion
  • 2 篇 program slicing
  • 2 篇 algorithms
  • 2 篇 bioambients
  • 2 篇 systems biology
  • 2 篇 data mining
  • 2 篇 process calculus
  • 2 篇 decompilation
  • 2 篇 type flaw attack...
  • 2 篇 proofnet
  • 2 篇 software testing

机构

  • 3 篇 univ pisa dipart...
  • 3 篇 tech univ denmar...
  • 2 篇 brandeis univ wa...
  • 2 篇 univ pisa dipart...
  • 2 篇 univ pisa dipart...
  • 2 篇 univ pisa dipart...
  • 1 篇 univ sassari dip...
  • 1 篇 univ sci & techn...
  • 1 篇 linköping univer...
  • 1 篇 univ victoria de...
  • 1 篇 univ london impe...
  • 1 篇 roskilde univ ro...
  • 1 篇 amirkabir univ t...
  • 1 篇 hong kong polyte...
  • 1 篇 zhejiang gongsha...
  • 1 篇 univ sci & techn...
  • 1 篇 univ szeged dept...
  • 1 篇 gebze inst techn...
  • 1 篇 carnegie mellon ...
  • 1 篇 georgia inst tec...

作者

  • 9 篇 bodei chiara
  • 5 篇 degano pierpaolo
  • 3 篇 alam shahid
  • 3 篇 nielson flemming
  • 2 篇 mairson harry g.
  • 2 篇 van horn david
  • 2 篇 brodo linda
  • 2 篇 traore issa
  • 2 篇 thorup m
  • 2 篇 gao han
  • 2 篇 priami corrado
  • 2 篇 nielson hanne ri...
  • 2 篇 alstrup s
  • 2 篇 lauridsen pw
  • 2 篇 horspool r. nige...
  • 1 篇 hankin chris
  • 1 篇 mao jian
  • 1 篇 chung cm
  • 1 篇 saha seemanta
  • 1 篇 di lorenzo giusy

语言

  • 49 篇 英文
  • 8 篇 其他
  • 1 篇 德文
  • 1 篇 中文
检索条件"主题词=Control Flow Analysis"
59 条 记 录,以下是11-20 订阅
排序:
Malware Detection Method based on control flow analysis  2019
Malware Detection Method based on Control Flow Analysis
收藏 引用
Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City
作者: Peng Shan Qingbao Li Ping Zhang Yanyang Gu State Key Laboratory of Mathematical Engineering and Advanced Computing China
With the rapid development of computer technology and the iteration of malware, numerous computer malware detection methods have been proposed, among which malware detection based on machine learning has become an imp... 详细信息
来源: 评论
control-flow analysis of Function Calls and Returns by Abstract Interpretation
Control-Flow Analysis of Function Calls and Returns by Abstr...
收藏 引用
14th ACM SIGPLAN International Conference on Functional Programming
作者: Midtgaard, Jan Jensen, Thomas P. Roskilde Univ Roskilde Denmark CNRS F-75700 Paris France
We derive a control-flow analysis that approximates the interprocedural control-flow of both function calls and returns in the presence of first-class functions and tail-call optimization. In addition to an abstract e... 详细信息
来源: 评论
Trace-Based control-flow analysis  2021
Trace-Based Control-Flow Analysis
收藏 引用
42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation (PLDI)
作者: Montagu, Benoit Jensen, Thomas INRIA Rennes France
We define a small-step semantics for the untyped lambda-calculus, that traces the beta-reductions that occur during evaluation. By abstracting the computation traces, we reconstruct k-CFA using abstract interpretation... 详细信息
来源: 评论
Automatic analysis of control flow in web services composition processes
Automatic analysis of control flow in web services compositi...
收藏 引用
15th Euromicro International Conference on Parallel, Distributed and Network-Based Processing
作者: Di Lorenzo, Giusy Moscato, Francesco Mazzocca, Nicola Vittorini, Valeria Univ Naples Federico II Dip Ing Informazione Naples Italy Seconda Univ Napoli Dip Ing Informazione Naples Italy
Composition of web services is of great interest to support business-to-business collaboration and provide value added services with desired properties or capabilities. Nevertheless, the standard languages used to cre... 详细信息
来源: 评论
PSTR: A Test Case Reuse Method Based on Path Similarity
收藏 引用
IEEE ACCESS 2025年 13卷 3175-3187页
作者: Xu, Xinyue Chen, Sinong Guo, Zhonghao Chen, Xiangxian Zhejiang Univ Coll Biomed Engn & Instrument Sci Hangzhou 310027 Zhejiang Peoples R China
Software testing plays a critical role throughout the software development lifecycle. In modern development practices, frequent and incremental updates to code are common, and each update typically necessitates the ge... 详细信息
来源: 评论
Accelerating Verification and Software Standards Testing (AVASST) with Large Language Models (LLMs)  58
Accelerating Verification and Software Standards Testing (AV...
收藏 引用
58th Hawaii International Conference on System Sciences, HICSS 2025
作者: Karl, Ryan Hindka, Yash Zhang, Shen Robert, John Carnegie Mellon University Software Engineering Institute United States
The recent explosion in large language model (LLM) technology has highlighted the challenges of using public generative Artificial Intelligence (AI) tools in classified environments, especially for software analysis. ... 详细信息
来源: 评论
A framework for security analysis of mobile wireless networks
收藏 引用
THEORETICAL COMPUTER SCIENCE 2006年 第1-2期367卷 203-227页
作者: Nanz, Sebastian Hankin, Chris Univ London Imperial Coll Sci Technol & Med Dept Comp London England
We present a framework for specification and security analysis of communication protocols for mobile wireless networks. This setting introduces new challenges which are not being addressed by classical protocol analys... 详细信息
来源: 评论
Abstract interpretation of mobile systems
收藏 引用
JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING 2005年 第1期63卷 59-130页
作者: Feret, J Ecole Normale Super Dept Informat F-75230 Paris France
We propose an Abstract Interpretation-based context-free analysis for mobile systems written in the pi-calculus. Our analysis automatically captures a sound-but not complete-description of the potential behavior of a ... 详细信息
来源: 评论
A framework for metamorphic malware analysis and real-time detection
收藏 引用
COMPUTERS & SECURITY 2015年 48卷 212-233页
作者: Alam, Shahid Horspool, R. Nigel Traore, Issa Sogukpinar, Ibrahim Univ Victoria Dept Comp Sci Victoria BC V8P5C2 Canada Univ Victoria Dept Elect & Comp Engn Victoria BC V8P5C2 Canada Gebze Inst Technol Dept Comp Engn TR-41400 Gebze Kocaeli Turkey
Metamorphism is a technique that mutates the binary code using different obfuscations. It is difficult to write a new metamorphic malware and in general malware writers reuse old malware. To hide detection the malware... 详细信息
来源: 评论
DroidNative: Automating and optimizing detection of Android native code malware variants
收藏 引用
COMPUTERS & SECURITY 2017年 65卷 230-246页
作者: Alam, Shahid Qu, Zhengyang Riley, Ryan Chen, Yan Rastogi, Vaibhav Gebze Tech Univ Dept Comp Engn Gebze Turkey Northwestern Univ Dept Elect Engn & Comp Sci Evanston IL USA Qatar Univ Dept Comp Sci & Engn Doha Qatar Univ Wisconsin Madison Dept Comp Sci Madison WI USA
According to the Symantec and F-Secure threat reports, mobile malware development in 2013 and 2014 has continued to focus almost exclusively (similar to 99%) on the Android platform. Malware writers are applying steal... 详细信息
来源: 评论