咨询与建议

限定检索结果

文献类型

  • 36 篇 期刊文献
  • 20 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 58 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 53 篇 工学
    • 47 篇 计算机科学与技术...
    • 25 篇 软件工程
    • 9 篇 电气工程
    • 5 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 建筑学
  • 4 篇 理学
    • 4 篇 数学
    • 2 篇 统计学(可授理学、...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 58 篇 control flow ana...
  • 7 篇 static analysis
  • 7 篇 data flow analys...
  • 3 篇 languages
  • 3 篇 program analysis
  • 3 篇 abstract interpr...
  • 3 篇 theory
  • 2 篇 continuation
  • 2 篇 linear logic
  • 2 篇 eta expansion
  • 2 篇 program slicing
  • 2 篇 algorithms
  • 2 篇 bioambients
  • 2 篇 systems biology
  • 2 篇 data mining
  • 2 篇 process calculus
  • 2 篇 decompilation
  • 2 篇 type flaw attack...
  • 2 篇 proofnet
  • 2 篇 software testing

机构

  • 3 篇 univ pisa dipart...
  • 3 篇 tech univ denmar...
  • 2 篇 brandeis univ wa...
  • 2 篇 univ pisa dipart...
  • 2 篇 univ pisa dipart...
  • 2 篇 univ pisa dipart...
  • 1 篇 univ sassari dip...
  • 1 篇 univ sci & techn...
  • 1 篇 linköping univer...
  • 1 篇 univ victoria de...
  • 1 篇 univ london impe...
  • 1 篇 roskilde univ ro...
  • 1 篇 amirkabir univ t...
  • 1 篇 hong kong polyte...
  • 1 篇 zhejiang gongsha...
  • 1 篇 univ sci & techn...
  • 1 篇 univ szeged dept...
  • 1 篇 gebze inst techn...
  • 1 篇 georgia inst tec...
  • 1 篇 northeastern uni...

作者

  • 9 篇 bodei chiara
  • 5 篇 degano pierpaolo
  • 3 篇 alam shahid
  • 3 篇 nielson flemming
  • 2 篇 mairson harry g.
  • 2 篇 van horn david
  • 2 篇 brodo linda
  • 2 篇 traore issa
  • 2 篇 thorup m
  • 2 篇 gao han
  • 2 篇 priami corrado
  • 2 篇 nielson hanne ri...
  • 2 篇 alstrup s
  • 2 篇 lauridsen pw
  • 2 篇 horspool r. nige...
  • 1 篇 hankin chris
  • 1 篇 mao jian
  • 1 篇 chung cm
  • 1 篇 saha seemanta
  • 1 篇 di lorenzo giusy

语言

  • 49 篇 英文
  • 7 篇 其他
  • 1 篇 德文
  • 1 篇 中文
检索条件"主题词=Control Flow Analysis"
58 条 记 录,以下是21-30 订阅
排序:
MARD: A Framework for Metamorphic Malware analysis and Real-Time Detection
MARD: A Framework for Metamorphic Malware Analysis and Real-...
收藏 引用
28th IEEE International Conference on Advanced Information Networking and Applications Workshops (IEEE WAINA)
作者: Alam, Shahid Horspool, R. Nigel Traore, Issa Univ Victoria Dept CS Victoria BC V8P5C2 Canada Univ Victoria Dept ECE Victoria BC V8P5C2 Canada
Because of the financial and other gains attached with the growing malware industry, there is a need to automate the process of malware analysis and provide real-time malware detection. To hide a malware, obfuscation ... 详细信息
来源: 评论
Generation of dynamic control-dependence graphs for binary programs
Generation of dynamic control-dependence graphs for binary p...
收藏 引用
作者: Pogulis, Jakob Linköping University
学位级别:master
Dynamic analysis of binary files is an area of computer science that has many purposes. It is useful when it comes to debugging software in a development environment and the developer needs to know which statements af... 详细信息
来源: 评论
control-flow analysis of Function Calls and Returns by Abstract Interpretation
Control-Flow Analysis of Function Calls and Returns by Abstr...
收藏 引用
14th ACM SIGPLAN International Conference on Functional Programming
作者: Midtgaard, Jan Jensen, Thomas P. Roskilde Univ Roskilde Denmark CNRS F-75700 Paris France
We derive a control-flow analysis that approximates the interprocedural control-flow of both function calls and returns in the presence of first-class functions and tail-call optimization. In addition to an abstract e... 详细信息
来源: 评论
Protocol Knowledge Combined Directed Symbolic Execution for Binary Programs
Protocol Knowledge Combined Directed Symbolic Execution for ...
收藏 引用
3rd International Conference on Instrumentation & Measurement, Computer, Communication and control (IMCCC)
作者: Huang, Hui Lu, Yu-Liang Zhao, Jun Wu, Zhi-Yong PLA Elect Engn Inst Network Engn Dept Hefei Peoples R China North Elect Equipments Res Inst Beijing Peoples R China
Symbolic Execution based defect discovery techniques for binary programs are now widely applied. However, because of the path explosion problem, it's still not applicable for security analysis on large programs. A... 详细信息
来源: 评论
control flow analysis for BioAmbients
收藏 引用
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE 2007年 第3期180卷 65-79页
作者: Nielson, Flemming Nielson, Hanne Riis Priami, Corrado Rosa, Debora Tech Univ Denmark Kongens Lyngby Denmark Univ Trento Trento Italy
This paper presents a static analysis for investigating properties of biological systems specified in BioAmbients. We exploit the control flow analysis to decode the bindings of variables induced by communications and... 详细信息
来源: 评论
Can We Make It Faster? Efficient May-Happen-in-Parallel analysis Revisited
Can We Make It Faster? Efficient May-Happen-in-Parallel Anal...
收藏 引用
13th International Conference on Parallel and Distributed Computing, Applications, and Technologies (PDCAT)
作者: Chen, Congming Huo, Wei Li, Lung Feng, Xiaobing Xing, Kai Chinese Acad Sci State Key Lab Comp Architecture Beijing Peoples R China Chinese Acad Sci Grad Univ Beijing Peoples R China Univ Sci & Technol China Sch Comp Sci Anhui Peoples R China
May-Happen-in-Parallel (MHP) analysis is a very important and fundamental mechanism to facilitate concurrent program analysis, optimization and even concurrency bug detection. However, the inefficiency in its design a... 详细信息
来源: 评论
PROGRAM MATCHING THROUGH CODE analysis AND ARTIFICIAL NEURAL NETWORKS
收藏 引用
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING 2012年 第2期22卷 225-241页
作者: Nascimento, Tiago M. Boccardo, Davidson R. Prado, Charles B. Machado, Raphael C. S. Carmo, Luiz F. R. C. Univ Fed Rio de Janeiro Rio De Janeiro Brazil Inmetro Natl Inst Metrol Qual & Technol Rio De Janeiro Brazil
Program matching refers to the mapping between equivalent codes written in different languages - including high-level and low-level languages. This equivalence is useful for some software engineering scenarios such as... 详细信息
来源: 评论
Detecting and Preventing Type flaws: a control flow analysis with Tags
收藏 引用
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE 2007年 第1期194卷 3-22页
作者: Bodei, Chiara Degano, Pierpaolo Gao, Han Brodo, Linda Univ Pisa Dipartimento Informat Via Pontecorvo I-56127 Pisa Italy Tech Univ Denmark Informat & Math Modelling DK-2800 Lyngby Denmark Univ Sassari Dipartimento Scienze Linguaggi I-07100 Sassari Italy
A type flaw attack on a security protocol is an attack where an honest principal is cheated on interpreting a field in a message as the one with a type other than the intended one. In this paper, we shall present an e... 详细信息
来源: 评论
Relating complexity and precision in control flow analysis
Relating complexity and precision in control flow analysis
收藏 引用
12th ACM SIGPLAN International Conference on Functional Programming
作者: Van Horn, David Mairson, Harry G. Brandeis Univ Waltham MA 02254 USA
We analyze the computational complexity of kCFA, a hierarchy of control flow analyses that determine which functions may be applied at a given call-site. This hierarchy specifies related decision problems, quite apart... 详细信息
来源: 评论
Relating complexity and precision in control flow analysis
收藏 引用
ACM SIGPLAN NOTICES 2007年 第9期42卷 85-96页
作者: Van Horn, David Mairson, Harry G. Brandeis Univ Waltham MA 02254 USA
We analyze the computational complexity of kCFA, a hierarchy of control flow analyses that determine which functions may be applied at a given call-site. This hierarchy specifies related decision problems, quite apart... 详细信息
来源: 评论