咨询与建议

限定检索结果

文献类型

  • 36 篇 期刊文献
  • 21 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 59 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 54 篇 工学
    • 48 篇 计算机科学与技术...
    • 25 篇 软件工程
    • 9 篇 电气工程
    • 6 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 建筑学
  • 4 篇 理学
    • 4 篇 数学
    • 2 篇 统计学(可授理学、...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 59 篇 control flow ana...
  • 8 篇 data flow analys...
  • 7 篇 static analysis
  • 3 篇 languages
  • 3 篇 program analysis
  • 3 篇 abstract interpr...
  • 3 篇 theory
  • 2 篇 continuation
  • 2 篇 linear logic
  • 2 篇 eta expansion
  • 2 篇 program slicing
  • 2 篇 algorithms
  • 2 篇 bioambients
  • 2 篇 systems biology
  • 2 篇 data mining
  • 2 篇 process calculus
  • 2 篇 decompilation
  • 2 篇 type flaw attack...
  • 2 篇 proofnet
  • 2 篇 software testing

机构

  • 3 篇 univ pisa dipart...
  • 3 篇 tech univ denmar...
  • 2 篇 brandeis univ wa...
  • 2 篇 univ pisa dipart...
  • 2 篇 univ pisa dipart...
  • 2 篇 univ pisa dipart...
  • 1 篇 univ sassari dip...
  • 1 篇 univ sci & techn...
  • 1 篇 linköping univer...
  • 1 篇 univ victoria de...
  • 1 篇 univ london impe...
  • 1 篇 roskilde univ ro...
  • 1 篇 amirkabir univ t...
  • 1 篇 hong kong polyte...
  • 1 篇 zhejiang gongsha...
  • 1 篇 univ sci & techn...
  • 1 篇 univ szeged dept...
  • 1 篇 gebze inst techn...
  • 1 篇 carnegie mellon ...
  • 1 篇 georgia inst tec...

作者

  • 9 篇 bodei chiara
  • 5 篇 degano pierpaolo
  • 3 篇 alam shahid
  • 3 篇 nielson flemming
  • 2 篇 mairson harry g.
  • 2 篇 van horn david
  • 2 篇 brodo linda
  • 2 篇 traore issa
  • 2 篇 thorup m
  • 2 篇 gao han
  • 2 篇 priami corrado
  • 2 篇 nielson hanne ri...
  • 2 篇 alstrup s
  • 2 篇 lauridsen pw
  • 2 篇 horspool r. nige...
  • 1 篇 hankin chris
  • 1 篇 mao jian
  • 1 篇 chung cm
  • 1 篇 saha seemanta
  • 1 篇 di lorenzo giusy

语言

  • 49 篇 英文
  • 8 篇 其他
  • 1 篇 德文
  • 1 篇 中文
检索条件"主题词=Control Flow Analysis"
59 条 记 录,以下是41-50 订阅
排序:
Rare Path Guided Fuzzing  2023
Rare Path Guided Fuzzing
收藏 引用
32nd ACM SIGSOFT International Symposium on Software Testing and analysis (ISSTA)
作者: Saha, Seemanta Sarker, Laboni Shafiuzzaman, Md Shou, Chaofan Li, Albert Sankaran, Ganesh Bultan, Tevfik Univ Calif Santa Barbara Santa Barbara CA 93106 USA
Starting with a random initial seed, fuzzers search for inputs that trigger bugs or vulnerabilities. However, fuzzers often fail to generate inputs for program paths guarded by restrictive branch conditions. In this p... 详细信息
来源: 评论
Towards automation of testing high-level security properties
Towards automation of testing high-level security properties
收藏 引用
22nd Annual Conference on Data and Applications Security
作者: Hanna, Aiman Ling, Hai Zhou Furlong, Jason Debbabi, Mourad Concordia Univ CIISE Comp Secur Lab Montreal PQ Canada
Many security problems only become apparent after software is deployed, and in many cases a failure has occurred prior to the awareness of the problem. Although many would argue that the simpler solution to the proble... 详细信息
来源: 评论
Protocol Knowledge Combined Directed Symbolic Execution for Binary Programs
Protocol Knowledge Combined Directed Symbolic Execution for ...
收藏 引用
3rd International Conference on Instrumentation & Measurement, Computer, Communication and control (IMCCC)
作者: Huang, Hui Lu, Yu-Liang Zhao, Jun Wu, Zhi-Yong PLA Elect Engn Inst Network Engn Dept Hefei Peoples R China North Elect Equipments Res Inst Beijing Peoples R China
Symbolic Execution based defect discovery techniques for binary programs are now widely applied. However, because of the path explosion problem, it's still not applicable for security analysis on large programs. A... 详细信息
来源: 评论
Model Reduction Techniques for the Formal Verification of Hardware dependent Software
Model Reduction Techniques for the Formal Verification of Ha...
收藏 引用
15th IEEE International High Level Design Validation and Test Workshop (HLDVT)
作者: Ecker, Wolfgang Esen, Volkan Findenig, Rainer Steininger, Thomas Velten, Michael Infineon Technol Hagenberg Austria Upper Austrian Univ Appl Sci Hagenberg Austria
Contemporary researches provide many solutions for formally verifying both hardware and software systems. In this paper, we describe the formal verification of assembly programs, which are part of the HW/SW interface ... 详细信息
来源: 评论
Privilege Escalation Detecting in Android Applications  3
Privilege Escalation Detecting in Android Applications
收藏 引用
3rd International Conference on Big Data Computing and Communications (BIGCOM)
作者: Zhong, Xingqiu Zeng, Fanping Cheng, Zhichao Xie, Niannian Qin, Xiaoxia Guo, Shuli Univ Sci & Technol China Sch Comp Sci & Technol Hefei Anhui Peoples R China Anhui Prov Key Lab Software Comp & Commun Hefei Anhui Peoples R China
As the most popular mobile operating system, there are large amount of applications developed for Android. Considering security issues, developers are forced to declare relative permissions in manifest file when they ... 详细信息
来源: 评论
SymWalker: Symbolic Execution in Routines of Binary Code  10
SymWalker: Symbolic Execution in Routines of Binary Code
收藏 引用
10th International Conference on Computational Intelligence and Security CIS 2014
作者: Ma, Jinxin Dong, Guowei Zhang, Puhan Guo, Tao China Informat Technol Secur Evaluat Ctr Beijing Peoples R China
Detecting vulnerabilities in binary codes is one of the most difficult problems due to the lack of type information and symbols. We propose a novel tool to perform symbolic execution inside the routines of binary code... 详细信息
来源: 评论
MARD: A Framework for Metamorphic Malware analysis and Real-Time Detection
MARD: A Framework for Metamorphic Malware Analysis and Real-...
收藏 引用
28th IEEE International Conference on Advanced Information Networking and Applications Workshops (IEEE WAINA)
作者: Alam, Shahid Horspool, R. Nigel Traore, Issa Univ Victoria Dept CS Victoria BC V8P5C2 Canada Univ Victoria Dept ECE Victoria BC V8P5C2 Canada
Because of the financial and other gains attached with the growing malware industry, there is a need to automate the process of malware analysis and provide real-time malware detection. To hide a malware, obfuscation ... 详细信息
来源: 评论
Assuring Application-level Correctness Against Soft Errors
Assuring Application-level Correctness Against Soft Errors
收藏 引用
IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
作者: Cong, Jason Gururaj, Karthik Univ Calif Los Angeles Dept Comp Sci Los Angeles CA 90024 USA
Traditionally, research in fault tolerance has required architectural state to be numerically perfect for program execution to be correct. However, in many programs, even if execution is not 100% numerically correct, ... 详细信息
来源: 评论
An analysis tool set for reconfigurable media processing
An analysis tool set for reconfigurable media processing
收藏 引用
International Conference on Engineering of Reconfigurable Systems and Algorithms
作者: Dasu, A Akoglu, A Panchanathan, S Arizona State Univ Visual Comp & Commun Lab Tempe AZ 85287 USA
Existing media processing solutions such as general purpose processors with,media acceleration support or application specific hardware units fail to satisfy the constraints of low power, less s ilicon area and varyin... 详细信息
来源: 评论
Computation of static execute after relation with applications to software maintenance
Computation of static execute after relation with applicatio...
收藏 引用
23rd IEEE International Conference on Software Maintenance
作者: Beszedes, Arpad Gergely, Tamas Jasz, Judit Toth, Gabriella Gyimothy, Tibor Rajlich, Vaclav Univ Szeged Dept Software Engn Arpad Ter 2 H-6720 Szeged Hungary Wayne State Univ Dept Comp Sci Detroit MI 48202 USA
In this paper, we introduce Static Execute After (SEA) relationship among program components and present an efficient analysis algorithm. Our case studies show that SEA may approximate static slicing with perfect reca... 详细信息
来源: 评论