咨询与建议

限定检索结果

文献类型

  • 11 篇 会议
  • 5 篇 期刊文献

馆藏范围

  • 16 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16 篇 工学
    • 11 篇 计算机科学与技术...
    • 6 篇 软件工程
    • 5 篇 电气工程
    • 3 篇 信息与通信工程
    • 1 篇 仪器科学与技术
    • 1 篇 控制科学与工程
  • 1 篇 理学
    • 1 篇 化学
    • 1 篇 生物学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 16 篇 dynamic code ana...
  • 5 篇 static code anal...
  • 2 篇 deep learning
  • 2 篇 simulation
  • 2 篇 computer securit...
  • 2 篇 inference
  • 2 篇 runtime monitori...
  • 2 篇 code analysis
  • 2 篇 api interception
  • 2 篇 machine learning
  • 2 篇 hard detours
  • 2 篇 probabilistic mo...
  • 2 篇 anti-forensics
  • 2 篇 software modelin...
  • 2 篇 code obfuscation
  • 2 篇 microsoft detour...
  • 2 篇 multivariate tes...
  • 1 篇 software reverse...
  • 1 篇 vulnerabilities ...
  • 1 篇 semantic clone d...

机构

  • 2 篇 johannes kepler ...
  • 1 篇 ain shams univ c...
  • 1 篇 dhirubhai ambani...
  • 1 篇 tomsk state univ...
  • 1 篇 barclays technol...
  • 1 篇 hanyang univ dep...
  • 1 篇 soongsil univ
  • 1 篇 peter great st p...
  • 1 篇 univ engn & tech...
  • 1 篇 software compete...
  • 1 篇 univ paris sacla...
  • 1 篇 natl engn & sci ...
  • 1 篇 affiliated inst ...
  • 1 篇 russian acad sci...
  • 1 篇 namseoul univ de...
  • 1 篇 fraunhofer inst ...
  • 1 篇 computer & syste...
  • 1 篇 montimage f-7501...
  • 1 篇 tech univ berlin...
  • 1 篇 sfi res ctr soft...

作者

  • 2 篇 choi seokwoo
  • 2 篇 chang taejoo
  • 2 篇 linsbauer lukas
  • 2 篇 park yongsu
  • 2 篇 thaller hannes
  • 2 篇 egyed alexander
  • 1 篇 kim hyuncheol
  • 1 篇 fischer stefan
  • 1 篇 de oca edgardo m...
  • 1 篇 lopez jorge
  • 1 篇 ferenc rudolf
  • 1 篇 kim changhyun
  • 1 篇 lee jinwoo
  • 1 篇 yevtushenko nina
  • 1 篇 das manik lal
  • 1 篇 loki gabor
  • 1 篇 mallouli wissam
  • 1 篇 sobh m. ali
  • 1 篇 krueger tammo
  • 1 篇 jimenez willy

语言

  • 16 篇 英文
检索条件"主题词=Dynamic Code Analysis"
16 条 记 录,以下是1-10 订阅
排序:
Is JavaScript Call Graph Extraction Solved Yet? A Comparative Study of Static and dynamic Tools
收藏 引用
IEEE ACCESS 2023年 11卷 25266-25284页
作者: Antal, Gabor Hegedus, Peter Herczeg, Zoltan Loki, Gabor Ferenc, Rudolf Univ Szeged Dept Software Engn H-6720 Szeged Hungary
code analysis is more important than ever because JavaScript is increasingly popular and actively used, both on the client and server sides. Most algorithms for analyzing vulnerabilities, finding coding issues, or inf... 详细信息
来源: 评论
Hard-Detours: a New Technique for dynamic code analysis
Hard-Detours: a New Technique for Dynamic Code Analysis
收藏 引用
IEEE EUROCON Conference
作者: El-Mal, A. Osama Abo Sobh, M. Ali Eldin, Ayman M. Bahaa Ain Shams Univ Comp & Syst Dept Cairo Egypt
dynamic code analysis for malware detection has become the heart of modern security tools. Some researchers target Microsoft Detours system to perform the dynamic analysis in window environment. This paper reveals som... 详细信息
来源: 评论
dynamic code Whitelist for Efficient analysis of Android code  18
Dynamic Code Whitelist for Efficient Analysis of Android Cod...
收藏 引用
Conference on Research in Adaptive and Convergent Systems (RACS)
作者: Choi, Jeongwoo Kim, Yongmin Lee, Jinwoo Hong, Jiman Soongsil Univ Seoul South Korea
Recently, as the number of malicious codes targeting Android platform is increasing, various researches are conducted to analyze them. However, Android applications tend to include various 3rd-party libraries which ma... 详细信息
来源: 评论
UnSafengine64: A Safengine Unpacker for 64-Bit Windows Environments and Detailed analysis Results on Safengine 2.4.0
收藏 引用
SENSORS 2024年 第3期24卷 840页
作者: Choi, Seokwoo Chang, Taejoo Park, Yongsu Affiliated Inst ETRI POB 1 Daejeon 305600 South Korea Hanyang Univ Dept Comp Sci Wangshimriro 222 Seoul 04763 South Korea
Despite recent remarkable advances in binary code analysis, malware developers still use complex anti-reversing techniques that make analysis difficult. Packers are used to protect malware, which are (commercial) tool... 详细信息
来源: 评论
Digital Transformation and the Role of dynamic Tooling in Extracting Microservices from Existing Software Systems  28th
Digital Transformation and the Role of Dynamic Tooling in Ex...
收藏 引用
28th European Conference on Systems, Software and Services Process Improvement (EuroSPI)
作者: Lapuz, Neil Clarke, Paul Abgaz, Yalemisew Dublin City Univ Dublin Ireland SFI Res Ctr Software Lero Dublin Ireland
The emergence of microservices architecture has promised to offer scalable, maintainable, evolvable, agile, and failure-resilient software products attracting software companies to migrate their legacy systems to a mi... 详细信息
来源: 评论
Hard-Detours: a New Technique for dynamic code analysis
Hard-Detours: a New Technique for Dynamic Code Analysis
收藏 引用
IEEE EUROCON
作者: A. Osama Abo El-Mal M. Ali Sobh Ayman M. Bahaa Eldin Computer & Systems Department Ain-Shams University
dynamic code analysis for malware detection has become the heart of modern security tools. Some researchers target Microsoft Detours system to perform the dynamic analysis in window environment. This paper reveals som... 详细信息
来源: 评论
Towards Fault Localization via Probabilistic Software Modeling  3
Towards Fault Localization via Probabilistic Software Modeli...
收藏 引用
3rd IEEE International Workshop on Validation, analysis, and Evolution of Software Tests (VST)
作者: Thaller, Hannes Linsbauer, Lukas Egyed, Alexander Fischer, Stefan Johannes Kepler Univ Linz Inst Software Syst Engn Linz Austria Software Competence Ctr Hagenberg GmbH Hagenberg Austria
Software testing helps developers to identify bugs. However, awareness of bugs is only the first step. Finding and correcting the faulty program components is equally hard and essential for high-quality software. Faul... 详细信息
来源: 评论
Towards Semantic Clone Detection via Probabilistic Software Modeling  14
Towards Semantic Clone Detection via Probabilistic Software ...
收藏 引用
IEEE 14th International Workshop on Software Clones (IWSC)
作者: Thaller, Hannes Linsbauer, Lukas Egyed, Alexander Johannes Kepler Univ Linz Inst Software Syst Engn Linz Austria
Semantic clones are program components with similar behavior, but different textual representation. Semantic similarity is hard to detect, and semantic clone detection is still an open issue. We present semantic clone... 详细信息
来源: 评论
Design and Implementation of Preprocessor for dynamic analysis of Sports Information  10th
Design and Implementation of Preprocessor for Dynamic Analys...
收藏 引用
iCatse International Conference on Information Science and Applications (ICISA)
作者: Kim, Hyuncheol Namseoul Univ Dept Comp Software Cheonan South Korea
Recently, due to the appearance of various types of malware, the existing static analysis exposes many limitations. Static analysis means analyzing the structure of a code or program with source code or object code wi... 详细信息
来源: 评论
x64Unpack: Hybrid Emulation Unpacker for 64-bit Windows Environments and Detailed analysis Results on VMProtect 3.4
收藏 引用
IEEE ACCESS 2020年 8卷 127939-127953页
作者: Choi, Seokwoo Chang, Taejoo Kim, Changhyun Park, Yongsu ETRI Affiliated Inst Daejeon 305600 South Korea Hanyang Univ Dept Comp Sci Seoul 04763 South Korea
In spite of recent remarkable advances in binary code analysis, malware developers are still using complex anti-reversing techniques to make analysis difficult. To protect malware, they use packers, which are (commerc... 详细信息
来源: 评论