咨询与建议

限定检索结果

文献类型

  • 8 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 12 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12 篇 工学
    • 11 篇 计算机科学与技术...
    • 7 篇 软件工程
    • 4 篇 信息与通信工程
    • 3 篇 电气工程

主题

  • 12 篇 program customiz...
  • 2 篇 protocol dialect...
  • 2 篇 deep learning
  • 2 篇 memory managemen...
  • 2 篇 software analysi...
  • 2 篇 binary rewriting
  • 2 篇 authentication
  • 2 篇 machine learning
  • 2 篇 binary analysis
  • 2 篇 profile-based op...
  • 2 篇 dynamic storage ...
  • 1 篇 feature-oriented...
  • 1 篇 performance
  • 1 篇 dynamic linking
  • 1 篇 embedded operati...
  • 1 篇 generics
  • 1 篇 java runtime env...
  • 1 篇 deployment
  • 1 篇 debugging and te...
  • 1 篇 java

机构

  • 4 篇 george washingto...
  • 1 篇 penn state univ ...
  • 1 篇 division of comp...
  • 1 篇 univ lille 1 irc...
  • 1 篇 microsoft corp r...
  • 1 篇 univ colorado de...
  • 1 篇 george washingto...
  • 1 篇 intelligent auto...
  • 1 篇 otto von guerick...
  • 1 篇 department of co...

作者

  • 5 篇 lan tian
  • 5 篇 venkataramani gu...
  • 4 篇 chen yurong
  • 2 篇 xue hongfa
  • 1 篇 grunwald d
  • 1 篇 wu dinghao
  • 1 篇 jin guang
  • 1 篇 olsson ra
  • 1 篇 ho ww
  • 1 篇 apel sven
  • 1 篇 leich thomas
  • 1 篇 jiang yufei
  • 1 篇 seidl ml
  • 1 篇 grimaud gilles
  • 1 篇 gogineni kailash
  • 1 篇 kuhlemann martin
  • 1 篇 zorn bg
  • 1 篇 courbot alexandr...
  • 1 篇 li jason
  • 1 篇 sun shaowen

语言

  • 12 篇 英文
检索条件"主题词=Program customization"
12 条 记 录,以下是1-10 订阅
排序:
JRed: program customization and Bloatware Mitigation Based on Static Analysis  40
JRed: Program Customization and Bloatware Mitigation Based o...
收藏 引用
40th Annual IEEE Computer Software and Applications Conference Symposium (COMPSAC) / Symposium on Software Engineering Technology and Applications (SETA)
作者: Jiang, Yufei Wu, Dinghao Liu, Peng Penn State Univ University Pk PA 16802 USA
Modern software engineering practice increasingly brings redundant code into software products, which has caused a phenomenon called bloatware, leading to software system maintenance, performance and reliability issue... 详细信息
来源: 评论
Hecate: Automated customization of program and Communication Features to Reduce Attack Surfaces  15th
Hecate: Automated Customization of Program and Communication...
收藏 引用
15th EAI International Conference on Security and Privacy in Communication Networks (SecureComm)
作者: Xue, Hongfa Chen, Yurong Venkataramani, Guru Lan, Tian George Washington Univ Washington DC 20052 USA
Customizing program and communication features is a commonly adopted strategy to counter security threats that arise from rapid inflation of software features. In this paper, we propose Hecate, a novel framework that ... 详细信息
来源: 评论
Verify-Pro: A Framework for Server Authentication using Communication Protocol Dialects
Verify-Pro: A Framework for Server Authentication using Comm...
收藏 引用
IEEE Military Communications Conference (MILCOM)
作者: Gogineni, Kailash Mei, Yongsheng Venkataramani, Guru Lan, Tian George Washington Univ Dept Elect & Comp Engn Washington DC 20052 USA
Customizing program binary and communication features is a commonly adopted strategy to counter network security threats like session hijacking, context confusion, and impersonation attacks. A potential attacker may h... 详细信息
来源: 评论
Verify-Pro: A Framework for Server Authentication using Communication Protocol Dialects
Verify-Pro: A Framework for Server Authentication using Comm...
收藏 引用
IEEE Military Communications Conference (MILCOM)
Customizing program binary and communication features is a commonly adopted strategy to counter network security threats like session hijacking, context confusion, and impersonation attacks. A potential attacker may h... 详细信息
来源: 评论
CustomPro: Network Protocol customization Through Cross-Host Feature Analysis  15th
CustomPro: Network Protocol Customization Through Cross-Host...
收藏 引用
15th EAI International Conference on Security and Privacy in Communication Networks (SecureComm)
作者: Chen, Yurong Lan, Tian Venkataramani, Guru George Washington Univ Washington DC 20052 USA
The implementations of network protocols are often "bloated" due to various users' needs and complex environment for deployment. The continual expansion of program features contribute to not only growing... 详细信息
来源: 评论
TOSS: Tailoring Online Server Systems through Binary Feature customization  25
TOSS: Tailoring Online Server Systems through Binary Feature...
收藏 引用
Workshop on Forming an Ecosystem Around Software Transformation (FEAST)
作者: Chen, Yurong Sun, Shaowen Lan, Tian Venkataramani, Guru George Washington Univ Washington DC 20052 USA
Network-based models are increasingly adopted to deliver key software service and utilities (e.g., data storage, search, and processing) to end users. The need to satisfy diverse user requirements and to fit different... 详细信息
来源: 评论
MORPH: Enhancing System Security through Interactive customization of Application and Communication Protocol Features  18
MORPH: Enhancing System Security through Interactive Customi...
收藏 引用
ACM SIGSAC Conference on Computer and Communications Security (CCS)
作者: Xue, Hongfa Chen, Yurong Venkataramani, Guru Lan, Tian Jin, Guang Li, Jason George Washington Univ Washington DC 20052 USA Intelligent Automat Inc Rockville MD USA
The ongoing expansion and addition of new features in software development bring inefficiency and vulnerabilities into programs, resulting in an increased attack surface with higher possibility of exploitation. Creati... 详细信息
来源: 评论
Generic feature modules: Two-staged program customization
Generic feature modules: Two-staged program customization
收藏 引用
1st International Conference on Software and Data Technologies
作者: Apel, Sven Kuhlemann, Martin Leich, Thomas Otto Von Guericke Univ Magdeburg Germany
With feature-oriented programming (FOP) and generics programmers have proper means for structuring software so that its elements can be reused and extended. This paper addresses the issue whether both approaches are e... 详细信息
来源: 评论
Efficient Off-Board Deployment and customization of Virtual Machine-Based Embedded Systems
收藏 引用
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS 2010年 第3期9卷 21-21页
作者: Courbot, Alexandre Grimaud, Gilles Vandewalle, Jean-Jacques Univ Lille 1 IRCICA LIFL INRIA Futurs POPS Res Grp F-59655 Villeneuve Dascq France
This article presents a new way to deploy and customize embedded virtual machine based operating systems for very restrained devices. Due to the specificity of restrained embedded devices (large usage of read-only mem... 详细信息
来源: 评论
Implementing heap-object behavior prediction efficiently and effectively
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 2001年 第9期31卷 869-892页
作者: Seidl, ML Zorn, BG Univ Colorado Dept Comp Sci Boulder CO 80309 USA Microsoft Corp Redmond WA 98052 USA
Heap-allocated objects play an important role in many modern programs. Various results have shown the overall performance of these programs can be improved by increasing the reference locality of heap-allocated object... 详细信息
来源: 评论