咨询与建议

限定检索结果

文献类型

  • 20 篇 会议
  • 10 篇 期刊文献

馆藏范围

  • 30 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 28 篇 工学
    • 21 篇 计算机科学与技术...
    • 15 篇 软件工程
    • 7 篇 电气工程
    • 3 篇 信息与通信工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 控制科学与工程
  • 3 篇 理学
    • 2 篇 生物学
    • 1 篇 数学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 农学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 30 篇 self-modifying c...
  • 3 篇 performance
  • 3 篇 program analysis
  • 3 篇 verification
  • 3 篇 dynamic code
  • 3 篇 code obfuscation
  • 2 篇 languages
  • 2 篇 debugging
  • 2 篇 chip multiproces...
  • 2 篇 modular verifica...
  • 2 篇 assembly code ve...
  • 2 篇 power
  • 2 篇 design
  • 2 篇 obfuscation
  • 2 篇 synthesis
  • 2 篇 mesi protocol
  • 2 篇 program represen...
  • 2 篇 gene regulatory ...
  • 2 篇 internal and ext...
  • 2 篇 satisfiability m...

机构

  • 2 篇 tsinghua univ de...
  • 2 篇 georgia inst tec...
  • 2 篇 univ arizona dep...
  • 2 篇 yale univ dept c...
  • 2 篇 intel corp fdc a...
  • 2 篇 microsoft res ca...
  • 1 篇 university of te...
  • 1 篇 nanyang technol ...
  • 1 篇 univ wisconsin d...
  • 1 篇 univ michigan ad...
  • 1 篇 fac sci rabat la...
  • 1 篇 trasmeta corp sa...
  • 1 篇 harbin inst tech...
  • 1 篇 agence natl secu...
  • 1 篇 google sunnyvale...
  • 1 篇 bar ilan univ il...
  • 1 篇 univ texas dalla...
  • 1 篇 nancy univ loria...
  • 1 篇 univ cambridge c...
  • 1 篇 katholieke univ ...

作者

  • 2 篇 ballapuram chinn...
  • 2 篇 wintersteiger ch...
  • 2 篇 dunn sara-jane
  • 2 篇 debray saumya
  • 2 篇 shao zhong
  • 2 篇 sharif ahmad
  • 2 篇 cai hongxu
  • 2 篇 lee hsien-hsin s...
  • 2 篇 kugler hillel
  • 2 篇 vaynberg alexand...
  • 2 篇 hamadi youssef
  • 2 篇 shavit yoli
  • 2 篇 yordanov boyan
  • 1 篇 zhang mingwei
  • 1 篇 klaiber a
  • 1 篇 silberman gm
  • 1 篇 kistler t
  • 1 篇 jon stephens
  • 1 篇 johnson r
  • 1 篇 liang zhihong

语言

  • 28 篇 英文
  • 2 篇 其他
检索条件"主题词=Self-Modifying code"
30 条 记 录,以下是21-30 订阅
排序:
Verified Just-In-Time Compiler on x86  10
Verified Just-In-Time Compiler on x86
收藏 引用
37th ACM-SIGPLAN-SIGACT Symposium on Principles of Programming Languages
作者: Myreen, Magnus O. Univ Cambridge Comp Lab Cambridge CB2 1TN England
This paper presents a method for creating formally correct just-in-time (JIT) compilers. The tractability of our approach is demonstrated through, what we believe is the first, verification of a JIT compiler with resp... 详细信息
来源: 评论
Hybrid Analysis and Control of Malware
Hybrid Analysis and Control of Malware
收藏 引用
13th International Symposium on Recent Advances in Intrusion Detection Systems
作者: Roundy, Kevin A. Miller, Barton P. Univ Wisconsin Dept Comp Sci Madison WI 53706 USA
Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ. The most prevalent of these techniques are cod... 详细信息
来源: 评论
Protection of DRM Agent codes
收藏 引用
10th Pacific Rim Conference on Multimedia
作者: Liang, Shan Emmanuel, Sabu Nanyang Technol Univ Sch Comp Engn Singapore Singapore
In most existing digital rights management (DRM) technologies, the DRM agent, or DRM client, contains the content protection mechanisms applied to the system However, the DRM agent that runs at the consumer side is of... 详细信息
来源: 评论
A computability perspective on self-modifying programs
A computability perspective on self-modifying programs
收藏 引用
7th IEEE International Conference on Software Engineering and Formal Methods (SEFM 2009)
作者: Bonfante, Guillaume Marion, Jean-Yves Reynaud-Plantey, Daniel Nancy Univ LORIA F-54602 Villers Les Nancy France
In order to increase their stealth, malware commonly use the self-modification property of programs. By doing so, programs can hide their real code so that it is difficult to define a signature for it. But then, what ... 详细信息
来源: 评论
Exploiting access semantics and program behavior to reduce snoop power in chip multiprocessors
Exploiting access semantics and program behavior to reduce s...
收藏 引用
13th International Conference on Architectural Support for Programming Languages and Operating Systems
作者: Ballapuram, Chinnakrishnan S. Sharif, Ahmad Lee, Hsien-Hsin S. Intel Corp FDC Architecture Santa Clara CA 95051 USA Georgia Inst Technol Sch Elect & Comp Engn Atlanta GA 30332 USA
Integrating more processor cores on-die has become the unanimous trend in the microprocessor industry. Most of the current research thrusts using chip multiprocessors (CMPs) as the baseline to analyze problems in vari... 详细信息
来源: 评论
Exploiting access semantics and program behavior to reduce snoop power in chip multiprocessors
收藏 引用
ACM SIGPLAN NOTICES 2008年 第3期43卷 60-69页
作者: Ballapuram, Chinnakrishnan S. Sharif, Ahmad Lee, Hsien-Hsin S. Intel Corp FDC Architecture Santa Clara CA 95051 USA Georgia Inst Technol Sch Elect & Comp Engn Atlanta GA 30332 USA
Integrating more processor cores on-die has become the unanimous trend in the microprocessor industry. Most of the current research thrusts using chip multiprocessors (CMPs) as the baseline to analyze problems in vari... 详细信息
来源: 评论
self-Replicating and self-modifying Programs in Fraglets
Self-Replicating and Self-Modifying Programs in Fraglets
收藏 引用
2nd International Conference on Bio-Inspired Models of Network, Information and Computing Systems
作者: Yamamoto, Lidia Schreckling, Daniel Meyer, Thomas Univ Basel Dept Comp Sci Bernoullistr 16 CH-4056 Basel Switzerland Univ Hamburg Dept Comp Sci D-22527 Hamburg Germany
The inherently decentralized nature of artificial chemical computing models makes them particularly attractive for building bio-inspired software with self-organizing and emergent properties. Yet it is not straightfor... 详细信息
来源: 评论
The transmeta code Morphing™ Software:: Using speculation, recovery, and adaptive retranslation to address real-life challenges
The transmeta Code Morphing™ Software:: Using speculation, ...
收藏 引用
International Symposium on code Generation and Optimization
作者: Dehnert, JC Grant, BK Banning, JP Johnson, R Kistler, T Klaiber, A Mattson, J Trasmeta Corp Santa Clara CA 95054 USA
Transmeta's Crusoe microprocessor is a full, system-level implementation of the x86 architecture, comprising a native VLIW microprocessor with a software layer, the code Morphing Software (CMS), that combines an i... 详细信息
来源: 评论
AN ARCHITECTURAL FRAMEWORK FOR SUPPORTING HETEROGENEOUS INSTRUCTION-SET ARCHITECTURES
收藏 引用
COMPUTER 1993年 第6期26卷 39-56页
作者: SILBERMAN, GM EBCIOGLU, K IBM Thomas J. Watson Res. Center Yorktown Heights NY
An architectural framework that allows software applications and operating system code written for a given instruction set to migrate to different, higher performance architectures is described. The framework provides... 详细信息
来源: 评论
CACHE BEHAVIOR OF COMBINATOR GRAPH REDUCTION
收藏 引用
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS 1992年 第2期14卷 265-297页
作者: KOOPMAN, PJ LEE, P SIEWIOREK, DP CARNEGIE MELLON UNIV SCH COMP SCIPITTSBURGHPA 15213
The results of cache-simulation experiments with an abstract machine for reducing combinator graphs are presented. The abstract machine, called TIGRE, exhibits reduction rates that, for similar kinds of combinator gra... 详细信息
来源: 评论