|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 102 occurrences of 63 keywords
|
|
|
Results
Found 116 publication records. Showing 116 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | Praveen Sivadasan, P. Sojan Lal, Naveen Sivadasan |
JDATATRANS for array obfuscation in Java source codes to defeat reverse engineering from decompiled codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bangalore Compute Conf. ![In: Proceedings of the 2nd Bangalore Annual Compute Conference, Compute 2009, Bangalore, India, January 9-10, 2009, pp. 13, 2009, ACM, 978-1-60558-476-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
restructured arrays, source code obfuscation, reverse engineering |
18 | Katerina Dolgova, Alexander Chernov |
Automatic Type Reconstruction in Disassembled C Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCRE ![In: WCRE 2008, Proceedings of the 15th Working Conference on Reverse Engineering, Antwerp, Belgium, October 15-18, 2008, pp. 202-206, 2008, IEEE Computer Society, 978-0-7695-3429-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Jingbo Zhang, Rongcai Zhao, Jianmin Pang, Wen Fu |
Formal Abstraction of Semantics for Detecting Malicious Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (2) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 2: Software Engineering, December 12-14, 2008, Wuhan, China, pp. 350-353, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Jingbo Zhang, Wen Fu, Jianmin Pang, Rongcai Zhao |
Using Propositional Calculas to Accurately Structure Control-Flow from Binary Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (2) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 2: Software Engineering, December 12-14, 2008, Wuhan, China, pp. 338-341, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Greg Stitt, Frank Vahid |
Binary synthesis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Design Autom. Electr. Syst. ![In: ACM Trans. Design Autom. Electr. Syst. 12(3), pp. 34:1-34:30, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Binary synthesis, synthesis from software binaries, FPGA, hardware/software codesign, hardware/software partitioning, configurable logic, warp processors |
18 | Atsushi Ohori |
A proof theory for machine code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 29(6), pp. 36, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Curry-Howard isomorphism |
18 | Elvira Albert, Miguel Gómez-Zamalloa, Laurent Hubert, Germán Puebla |
Verification of Java Bytecode Using Analysis and Transformation of Logic Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PADL ![In: Practical Aspects of Declarative Languages, 9th International Symposium, PADL 2007, Nice, France, January 14-15, 2007., pp. 124-139, 2007, Springer, 978-3-540-69608-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | François Garillot, Benjamin Werner |
Simple Types in Type Theory: Deep and Shallow Encodings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TPHOLs ![In: Theorem Proving in Higher Order Logics, 20th International Conference, TPHOLs 2007, Kaiserslautern, Germany, September 10-13, 2007, Proceedings, pp. 368-382, 2007, Springer, 978-3-540-74590-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Haifeng He, John Trimble, Somu Perianayagam, Saumya K. Debray, Gregory R. Andrews |
Code Compaction of an Operating System Kernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CGO ![In: Fifth International Symposium on Code Generation and Optimization (CGO 2007), 11-14 March 2007, San Jose, California, USA, pp. 283-298, 2007, IEEE Computer Society, 978-0-7695-2764-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Jingbo Zhang, Rongcai Zhao, Jianmin Pang |
Parameter and Return-value Analysis of Binary Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, Beijing, China, July 24-27, 2007. Volume 1, pp. 501-508, 2007, IEEE Computer Society, 978-0-7695-2870-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Tao Wei, Jian Mao, Wei Zou, Yu Chen |
Structuring 2-way Branches in Binary Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, Beijing, China, July 24-27, 2007. Volume 1, pp. 115-118, 2007, IEEE Computer Society, 978-0-7695-2870-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007, pp. 129-140, 2007, ACM, 978-1-59593-857-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anti-disassembly, oblivious hashing, overlapped code, obfuscation, tamper-resistance, integrity checking |
18 | Jiang Zheng 0001, Brian Robinson, Laurie A. Williams, Karen Smiley |
A process for identifying changes when source code is not available. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(4), pp. 1-4, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
change identification, COTS |
18 | Fubo Zhang, Erik H. D'Hollander |
Using Hammock Graphs to Structure Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 30(4), pp. 231-245, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
optimization, parallel processing, compilers, Program transformation, structured programming, correctness proofs, software/program verification |
18 | D. Curran, Neil J. Hurley, Mel Ó Cinnéide |
Securing Java through software watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPPJ ![In: Proceedings of the 2nd International Symposium on Principles and Practice of Programming in Java, PPPJ 2003, Kilkenny City, Ireland, June 16-18, 2003, pp. 145-148, 2003, ACM, 0-9544145-1-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Java protection, copyright infringement, software watermarking, spread spectrum watermarking |
18 | Raja Vallée-Rai, Phong Co, Etienne Gagnon, Laurie J. Hendren, Patrick Lam 0001, Vijay Sundaresan |
Soot - a Java bytecode optimization framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASCON ![In: Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative Research, November 8-11, 1999, Mississauga, Ontario, Canada, pp. 13, 1999, IBM. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
Java |
Displaying result #101 - #116 of 116 (100 per page; Change: ) Pages: [ <<][ 1][ 2] |
|