The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for binaries with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1952-1998 (16) 1999-2001 (25) 2002 (17) 2003 (15) 2004 (23) 2005 (29) 2006 (22) 2007 (27) 2008 (38) 2009 (29) 2010 (15) 2011-2012 (21) 2013-2014 (28) 2015 (25) 2016 (18) 2017 (34) 2018 (30) 2019 (38) 2020 (26) 2021 (35) 2022 (30) 2023 (41) 2024 (7)
Publication types (Num. hits)
article(122) incollection(1) inproceedings(456) phdthesis(10)
Venues (Conferences, Journals, ...)
CoRR(40) ACSAC(18) USENIX Security Symposium(16) CGO(10) PLDI(9) ICSE(8) WCRE(8) ASE(7) CCS(7) ISSTA(7) NDSS(7) RAID(7) SP(7) VEE(7) DSN(6) IEEE Access(6) More (+10 of total 303)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 385 occurrences of 291 keywords

Results
Found 589 publication records. Showing 589 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Raghunathan Srinivasan, Partha Dasgupta, Tushar Gohad, Amiya Bhattacharya Determining the Integrity of Application Binaries on Unsecure Legacy Machines Using Software Based Remote Attestation. Search on Bibsonomy ICISS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Daniel J. Quinlan, Cory Cohen Discovery of C++ data structures from binaries. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Johannes Kinder, Helmut Veith Precise static analysis of untrusted driver binaries. Search on Bibsonomy FMCAD The full citation details ... 2010 DBLP  BibTeX  RDF
18Clemens Kolbitsch, Thorsten Holz, Christopher Kruegel, Engin Kirda Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide Balzarotti, Engin Kirda G-Free: defeating return-oriented programming through gadget-less binaries. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Scott Sirowy Emulation of SystemC Applications for Portable FPGA Binaries. Search on Bibsonomy 2010   RDF
18Alexandre Keunecke Ignácio Mendonça, Daniel P. Volpato, José Luís Almada Güntzel, Luiz C. V. dos Santos Mapping Data and Code into Scratchpads from Relocatable Binaries. Search on Bibsonomy ISVLSI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Kevin Coogan, Saumya K. Debray, Tasneem Kaochar, Gregg M. Townsend Automatic Static Unpacking of Malware Binaries. Search on Bibsonomy WCRE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Trevor Hansen, Peter Schachte, Harald Søndergaard State Joining and Splitting for the Symbolic Execution of Binaries. Search on Bibsonomy RV The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Johannes Kinder, Florian Zuleger, Helmut Veith An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries. Search on Bibsonomy VMCAI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Frank Vahid, Greg Stitt, Roman L. Lysecky Warp Processing: Dynamic Translation of Binaries to FPGA Circuits. Search on Bibsonomy Computer The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Lionel Litty, H. Andrés Lagar-Cavilla, David Lie Hypervisor Support for Identifying Covertly Executing Binaries. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2008 DBLP  BibTeX  RDF
18Glenn Wurster, Paul C. van Oorschot Self-Signed Executables: Restricting Replacement of Program Binaries by Malware. Search on Bibsonomy HotSec The full citation details ... 2007 DBLP  BibTeX  RDF
18Sean McIlwain, Barton P. Miller A tool for converting Linux device drivers into Solaris compatible binaries. Search on Bibsonomy Softw. Pract. Exp. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Arun Lakhotia, Eric Uday Kumar, Michael Venable A Method for Detecting Obfuscated Calls in Malicious Binaries. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Invasive software (viruses, worms), abstract stack, validation, program analysis, obfuscation
18Mihai Christodorescu, Nicholas Kidd, Wen-Han Goh String analysis for x86 binaries. Search on Bibsonomy PASTE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Marco Slaviero, Jaco Kroon, Martin S. Olivier Attacking Signed Binaries. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
18Stacey Shogan, Bruce R. Childers Compact Binaries with Code Compression in a Software Dynamic Translator. Search on Bibsonomy DATE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Christopher Krügel, William K. Robertson, Fredrik Valeur, Giovanni Vigna Static Disassembly of Obfuscated Binaries. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2004 DBLP  BibTeX  RDF
18Bertrand Anckaert, Frederik Vandeputte, Bruno De Bus, Bjorn De Sutter, Koen De Bosschere Link-Time Optimization of IA64 Binaries. Search on Bibsonomy Euro-Par The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Axelle Apvrille, David Gordon, Serge E. Hallyn, Makan Pourzandi, Vincent Roy DigSig: Runtime Authentication of Binaries at Kernel Level. Search on Bibsonomy LISA The full citation details ... 2004 DBLP  BibTeX  RDF
18Arun Lakhotia, Eric Uday Kumar Abstracting Stack to Detect Obfuscated Calls in Binaries. Search on Bibsonomy SCAM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Pramod G. Joisha, Samuel P. Midkiff, Mauricio J. Serrano, Manish Gupta 0002 Efficiently Adapting Java Binaries in Limited Memory Contexts. Search on Bibsonomy Int. J. Parallel Program. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Greg Stitt, Frank Vahid Hardware/software partitioning of software binaries. Search on Bibsonomy ICCAD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF FPGA, low power, C++, C, synthesis, codesign, hardware/software partitioning, binary translation, decompilation, assembly language
18Enrico Ghillino, Carlo Garetto, Michele Goano, Giovanni Ghione, Enrico Bellotti, Kevin F. Brennan Simplex Algorithm for Band Structure Calculation of Noncubic Symmetry Semiconductors: Application to III-nitride Binaries and Alloys. Search on Bibsonomy VLSI Design The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Henrik Theiling Generating Decision Trees for Decoding Binaries. Search on Bibsonomy LCTES/OM The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Henrik Theiling Generating Decision Trees for Decoding Binaries. Search on Bibsonomy OM@PLDI The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Henrik Theiling Extracting safe and precise control flow from binaries. Search on Bibsonomy RTCSA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF safe precise control flow extraction, binary executables, instruction sequence clustering, branch targets, block boundaries, safety-critical real-time systems, graph approximation, entry points, instruction blocks, instruction routines, real-time systems, uncertainties, sequences, safety-critical software, program diagnostics, control flow graph, program control structures, static program analysis, flow graphs, bottom-up approach
18Bjorn De Sutter, Bruno De Bus, Koenraad De Bosschere, P. Keyngnaert, Bart Demoen On the Static Analysis of Indirect Control Transfers in Binaries. Search on Bibsonomy PDPTA The full citation details ... 2000 DBLP  BibTeX  RDF
18Mira Mezini, Jens Uwe Pipka, Thorsten Dittmar, Wim Boot Detecting Evolution Incompatibilities by Analyzing Java Binaries. Search on Bibsonomy TOOLS (30) The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
18Venkata Krishnan, Josep Torrellas Hardware and Software Support for Speculative Execution of Sequential Binaries on a Chip-multiprocessor. Search on Bibsonomy International Conference on Supercomputing The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
18Michael Franz, Thomas Kistler Slim Binaries. Search on Bibsonomy Commun. ACM The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
18Michelle Rodino Breaking out of Binaries: Reconceptualizing Gender and its Relationship to Languagein Computer-Mediated Communication. Search on Bibsonomy J. Comput. Mediat. Commun. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
18Steve C. McMahan, Mark Bluhm, Raul Garibay 6×86: the Cyrix solution to executing ×86 binaries on a high performance microprocessor. Search on Bibsonomy Proc. IEEE The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
18Norman B. Saunders Magnetic binaries in the logical design of information handling machines. Search on Bibsonomy ACM National Meeting (Pittsburgh) The full citation details ... 1952 DBLP  DOI  BibTeX  RDF
12Asia Slowinska, Traian Stancescu, Herbert Bos DDE: dynamic data structure excavation. Search on Bibsonomy ApSys The full citation details ... 2010 DBLP  DOI  BibTeX  RDF detecting data structures, dynamic analysis, binary
12Tathagata Das, Prashanth Mohan, Venkata N. Padmanabhan, Ramachandran Ramjee, Asankhaya Sharma PRISM: platform for remote sensing using smartphones. Search on Bibsonomy MobiSys The full citation details ... 2010 DBLP  DOI  BibTeX  RDF mobile sandbox, opportunistic sensing, smart phones, mobile platform, participatory sensing
12Blair Foster, Anil Somayaji Object-level recombination of commodity applications. Search on Bibsonomy GECCO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF commodity programs, object-level recombination, objrecombga, software recombination, genetic algorithms, genetic programming
12Yongzheng Wu, Roland H. C. Yap, Rajiv Ramnath Comprehending module dependencies and sharing. Search on Bibsonomy ICSE (2) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF visualization, dependency graph, shared library
12Kunal Agrawal, I-Ting Angelina Lee, Jim Sukha Brief announcement: serial-parallel reciprocity in dynamic multithreaded languages. Search on Bibsonomy SPAA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF dynamic multithreading, intel threading building blocks, serial-parallel reciprocity, scheduling, work stealing, cilk
12Dirk Koch, Christian Beckhoff, Jürgen Teich Hardware Decompression Techniques for FPGA-Based Embedded Systems. Search on Bibsonomy ACM Trans. Reconfigurable Technol. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF reconfigurable computing, configuration, Bitstream
12Yoann Guillot, Alexandre Gazet Semi-automatic binary protection tampering. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Efe Yardimci, Michael Franz Mostly static program partitioning of binary executables. Search on Bibsonomy ACM Trans. Program. Lang. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Continuous compilation and optimization, dynamic parallelization, binary translation
12Alex Shye, Joseph Blomstedt, Tipp Moseley, Vijay Janapa Reddi, Daniel A. Connors PLR: A Software Approach to Transient Fault Tolerance for Multicore Architectures. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Jongeun Lee, Aviral Shrivastava A compiler optimization to reduce soft errors in register files. Search on Bibsonomy LCTES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF architectural vulnerability factor, link-time optimization, embedded system, compilation, static analysis, soft error, register file
12Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attestation systems, integrity monitoring, return-oriented programming
12Arjun Dasgupta, Vivek R. Narasayya, Manoj Syamala A Static Analysis Framework for Database Applications. Search on Bibsonomy ICDE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Gaurav Mittal, David Zaretsky, Prithviraj Banerjee Streaming implementation of a sequential decompression algorithm on an FPGA. Search on Bibsonomy FPGA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF fix., fpga, system-on-chip, binary translation, hardware-software co-design, streaming architecture
12Aimen Bouchhima, Patrice Gerin, Frédéric Pétrot Automatic instrumentation of embedded software for high level hardware/software co-simulation. Search on Bibsonomy ASP-DAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Shuo Guo, Yu Gu 0001, Bo Jiang, Tian He 0001 Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links. Search on Bibsonomy MobiCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF low duty cycle networks, wireless sensor networks, flooding
12Jeff Ringenberg, Trevor N. Mudge SuiteSpecks and SuiteSpots: A methodology for the automatic conversion of benchmarking programs into intrinsically checkpointed assembly code. Search on Bibsonomy ISPASS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Pradeep Varma, R. K. Shyamasundar, Harshit J. Shah Backward-compatible constant-time exception-protected memory. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF scalar fat pointer, spatial access error, temporal access error, memory safety, object version, backward compatibility
12Brian W. DeVries, Gopal Gupta 0001, Kevin W. Hamlen, Scott Moore, Meera Sridhar ActionScript bytecode verification with co-logic programming. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ActionScript, coinductive logic programming, in-lined reference monitoring, model checking, verification
12James Newsome, Stephen McCamant, Dawn Song Measuring channel capacity to distinguish undue influence. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF model counting, quantitative information flow, channel capacity
12Jeff H. Perkins, Sunghun Kim 0001, Samuel Larsen, Saman P. Amarasinghe, Jonathan Bachrach, Michael Carbin, Carlos Pacheco, Frank Sherwood, Stelios Sidiroglou, Gregory T. Sullivan, Weng-Fai Wong, Yoav Zibin, Michael D. Ernst, Martin C. Rinard Automatically patching errors in deployed software. Search on Bibsonomy SOSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF self healing
12Shih-wei Liao, Tzu-Han Hung, Donald Nguyen, Hucheng Zhou, Chinyen Chou, Chia-Heng Tu Prefetch optimizations on large-scale applications via parameter value prediction. Search on Bibsonomy ICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF data center applications, machine learning
12Kapil Anand, Rajeev Barua Instruction cache locking inside a binary rewriter. Search on Bibsonomy CASES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cache locking, embedded systems, caches, binary rewriting
12Fabrizio Baiardi, Diego Cilea, Daniele Sgandurra, Francesco Ceccarelli Measuring Semantic Integrity for Remote Attestation. Search on Bibsonomy TRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Manuel Werlberger, Thomas Pock, Markus Unger, Horst Bischof A Variational Model for Interactive Shape Prior Segmentation and Real-Time Tracking. Search on Bibsonomy SSVM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Monirul Islam Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee Automatic Reverse Engineering of Malware Emulators. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Asia Slowinska, Herbert Bos Pointless tainting?: evaluating the practicality of pointer tainting. Search on Bibsonomy EuroSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dynamic taint analysis, pointer tainting
12Thomas Zimmermann 0001 Changes and bugs - Mining and predicting development activities. Search on Bibsonomy ICSM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12David K. Tam, Reza Azimi, Livio Soares, Michael Stumm RapidMRC: approximating L2 miss rate curves on commodity systems for online optimizations. Search on Bibsonomy ASPLOS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF miss rate curve, performance monitoring unit, shared cache management, chip multiprocessor, dynamic optimization, multicore processor, shared cache, cache management, cache partitioning, hardware performance counters, online optimization
12Manuel Costa, Jon Crowcroft, Miguel Castro 0001, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham 0001 Vigilante: End-to-end containment of Internet worm epidemics. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF self-certifying alerts, vulnerability condition slicing, program analysis, dynamic data-flow analysis, Worm containment
12Fredrik Warg, Per Stenström Dual-thread Speculation: A Simple Approach to Uncover Thread-level Parallelism on a Simultaneous Multithreaded Processor. Search on Bibsonomy Int. J. Parallel Program. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Computer architecture, Chip multiprocessors, Thread-level speculation, Thread-level parallelism, Simultaneous multithreading
12Stanley J. Barr, Samuel J. Cardman, David M. Martin A boosting ensemble for the recognition of code sharing in malware. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Olaf Landsiedel, Muhammad Hamad Alizai, Klaus Wehrle When Timing Matters: Enabling Time Accurate and Scalable Simulation of Sensor Network Applications. Search on Bibsonomy IPSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Vijaykumar Channakeshava, Vivek K. Shanbhag, Avinash Panigrahi, Rajendra Sisodia, Sala Lakshmanan Safe subset-regression test selection for managed code. Search on Bibsonomy ISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF software maintanance, change impact analysis, regression test selection
12Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel Rootkit-resistant disks. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, storage, labels, rootkits
12Dirk Beyer 0001, Damien Zufferey, Rupak Majumdar CSIsat: Interpolation for LA+EUF. Search on Bibsonomy CAV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Tong Chen 0001, Tao Zhang, Zehra Sura, Marc González Tallada Prefetching irregular references for software cache on cell. Search on Bibsonomy CGO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF prefetch, DMA, software cache
12Gunar Schirner, Andreas Gerstlauer, Rainer Dömer Automatic generation of hardware dependent software for MPSoCs from abstract system specifications. Search on Bibsonomy ASP-DAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Gabriel Marin, John M. Mellor-Crummey Pinpointing and Exploiting Opportunities for Enhancing Data Reuse. Search on Bibsonomy ISPASS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Yu Guo, Krzysztof Sierszecki, Christo Angelov A (Re)Configuration Mechanism for Resource-Constrained Embedded Systems. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF embedded systems, reconfiguration, function blocks
12Wenrui Dai, Hongkai Xiong, Li Song 0001 On Non-sequential Context Modeling with Application to Executable Data Compression. Search on Bibsonomy DCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Sequential context modeling, Prediction by Partial Match, data compression, MDL, maximum a posteriori
12Martin Pinzger 0001, Nachiappan Nagappan, Brendan Murphy Can developer-module networks predict failures? Search on Bibsonomy SIGSOFT FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF developer contribution network, network centrality measures, social network analysis, failure prediction
12Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Jean-Pierre Seifert Model-based behavioral attestation. Search on Bibsonomy SACMAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF behavioral attestation, highlevel framework, remote attestation, UCON
12Anjaneyulu Pasala, Yannick L. H. Lew Yaw Fung, Fady Akladios, Ravi Prakash Gorthi An approach to select regression tests to validate .NET applications upon deployment of components upgrades. Search on Bibsonomy Bangalore Compute Conf. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF components upgrades, software maintenance, change impact analysis, regression test selection
12Thomas F. Wenisch, Michael Ferdman, Anastasia Ailamaki, Babak Falsafi, Andreas Moshovos Temporal streams in commercial server applications. Search on Bibsonomy IISWC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Monirul Islam Sharif, Vinod Yegneswaran, Hassen Saïdi, Phillip A. Porras, Wenke Lee Eureka: A Framework for Enabling Static Malware Analysis. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Thomas Zimmermann 0001, Nachiappan Nagappan Predicting defects using network analysis on dependency graphs. Search on Bibsonomy ICSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF windows server 2003, network analysis, dependency graph, defect prediction
12Nachiappan Nagappan, Brendan Murphy, Victor R. Basili The influence of organizational structure on software quality: an empirical case study. Search on Bibsonomy ICSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF code churn, software mining, empirical studies, developers, failures, organizational structure
12Sanmin Liu, Hai Jin 0001, Xiaofei Liao, Hong Yao, Deze Zeng TCPBridge: A software approach to establish direct communications for NAT hosts. Search on Bibsonomy AICCSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Roy Levin, Ilan Newman, Gadi Haber Complementing Missing and Inaccurate Profiling Using a Minimum Cost Circulation Algorithm. Search on Bibsonomy HiPEAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Circulations, Real-time, Sampling, Profiling, Control Flow, Flow network
12Joe Devietti, Colin Blundell, Milo M. K. Martin, Steve Zdancewic Hardbound: architectural support for spatial safety of the C programming language. Search on Bibsonomy ASPLOS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF spatial memory safety, C programming language
12Nathan E. Rosenblum, Gregory Cooksey, Barton P. Miller Virtual machine-provided context sensitive page mappings. Search on Bibsonomy VEE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF context sensitive memory, self checksumming code, virtual machine monitor, xen
12Bernhard Jansen, HariGovind V. Ramasamy, Matthias Schunter Policy enforcement and compliance proofs for Xen virtual machines. Search on Bibsonomy VEE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF virtual machines, trusted computing, integrity management
12Yougang Song, Brett D. Fleisch Utilizing Binary Rewriting for Improving End-Host Security. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Performance Evaluation, Web Servers, Traffic Analysis, Security and Protection, Binary Rewriting
12Alex Shye, Tipp Moseley, Vijay Janapa Reddi, Joseph Blomstedt, Daniel A. Connors Using Process-Level Redundancy to Exploit Multiple Cores for Transient Fault Tolerance. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Juan Caballero, Heng Yin 0001, Zhenkai Liang, Dawn Xiaodong Song Polyglot: automatic extraction of protocol message format using dynamic binary analysis. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF protocol reverse engineering, binary analysis
12Kussay Nugamesh Mutter, Mohd. Zubir Mat Jafri, Azlan Bin Abdul Aziz Change detection, Remote sensing image, Saliency map, Visual saliency model. Search on Bibsonomy CGIV The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Alexander Dreweke, Marc Wörlein, Ingrid Fischer, Dominic Schell, Thorsten Meinl, Michael Philippsen Graph-Based Procedural Abstraction. Search on Bibsonomy CGO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Kapil Vaswani, Matthew J. Thazhuthaveetil, Y. N. Srikant, P. J. Joseph Microarchitecture Sensitive Empirical Models for Compiler Optimizations. Search on Bibsonomy CGO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Lungpin Yeh, Juei-Ting Sun, Sheng-Kai Hung, Yarsun Hsu A Windows-Based Parallel File System. Search on Bibsonomy HPCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Martin Rehr, Brian Vinter The One-Click Grid-Resource Model. Search on Bibsonomy HPCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Stefan Monnier The swiss coercion. Search on Bibsonomy PLPV The full citation details ... 2007 DBLP  DOI  BibTeX  RDF type based security, formal methods, compilation, coercions
12Cheng Wang 0013, Shiliang Hu, Ho-Seop Kim, Sreekumar R. Nair, Maurício Breternitz Jr., Zhiwei Ying, Youfeng Wu StarDBT: An Efficient Multi-platform Dynamic Binary Translation System. Search on Bibsonomy Asia-Pacific Computer Systems Architecture Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF performance evaluation, Dynamic binary translation
12Jan Goebel, Thorsten Holz, Carsten Willems Measurement and Analysis of Autonomous Spreading Malware in a University Environment. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Malware, Honeypots, Invasive Software
12Luís Veiga, Rodrigo Rodrigues 0001, Paulo Ferreira 0001 GiGi: An Ocean of Gridlets on a "Grid-for-the-Masses". Search on Bibsonomy CCGRID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Michael Dalton, Hari Kannan, Christos Kozyrakis Raksha: a flexible information flow architecture for software security. Search on Bibsonomy ISCA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF semantic vulnerabilities, dynamic, software security
Displaying result #401 - #500 of 589 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license