Results 1 - 10
of
794,994
Disassembly of Executable Code Revisited
- In Proc. IEEE 2002 Working Conference on Reverse Engineering (WCRE
, 2002
"... Machine code disassembly routines form a fundamental component of software systems that statically analyze or modify executable programs. The task of disassembly is complicated by indirect jumps and the presence of nonexecutable data---jump tables, alignment bytes, etc.---in the instruction stream ..."
Abstract
-
Cited by 79 (9 self)
- Add to MetaCart
Machine code disassembly routines form a fundamental component of software systems that statically analyze or modify executable programs. The task of disassembly is complicated by indirect jumps and the presence of nonexecutable data---jump tables, alignment bytes, etc.---in the instruction
Obfuscation of Executable Code to Improve Resistance to Static Disassembly
- IN ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS
, 2003
"... A great deal of software is distributed in the form ofexecutable code. The ability to reverse engineer such ..."
Abstract
-
Cited by 214 (12 self)
- Add to MetaCart
A great deal of software is distributed in the form ofexecutable code. The ability to reverse engineer such
From DAML-S to Executable Code
"... This paper analyses the specification of agent control and agent knowledge in DAML-S and its conversion into executable code. Instead of the ..."
Abstract
-
Cited by 10 (0 self)
- Add to MetaCart
This paper analyses the specification of agent control and agent knowledge in DAML-S and its conversion into executable code. Instead of the
Executive Compensation
, 1999
"... This paper summarizes the empirical and theoretical research on executive compensation and provides a comprehensive and up-to-date description of pay practices (and trends in pay practices) for chief executive officers (CEOs). Topics discussed include the level and structure of CEO pay (including de ..."
Abstract
-
Cited by 603 (19 self)
- Add to MetaCart
This paper summarizes the empirical and theoretical research on executive compensation and provides a comprehensive and up-to-date description of pay practices (and trends in pay practices) for chief executive officers (CEOs). Topics discussed include the level and structure of CEO pay (including
Compressing differences of executable code
- In ACM SIGPLAN 1999 Workshop on Compiler Support for System Software (WCSSS’99
, 1999
"... Programs change often, and it is important to bring those changes to users as conveniently as possible. The two most common ways to deliver changes are to send a whole new program or to send “patches ” that encode the differences between the two versions, requiring much less space. In this paper, we ..."
Abstract
-
Cited by 15 (0 self)
- Add to MetaCart
, we address computation of patches for executables of programs. Our techniques take into account the platform-dependent structure of executables, We identify changes in the executables that are likely to be artifacts of the compilation process, and arrange to reconstruct these when the patch
Naive Differences of Executable Code
, 2003
"... The increasing frequency with which serious security flaws are discovered and the increasing rapidity with which they are exploited have made it necessary for programs to be updated far more frequently than in the past. While binary updates are generally far more convenient than source code updates, ..."
Abstract
-
Cited by 12 (1 self)
- Add to MetaCart
The increasing frequency with which serious security flaws are discovered and the increasing rapidity with which they are exploited have made it necessary for programs to be updated far more frequently than in the past. While binary updates are generally far more convenient than source code updates
From Formal Methods to Executable Code
"... In this paper we will discuss one approach to achieving software reliability. In particular, where software systems are modeled using a formal mathematical framework that is used to verify their behaviors. Once verified these are translated to executable code. Formal system specifications and their ..."
Abstract
- Add to MetaCart
In this paper we will discuss one approach to achieving software reliability. In particular, where software systems are modeled using a formal mathematical framework that is used to verify their behaviors. Once verified these are translated to executable code. Formal system specifications
Proof-Carrying Code
, 1997
"... This paper describes proof-carrying code (PCC), a mechanism by which a host system can determine with certainty that it is safe to execute a program supplied (possibly in binary form) by an untrusted source. For this to be possible, the untrusted code producer must supply with the code a safety proo ..."
Abstract
-
Cited by 1263 (27 self)
- Add to MetaCart
This paper describes proof-carrying code (PCC), a mechanism by which a host system can determine with certainty that it is safe to execute a program supplied (possibly in binary form) by an untrusted source. For this to be possible, the untrusted code producer must supply with the code a safety
Understanding Code Mobility
- IEEE COMPUTER SCIENCE PRESS
, 1998
"... The technologies, architectures, and methodologies traditionally used to develop distributed applications exhibit a variety of limitations and drawbacks when applied to large scale distributed settings (e.g., the Internet). In particular, they fail in providing the desired degree of configurability, ..."
Abstract
-
Cited by 549 (34 self)
- Add to MetaCart
, scalability, and customizability. To address these issues, researchers are investigating a variety of innovative approaches. The most promising and intriguing ones are those based on the ability of moving code across the nodes of a network, exploiting the notion of mobile code. As an emerging research field
Results 1 - 10
of
794,994