• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 794,994
Next 10 →

Disassembly of Executable Code Revisited

by Benjamin Schwarz, Saumya Debray, Gregory Andrews - In Proc. IEEE 2002 Working Conference on Reverse Engineering (WCRE , 2002
"... Machine code disassembly routines form a fundamental component of software systems that statically analyze or modify executable programs. The task of disassembly is complicated by indirect jumps and the presence of nonexecutable data---jump tables, alignment bytes, etc.---in the instruction stream ..."
Abstract - Cited by 79 (9 self) - Add to MetaCart
Machine code disassembly routines form a fundamental component of software systems that statically analyze or modify executable programs. The task of disassembly is complicated by indirect jumps and the presence of nonexecutable data---jump tables, alignment bytes, etc.---in the instruction

Alias Analysis of Executable Code

by Saumya Debray, Robert Muth, Matthew Weippert , 1998
"... ..."
Abstract - Cited by 74 (9 self) - Add to MetaCart
Abstract not found

Obfuscation of Executable Code to Improve Resistance to Static Disassembly

by Cullen Linn, Saumya Debray - IN ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS , 2003
"... A great deal of software is distributed in the form ofexecutable code. The ability to reverse engineer such ..."
Abstract - Cited by 214 (12 self) - Add to MetaCart
A great deal of software is distributed in the form ofexecutable code. The ability to reverse engineer such

From DAML-S to Executable Code

by Sérgio Gaio, António Lopes, Luis Botelho
"... This paper analyses the specification of agent control and agent knowledge in DAML-S and its conversion into executable code. Instead of the ..."
Abstract - Cited by 10 (0 self) - Add to MetaCart
This paper analyses the specification of agent control and agent knowledge in DAML-S and its conversion into executable code. Instead of the

Executive Compensation

by Kevin J. Murphy , 1999
"... This paper summarizes the empirical and theoretical research on executive compensation and provides a comprehensive and up-to-date description of pay practices (and trends in pay practices) for chief executive officers (CEOs). Topics discussed include the level and structure of CEO pay (including de ..."
Abstract - Cited by 603 (19 self) - Add to MetaCart
This paper summarizes the empirical and theoretical research on executive compensation and provides a comprehensive and up-to-date description of pay practices (and trends in pay practices) for chief executive officers (CEOs). Topics discussed include the level and structure of CEO pay (including

Compressing differences of executable code

by Brenda S. Baker, Udi Manber, Robert Muth - In ACM SIGPLAN 1999 Workshop on Compiler Support for System Software (WCSSS’99 , 1999
"... Programs change often, and it is important to bring those changes to users as conveniently as possible. The two most common ways to deliver changes are to send a whole new program or to send “patches ” that encode the differences between the two versions, requiring much less space. In this paper, we ..."
Abstract - Cited by 15 (0 self) - Add to MetaCart
, we address computation of patches for executables of programs. Our techniques take into account the platform-dependent structure of executables, We identify changes in the executables that are likely to be artifacts of the compilation process, and arrange to reconstruct these when the patch

Naive Differences of Executable Code

by Colin Percival , 2003
"... The increasing frequency with which serious security flaws are discovered and the increasing rapidity with which they are exploited have made it necessary for programs to be updated far more frequently than in the past. While binary updates are generally far more convenient than source code updates, ..."
Abstract - Cited by 12 (1 self) - Add to MetaCart
The increasing frequency with which serious security flaws are discovered and the increasing rapidity with which they are exploited have made it necessary for programs to be updated far more frequently than in the past. While binary updates are generally far more convenient than source code updates

From Formal Methods to Executable Code

by Peter M. Musial
"... In this paper we will discuss one approach to achieving software reliability. In particular, where software systems are modeled using a formal mathematical framework that is used to verify their behaviors. Once verified these are translated to executable code. Formal system specifications and their ..."
Abstract - Add to MetaCart
In this paper we will discuss one approach to achieving software reliability. In particular, where software systems are modeled using a formal mathematical framework that is used to verify their behaviors. Once verified these are translated to executable code. Formal system specifications

Proof-Carrying Code

by George C. Necula , 1997
"... This paper describes proof-carrying code (PCC), a mechanism by which a host system can determine with certainty that it is safe to execute a program supplied (possibly in binary form) by an untrusted source. For this to be possible, the untrusted code producer must supply with the code a safety proo ..."
Abstract - Cited by 1263 (27 self) - Add to MetaCart
This paper describes proof-carrying code (PCC), a mechanism by which a host system can determine with certainty that it is safe to execute a program supplied (possibly in binary form) by an untrusted source. For this to be possible, the untrusted code producer must supply with the code a safety

Understanding Code Mobility

by Alfonso Fuggetta, Gian Pietro Picco, Giovanni Vigna - IEEE COMPUTER SCIENCE PRESS , 1998
"... The technologies, architectures, and methodologies traditionally used to develop distributed applications exhibit a variety of limitations and drawbacks when applied to large scale distributed settings (e.g., the Internet). In particular, they fail in providing the desired degree of configurability, ..."
Abstract - Cited by 549 (34 self) - Add to MetaCart
, scalability, and customizability. To address these issues, researchers are investigating a variety of innovative approaches. The most promising and intriguing ones are those based on the ability of moving code across the nodes of a network, exploiting the notion of mobile code. As an emerging research field
Next 10 →
Results 1 - 10 of 794,994
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University