Results 51 to 60 of about 49,891 (172)

A comparative analysis of software identifying approaches

open access: yesБезопасность информационных технологий, 2019
The aim of the study is to provide a test of various well-known gradient boosted decision trees libraries, which are used here in relation to the  software identification problem with limited set of executable files belonged to different versions of the ...
Kseniya I. Salakhutdinova   +2 more
doaj   +1 more source

Binary Analysis Using Symbolic Execution

open access: yesБезопасность информационных технологий, 2010
This paper presents a method of static analysis of executable code that combines abstract interpretation and symbolic execution, where the latter is used in order to refine results of the former.
I. O. Leoshkevich
doaj  

Methods of executable code protection [PDF]

open access: yesarXiv, 2014
The article deals with the problems in constructing a protection system of executable code. The techniques of breaking the integrity of executable code and ways to eliminate them are described. The adoption of virtual machine technology in the context of executable code protection from analysis is considered.
arxiv  

Abstract Interpretation under Speculative Execution [PDF]

open access: yesarXiv, 2019
Analyzing the behavior of a program running on a processor that supports speculative execution is crucial for applications such as execution time estimation and side channel detection. Unfortunately, existing static analysis techniques based on abstract interpretation do not model speculative execution since they focus on functional properties of a ...
arxiv  

KEDUDUKAN BPN RI DALAM MENGHADAPI PROBLEMATIK PUTUSAN NON-EXECUTABLE PENGADILAN TATA USAHA NEGARA TENTANG PEMBATALAN SERTIPIKAT HAK ATAS TANAH (ANOTASI PUTUSAN MAHKAMAH AGUNG RI NO. 158/PK/TUN/2011 TENTANG PEMBATALAN SERTIPIKAT HAK GUNA BANGUNAN NO. 132

open access: yesJurnal Media Hukum, 2016
The existence of a lawsuit in court against the certificate is not a new thing anymore , given stelsel adopted in the system of land registration in Indonesia is negative stelsel positive tendency .
Rani Arvita
doaj  

SynFuzz: Efficient Concolic Execution via Branch Condition Synthesis [PDF]

open access: yesarXiv, 2019
Concolic execution is a powerful program analysis technique for exploring execution paths in a systematic manner. Compare to random-mutation-based fuzzing, concolic execution is especially good at exploring paths that are guarded by complex and tight branch predicates (e.g., (a*b) == 0xdeadbeef).
arxiv  

Kedudukan BPN RI dalam Menghadapi Problematika Putusan Non-Executable Pengadilan Tata Usaha Negara Tentang Pembatalan Sertipikat Hak Atas Tanah Anotasi Putusan Mahkamah Agung RI No. 158/PK/TUN/2011 Tentang Pembatalan Sertipikat Hak Guna Bangunan No. 132 An PT. Taman Ogan Permai

open access: yesLex Librum, 2018
Adanya gugatan di Pengadilan terhadap sertipikat bukan merupakan hal baru lagi, mengingat stelsel yang dianut dalam sistem pendaftaran tanah di Indonesia adalah stelsel negatif bertendensi positif.
Rani Arvita
doaj  

Leveraging deep learning and image conversion of executable files for effective malware detection: A static malware analysis approach

open access: yesAIMS Mathematics
The escalating sophistication of malware poses a formidable security challenge, as it evades traditional protective measures. Static analysis, an initial step in malware investigation, involves code scrutiny without actual execution.
Mesut GUVEN
doaj   +1 more source

Compact Symbolic Execution (technical report) [PDF]

open access: yesarXiv, 2012
We present a generalisation of King's symbolic execution technique called compact symbolic execution. It is based on a concept of templates: a template is a declarative parametric description of such a program part, generating paths in symbolic execution tree with regularities in program states along them.
arxiv  

Learning Execution Contexts from System Call Distributions for Intrusion Detection in Embedded Systems [PDF]

open access: yesarXiv, 2015
Existing techniques used for intrusion detection do not fully utilize the intrinsic properties of embedded systems. In this paper, we propose a lightweight method for detecting anomalous executions using a distribution of system call frequencies. We use a cluster analysis to learn the legitimate execution contexts of embedded applications and then ...
arxiv  

Home - About - Disclaimer - Privacy