Results 51 to 60 of about 49,891 (172)
A comparative analysis of software identifying approaches
The aim of the study is to provide a test of various well-known gradient boosted decision trees libraries, which are used here in relation to the software identification problem with limited set of executable files belonged to different versions of the ...
Kseniya I. Salakhutdinova+2 more
doaj +1 more source
Binary Analysis Using Symbolic Execution
This paper presents a method of static analysis of executable code that combines abstract interpretation and symbolic execution, where the latter is used in order to refine results of the former.
I. O. Leoshkevich
doaj
Methods of executable code protection [PDF]
The article deals with the problems in constructing a protection system of executable code. The techniques of breaking the integrity of executable code and ways to eliminate them are described. The adoption of virtual machine technology in the context of executable code protection from analysis is considered.
arxiv
Abstract Interpretation under Speculative Execution [PDF]
Analyzing the behavior of a program running on a processor that supports speculative execution is crucial for applications such as execution time estimation and side channel detection. Unfortunately, existing static analysis techniques based on abstract interpretation do not model speculative execution since they focus on functional properties of a ...
arxiv
The existence of a lawsuit in court against the certificate is not a new thing anymore , given stelsel adopted in the system of land registration in Indonesia is negative stelsel positive tendency .
Rani Arvita
doaj
SynFuzz: Efficient Concolic Execution via Branch Condition Synthesis [PDF]
Concolic execution is a powerful program analysis technique for exploring execution paths in a systematic manner. Compare to random-mutation-based fuzzing, concolic execution is especially good at exploring paths that are guarded by complex and tight branch predicates (e.g., (a*b) == 0xdeadbeef).
arxiv
Adanya gugatan di Pengadilan terhadap sertipikat bukan merupakan hal baru lagi, mengingat stelsel yang dianut dalam sistem pendaftaran tanah di Indonesia adalah stelsel negatif bertendensi positif.
Rani Arvita
doaj
The escalating sophistication of malware poses a formidable security challenge, as it evades traditional protective measures. Static analysis, an initial step in malware investigation, involves code scrutiny without actual execution.
Mesut GUVEN
doaj +1 more source
Compact Symbolic Execution (technical report) [PDF]
We present a generalisation of King's symbolic execution technique called compact symbolic execution. It is based on a concept of templates: a template is a declarative parametric description of such a program part, generating paths in symbolic execution tree with regularities in program states along them.
arxiv
Learning Execution Contexts from System Call Distributions for Intrusion Detection in Embedded Systems [PDF]
Existing techniques used for intrusion detection do not fully utilize the intrinsic properties of embedded systems. In this paper, we propose a lightweight method for detecting anomalous executions using a distribution of system call frequencies. We use a cluster analysis to learn the legitimate execution contexts of embedded applications and then ...
arxiv