Vyzkoušejte nový nástroj s podporou AI
  
        
        Summon Research Assistant
        BETA
      
                    
  
      
    Technique for IoT malware detection based on control flow graph analysis
                                      
                                            Bobrovnikova, Kira,                              Lysenko, Sergii,                              Savenko, Bohdan,                              Gaj, Piotr,                              Savenko, Oleg                              
Published in Radìoelektronnì ì komp'ûternì sistemi (Online) (23.02.2022)
                   
      
      
                                                  Published in Radìoelektronnì ì komp'ûternì sistemi (Online) (23.02.2022)
Get full text
              Journal Article
          
              
          Method and system of control flow graph construction
                                      
                                            CHAUVEL GERARD,                              PELTIER MIKAEL,                              LESOT JEAN-PHILIPPE,                              CABILLIC GILBERT                              
Year of Publication 24.11.2009
                         
                                            
                   
      
      
                                                                                
                                                        Get full text
                                        
              Year of Publication 24.11.2009
              Patent
          
              
          Method and system of control flow graph construction
                                      
                                            CHAUVEL GERARD,                              PELTIER MIKAEL,                              LESOT JEAN-PHILIPPE,                              CABILLIC GILBERT                              
Year of Publication 02.02.2006
                         
                                            
                   
      
      
                                                                                
                                                        Get full text
                                        
              Year of Publication 02.02.2006
              Patent
          
              
          Combating Control Flow Linearization
                                      
                                            Kirsch, Julian,                              Jonischkeit, Clemens,                              Kittel, Thomas,                              Zarras, Apostolis,                              Eckert, Claudia                              
Published in ICT Systems Security and Privacy Protection (2017)
                   
      
      
                                                  Published in ICT Systems Security and Privacy Protection (2017)
Get full text
              Book Chapter
          
              
          Node coarsening calculi for program slicing
                                      
                                            Harman, M.,                              Hierons, R.,                              Danicic, S.,                              Howroyd, J.,                              Laurence, M.,                              Fox, C.                              
Published in Proceedings Eighth Working Conference on Reverse Engineering (2001)
                   
      
      
                                                  Published in Proceedings Eighth Working Conference on Reverse Engineering (2001)
Get full text
              Conference Proceeding
          
              
          A relational symbolic execution algorithm for constraint-based testing of database programs
                                      
                                            Marcozzi, Michael,                              Vanhoof, Wim,                              Hainaut, Jean-Luc                              
Published in 2013 IEEE 13th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2013)
                   
      
      
                                                  Published in 2013 IEEE 13th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2013)
Get full text
              Conference Proceeding
          
              
          Optimal Program Partitioning for Predictable Performance
                                      
                                            Whitham, Jack,                              Audsley, Neil                              
Published in 2012 24th Euromicro Conference on Real-Time Systems (01.07.2012)
                   
      
      
                                                  Published in 2012 24th Euromicro Conference on Real-Time Systems (01.07.2012)
Get full text
              Conference Proceeding