Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Hira Agrawal"'
Publikováno v:
Handbook of Software Fault Localization. :135-200
Autor:
Marc Pucci, Isil Sebuktekin, John C. Koshy, Joe Liberti, Scott Alexander, Jeffrey K. Hollingsworth, Thimios Panagos, Rauf Izmailov, Christine Roxanne Hung, Hira Agrawal, Ray S. Chen, Josh Morman, Simon Tsang, Chris Mesterharm
Publikováno v:
Cyber Sensing 2018.
The CASPER system offers a lightweight, multi-disciplinary approach to detect the execution of anomalous code by monitoring the unintended electronic device emissions. Using commodity hardware and a combination of novel signal processing, machine lea
Publikováno v:
ICSE
Locating, extracting, and reusing the implementation of a feature within an existing binary program is challenging. This paper proposes a novel algorithm to identify modular functions corresponding to such features and to provide usable interfaces fo
Publikováno v:
Advances in Cyber Security: Technology, Operations, and Experiences
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1326b8f2d51bc774bca106afecbb0ffc
https://doi.org/10.2307/j.ctt13x07xx.8
https://doi.org/10.2307/j.ctt13x07xx.8
Publikováno v:
MILCOM
Current malware detection and classification tools fail to adequately address variants that are generated automatically using new polymorphic and metamorphic transformation engines that can produce variants that bear no resemblance to one another. Cu
Autor:
Zhenyu Chen, Hira Agrawal
Publikováno v:
Journal of Systems and Software. 90:1-2
Autor:
Josephine Micallef, R. Snyder Shane, Hira Agrawal, William Conner, James L. Alberi, Alexandr Virodov, Lisa Bahler
Publikováno v:
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
Current malware detection tools focus largely on malicious code that is injected into target programs by outsiders by exploiting inadvertent vulnerabilities such as failing to guard against a buffer overflow or failure to properly validate a user inp
Publikováno v:
Advances in Intelligent and Soft Computing ISBN: 9783642040900
CISIS
CISIS
In this paper we present techniques for machine learning of program behavior by observing application level events to support runtime anomaly detection. We exploit two key relationships among event sequences: their edit distance proximity and state i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::756335952495a06f9565cd766b46bf3b
https://doi.org/10.1007/978-3-642-04091-7_17
https://doi.org/10.1007/978-3-642-04091-7_17
Autor:
Hira Agrawal
Publikováno v:
PASTE
Coverage testing techniques, such as statement and decision coverage, play a significant role in improving the quality of software systems. Constructing a thorough set of tests that yield high coverage, however, is often a very tedious, time consumin
Autor:
Andrew Do-Sung Jun, Gabor Kiss, Hira Agrawal, Hyunseo Park, Sookyang Kang, KyungChul Sihn, DaeSik Kim
Publikováno v:
IEEE Communications Magazine; Sep2006, Vol. 44 Issue 9, p88-95, 8p, 5 Diagrams, 1 Chart