Zobrazeno 1 - 10
of 89
pro vyhledávání: '"Lakhotia, Arun"'
Knowledge of the input format of binary executables is important for finding bugs and vulnerabilities, such as generating data for fuzzing or manual reverse engineering. This paper presents an algorithm to recover the structure and semantic relations
Externí odkaz:
http://arxiv.org/abs/2405.14052
Autor:
Pfeffer, Avi, Ruttenberg, Brian, Kellogg, Lee, Howard, Michael, Call, Catherine, O'Connor, Alison, Takata, Glenn, Reilly, Scott Neal, Patten, Terry, Taylor, Jason, Hall, Robert, Lakhotia, Arun, Miles, Craig, Scofield, Dan, Frank, Jared
Artificial intelligence methods have often been applied to perform specific functions or tasks in the cyber-defense realm. However, as adversary methods become more complex and difficult to divine, piecemeal efforts to understand cyber-attacks, and m
Externí odkaz:
http://arxiv.org/abs/1704.08716
Autor:
Lakhotia, Arun
Logic programming languages provide a higher level of data and control abstraction compared to procedural languages. The greater abstraction has made visible some new patterns in programs and in the process of their construction. Programs may be conc
Externí odkaz:
http://rave.ohiolink.edu/etdc/view?acc_num=case1054583632
Publikováno v:
Journal of Computer Virology and Hacking Techniques; 20240101, Issue: Preprints p1-16, 16p
Publikováno v:
International Journal of Web Information Systems, 2011, Vol. 7, Issue 2, pp. 152-182.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/17440081111141781
Publikováno v:
In Information and Software Technology 2006 48(7):549-565
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Walenstein, Andrew, Lakhotia, Arun
In software engineering contexts software may be compared for similarity in order to detect duplicate code that indicates poor design, and to reconstruct evolution history. Malicious software, being nothing other than a particular type of software, c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c19b1684d8a7af39acf1c11ea9d22957
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
LeDoux, Charles, Lakhotia, Arun
Publikováno v:
Intelligent Methods for Cyber Warfare; 2015, p1-42, 42p