Zobrazeno 1 - 10
of 58
pro vyhledávání: '"Rajeev Barua"'
Publikováno v:
ICSCA
This paper improves upon an earlier binary rewriter we designed called RL-Bin. Unlike static rewrites, which are inherently non-robust, RL-Bin uses a dynamic design and thus is more robust. However, although RL-Bin works for most compiled binaries, r
Autor:
Rajeev Barua, Timothy Creech
Publikováno v:
ACM Transactions on Parallel Computing. 3:1-35
As hardware becomes increasingly parallel and the availability of scalable parallel software improves, the problem of managing multiple multithreaded applications (processes) becomes important. Malleable processes, which can vary the number of thread
Autor:
Angelos D. Keromytis, Kapil Anand, Matthew Smithson, Khaled ElWazeer, Rajeev Barua, Aparna Kotha
Publikováno v:
ACM Transactions on Software Engineering and Methodology. 25:1-38
This article makes three contributions regarding reverse-engineering of executables. First, techniques are presented for recovering a precise and correct stack-memory model in executables while addressing executable-specific challenges such as indire
Publikováno v:
MALWARE
Malware detection is a paramount priority in today’s world in order to prevent malware attacks. Malware detection comes in three methods: static analysis, dynamic analysis, and hybrids. Static analysis is fast and effective for detecting previously
Autor:
Kapil Anand, Rajeev Barua
Publikováno v:
ACM Transactions on Embedded Computing Systems. 14:1-25
Cache memories in embedded systems play an important role in reducing the execution time of applications. Various kinds of extensions have been added to cache hardware to enable software involvement in replacement decisions, improving the runtime ove
Publikováno v:
FEAST@CCS
Binary rewriters are used to ensure security properties or optimize and reduce runtime of existing binary applications. Existing binary rewriters are either static or dynamic, and both have severe shortcomings. Existing static rewriters have low over
Autor:
Julien Roy, Danny Kim, Amir Majlesi-Kupaei, Kapil Anand, Daniel Buettner, Khaled ElWazeer, Rajeev Barua
Publikováno v:
Detection of Intrusions and Malware, and Vulnerability Assessment ISBN: 9783319608754
DIMVA
DIMVA
Malicious software, better known as malware, is a major threat to society. Malware today typically employ a technique called obfuscation. Obfuscation detection in malware is a well-documented problem and has been analyzed using dynamic analysis. Howe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e3fbeb9acc1adcc8e9ffdb265d7a3526
https://doi.org/10.1007/978-3-319-60876-1_5
https://doi.org/10.1007/978-3-319-60876-1_5
Publikováno v:
ACM Transactions on Programming Languages and Systems. 36:1-51
Lazy scheduling is a runtime scheduler for task-parallel codes that effectively coarsens parallelism on load conditions in order to significantly reduce its overheads compared to existing approaches, thus enabling the efficient execution of more fine
Publikováno v:
PLDI
We present scalable static analyses to recover variables, data types, and function prototypes from stripped x86 executables (without symbol or debug information) and obtain a functional intermediate representation (IR) for analysis and rewriting purp
Publikováno v:
PACT
Large performance growth for processors requires exploitation of hardware parallelism, which, itself, requires parallelism in software. In spite of massive efforts, automatic parallelization of serial programs has had limited success mostly for regul