A survey and evaluation of android-based malware evasion techniques and detection frameworks

P Faruki, R Bhan, V Jain, S Bhatia, N El Madhoun… - Information, 2023 - mdpi.com
Android platform security is an active area of research where malware detection techniques
continuously evolve to identify novel malware and improve the timely and accurate detection …

[图书][B] Embedded system design: embedded systems foundations of cyber-physical systems, and the internet of things

P Marwedel - 2021 - library.oapen.org
A unique feature of this open access textbook is to provide a comprehensive introduction to
the fundamental knowledge in embedded systems, with applications in cyber-physical …

[图书][B] Eingebettete Systeme: Grundlagen Eingebetteter Systeme in Cyber-Physikalischen Systemen

P Marwedel - 2021 - library.oapen.org
Abstract Ein Alleinstellungsmerkmal dieses Open-Access-Lehrbuchs ist die umfassende
Einführung in das Grundlagenwissen über eingebettete Systeme mit Anwendungen in cyber …

Cycle-accurate performance modelling in an ultra-fast just-in-time dynamic binary translation instruction set simulator

I Böhm, B Franke, N Topham - 2010 International Conference …, 2010 - ieeexplore.ieee.org
Instruction set simulators (ISS) are vital tools for compiler and processor architecture design
space exploration and verification. State-of-the-art simulators using just-in-time (JIT) …

Early execution time-estimation through automatically generated timing models

P Altenbernd, J Gustafsson, B Lisper, F Stappert - Real-Time Systems, 2016 - Springer
Traditional timing analysis, such as worst-case execution time analysis, is normally applied
only in the late stages of embedded system software development, when the hardware is …

A dynamic scheduling strategy for the chare-kernel system

W Shu, LV Kale - Proceedings of the 1989 ACM/IEEE conference on …, 1989 - dl.acm.org
One of the challenges in programming distributed memory parallel machines is deciding
how to allocate work to processors. This problem is particularly acute for computations with …

Rethinking anti-emulation techniques for large-scale software deployment

D Jang, Y Jeong, S Lee, M Park, K Kwak, D Kim… - computers & …, 2019 - Elsevier
From the security perspective, emulation is often utilized to analyze unknown malware
owing to its capability of tracing fine-grained runtime behavior (ie, execution path …

Performance and power profiling for emulated android systems

CH Tu, HH Hsu, JH Chen, CH Chen… - ACM Transactions on …, 2014 - dl.acm.org
Simulation is a common approach for assisting system design and optimization. For system-
wide optimization, energy and computational resources are often the two most critical …

Approximate worst-case execution time analysis for early stage embedded systems development

J Gustafsson, P Altenbernd, A Ermedahl… - Software Technologies for …, 2009 - Springer
Abstract A Worst-Case Execution Time (WCET) analysis finds upper bounds for the
execution time of programs. Reliable WCET estimates are essential in the development of …

Early performance estimation of embedded software on risc-v processor using linear regression

W Zhang, M Goli, R Drechsler - 2022 25th International …, 2022 - ieeexplore.ieee.org
RISC-V-based embedded systems are becoming more and more popular in recent years.
Performance estimation of embedded software at an early stage of the design process plays …