[图书][B] Modern compiler design
" Modern Compiler Design" makes the topic of compiler design more accessible by focusing
on principles and techniques of wide application. By carefully distinguishing between the …
on principles and techniques of wide application. By carefully distinguishing between the …
Off-device anti-malware protection for mobile devices
AJ Bettini, K Watkins, DJ Guerra, M Price - US Patent 8,918,881, 2014 - Google Patents
Techniques for off-device anti-malware protection for mobile devices are disclosed. In some
embodiments, off-device anti malware protection for mobile devices includes receiving a …
embodiments, off-device anti malware protection for mobile devices includes receiving a …
[图书][B] Reverse compilation techniques
C Cifuentes - 1994 - rgaucher.info
Techniques for writing reverse compilers or decompilers are presented in this thesis. These
techniques are based on compiler and optimization theory, and are applied to decompilation …
techniques are based on compiler and optimization theory, and are applied to decompilation …
Decompilation of binary programs
C Cifuentes, KJ Gough - Software: Practice and Experience, 1995 - Wiley Online Library
The structure of a decompiler is presented, along with a thorough description of the different
modules that form part of a decompiler, and the type of analyses that are performed on the …
modules that form part of a decompiler, and the type of analyses that are performed on the …
In-line filtering of insecure or unwanted mobile device software components or communications
AJ Bettini, K Watkins, DJ Guerra, M Price - US Patent 8,819,772, 2014 - Google Patents
Techniques for in-line filtering of insecure or unwanted mobile components or
communications (eg, insecure or unwanted behaviors associated with applications for …
communications (eg, insecure or unwanted behaviors associated with applications for …
Quantifying the risks of applications for mobile devices
AJ Bettini, K Watkins, DJ Guerra, M Price - US Patent 8,713,684, 2014 - Google Patents
An application, also referred to as an “app.” generally refers to a software application that
executes on a computing device, such as a mobile device. For example, mobile devices …
executes on a computing device, such as a mobile device. For example, mobile devices …
Warp processors
We describe a new processing architecture, known as a warp processor, that utilizes a field-
programmable gate array (FPGA) to improve the speed and energy consumption of a …
programmable gate array (FPGA) to improve the speed and energy consumption of a …
[PDF][PDF] No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations.
Decompilation is important for many security applications; it facilitates the tedious task of
manual malware reverse engineering and enables the use of source-based security tools on …
manual malware reverse engineering and enables the use of source-based security tools on …
Intraprocedural static slicing of binary executables
C Cifuentes, A Fraboulet - 1997 Proceedings International …, 1997 - ieeexplore.ieee.org
Program slicing is a technique for determining the set of statements of a program that
potentially affect the value of a variable at some point in the program. Intra and …
potentially affect the value of a variable at some point in the program. Intra and …
Assembly to high-level language translation
C Cifuentes, D Simon… - … Conference on Software …, 1998 - ieeexplore.ieee.org
Translation of assembly code to high-level language code is of importance in the
maintenance of legacy code, as well as in the areas of program understanding, porting, and …
maintenance of legacy code, as well as in the areas of program understanding, porting, and …