<--- Back to Details
First PageDocument Content
Programming language implementation / Malware / Control flow graph / Computing / Bardin / Compiler construction / Software / Compiler
Date: 2011-08-29 08:46:50
Programming language implementation
Malware
Control flow graph
Computing
Bardin
Compiler construction
Software
Compiler

Refinement-Based CFG Reconstruction from Unstructured Programs -

Add to Reading List

Source URL: sebastien.bardin.free.fr

Download Document from Source Website

File Size: 999,43 KB

Share Document on Facebook

Similar Documents

Software engineering / Programming language implementation / Computer programming / Compiler construction / Compilers / Functional languages / LLVM / Haskell / Cabal / GHC / Static single assignment form / Compiler

Intel Labs Haskell Research Compiler Hai (Paul) Liu with Neal Glew, Leaf Peterson, Todd A. Anderson Intel Labs. September 28, 2016

DocID: 1xVxS - View Document

Software engineering / Computing / Computer programming / Compiler construction / Formal methods / Logic in computer science / Theoretical computer science / Compilers / Compiler correctness / CompCert / Formal verification / Compiler

c Copyright 2018 Eric Mullen Pushing the Limits of Compiler Verification

DocID: 1xULs - View Document

Artificial neural networks / Machine learning / Applied mathematics / Cybernetics / Artificial neuron / Backpropagation / Recurrent neural network / Deep learning / Multilayer perceptron / Neuron / Neural network / Perceptron

Latte: A Language, Compiler, and Runtime for Elegant and Efficient Deep Neural Networks Leonard Truong Rajkishore Barik

DocID: 1xUEK - View Document

Computing / Software engineering / Computer programming / Compiler construction / Concurrency / Software design patterns / Computer memory / Optimizing compiler / Synchronization / Memory model / Parallel computing / Thread

c Copyright 2012 Laura Effinger-Dean Interference-Free Regions and Their Application to Compiler

DocID: 1xUlU - View Document

Cryptographic protocols / Electromagnetism / Garbled circuit / Secure multi-party computation / IP / Theory of computation / NC / Electronic circuit / Applied mathematics / Commitment scheme

CS 294 – Secure Computation February 16 and 18, 2016 Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension

DocID: 1xTR2 - View Document