Back to Results
First PageMeta Content
Compiler construction / Computer memory / Control flow graph / Data-flow analysis / C dynamic memory allocation / Data buffer / Call stack / ACT-R / Pointer / Computing / Software engineering / Computer programming


HI-CFG: Construction by Binary Analysis, and Application to Attack Polymorphism Dan Caselden1 , Alex Bazhanyuk2 , Mathias Payer3 , Stephen McCamant4 , and Dawn Song3 1
Add to Reading List

Document Date: 2013-06-27 15:30:02


Open Document

File Size: 419,88 KB

Share Result on Facebook

Company

Dawn Song3 1 FireEye Inc. / Intel Corporation / /

Event

Reorganization / /

Facility

University of Minnesota / Intel Corporation University of California / /

IndustryTerm

construction algorithm / word processor / software stack / security applications / give algorithms / software systems / /

Organization

University of California / Berkeley / University of Minnesota / UC Berkeley / /

Person

MIN SIZE / /

Position

engineer data structures / active memory model for linear access patterns / analyst / security analyst / producer / word processor / /

Product

BitBlaze Tracecap tool / CFG / BitBlaze Tracecap / /

ProgrammingLanguage

C++ / /

ProvinceOrState

Minnesota / California / /

Technology

give algorithms / operating system / word processor / HI-CFG construction algorithm / PDF / /

SocialTag