First Page | Document Content | |
---|---|---|
Date: 2017-04-03 15:56:44Computer programming Computing Mathematics Theoretical computer science Boolean algebra Error detection and correction Compiler construction Hash function Avalanche effect Optimizing compiler Recursion MD5 | Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping Dongpeng Xu The Pennsylvania State University University Park, USA Email:Add to Reading ListSource URL: www.ieee-security.orgDownload Document from Source WebsiteFile Size: 637,30 KBShare Document on Facebook |
COMPILER CONSTRUCTION William M. Waite Department of Electrical Engineering University of Colorado Boulder, Colorado 80309DocID: 1u5Ve - View Document | |
Combining Static and Dynamic Contract Checking for Curry Michael Hanus University of Kiel Programming Languages and Compiler ConstructionDocID: 1tKXN - View Document | |
CompSci 754: Compiler Construction and Theory John Boyland Spring 2018 Office Office HoursDocID: 1tCj1 - View Document | |
On Functional Logic Programming and its Application to Testing Sebastian Fischer Programming Languages and Compiler Construction Department of Computing Science Christian-Albrechts University of KielDocID: 1sWAw - View Document | |
Accurate prediction of the behavior of multithreaded applications in shared cachesDocID: 1rtkc - View Document |