Pointer analysis

Results: 174



#Item
101Static program analysis / Data types / Primitive types / Pointer / Data-flow analysis / Alias analysis / Aliasing / Algorithm / Compiler optimization / Software engineering / Computing / Mathematics

Demand-Driven Alias Analysis for C Xin Zheng and Radu Rugina Computer Science Department Cornell University Ithaca, NY 14853 {xinz, rugina}@cs.cornell.edu

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2007-11-09 11:10:22
102Graph / Connectivity / Mathematics / Computing / Computer programming / Pointer / Heap / Tree

Heap Analysis with Collections Mark Marron Deepak Kapur Darko Stefanovic Manuel Hermenegildo University of New Mexico

Add to Reading List

Source URL: paste07.cs.washington.edu

Language: English - Date: 2007-06-25 11:48:10
103Control flow / Microsoft-specific exception handling mechanisms / Computer virus / Exception handling / Subroutine / Pointer / Stack / Dynamic-link library / Computing / Software engineering / Computer programming

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS 1 Rarely is that question asked – not least because the grammar is improper. It’s rare to see a virus advertised as

Add to Reading List

Source URL: pferrie.host22.com

Language: English
104Parallel computing / Data mining / Geostatistics / Garbage collection / Computer cluster / Pointer / K-nearest neighbor algorithm / Statistics / Computing / Cluster analysis

Reducing Pause Times With Clustered Collection by Cody Cutler Submitted to the Department of Electrical Engineering and Computer Science

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-12 14:06:02
105Computer virus / Dynamic-link library / AI / 4K / Pointer / Portable Executable Automatic Protection / Software / System software / Computing

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS DEELAED LEARNING Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 17:18:26
106Computer virus / Portable Executable / COM file / Relocation / Pointer / Malware / Computing / System software / Software

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS FLYING SOLO Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 17:18:26
107Programming language implementation / Central processing unit / Instruction set / Interpreter / Opcode / Computer virus / Stack / Pointer / Stack machine / Computing / Software engineering / Computer architecture

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS 1 NOTEVEN CLOSE Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2012-08-01 22:35:23
108Pointer / Transmission Control Protocol / Computer architecture / Computing / Computer virus / COM file

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS HEADS OR TAILS? Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 17:18:26
109Antivirus software / COM file / Virus / Portable Executable / Memory address / Pointer / Computing / System software / Computer virus

VIRUS BULLETIN www.virusbtn.com VIRUS ANALYSIS THE ROAD LESS TRUVELLED: W32/TRUVEL Peter Ferrie

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:13:20
110Computer virus / COM file / Pointer / Relocation / Dynamic-link library / Extensible Storage Engine / Computing / Software / System software

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS ‘HOLEY’ VIRUS, BATMAN! Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-10-01 10:49:36
UPDATE