Academic literature on the topic 'Self-modifying code'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Self-modifying code.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Self-modifying code"
Behera, Chandan Kumar, and D. Lalitha Bhaskari. "Self-Modifying Code." International Journal of Secure Software Engineering 8, no. 3 (2017): 24–41. http://dx.doi.org/10.4018/ijsse.2017070102.
Full textCai, Hongxu, Zhong Shao, and Alexander Vaynberg. "Certified self-modifying code." ACM SIGPLAN Notices 42, no. 6 (2007): 66–77. http://dx.doi.org/10.1145/1273442.1250743.
Full textĐurić, Goran, Časlav Mitrović, Goran Vorotović, Ivan Blagojević, and Miloš Vasić. "Developing self-modifying code model." Istrazivanja i projektovanja za privredu 14, no. 2 (2016): 239–47. http://dx.doi.org/10.5937/jaes14-10931.
Full textQiu, Jing, Xiao Hong Su, and Pei Jun Ma. "A New Disassembly Approach for Binary Code Using Dynamic Multiple-Path Exploration and Static Disassembly." Applied Mechanics and Materials 577 (July 2014): 852–55. http://dx.doi.org/10.4028/www.scientific.net/amm.577.852.
Full textMody, R. P. "Functional programming is not self-modifying code." ACM SIGPLAN Notices 27, no. 11 (1992): 13–14. http://dx.doi.org/10.1145/141018.141021.
Full textShan, Liang, and Sabu Emmanuel. "Mobile Agent Protection with Self-Modifying Code." Journal of Signal Processing Systems 65, no. 1 (2010): 105–16. http://dx.doi.org/10.1007/s11265-010-0548-8.
Full textMavrogiannopoulos, Nikos, Nessim Kisserli, and Bart Preneel. "A taxonomy of self-modifying code for obfuscation." Computers & Security 30, no. 8 (2011): 679–91. http://dx.doi.org/10.1016/j.cose.2011.08.007.
Full textBlazy, Sandrine, Vincent Laporte, and David Pichardie. "Verified Abstract Interpretation Techniques for Disassembling Low-level Self-modifying Code." Journal of Automated Reasoning 56, no. 3 (2016): 283–308. http://dx.doi.org/10.1007/s10817-015-9359-8.
Full textAnsel, Jason, Petr Marchenko, Úlfar Erlingsson, et al. "Language-independent sandboxing of just-in-time compilation and self-modifying code." ACM SIGPLAN Notices 47, no. 6 (2012): 355. http://dx.doi.org/10.1145/2345156.1993540.
Full textBalachandran, Vivek, and Sabu Emmanuel. "Potent and Stealthy Control Flow Obfuscation by Stack Based Self-Modifying Code." IEEE Transactions on Information Forensics and Security 8, no. 4 (2013): 669–81. http://dx.doi.org/10.1109/tifs.2013.2250964.
Full textDissertations / Theses on the topic "Self-modifying code"
Ye, Xin. "Model checking self modifying code." Thesis, Université de Paris (2019-....), 2019. http://www.theses.fr/2019UNIP7010.
Full textPan, Yen-Chien, and 潘彥謙. "Self-modifying Code Detection and Protection on Android System." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/37550703715962474447.
Full textBooks on the topic "Self-modifying code"
Tse, Peter U. Two Types of Libertarian Free Will Are Realized in the Human Brain. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190460723.003.0010.
Full textBook chapters on the topic "Self-modifying code"
Anckaert, Bertrand, Matias Madou, and Koen De Bosschere. "A Model for Self-Modifying Code." In Information Hiding. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74124-4_16.
Full textTschudin, Christian, and Lidia Yamamoto. "Harnessing Self-modifying Code for Resilient Software." In Innovative Concepts for Autonomic and Agent-Based Systems. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11964995_17.
Full textBlazy, Sandrine, Vincent Laporte, and David Pichardie. "Verified Abstract Interpretation Techniques for Disassembling Low-level Self-modifying Code." In Interactive Theorem Proving. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-08970-6_9.
Full textArmstrong, Alasdair, Brian Campbell, Ben Simner, Christopher Pulte, and Peter Sewell. "Isla: Integrating Full-Scale ISA Semantics and Axiomatic Concurrency Models." In Computer Aided Verification. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81685-8_14.
Full textVasudevan, Amit. "Effective Malware Analysis Using Stealth Breakpoints." In Threats, Countermeasures, and Advances in Applied Information Security. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0978-5.ch023.
Full text"Deep Learning Theory and Software." In Advances in Computer and Electrical Engineering. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1554-9.ch002.
Full textMcAnally, Heath B., and Beth Darnall. "The Primacy of Motivation in Preoperative Optimization." In Preoperative Optimization of the Chronic Pain Patient. Oxford University Press, 2019. http://dx.doi.org/10.1093/med/9780190920142.003.0003.
Full textConference papers on the topic "Self-modifying code"
Cai, Hongxu, Zhong Shao, and Alexander Vaynberg. "Certified self-modifying code." In the 2007 ACM SIGPLAN conference. ACM Press, 2007. http://dx.doi.org/10.1145/1250734.1250743.
Full textTouili, Tayssir, and Xin Ye. "Reachability Analysis of Self Modifying Code." In 2017 22nd International Conference on Engineering of Complex Computer Systems (ICECCS). IEEE, 2017. http://dx.doi.org/10.1109/iceccs.2017.19.
Full textDebray, Saumya, and Jay Patel. "Reverse Engineering Self-Modifying Code: Unpacker Extraction." In 2010 17th Working Conference on Reverse Engineering (WCRE). IEEE, 2010. http://dx.doi.org/10.1109/wcre.2010.22.
Full textTouili, Tayssir, and Xin Ye. "LTL Model Checking of Self Modifying Code." In 2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS). IEEE, 2019. http://dx.doi.org/10.1109/iceccs.2019.00008.
Full textTouili, Tayssir, and Xin Ye. "CTL Model Checking of Self Modifying Code." In 2020 25th International Conference on Engineering of Complex Computer Systems (ICECCS). IEEE, 2020. http://dx.doi.org/10.1109/iceccs51672.2020.00009.
Full textKamunyori, Joy. "Handling self-modifying code using software dynamic translation." In the 2007 conference. ACM Press, 2007. http://dx.doi.org/10.1145/1347787.1347807.
Full textGnaedig, Isabelle, Matthieu Kaczmarek, Daniel Reynaud, and Stephane Wloka. "Unconditional self-modifying code elimination with dynamic compiler optimizations." In 2010 5th International Conference on Malicious and Unwanted Software (MALWARE). IEEE, 2010. http://dx.doi.org/10.1109/malware.2010.5665795.
Full textDawei, Shi, Lv Delong, and Ye Zhibin. "Dynamic Self-modifying Code Detection Based on Backward Analysis." In ICCAE 2018: 2018 10th International Conference on Computer and Automation Engineering. ACM, 2018. http://dx.doi.org/10.1145/3192975.3193016.
Full textXianya, Mi, Zhang Yi, Wang Baosheng, and Tang Yong. "A Survey of Software Protection Methods Based on Self-Modifying Code." In 2015 International Conference on Computational Intelligence and Communication Networks (CICN). IEEE, 2015. http://dx.doi.org/10.1109/cicn.2015.121.
Full textLiu, Anzhan, and Wenqi Wang. "ASCMS: An Accurate Self-Modifying Code Cache Management Strategy in Binary Translation." In 2013 International Conference on Information Science and Cloud Computing Companion (ISCC-C). IEEE, 2013. http://dx.doi.org/10.1109/iscc-c.2013.52.
Full text