Improving Network System Security with Function Extraction Technology for Automated Calculation of Program Behavior (2004)


Download Links

by Mark G. Pleszkoch , Richard C. Linger
Venue:In Proceedings of the 37th Annual Hawaii International Conference on System Sciences. IEEE
Citations:17 - 10 self

Documents Related by Co-Citation

13 The Impact of Function Extraction Technology on Next-Generation Software Engineering – A Hevner, R Linger, R Collins, M Pleszkoch, S Prowell, G Walton - 2005
9 The cert function extraction experiment: Quantifying fx impact on software comprehension and verification – Rosann W Collins, Gwendolyn H Walton, Alan R Hevner, Richard C Linger - 2005
8 Next-Generation Software Engineering: Function Extraction for Computation of Software Behavior – Richard C. Linger, Mark G. Pleszkoch, Luanne Burns, Alan R. Hevner, Gwendolyn H. Walton
15 Function-Theoretic Principles of Program Understanding – M Pleszkoch, P Hausler, A Hevner, R Linger - 1990
51 Structural Programming: Theory and Practice – H Mills R Linger, B Witt - 1983
27 A.R.: Using function abstraction to understand program behavior – P A Hausler, M G Pleszkoch, R C Linger, Hevner - 1990
11 Cleanroom software engineering: technology and process – S Prowell - 1999
3 Technology Foundations for Computational Evaluation of Security Attributes – G Walton, T Longstaff, R Linger - 2006
13 The Flow-ServiceQuality Framework: Unified Engineering for Large-Scale, Adaptive Systems – Alan Hevner, Ann Sobel, Richard Linger, Gwendolyn Walton - 2002
6 A Framework for Tamper Detection Marking of Mobile Applications – Mike Jochen, Lisa M. Marvel, Lori L. Pollock - 2003
36 Security in the Ajanta Mobile Agent System – Neeran Karnik, Anand R. Tripathi - 1999
113 Software Engineering for Security: a Roadmap – Premkumar T. Devanbu, Stuart Stubblebine - 2000
35 Attacking Malicious Code: A Report to the Infosec Research Council – Gary McGraw, Greg Morrisett - 2000
3 Tamper detection marking for object files – Mike Jochen, Lori L. Pollock - 2003
3 Reliable and dynamic access to service in battlefield ad hoc networks – M A Fecko, U C Kozat, S Samtani, M Ümit Uyar, I Höklek - 2004
17 Hydan: Hiding Information in Program Binaries – Rakan El-khalil, Angelos D. Keromytis - 2004
19 Classification of Malicious Host Threats in Mobile Agent Computing – E Bierman, E Cloete - 2002
22 Exploiting self-modification mechanism for program protection – Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto - 2003
59 High-Level Adaptive Program Optimization with ADAPT – Michael J. Voss, Rudolf Eigenmann - 2001