17 p. : il.Program matching refers to the mapping between equivalent codes written in different languages - including high-level and low-level languages. This equivalence is useful for some software engineering scenarios such as determining whether rewritten code is cor- rect, which version of a program is being used, and whether a malware is present in the program. In the present work, we propose a novel approach to solve the executable code traceability by using program code analysis and arti cial neural networks. From the program code analysis we obtained execution behavior properties of the codes, and from the artifcial neural networks we judge about their correspondence. Our evaluation using real code examples shows an acceptable corre...
Many malicious programs are just previously-seen programs that have had some minor changes made to t...
In recent years, millions of source codes are generated in different languages on a daily basis all ...
Duplication is detected by comparing features of source fragments. The main problem for the detectio...
Copyright CRC Press. [Full text of this chapter is not available in the UHRA]This chapter describes ...
Software requirement changes, code changes, software reuse, and testing are important activities in ...
When a successful software system is maintained and evolved for an extended period of time, original...
As modern programs grow in size and complexity, the importance of program behavior modeling is emerg...
Program understanding is a fundamental task in program language processing. Despite the success, exi...
Automated program analysis is a pivotal research domain in many areas of Computer Science -- Formal ...
Although Software Verification technology is rapidly advancing, the process of formally specifying t...
The abundance of publicly available source code repositories, in conjunction with the advances in ne...
Code clones, referring to code fragments that are either similar or identical and are copied and pas...
Code clones, referring to code fragments that are either similar or identical and are copied and pas...
Software forensics is here regarded as the particular field of inquiry that, by treating pieces of p...
Code clones, referring to code fragments that are either similar or identical and are copied and pas...
Many malicious programs are just previously-seen programs that have had some minor changes made to t...
In recent years, millions of source codes are generated in different languages on a daily basis all ...
Duplication is detected by comparing features of source fragments. The main problem for the detectio...
Copyright CRC Press. [Full text of this chapter is not available in the UHRA]This chapter describes ...
Software requirement changes, code changes, software reuse, and testing are important activities in ...
When a successful software system is maintained and evolved for an extended period of time, original...
As modern programs grow in size and complexity, the importance of program behavior modeling is emerg...
Program understanding is a fundamental task in program language processing. Despite the success, exi...
Automated program analysis is a pivotal research domain in many areas of Computer Science -- Formal ...
Although Software Verification technology is rapidly advancing, the process of formally specifying t...
The abundance of publicly available source code repositories, in conjunction with the advances in ne...
Code clones, referring to code fragments that are either similar or identical and are copied and pas...
Code clones, referring to code fragments that are either similar or identical and are copied and pas...
Software forensics is here regarded as the particular field of inquiry that, by treating pieces of p...
Code clones, referring to code fragments that are either similar or identical and are copied and pas...
Many malicious programs are just previously-seen programs that have had some minor changes made to t...
In recent years, millions of source codes are generated in different languages on a daily basis all ...
Duplication is detected by comparing features of source fragments. The main problem for the detectio...