共 50 条
- [41] Improved Algorithm for Identification of Switch Tables in Executable Code PROCEEDINGS OF THE 17TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION FRUCT, 2015, : 44 - 49
- [42] An Executable Code Authorization Model for Secure Operating System PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 292 - +
- [43] SOFTWARE METHODS FOR VIRTUAL-STORAGE OF EXECUTABLE CODE COMPUTER JOURNAL, 1979, 22 (01): : 50 - 52
- [44] Extracting Executable Transformations from Distilled Code Changes 2017 IEEE 24TH INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), 2017, : 171 - 181
- [45] AN APPROACH TO EXECUTABLE SPECIFICATIONS, BASED ON FORMAL SOURCE TO SOURCE CONVERSION SIGPLAN NOTICES, 1995, 30 (12): : 51 - 58
- [46] An Analysis Tool that Detects The Code Caves in Specified Sizes for Portable Executable Files 2022 INTERNATIONAL CONFERENCE ON THEORETICAL AND APPLIED COMPUTER SCIENCE AND ENGINEERING (ICTASCE), 2022, : 38 - 41
- [48] Automatic Generation of Executable Code from Software Architecture Models INFORMATION SYSTEMS DEVELOPMENT: CHALLENGES IN PRACTICE, THEORY AND EDUCATION, VOLS 1AND 2, 2009, : 1047 - 1058
- [50] Translating Security Policy to Executable code for Sandboxing Linux Kernel 2009 THIRD UKSIM EUROPEAN SYMPOSIUM ON COMPUTER MODELING AND SIMULATION (EMS 2009), 2009, : 124 - +