نتایج جستجو برای: metamorphism
تعداد نتایج: 2072 فیلتر نتایج به سال:
Metamorphic malware apply semantics-preserving transformations to their own code in order to foil detection systems based on signature matching. In this paper we consider the problem of automatically extract metamorphic signatures from these malware. We introduce a semantics for self-modifying code, later called phase semantics, and prove its correctness by showing that it is an abstract interp...
The 18-km-diameter El’gygytgyn crater is located on the Chukotka peninsula, northeastern Russia. It represents the only currently known impact structure formed in siliceous volcanics, including tuffs. The impact melt rocks and target rocks provide an excellent opportunity to study shock metamorphism of volcanic rocks. The shockinduced changes observed in porphyritic volcanic rocks from El’gygyt...
Ke y w o r d s : impact features, shock metamorphism, shock waves, minerals, crystal structure, defects, experimental study Apollo Luna Earth N um be r of c ra te rs ( > 1 km ) pe r km 2 0.04
The composition of Kuh-e- Barandeh volcanic dome is andesite, dacitic andesite and dacite of calc-alkaline affinity. A prominent feature of this dome is the presence of various types of enclaves with different composition, shape and size. Detailed field and laboratory investigation proved that they are of xenolith and autolith types. The xenoliths are of pelitic and basic protoliths. Xenoliths ...
U-Pb analyses of zircon from ten samples of augen gneisses, eight mafic and intermediate metaigneous rocks and six metasediments from some tectonic domains along the Calabria-Peloritani Terrane (Southern Italy) contribute to knowledge of peri-Gondwanan evolution from Late-Proterozoic to Paleozoic times. All samples were equilibrated under amphibolite to granulite facies metamorphism during the ...
a r t i c l e i n f o a b s t r a c t Abstract interpretation Program semantics Metamorphic malware detection Self-modifying programs Metamorphic code includes self-modifying semantics-preserving transformations to exploit code diversification. The impact of metamorphism is growing in security and code protection technologies, both for preventing malicious host attacks, e.g., in software divers...
This paper presents a formalisation of the different existing code mutation techniques (polymorphism and metamorphism) by means of formal grammars. While very few theoretical results are known about the detection complexity of viral mutation techniques, we exhaustively address this critical issue by considering the Chomsky classification of formal grammars. This enables us to determine which fa...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید