Search is not available for this dataset
query
stringlengths
1
13.4k
pos
stringlengths
1
61k
neg
stringlengths
1
63.9k
query_lang
stringclasses
147 values
__index_level_0__
int64
0
3.11M
Understanding the Evolution of Code Smells by Observing Code Smell Clusters
Code smells are more likely to stay inter-connected in software rather than remaining as a single instance. These code smell clusters create maintainability issues in evolving software. This paper aims to understand the evolution of the code smells in software, by analyzing the behavior of these clusters such as size, number and connectivity. For this, the clusters are first identified and then these characteristics are observed. The identification of code smell clusters is performed in three steps - detection of code smells (God Class, Long Method, Feature Envy, Type Checking) using smell detection tools, extraction of their relationships by analyzing the source code architecture, and generation of graphs from the identified smells and their relationships, that finally reveals the smelly clusters. This analysis was executed on JUnit as a case study, and four important cluster behaviors were reported.
In this paper, we have presented an effective yield improvement methodology that can help both manufacturing ::: foundries, fabless and fab-lite companies to identify systematic failures. It uses the physical addresses of failing bits ::: from wafer sort results to overlay to inline wafer defect inspection locations. The inline defect patterns or the design ::: patterns where overlay results showed matches were extracted and grouped by feature similarity or cell names. The potentially problematic design patterns can be obtained and used for design debug and process improvement.
eng_Latn
4,500
Irish software to detect airline threats
Hazard IQ to 'restore faith in air travel' A new intelligent software program developed by NUI Galway could give the airline industry a leg up in the security stakes.…
Want a computer that screams when a thief strikes? Or a personal tracking unit in case you get kidnapped?
eng_Latn
4,501
AONT-RS: Blending security and performance in dispersed storage systems
A Performance Evaluation and Examination of Open-Source Erasure Coding Libraries for Storage
Fabric Defect Detection Based on Wavelet Decomposition with One Resolution Level
eng_Latn
4,502
Improved Inference for Unlexicalized Parsing
Coarse-To-Fine N-Best Parsing And MaxEnt Discriminative Reranking
Malware encryption schemes - rerandomizable ciphertexts encrypted using environmental keys
eng_Latn
4,503
Physically Based Deformable Models in Computer Graphics
Real-Time subspace integration for St. Venant-Kirchhoff deformable models
Software engineering for security: a roadmap
eng_Latn
4,504
approximating mutual information by maximum likelihood density ratio estimation .
learning with kernels .
Automated procedure clustering for reverse engineering PL/SQL programs
eng_Latn
4,505
Architectural Data Flow Analysis
Challenges in Secure Software Evolution - The Role of Software Architecture
A deep bidirectional long short-term memory based multi-scale approach for music dynamic emotion prediction
kor_Hang
4,506
Watermarking, Tamper-Proofing, and Obfuscation -- Tools for Software Protection
A Taxonomy of Obfuscating Transformations
LPC and LPCC method of feature extraction in Speech Recognition System
eng_Latn
4,507
Validation and verification of computer forensic software tools d Searching Function
An Examination of Digital Forensic Models
Open information extraction using constraints over part-of-speech sequences T E S I S
eng_Latn
4,508
SoK: Exploiting Network Printers
Portable Document Format ( PDF ) Security Analysis and Malware Threats
Integration of Decision Support Systems and Data Mining for Improved Decision Making
eng_Latn
4,509
Interactive Principal Component Analysis
Clustrophile: A Tool for Visual Clustering Analysis
De-anonymizing Programmers via Code
eng_Latn
4,510
Identification and Characterization of Virus(es) Infecting Lilium, Tulip and Aletroemeria in H.P.
The geographical distribution of Lilium, Tulip and Alstroemeria. a) Eurasian species range from the Atlantic through Mediterranean and Central Europe to the Caucasus and Ural mountains. b) Most American species are found in an area ranging from the Atlantic to the Midwest. The distribution of the Western species is limited by the Rocky Mountains and the Pacific. c) Eastern Asia. Their distribution ranges from the Pacific to Ural and Caucasus mountains, to the Northern India and Burma in the south and Siberia in the north.
This short paper proposes two different ways for exploiting an evolutionary algorithm to devise malware: the former targeting heuristic-based anti-virus scanner; the latter optimizing a Trojan attack. An extended internal on the same the subject can be downloaded from http://www.cad.polito.it/downloads/
eng_Latn
4,511
Study on Chinese text digit watermarking algorithm
In order to improve the robustness of watermark,to adapt the text integrity testing needs,many literature advocates multiple watermarking redundancy embedding method,which relate to the blocked text.Based on Chinese characters structure,the design method of blocked text of Chinese characters and watermarking algorithm were put forward.The method has obvious features of Chinese characters,can effectively improve the robustness of watermark,and raise the watermark's recovery ability after being attacked.
Formal methods technique offer a means of verifying the correctness of the design process used to create the security protocol. Notwithstanding the successful verification of the design of security protocols, the implementation code for them may contain security flaws, due to the mistakes made by the programmers or bugs in the programming language itself. We propose an ACG-C# tool, which can be used to generate automatically C# implementation code for the security protocol verified with Casper and FDR. The ACG-C# approach has several different features, namely automatic code generation, secure code, and high confidence. We conduct a case study on the Yahalom security protocol, using ACG-C# to generate the C# implementation code.
eng_Latn
4,512
[RNA editing in different genetic systems].
One of the significant amendments to the central dogma of the molecular biology was the discovery of the RNA editing process in different genetic systems. Whereas other forms of co- and posttranscriptional modifications of messenger RNA (mRNA) (capping, polyadenilation, splicing) retain the correspondence of the primary structure of exon and final transcript, RNA editing disturbs this correspondence changing the primary structure of mRNA after its transcription. The variants of RNA-editing mechanisms are various and include site-specific insertions and deletions of one or several nucleotides (insertion-deletion editing) as well as specific modifications of nucleosides such as C-->U and A-->I deamination or U-->C transamination (conversion editing). These mechanisms differ greatly in different genetic systems but they always result in synthesis of functionally valuable proteins from "incorrect" genes and, correspondingly, can play a significant role in regulation of their expression.
Software engineers often need to identify and correct design defects, i.e., recurring design problems that hinder development and maintenance by making programs harder to comprehend and/or evolve. While detection of design defects is an actively researched area, their correction- mainly a manual and time-consuming activity- is yet to be extensively investigated for automation. In this paper, we propose an automated approach for suggesting defect-correcting refactorings using relational concept analysis (RCA). The added value of rca consists in exploiting the links between formal objects which abound in a software re-engineering context. We validated our approach on instances of the Blob design defect taken from four different open-source programs.
eng_Latn
4,513
Source Code Analysis and Manipulation
The special section contains nine papers which are extended versions of papers originally published in the proceedings of the IEEE workshop on Source Code Analysis and Manipulation (SCAM 2001). The papers cover the spectrum of analysis and manipulation work from traditional transformation application areas concerned with optimisation through to more novel application areas such as transformation for evolution of websites; they cover the use of linguistic source code aspects which arise from the semantics of the language to more ephemeral, yet higher level domain-related information. The special issue brings together work on algorithms, tools, empirical results and novel approaches to source code analysis and manipulation. There are five papers on analysis and four on manipulation in this special issue. The next two sections describe the papers on analysis and manipulation respectively.
Abstract modENCODE was a 5 year NHGRI funded project (2007–2012) to map the function of every base in the genomes of worms and flies characterizing positions of modified histones and other chromatin marks, origins of DNA replication, RNA transcripts and the transcription factor binding sites that control gene expression. Here we describe the Drosophila modENCODE datasets and how best to access and use them for genome wide and individual gene studies.
eng_Latn
4,514
Dynamic stability of cracked multi-bay frame structures.
ABSTRACTThe effects of crack depth and crack location on the in-plane static and dynamic stability of cracked multi-bay frame structures subjected to periodic loading have been investigated numerically by using the finite element method. For the rectangular cross-section beam, a crack element is developed by using the principles of fracture mechanics. In addition, the effect of the number of spans and static and dynamic load parameters on static and dynamic stability analysis are also investigated. For buckling and dynamic stability analyses, the results obtained by using the present model are presented in three-dimensional graphical forms and tables.
The complexity of modern network architectures and the epidemic diffusion of malware require collaborative approaches for defense. We present a novel distributed system where each component collaborates to the intrusion and malware detection and to the dissemination of the local analyses. The proposed architecture is based on a decentralized, peer-to-peer and sensor-agnostic design that addresses dependability and load unbalance issues affecting existing systems based on centralized and hierarchical schemes. Load balancing properties, ability to tolerate churn, self-organization capabilities and scalability are demonstrated through a prototype integrating different open source defensive software.
eng_Latn
4,515
Computational study of the accuracy of the r-centroid approximation
Abstract The r -centroid approximation, used in the analysis of intensity measurements of electronic band spectra of diatomic molecules, allows a separation of the band strength into a pure vibrational term (the Franck-Condon factor q v ′ v ″ ) and an electronic term [the electronic transition moment Re ( r )]. The r -centroid approximation is known to have limits to its applicability. However, no specific error limits have previously been given. A computational study has been performed using several molecules and analytic curves to determine specific error limits which can be assigned to either a specific band strength, or in estimating the electronic transition moment using the r -centroid approximation. Other techniques suggested for the evaluation of Re ( r ) have also been tested.
Software engineers often need to identify and correct design defects, i.e., recurring design problems that hinder development and maintenance by making programs harder to comprehend and/or evolve. While detection of design defects is an actively researched area, their correction- mainly a manual and time-consuming activity- is yet to be extensively investigated for automation. In this paper, we propose an automated approach for suggesting defect-correcting refactorings using relational concept analysis (RCA). The added value of rca consists in exploiting the links between formal objects which abound in a software re-engineering context. We validated our approach on instances of the Blob design defect taken from four different open-source programs.
eng_Latn
4,516
Ecient, Secure, and Privacy-preserving Distributed Hot Item Identification
Millions of people every day identify many types of popular or widespread items, including interesting entertainment content and malicious network attacks. Unfortunately, much of the information required for these popularity contests has privacy concerns attached to its use. Unless their privacy is preserved, participants may refuse to participate honestly, reducing the quality of the results. Provably ensuring the privacy of participants, while retaining the level of eciency and robustness necessary for a practical protocol, is a serious challenge to privacy-preserving popular item identification. Previous eorts have not obtained the necessary eciency [23] or provide only unproven, heuristic levels of privacy [24, 16, 39, 19]. In this paper, we propose and experimentally evaluate protocols that provably protect the privacy of participants, while adding only a small amount of overhead.
Programmers using software components have to follow protocols that specify when it is legal to call particular methods with particular arguments. For example, one cannot use an iterator over a set once the set has been changed directly or through another iterator. We formalize the notion of dynamic package interfaces (DPI), which generalize state-machine interfaces for single objects, and give an algorithm to statically compute a sound abstraction of a DPI. States of a DPI represent (unbounded) sets of heap configurations and edges represent the effects of method calls on the heap. We introduce a novel heap abstract domain based on depth-bounded systems to deal with potentially unboundedly many objects and the references among them. We have implemented our algorithm and show that it is effective in computing representations of common patterns of package usage, such as relationships between viewer and label, container and iterator, and JDBC statements and cursors.
eng_Latn
4,517
Avrupa Birliği’nin Hedefli Yaptırımları: Temel Hakların Korunması Temelinde Bir Değerlendirme
Targeted sanctions of the European Union (EU) form a part of restrictive measures/sanctions which are adopted within the framework of Common Foreign and Security Policy. Taking into account their way of adoption and contents, EU’s targeted sanctions are among the measures which have high potential for conflict with fundamental rights. The article tries to answer the following research questions: Could EU targeted sanctions be reviewed under fundamental rights, and if yes, how and to what extent could they be reviewed in the light of procedural fundamental rights, such as right to defence, and substantive fundamental rights, such as right to property? Based upon the caselaw of the Court of Justice of the European Union, this article aims to present the relationship between EU targeted sanctions and protection of fundamental rights, and in this regard the standard and intensity of review of EU targeted sanctions in the light of fundamental rights.
We introduce HiPErJiT, a profile-driven Just-in-Time compiler for the BEAM ecosystem based on HiPE, the High Performance Erlang compiler. HiPErJiT uses runtime profiling to decide which modules to compile to native code and which of their functions to inline and type-specialize. HiPErJiT is integrated with the runtime system of Erlang/OTP and preserves aspects of Erlang's compilation which are crucial for its applications: most notably, tail-call optimization and hot code loading at the module level. We present HiPErJiT's architecture, describe the optimizations that it performs, and compare its performance with BEAM, HiPE, and Pyrlang. HiPErJiT offers performance which is about two times faster than BEAM and almost as fast as HiPE, despite the profiling and compilation overhead that it has to pay compared to an ahead-of-time native code compiler. But there also exist programs for which HiPErJiT's profile-driven optimizations allow it to surpass HiPE's performance.
tur_Latn
4,518
Writing Hygienic Macros in Scheme with Syntax-Case
This article describes a pattern-based hygienic macro system for Scheme and provides numerous examples of its use. Macros dened using this system are automatically hygienic and referentially transparent. Unlike earlier hygienic macro systems, this system does not require \low level" macros to be written in a dierent style from \high level" macros. In particular, automatic hygiene, referential transparency, and the ability to use patterns extend to all macro denitions, and there is never any need to explicitly manipulate syntactic environments of any kind. The macro system also supplies a hygiene-preserving mechanism for controlled variable capture, allowing macros to introduce implicit identier bindings or references.
Structure-analyzing metaprograms remain largely type-unsafe. In programming languages that support meta-programming, the type system is not strong enough to guarantee that well-typed metaprograms produce only well-typed programs. Banning facilities for code analysis from the meta-programming toolbox in order to achieve type soundness, robs programmers of useful tools such as ability to specify powerful code transformations. We present code pattern types, types that reason about the structure of programs through pattern matching and supports type safe code analysis.
eng_Latn
4,519
Extended dissipativity-based non-fragile control for multi-area power systems with actuator fault
ABSTRACTThis paper addresses the issue of reliable load frequency control design of an uncertain multi-area power system with constant time delays and disturbances via non-fragile sampled-data control approach. In particular, the parameter uncertainties are assumed to be randomly occurring which are described by the Bernoulli distributed sequences. By constructing a suitable Lyapunov–Krasovskii functional together with Wirtinger-based inequality, a new set of sufficient conditions in terms of linear matrix inequalities is obtained to ensure the asymptotic stability and extended dissipativity of the multi-area power system not only when all actuators are operational, but also in case of some actuator failures. Finally, simulation results are conducted to validate the effectiveness of the proposed control design technique.
The complexity of modern network architectures and the epidemic diffusion of malware require collaborative approaches for defense. We present a novel distributed system where each component collaborates to the intrusion and malware detection and to the dissemination of the local analyses. The proposed architecture is based on a decentralized, peer-to-peer and sensor-agnostic design that addresses dependability and load unbalance issues affecting existing systems based on centralized and hierarchical schemes. Load balancing properties, ability to tolerate churn, self-organization capabilities and scalability are demonstrated through a prototype integrating different open source defensive software.
eng_Latn
4,520
Preventive Primordial Strategies: Times Are Changing
Chronic degenerative diseases represent a major sanitary health problem, destined to grow with aging of the population. The implementation of primordial prevention strategies, beginning with health lifestyle adoption from earlier ages, can improve the health and well-being of future societies predominantly made up of elderly subjects.
This short paper proposes two different ways for exploiting an evolutionary algorithm to devise malware: the former targeting heuristic-based anti-virus scanner; the latter optimizing a Trojan attack. An extended internal on the same the subject can be downloaded from http://www.cad.polito.it/downloads/
kor_Hang
4,521
Towards automated malware creation: code generation and code integration
This short paper proposes two different ways for exploiting an evolutionary algorithm to devise malware: the former targeting heuristic-based anti-virus scanner; the latter optimizing a Trojan attack. An extended internal on the same the subject can be downloaded from http://www.cad.polito.it/downloads/
Based on the traditional adaptive multiuser detection method,sum up application of new LMS,RLS,Kalman arithmetics in DS-CDMA Multiuser detection.principles and methods of 3 arithmetics were given and emulation by Matlab.Based on comparing with SIR and errorcode of 3 arrthmetic,Kalman arithmetic show more excellent detection performance.
eng_Latn
4,522
Patch Assessment in Fox Squirrels: The Role of Resource Density, Patch Size, and Patch Boundaries
The finer the scale at which a forager can detect patchiness, the greater is its opportunity to allocate time efficiently in response to spatial heterogeneity in resource abundance. There are three advantages of assessing and responding to patchiness at smaller scales. First, an environment may be rendered profitable only when the forager can separate areas of low and high resource abundance. Second, by placing accurate boundaries on profitable food patches, foragers can eliminate the "cost" of over- and underestimating patch size. Third, by biasing search efforts toward rich food patches, the forager can harvest more resources in the same amount of time. We investigate the ability of fox squirrels, Sciurus niger, to detect patchiness at small spatial scales, using experimental food patches subdivided into micropatches. We manipulated micropatch size, food density, and the occurrence of distinct versus vague boundaries. In accord with the theory, increasing the proportion of vague boundaries increased ass...
Software engineers often need to identify and correct design defects, i.e., recurring design problems that hinder development and maintenance by making programs harder to comprehend and/or evolve. While detection of design defects is an actively researched area, their correction- mainly a manual and time-consuming activity- is yet to be extensively investigated for automation. In this paper, we propose an automated approach for suggesting defect-correcting refactorings using relational concept analysis (RCA). The added value of rca consists in exploiting the links between formal objects which abound in a software re-engineering context. We validated our approach on instances of the Blob design defect taken from four different open-source programs.
eng_Latn
4,523
Veracode debuts system to test source code
Veracode launched its Software Security Ratings Service on June 25, introducing its new system for use in testing the safety of applications development among enterprise customers and third-party software makers.
By this time next year, virtualization users may have their own industry-sanctioned benchmarking software for evaluating various virtualization environments.
eng_Latn
4,524
What sort of DNA repair is created by modern genetic engineering techniques?
Genetic engineering is the modification of an organism's genome through biotechnology. Since the 1970s, a variety of techniques have been developed to specifically add, remove and edit genes in an organism. Recently developed genome engineering techniques use engineered nuclease enzymes to create targeted DNA repair in a chromosome to either disrupt or edit a gene when the break is repaired. The related term synthetic biology is sometimes used to refer to extensive genetic engineering of an organism.
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtain classified files, such as air tasking order systems data and furthermore able to penetrate connected networks of National Aeronautics and Space Administration's Goddard Space Flight Center, Wright-Patterson Air Force Base, some Defense contractors, and other private sector organizations, by posing as a trusted Rome center user.
eng_Latn
4,525
Is there any way to hide or encrypt JavaScript code to prevent people from viewing, copying, and/or modifying proprietary programs?
I want to make a JavaScript application that's not open source, and thus I wish to learn how to can obfuscate my JS code? Is this possible?
Particularly, what is the best snippets package out there? Features: easy to define new snippets (plain text, custom input with defaults) simple navigation between predefined positions in the snippet multiple insertion of the same custom input accepts currently selected text as a custom input cross-platform (Windows, Linux) dynamically evaluated expressions (embedded code) written in a concise programming language (Perl, Python, Ruby are preferred) nicely coexists with others packages in Emacs Example of code template, a simple for loop in C: for (int i = 0; i < %N%; ++i) { _ } It is a lot of typing for such common code. I want to invoke a code template or snippet which inserts that boilerplate code for me. Additionally it stops (on TAB or other keystroke) at %N% (my input replaces it) and final position of the cursor is _.
eng_Latn
4,526
Supposed I have written a program, and I want to make sure that its code will not be changed (for now, let's assume we are using an interpreted / scripting language, so "just compile it" is not a valid answer). So I would like to detect if someone changes the code. How can I do this reliably? The most obvious way is to hash the code, put the hash into the code, and verify it - but of course this does not work, as it is pretty easy to simply rehash the code. You would have to know the hash in advance and put it into it while calculating the hash, but this is a chicken-egg problem, obviously. Are there any other options that are reliable?
I need to write a small program that can detect that it has been changed. Please give me a suggestion! Thank you.
The new Top-Bar does not show reputation changes from Area 51.
eng_Latn
4,527
Can an AES-256 key be generated for a large number of cribs? I have a question in regards to Ransomware type viruses. I know that a number of these viruses use the AES-256 algorithm to encrypt user's files using a randomly generated key. I work in IT support and I had one client the other week who had lost a large number of important files this way but one thing which struck me was that we were able to recover a large number of files via DropBox - about 500 files (~2gb worth of data) and because the virus only changed the extension it was clear which unencrypted file corresponded to which encrypted file. What I was wondering is; with a large dataset like this where you have both the encrypted and unencrypted data would it be possible to calculate the encryption key for an AES-256 algorithm in a reasonable time? I don't know how these algorithms work but presumably you would have so much data available to compare that it should at least make the task considerably easier should it not? I'm not intending to rid the world of ransomware but it just interested me! Cheers, Olly
Why is AES resistant to known-plaintext attacks? At least it's my understanding that AES isn't affected by known-plaintext. Is it immune to such an attack, or just resistant? Does this vary for chosen-plaintext?
How to lock compiled Java classes to prevent decompilation? How do I lock compiled Java classes to prevent decompilation? I know this must be very well discussed topic on the Internet, but I could not come to any conclusion after referring them. Many people do suggest obfuscator, but they just do renaming of classes, methods, and fields with tough-to-remember character sequences but what about sensitive constant values? For example, you have developed the encryption and decryption component based on a password based encryption technique. Now in this case, any average Java person can use to decompile the class file and easily retrieve the password value (defined as constant) as well as and in turn can decrypt the data by writing small independent program! Or should such sensitive components be built in native code (for example, VC++) and call them via ?
eng_Latn
4,528
Is imklaunchagent virus or Apple system file? My client suspects the imklaunchagent damages his computer. I did some research but found two explanations. One is Apple's system file and the other is virus. Which one is true? Apple System File? claim 1 man imklaunchagent" in Terminal.app says: imklaunchagent is automatically invoked to launch input methods that are selected via direct user inter- action. It is not intended to be invoked via other means and must not be terminated. imklaunchagent monitors abnormal behavior and will disallow an input method from launching if it repeatedly terminates unexpect- edly within a short timespan. (Reference: ) claim 2 Do you happen to write in, say, Chinese or Japanese? I think the process you are mentioning is part of Apple's Input Method Kit framework ( ), which is used to support languages that use complex scripts. The program itself is located in: /System/Library/Frameworks/InputMethodKit.framework/Versions/A/Resources/imklaun chagent (Reference: ) claim 3 (see answer, not the question) It's a standard macOS process. If you ever google a process name & all you get are 'malware removal sites trying to sell you something'… think twice about why. If the threat was real, the make-a-quick-buck sites would be far far down the list, well below real issues faced by real people. The process is inside a protected area, in the System folder on the System partition. You'd have to try very, very hard to overwrite it with a malicious component - including rebooting to Recovery & manually disabling SIP. macOS simply will not let a random process anywhere near that area, even with admin permission. (Reference: ) Virus? (Reference: )
Deleting a suspicious malware (imklaunchagent) in Mac I have a MacBook Pro (macOS Mojave) laptop and have recently noticed a suspicious process in Activity Monitor with this name : imklaunchagent I checked this folder: /System/Library/Frameworks/InputMethodKit.framework/Versions/A/Resources/imklaunchagent and it seems imklaunchagent and its related files cannot be removed. I tried to remove it via Terminal and this message showed up: "Operation not permitted". However, in "Security and Privacy" of "System Preferences", I chose Terminal to have full disk access, still can't delete the file and the same message appears. I installed the free version of Combo Cleaner and it detected other viruses, none of which are imklaunchagent. Is imklaunchagent a malware? How can it be deleted?
Impulsioned jumping There's one thing that has been puzzling me, and that is how to implement a 'faux-impulsed' jump in a platformer. If you don't know what I'm talking about, then think of the jumps of Mario, Kirby, and Quote from Cave Story. What do they have in common? Well, the height of your jump is determined by how long you keep the jump button pressed. Knowing that these character's 'impulses' are built not before their jump, as in actual physics, but rather while in mid-air - that is, you can very well lift your finger midway of the max height and it will stop, even if with desacceleration between it and the full stop; which is why you can simply tap for a hop and hold it for a long jump -, I am mesmerized by how they keep their trajetories as arcs. My current implementation works as following: While the jump button is pressed, gravity is turned off and the avatar's Y coordenate is decremented by the constant value of the gravity. For example, if things fall at Z units per tick, it will rise Z units per tick. Once the button is released or the limit is reached, the avatar desaccelerates in an amount that would make it cover X units until its speed reaches 0; once it does, it accelerates up until its speed matches gravity - sticking to the example, I could say it accelerates from 0 to Z units/tick while still covering X units. This implementation, however, makes jumps too diagonal, and unless the avatar's speed is faster than the gravity, which would make it way too fast in my current project (it moves at about 4 pixels per tick and gravity is 10 pixels per tick, at a framerate of 40FPS), it also makes it more vertical than horizontal. Those familiar with platformers would notice that the character's arc'd jump almost always allows them to jump further even if they aren't as fast as the game's gravity, and when it doesn't, if not played right, would prove itself to be very counter-intuitive. I know this because I could attest that my implementation is very annoying. Has anyone ever attempted at similar mechanics, and maybe even succeeded? I'd like to know what's behind this kind of platformer jumping. If you haven't ever had any experience with this beforehand and want to give it a go, then please, don't try to correct or enhance my explained implementation, unless I was on the right way - try to make up your solution from scratch. I don't care if you use gravity, physics or whatnot, as long as it shows how these pseudo-impulses work, it does the job. Also, I'd like its presentation to avoid a language-specific coding; like, sharing us a C++ example, or Delphi... As much as I'm using the XNA framework for my project and wouldn't mind C# stuff, I don't have much patience to read other's code, and I'm certain game developers of other languages would be interested in what we achieve here, so don't mind sticking to pseudo-code. Thank you beforehand.
eng_Latn
4,529
5-letter term for an "infectious" program designed to harm your computer
Timeline of computer viruses and worms - Wikipedia This timeline of computer viruses and worms presents a chronology of noteworthy computer .... Elk Cloner's design combined with public ignorance about what malware was ... Brain is considered the first IBM PC compatible virus, and the program .... May 5: The ILOVEYOU worm, also known as Love Letter, or VBS, or Love...
Jeopary Questions page 1935 - THE 1880S - TriviaBistro.com ITALIAN WORDS & PHRASES: Eye drops are delle gocce per gliocchi & these drops are delle gocce per le orecchie LAKES: Seneca Lake, one of these New...
eng_Latn
4,530
Around 1980/81, a car-pool buddy told me of a story that he had read about a computer virus that constantly evolving. I vaguely remember that it's human programmer had created several early variants that weren't self-sustaining but as they 'died' he would add new characteristics - self-replicating, mirror real code to escape detection, and eventually self-modifying so it could learn and adapt on its own. I don't remember the title or author (or friend, for that matter) but it was the earliest I had heard of a computer virus that evolved. Any thoughts?
This book came out of the 1970s (early 1980's) at the latest. In it the protagonist, a not so diligent student, gets turned on to computer programming and creates (I think..) a weather program. Eventually he moves on and years later the program contacts him. It has become an AI and he is its creator. I forget what the setup is post contact which is not helpful at all..
The new Top-Bar does not show reputation changes from Area 51.
eng_Latn
4,531
A variety of refinements to the attack have been suggested , including using multiple linear approximations or incorporating non-linear expressions , leading to a generalized partitioning cryptanalysis .
A variety of refinements to the attack have been suggested , including using multiple linear approximations or including non-linear expressions .
PCLinuxOS uses the Advanced Packaging Tool ( or APT ) , a package management system ( originally from the Debian distribution ) , together with Synaptic Package Manager , a GUI front end to APT , in order to add , remove or update packages .
eng_Latn
4,532
I was wondering if it is possible to decompile a .net binary application? and I found out that is easy as a piece of cake! This is wired. why would Microsoft NOT protect customer source code binaries? At least why it is so easy to decompile even with orginal variable names and etc. I know that in PHP there is a way to encode your source code that nobody can read that. I don't know if its impossible to decompile BUT at least it is not as easy as JetBrains or ILSpy So my main Question is here: IS THERE ANY WAY TO ENCODE YOUR SOURCE CODES IN .NET (C#)?
Obfuscation is one way, but it can't protect from breaking the piracy protection security of the application. How do I make sure that the application is not tampered with, and how do I make sure that the registration mechanism can't be reverse engineered? Also it is possible to convert a C# application to native code, and is too costly. C# provides lot of features, and is the ideal language for my code, so writing the whole codebase again in C++ is out of the question. Secure certificates can be easily removed from the signed assemblies in .NET.
Is it possible to write some C or C++ code and compile to binaries, then use those binaries with php? Is it also possible to write a php library using C and C++ ? If so, please tell how can I do so?
eng_Latn
4,533
Is there any way to compile ASP.NET Web Site and make it impossible to decompile (reverse engeenering)? I wrote my own big project in Visual Studio, I want to compile it and sell to the buyer. But I don't want buyer to see/modify the source code in any way. I'm worried because even though I published (compiled) it with "allow this pre-compilled web site to be updatable" unchecked, I heard about something like Reflector and ways to get the source from binaries. Is there any way to make it impossible? It's all about piracy prevention - I added fixed line of code that makes the website working only on ONE particular domain like XXXXXXX.XXX (typed in the code). But I'm worried that it can be decompiled and this line can be removed. Thanks
Obfuscation is one way, but it can't protect from breaking the piracy protection security of the application. How do I make sure that the application is not tampered with, and how do I make sure that the registration mechanism can't be reverse engineered? Also it is possible to convert a C# application to native code, and is too costly. C# provides lot of features, and is the ideal language for my code, so writing the whole codebase again in C++ is out of the question. Secure certificates can be easily removed from the signed assemblies in .NET.
Can I do it with reflection or something like that?
eng_Latn
4,534
It is possible to share a tampermonkey script to someone but to hide the code from it and somehow to secure it. I just don't want not to be possible for anyone to copy/paste the script from there.
I want to make a JavaScript application that's not open source, and thus I wish to learn how to can obfuscate my JS code? Is this possible?
The entire site is blank right now. The header and footer are shown, but no questions.
eng_Latn
4,535
How to evaluate the avalanche effect? How can avalanche effect be calculated? I would in particular want to know what platform or IDE can be used to calculate the same?
Calculation of the avalanche effect coefficient Given a matrix/dependence matrix for a hash function,how do I calculate the avalanche coefficient for it. I want to calculate a single parameter(value) which represents the amount of avalanche effect for the given hash function. I have thought of computing mean all over the matrix but am not sure that's the correct thing to do. The talks about the avalanche coefficient but they haven't mentioned the way they calculate it.
What is syntax highlighting and how does it work? I noticed that sometimes my code gets highlighted in different colors when rendered. What is syntax highlighting? How does it work? Why isn't my code being highlighted correctly? How do I report a bug or request a new language? How do I use syntax highlighting? What languages are currently available on Stack Exchange?
eng_Latn
4,536
I'm asking if the SE sites or new proposals could have code analysis in its scope similar to , or it's against Stack Exchange rules? One example of question is , which was closed as off-topic (code analysis), therefore I've created the new (similar to ) where (malicious) code analysis is on-topic and defining exactly what kind of code it's expected to be analysed. Is that perfectly fine, fine, worth to try or code analysis is not suitable on SE sites at all?
Is it OK to ask on SO for help in explaining someone else's working piece of code, from Open Source projects or library examples etc.? Or does this belong somewhere else?
The new Top-Bar does not show reputation changes from Area 51.
eng_Latn
4,537
What exactly from the source is visible in .net assembly? Using the code analysis tools (FxCop) I'm surprised how much information is visible inside the application exe file: Class names Methods Argument count/types/passing mathods etc I have tried to make the app a release, do not include any debug info, but still, lot of "coding" info is present. Is there any option how to "strip" such meta info? Is this needed for reflection?
Protect .NET code from reverse engineering? Obfuscation is one way, but it can't protect from breaking the piracy protection security of the application. How do I make sure that the application is not tampered with, and how do I make sure that the registration mechanism can't be reverse engineered? Also it is possible to convert a C# application to native code, and is too costly. C# provides lot of features, and is the ideal language for my code, so writing the whole codebase again in C++ is out of the question. Secure certificates can be easily removed from the signed assemblies in .NET.
C# - how can I get owner's name for a Mutex I have a shared mutex between 2 applications. I want to create an administration console that shows the current owner's name of the mutex. How can I get the application name that currently owns the Mutex?
eng_Latn
4,538
Give me a c-program system samples?
int\nmain (void)\n{\nfor(i=0;i<10;i++){\nprintf("some thing output here %d", i)\n}\n}
AVG Free Anti-Virus, \nC Cleaner Registry Cleaner, \nSpybot S & D spyware remover, \nAd-Aware SE Personal adware remover, \nWindows Defender spyware remover,\nZone Alarm Basic Firewall
eng_Latn
4,539
Program hidden beneath an interface in mathematica
How to distribute proprietary Mathematica code
Annoying FrontEnd bugs in Mathematica 10
eng_Latn
4,540
JSNOSE: Detecting JavaScript Code Smells
JDeodorant: Identification and Removal of Type-Checking Bad Smells
Estimation of the Mathematical Parameters of Double-Exponential Pulses Using the Nelder–Mead Algorithm
eng_Latn
4,541
In addition to individual applications, what modern systems that control the basic functions of a computer typically use UTC?
Some applications standardize on UTC to avoid problems with clock shifts and time zone differences. Likewise, most modern operating systems internally handle and store all times as UTC and only convert to local time for display.
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtain classified files, such as air tasking order systems data and furthermore able to penetrate connected networks of National Aeronautics and Space Administration's Goddard Space Flight Center, Wright-Patterson Air Force Base, some Defense contractors, and other private sector organizations, by posing as a trusted Rome center user.
eng_Latn
4,542
Beyond the Interconnections: Split Manufacturing in RF Designs
Securing computer hardware using 3D integrated circuit (IC) technology and split manufacturing for obfuscation
Silencing Hardware Backdoors
eng_Latn
4,543
.Net Obfuscator
.NET obfuscation tools/strategy
.NET obfuscation tools/strategy
deu_Latn
4,544
How to fight against memory editing cheat software?
Strategies to Defeat Memory Editors for Cheating - Desktop Games
Strategies to Defeat Memory Editors for Cheating - Desktop Games
eng_Latn
4,545
What is bug density and how do we calculate it?
A measure of how a buggy your software is.\nBuggy lines divided by total lines.
Get in touch with a psychic and ask Douglas Adams (RIP). (If &) Where he is now, he's bound to know the answer.
eng_Latn
4,546
Formal concept analysis: current trends and directions
Regularized offpolicy TD-learning
MEDUSA: MEtamorphic malware dynamic analysis usingsignature from API
eng_Latn
4,547
Mining Change Patterns in AspectJ Software Evolution
Identifying Syntactic Differences Between Two Programs
A linear space algorithm for computing maximal common subsequences
kor_Hang
4,548
gamer psychology and behavior .
Using heuristics to evaluate the playability of games
Context-sensitive analysis of obfuscated x86 executables
eng_Latn
4,549
Code Transformation by Direct Transformation of ASTs
refactoring improving the design of existing code .
Automatic Melody Generation
eng_Latn
4,550
English shellcode
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
Implementation of a Covert Channel in the 802.11 Header
eng_Latn
4,551
Finding dispatcher gadgets for jump oriented programming code reuse attacks
Defeating return-oriented rootkits with "Return-Less" kernels
Deep ADMM-Net for compressive sensing MRI
eng_Latn
4,552
analyzing the state of static analysis : a large - scale evaluation in open source software .
Would static analysis tools help developers with code reviews?
SURVEY PAPER : MULTI SENSOR DATA FUSION FOR SENSOR VALIDATION
eng_Latn
4,553
Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation
Watermarking-based copyright protection of sequential functions
Laser technology to manage periodontal disease: a valid concept?
eng_Latn
4,554
Detecting code clones in binary executables
Similarity Search in High Dimensions via Hashing
Dynamic voltage regulator based on PWM AC chopper converter: topology and control
eng_Latn
4,555
Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces
Dytan: a generic dynamic taint analysis framework
Finding Groups in Data: An Introduction to Cluster Analysis.
eng_Latn
4,556
a probabilistic software quality model .
A METRICS SUITE FOR OBJECT ORIENTED DESIGN
Relative Entropy Policy Search
eng_Latn
4,557
InputFinder: Reverse Engineering Closed Binaries using Hardware Performance Counters
Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs
Dynamic Instrumentation of Production Systems
eng_Latn
4,558
Hardware trojan attacks in FPGA devices: threat analysis and effective counter measures
MERO: A Statistical Approach for Hardware Trojan Detection
A Transformation System for Developing Recursive Programs
eng_Latn
4,559
Uptane : Securing Software Updates for Automobiles
Secure software updates: disappointments and new challenges
ERICO: Effective Removal of Inline Caching Overhead in Dynamic Typed Languages
eng_Latn
4,560
An Evil Copy: How the Loader Betrays You.
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications
Biochemical method for inserting new genetic information into DNA of Simian Virus 40: circular SV40 DNA molecules containing lambda phage genes and the galactose operon of Escherichia coli.
eng_Latn
4,561
Grammar-based adaptive fuzzing: Evaluation on SCADA modbus protocol
BAP: A Binary Analysis Platform
Interference Analysis for UAV Connectivity over LTE Using Aerial Radio Measurements
eng_Latn
4,562
software quality attributes and trade - offs .
A framework for classifying and comparing software architecture evaluation methods
Citing for high impact
eng_Latn
4,563
A Hybrid Model to Detect Malicious Executables
Learning to detect malicious executables in the wild
triejoin : a simple , worst - case optimal join algorithm .
eng_Latn
4,564
Effective Function Recovery for COTS Binaries using Interface Verification
Blanket execution: dynamic similarity testing for program binaries and components
Service-Oriented Architecture Maturity
eng_Latn
4,565
A Trusted Safety Verifier for Process Controller Code
Detecting False Data Injection Attacks on DC State Estimation
SSP: Semantic Space Projection for Knowledge Graph Embedding with Text Descriptions
eng_Latn
4,566
A2: Analog Malicious Hardware
Trojan Detection using IC Fingerprinting
On Textual Analysis and Machine Learning for Cyberstalking Detection
eng_Latn
4,567
Do I use the wrong definition?: DeFuse: definition-use invariants for detecting concurrency and sequential bugs
Valgrind: a framework for heavyweight dynamic binary instrumentation
50-kW 1kV DC bus air-cooled inverter with 1.7 kV SiC MOSFETs and 3D-printed novel power module packaging structure for grid applications
eng_Latn
4,568
Xandra: An Autonomous Cyber Battle System for the Cyber Grand Challenge
Howard: A Dynamic Excavator for Reverse Engineering Data Structures
EEL: machine-independent executable editing
eng_Latn
4,569
Scalable Graph-based Bug Search for Firmware Images
Program-Adaptive Mutational Fuzzing
T- and B-cell subsets in periodontitis
eng_Latn
4,570
Software Crash Analysis for Automatic Exploit Generation on Binary Programs
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
Design and control of a three-phase active rectifier under non-ideal operating conditions
kor_Hang
4,571
Benchmarking Static Analysis Tools for Web Security
Pixy: a static analysis tool for detecting Web application vulnerabilities
Seamless Montage for Texturing Models
eng_Latn
4,572
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.
Statically-directed dynamic automated test generation
Self-adaptive differential evolution with neighborhood search
eng_Latn
4,573
Automatic logging of operating system effects to guide application-level architecture simulation
Pin: building customized program analysis tools with dynamic instrumentation
Temporal Information Retrieval
eng_Latn
4,574
XFI: software guards for system address spaces
Unmodified Device Driver Reuse and Improved System Dependability via Virtual Machines
Fast and Accurate Estimation of Quality of Results in High-Level Synthesis with Machine Learning
eng_Latn
4,575
Security Analysis of PHP Bytecode Protection Mechanisms
A Generic Approach to Automatic Deobfuscation of Executable Code
Newsletter No . 17 , Fall 2006 Geodetic constraints on Rupturing of Continental Lithosphere along the Red Sea
kor_Hang
4,576
Classification of hardware trojan detection techniques
Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis
Density-Driven Cross-Lingual Transfer of Dependency Parsers
eng_Latn
4,577
SCRAP: Architecture for signature-based protection from Code Reuse Attacks
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
Beyond Bilinear: Generalized Multi-modal Factorized High-order Pooling for Visual Question Answering
eng_Latn
4,578
portable and efficient auto - vectorized bytecode : a look at the interaction between static and jit compilers .
Split Compilation: an Application to Just-in-Time Vectorization
DIABLO: a reliable, retargetable and extensible link-time rewriting framework
eng_Latn
4,579
Pinpointing Vulnerabilities
Non-control-data attacks are realistic threats
Secure Execution via Program Shepherding
eng_Latn
4,580
Learning to target: what works for behavioral targeting
Mining advertiser-specific user behavior using adfactors
Efficient software-based fault isolation
eng_Latn
4,581
Broken Promises: An Experiment
ERC -- A Theory of Equity, Reciprocity and Competition
Algorithmically Generated Domain Detection and Malware Family Classification
deu_Latn
4,582
branch prediction and the performance of interpreters — don ' t trust folklore .
Pin: building customized program analysis tools with dynamic instrumentation
Minimal Narrative Annotation Schemes and Their Applications
eng_Latn
4,583
A similarity metric method of obfuscated malware using function-call graph
A survey of graph edit distance
Automatic detection of body parts in x-ray images
eng_Latn
4,584
On the Feasibility of Malware Authorship Attribution
refactoring improving the design of existing code .
Finding Plagiarisms among a Set of Programs with JPlag
eng_Latn
4,585
Unknown Malcode Detection Using OPCODE Representation
Data mining methods for detection of new malicious executables
Speech and Language Processing
eng_Latn
4,586
Static analysis of Android programs
Precise null-pointer analysis
Graph-Based Algorithms for Boolean Function Manipulation
eng_Latn
4,587
Selecting a set of appropriate metrics for detecting code clones
CCFinder: a multilinguistic token-based code clone detection system for large scale source code
Health Insurance and the Demand for Medical Care : Evidence from a Randomized Experiment
eng_Latn
4,588
on the evolution of lehman ' s laws .
Laws of Software Evolution Revisited
software aging .
eng_Latn
4,589
Predicting change propagation in software systems
CVSSearch: Searching thr ough SourceCodeusingCVS Comments
IT2FS-based ontology with soft-computing mechanism for malware behavior analysis
eng_Latn
4,590
APISan: Sanitizing {API} Usages through Semantic Cross-Checking
Cross-checking semantic correctness: the case of finding file system bugs
Singularity: rethinking the software stack
eng_Latn
4,591
Valgrind: a framework for heavyweight dynamic binary instrumentation
How to shadow every byte of memory used by a program
dynamic binary analysis and instrumentation .
eng_Latn
4,592
Malware detection with quantitative data flow graphs
A survey on automated dynamic malware-analysis techniques and tools
Memory-efficient on-the-fly voxelization of particle data
eng_Latn
4,593
Network Flow Watermarking: A Survey
Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions
X-trace: A pervasive network tracing framework
deu_Latn
4,594
JITDefender: A Defense against JIT Spraying Attacks
Address obfuscation: an efficient approach to combat a broad range of memory error exploits
Linked Hypernyms : Enriching DBpedia with Targeted Hypernym Discovery
eng_Latn
4,595
Finding software license violations through binary code clone detection
Clustering by compression
Mammalian Rho GTPases: new insights into their functions from in vivo studies
eng_Latn
4,596
Calipso: physics-based image and video editing through CAD model proxies
Physically Based Deformable Models in Computer Graphics
SCADAVT-A framework for SCADA security testbed based on virtualization technology
eng_Latn
4,597
A 3-D Split Manufacturing Approach to Trustworthy System Development
Yet another MicroArchitectural Attack:: exploiting I-Cache
Differential Power Analysis
eng_Latn
4,598
Towards automated exploit generation for embedded systems
A large-scale analysis of the security of embedded firmwares
On Regularization Parameter Estimation under Covariate Shift
eng_Latn
4,599