Dynamic Analysis Techniques for the Reconstruction of Architectural Views

Author(s):  
Bas Cornelissen
Author(s):  
Nguyen Minh Tu ◽  
Nguyen Viet Hung ◽  
Phan Viet Anh ◽  
Cao Van Loi ◽  
Nathan Shone

2020 ◽  
Vol 16 (S5) ◽  
Author(s):  
David M Cash ◽  
Pawel J Markiewicz ◽  
Jieqing Jiao ◽  
William Coath ◽  
Marc Modat ◽  
...  

1981 ◽  
Vol 103 (3) ◽  
pp. 643-651 ◽  
Author(s):  
W. Sunada ◽  
S. Dubowsky

An analytical method is presented for the dynamics of spatial mechanisms containing complex-shaped, flexible links with application to both high-speed industrial machines and robotic manipulators. Existing NASTRAN-type finite element structural analysis programs are combined with 4 × 4 matrix dynamic analysis techniques and Component Mode Synthesis coordinate reduction to yield a procedure capable of analyzing complex, non-linear spatial mechanisms with irregularly shaped links in great detail, yet producing a system of equations small enough for efficient numerical integration. The method is applied to two examples.


Author(s):  
Angelos D. Keromytis ◽  
Salvatore J. Stolfo ◽  
Junfeng Yang ◽  
Angelos Stavrou ◽  
Anup Ghosh ◽  
...  

2021 ◽  
pp. 1-25
Author(s):  
Hector David Menendez

"Antivirus is death"' and probably every detection system that focuses on a single strategy for indicators of compromise. This famous quote that Brian Dye --Symantec's senior vice president-- stated in 2014 is the best representation of the current situation with malware detection and mitigation. Concealment strategies evolved significantly during the last years, not just like the classical ones based on polimorphic and metamorphic methodologies, which killed the signature-based detection that antiviruses use, but also the capabilities to fileless malware, i.e. malware only resident in volatile memory that makes every disk analysis senseless. This review provides a historical background of different concealment strategies introduced to protect malicious --and not necessarily malicious-- software from different detection or analysis techniques. It will cover binary, static and dynamic analysis, and also new strategies based on machine learning from both perspectives, the attackers and the defenders.


Author(s):  
Cong Liu

Design pattern detection can provide useful insights to support software comprehension. Accurate and complete detection of pattern instances are extremely important to enable software usability improvements. However, existing design pattern detection approaches and tools suffer from the following problems: incomplete description of design pattern instances, inaccurate behavioral constraint checking, and inability to support novel design patterns. This paper presents a general framework to detect design patterns while solving these issues by combining static and dynamic analysis techniques. The framework has been instantiated for typical behavioral and creational patterns, such as the observer pattern, state pattern, strategy pattern, and singleton pattern to demonstrate the applicability. Based on the open-source process mining toolkit ProM, we have developed an integrated tool that supports the whole detection process for these patterns. We applied and evaluated the framework using software execution data containing around 1,000,000 method calls generated from eight synthetic software systems and three open-source software systems. The evaluation results show that our approach can guarantee a higher precision and recall than existing approaches and can distinguish state and strategy patterns that are indistinguishable by the state-of-the-art.


Sign in / Sign up

Export Citation Format

Share Document