Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,425,516 papers from all fields of science
Search
Sign In
Create Free Account
Call graph
Known as:
Callgraph
A call graph (also known as a call multigraph) is a control flow graph, which represents calling relationships between subroutines in a computer…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
35 relations
Alias analysis
Architecture description language
Binary translation
C++
Expand
Broader (1)
Static program analysis
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
The Soot-Based Toolchain for Analyzing Android Apps
Steven Arzt
,
Siegfried Rasthofer
,
E. Bodden
International Conference on Mobile Software…
2017
Corpus ID: 23365838
Due to the quality and security requirements that come with an always-on mobile device processing large amounts of highly…
Expand
2015
2015
LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis
Zhongshu Gu
,
Kexin Pei
,
Qifan Wang
,
Luo Si
,
X. Zhang
,
Dongyan Xu
45th Annual IEEE/IFIP International Conference on…
2015
Corpus ID: 11501067
Currently cyber infrastructures are facing increasingly stealthy attacks that implant malicious payloads under the cover of…
Expand
2010
2010
Automated Attacker Correlation for Malicious Code
T. Dullien
,
Ero Carrera
,
Soeren-Meyer Eppler
,
Sebastian Porst
2010
Corpus ID: 38805778
Abstract : Correlating attacks can be specifically problematic in the digital domain. It is a common scenario that the only real…
Expand
2010
2010
A Design Methodology for Application Partitioning and Architecture Development of Reconfigurable Multiprocessor Systems-on-Chip
D. Göhringer
,
M. Hübner
,
M. Benz
,
J. Becker
18th IEEE Annual International Symposium on Field…
2010
Corpus ID: 15611092
Until today, the efficient partitioning and mapping of applications for multiprocessor systems is a challenging task. The…
Expand
Review
2010
Review
2010
Optimizing real world applications with GCC Link Time Optimization
Taras Glek
arXiv.org
2010
Corpus ID: 225421
GCC has a new infrastructure to support a link time optimization (LTO). The infrastructure is designed to allow linking of large…
Expand
2008
2008
A Toolkit for Visualizing the Runtime Behavior of TinyOS Applications
Andrew R. Dalton
,
J. Hallstrom
IEEE International Conference on Program…
2008
Corpus ID: 16081091
TinyOS has proven to be an effective platform for developing reactive embedded network applications. However, the platform's lean…
Expand
2007
2007
Callgraph properties of executables
Daniel Bilar
AI Communications
2007
Corpus ID: 7751469
This paper examines the callgraphs of 120 malicious and 280 non-malicious executables. Pareto models are fitted to indegree…
Expand
Highly Cited
2005
Highly Cited
2005
Automatic extraction of accurate application-specific sandboxing policy
L. Lam
,
T. Chiueh
IEEE Military Communications Conference
2005
Corpus ID: 10747678
One of the most dangerous cybersecurity threats is control hijacking attacks, which hijack the control of a victim application…
Expand
2004
2004
Coupling Aspect-Oriented and Adaptive Programming
K. Lieberherr
,
D. Lorenz
2004
Corpus ID: 38304875
Aspect-oriented programming (AOP) enables the programmer to modularize concerns that cut across other concerns. Adaptive…
Expand
Highly Cited
1998
Highly Cited
1998
Program slicing in understanding of large programs
B. Korel
,
J. Rilling
Proceedings. 6th International Workshop on…
1998
Corpus ID: 6742838
Program slicing transforms a large program into a smaller one that contains only statements relevant to the computation of a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE