Skip to search formSkip to main contentSkip to account menu

Call graph

Known as: Callgraph 
A call graph (also known as a call multigraph) is a control flow graph, which represents calling relationships between subroutines in a computer… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Due to the quality and security requirements that come with an always-on mobile device processing large amounts of highly… 
2015
2015
Currently cyber infrastructures are facing increasingly stealthy attacks that implant malicious payloads under the cover of… 
2010
2010
Abstract : Correlating attacks can be specifically problematic in the digital domain. It is a common scenario that the only real… 
2010
2010
Until today, the efficient partitioning and mapping of applications for multiprocessor systems is a challenging task. The… 
Review
2010
Review
2010
GCC has a new infrastructure to support a link time optimization (LTO). The infrastructure is designed to allow linking of large… 
2008
2008
TinyOS has proven to be an effective platform for developing reactive embedded network applications. However, the platform's lean… 
2007
2007
This paper examines the callgraphs of 120 malicious and 280 non-malicious executables. Pareto models are fitted to indegree… 
Highly Cited
2005
Highly Cited
2005
One of the most dangerous cybersecurity threats is control hijacking attacks, which hijack the control of a victim application… 
2004
2004
Aspect-oriented programming (AOP) enables the programmer to modularize concerns that cut across other concerns. Adaptive… 
Highly Cited
1998
Highly Cited
1998
Program slicing transforms a large program into a smaller one that contains only statements relevant to the computation of a…