Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Control flow graph

Known as: CFG, Flow control diagrams 
A control flow graph (CFG) in computer science is a representation, using graph notation, of all paths that might be traversed through a program… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Constraining dynamic control transfers is a common technique for mitigating software vulnerabilities. This defense has been… Expand
  • figure 1
  • table 1
  • table 2
  • table 5
  • table 3
Highly Cited
2011
Highly Cited
2011
Code-reuse attacks are software exploits in which an attacker directs control flow through existing code with a malicious result… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Highly Cited
2010
Highly Cited
2010
Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2010
Highly Cited
2010
Malware is a pervasive problem in distributed computer and network systems. Identification of malware variants provides great… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 2
  • table 1
Highly Cited
2007
Highly Cited
2007
This paper presents a new approach to dynamically monitoring operating system kernel integrity, based on a property called state… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 5
  • table 2
Highly Cited
2006
Highly Cited
2006
Next generation malware will by be characterized by the intense use of polymorphic and metamorphic techniques aimed at… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Highly Cited
2004
Highly Cited
2004
Given a finite-state abstraction of a sequential program with potentially recursive procedures and input from the environment, we… Expand
Highly Cited
1991
Highly Cited
1991
In optimizing compilers, data structure choices directly influence the power and efficiency of practical program optimization. A… Expand
  • figure 1
  • figure 4
  • figure 5
  • figure 7
  • figure 8
Highly Cited
1991
Highly Cited
1991
Programs written in powerful, higher-order languages like Scheme, ML, and Common Lisp should run as fast as their FORTRAN and C… Expand
  • figure 1.2
  • figure 2.1
  • figure 2.2
  • figure 3.1
  • figure 3.2
Highly Cited
1987
Highly Cited
1987
In this paper we present an intermediate program representation, called the program dependence graph (PDG), that makes explicit… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5