scispace - formally typeset
C

Cristina Cifuentes

Researcher at Oracle Corporation

Publications -  87
Citations -  2804

Cristina Cifuentes is an academic researcher from Oracle Corporation. The author has contributed to research in topics: Executable & Binary translation. The author has an hindex of 28, co-authored 85 publications receiving 2711 citations. Previous affiliations of Cristina Cifuentes include Queensland University of Technology & University of Tasmania.

Papers
More filters
Proceedings ArticleDOI

The impact of copyright on the development of cutting edge binary reverse engineering technology

TL;DR: It is argued that copyright laws should not hinder the development of computer and software technology at a time when hardware is developing at increasingly fast rates and software needs to be made available on such new machines; i.e. economic considerations need to be taken into account.
Patent

System and method for overflow detection using partial evaluations

TL;DR: In this paper, a method for overflow detection using partial evaluations using partial evaluation is presented, where a section of code from a source code file stored on a storage device is analyzed to identify a buffer with an index, and a plurality of statements that are statically-computable and dependent on the index of the buffer is generated.
Proceedings ArticleDOI

Copyright in shareware software distributed on the Internet—the Trumpet Winsock case

TL;DR: In the first Australian case to consider copyright in a shareware computer program distributed on the Internet, the court held that the Internet service provider OzEmail had infringed Trumpet Software's copyright in Trumpet Winsock 2.OB by arranging for the program and a set of altered data files to be distributed with other software on diskette as a give-away inserted in copies of computer magazines.

What is a Secure Programming Language

TL;DR: A simple data-driven definition for a secure programming language is proposed: that it provides first-class language support to address the causes for the most common, significant vulnerabilities found in real-world software.