Search dblp for Publications

export results for "toc:db/conf/acsac/ssprew2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acsac/AboughadarehC16,
  author       = {Shabnam Aboughadareh and
                  Christoph Csallner},
  editor       = {Mila Dalla Preda and
                  Natalia Stakhanova and
                  Jeffrey Todd McDonald},
  title        = {Detecting rootkits with the {RAI} runtime application inventory},
  booktitle    = {Proceedings of the 6th Workshop on Software Security, Protection,
                  and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California,
                  USA, December 5-6, 2016},
  pages        = {3:1--3:12},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3015135.3015138},
  doi          = {10.1145/3015135.3015138},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AboughadarehC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AbrathCVWS16,
  author       = {Bert Abrath and
                  Bart Coppens and
                  Stijn Volckaert and
                  Joris Wijnant and
                  Bjorn De Sutter},
  editor       = {Mila Dalla Preda and
                  Natalia Stakhanova and
                  Jeffrey Todd McDonald},
  title        = {Tightly-coupled self-debugging software protection},
  booktitle    = {Proceedings of the 6th Workshop on Software Security, Protection,
                  and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California,
                  USA, December 5-6, 2016},
  pages        = {7:1--7:10},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3015135.3015142},
  doi          = {10.1145/3015135.3015142},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AbrathCVWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FeistMBDP16,
  author       = {Josselin Feist and
                  Laurent Mounier and
                  S{\'{e}}bastien Bardin and
                  Robin David and
                  Marie{-}Laure Potet},
  editor       = {Mila Dalla Preda and
                  Natalia Stakhanova and
                  Jeffrey Todd McDonald},
  title        = {Finding the needle in the heap: combining static analysis and dynamic
                  symbolic execution to trigger use-after-free},
  booktitle    = {Proceedings of the 6th Workshop on Software Security, Protection,
                  and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California,
                  USA, December 5-6, 2016},
  pages        = {2:1--2:12},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3015135.3015137},
  doi          = {10.1145/3015135.3015137},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FeistMBDP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GuJLWW16,
  author       = {Yuan Xiang Gu and
                  Harold Johnson and
                  Clifford Liem and
                  Andrew Wajs and
                  Michael J. Wiener},
  editor       = {Mila Dalla Preda and
                  Natalia Stakhanova and
                  Jeffrey Todd McDonald},
  title        = {White-box cryptography: practical protection on hostile hosts},
  booktitle    = {Proceedings of the 6th Workshop on Software Security, Protection,
                  and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California,
                  USA, December 5-6, 2016},
  pages        = {4:1--4:8},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3015135.3015139},
  doi          = {10.1145/3015135.3015139},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GuJLWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ManikyamMMAR16,
  author       = {Ramya Manikyam and
                  Jeffrey Todd McDonald and
                  William R. Mahoney and
                  Todd R. Andel and
                  Samuel H. Russ},
  editor       = {Mila Dalla Preda and
                  Natalia Stakhanova and
                  Jeffrey Todd McDonald},
  title        = {Comparing the effectiveness of commercial obfuscators against {MATE}
                  attacks},
  booktitle    = {Proceedings of the 6th Workshop on Software Security, Protection,
                  and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California,
                  USA, December 5-6, 2016},
  pages        = {8:1--8:11},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3015135.3015143},
  doi          = {10.1145/3015135.3015143},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ManikyamMMAR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MooreYGMA16,
  author       = {Samuel Bennett Moore and
                  Mark Yampolskiy and
                  Jacob Gatlin and
                  Jeffrey Todd McDonald and
                  Todd R. Andel},
  editor       = {Mila Dalla Preda and
                  Natalia Stakhanova and
                  Jeffrey Todd McDonald},
  title        = {Buffer overflow attack's power consumption signatures},
  booktitle    = {Proceedings of the 6th Workshop on Software Security, Protection,
                  and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California,
                  USA, December 5-6, 2016},
  pages        = {6:1--6:7},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3015135.3015141},
  doi          = {10.1145/3015135.3015141},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MooreYGMA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SalemB16,
  author       = {Aleieldin Salem and
                  Sebastian Banescu},
  editor       = {Mila Dalla Preda and
                  Natalia Stakhanova and
                  Jeffrey Todd McDonald},
  title        = {Metadata recovery from obfuscated programs using machine learning},
  booktitle    = {Proceedings of the 6th Workshop on Software Security, Protection,
                  and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California,
                  USA, December 5-6, 2016},
  pages        = {1:1--1:11},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3015135.3015136},
  doi          = {10.1145/3015135.3015136},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SalemB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SarteaPFGM16,
  author       = {Riccardo Sartea and
                  Mila Dalla Preda and
                  Alessandro Farinelli and
                  Roberto Giacobazzi and
                  Isabella Mastroeni},
  editor       = {Mila Dalla Preda and
                  Natalia Stakhanova and
                  Jeffrey Todd McDonald},
  title        = {Active Android malware analysis: an approach based on stochastic games},
  booktitle    = {Proceedings of the 6th Workshop on Software Security, Protection,
                  and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California,
                  USA, December 5-6, 2016},
  pages        = {5:1--5:10},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3015135.3015140},
  doi          = {10.1145/3015135.3015140},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/SarteaPFGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2016ssprew,
  editor       = {Mila Dalla Preda and
                  Natalia Stakhanova and
                  Jeffrey Todd McDonald},
  title        = {Proceedings of the 6th Workshop on Software Security, Protection,
                  and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California,
                  USA, December 5-6, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3015135},
  doi          = {10.1145/3015135},
  isbn         = {978-1-4503-4841-6},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2016ssprew.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics