Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acsac/ssprew2016.bht:"
@inproceedings{DBLP:conf/acsac/AboughadarehC16, author = {Shabnam Aboughadareh and Christoph Csallner}, editor = {Mila Dalla Preda and Natalia Stakhanova and Jeffrey Todd McDonald}, title = {Detecting rootkits with the {RAI} runtime application inventory}, booktitle = {Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California, USA, December 5-6, 2016}, pages = {3:1--3:12}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3015135.3015138}, doi = {10.1145/3015135.3015138}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AboughadarehC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AbrathCVWS16, author = {Bert Abrath and Bart Coppens and Stijn Volckaert and Joris Wijnant and Bjorn De Sutter}, editor = {Mila Dalla Preda and Natalia Stakhanova and Jeffrey Todd McDonald}, title = {Tightly-coupled self-debugging software protection}, booktitle = {Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California, USA, December 5-6, 2016}, pages = {7:1--7:10}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3015135.3015142}, doi = {10.1145/3015135.3015142}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AbrathCVWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FeistMBDP16, author = {Josselin Feist and Laurent Mounier and S{\'{e}}bastien Bardin and Robin David and Marie{-}Laure Potet}, editor = {Mila Dalla Preda and Natalia Stakhanova and Jeffrey Todd McDonald}, title = {Finding the needle in the heap: combining static analysis and dynamic symbolic execution to trigger use-after-free}, booktitle = {Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California, USA, December 5-6, 2016}, pages = {2:1--2:12}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3015135.3015137}, doi = {10.1145/3015135.3015137}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FeistMBDP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GuJLWW16, author = {Yuan Xiang Gu and Harold Johnson and Clifford Liem and Andrew Wajs and Michael J. Wiener}, editor = {Mila Dalla Preda and Natalia Stakhanova and Jeffrey Todd McDonald}, title = {White-box cryptography: practical protection on hostile hosts}, booktitle = {Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California, USA, December 5-6, 2016}, pages = {4:1--4:8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3015135.3015139}, doi = {10.1145/3015135.3015139}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GuJLWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ManikyamMMAR16, author = {Ramya Manikyam and Jeffrey Todd McDonald and William R. Mahoney and Todd R. Andel and Samuel H. Russ}, editor = {Mila Dalla Preda and Natalia Stakhanova and Jeffrey Todd McDonald}, title = {Comparing the effectiveness of commercial obfuscators against {MATE} attacks}, booktitle = {Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California, USA, December 5-6, 2016}, pages = {8:1--8:11}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3015135.3015143}, doi = {10.1145/3015135.3015143}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ManikyamMMAR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MooreYGMA16, author = {Samuel Bennett Moore and Mark Yampolskiy and Jacob Gatlin and Jeffrey Todd McDonald and Todd R. Andel}, editor = {Mila Dalla Preda and Natalia Stakhanova and Jeffrey Todd McDonald}, title = {Buffer overflow attack's power consumption signatures}, booktitle = {Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California, USA, December 5-6, 2016}, pages = {6:1--6:7}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3015135.3015141}, doi = {10.1145/3015135.3015141}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MooreYGMA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SalemB16, author = {Aleieldin Salem and Sebastian Banescu}, editor = {Mila Dalla Preda and Natalia Stakhanova and Jeffrey Todd McDonald}, title = {Metadata recovery from obfuscated programs using machine learning}, booktitle = {Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California, USA, December 5-6, 2016}, pages = {1:1--1:11}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3015135.3015136}, doi = {10.1145/3015135.3015136}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SalemB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SarteaPFGM16, author = {Riccardo Sartea and Mila Dalla Preda and Alessandro Farinelli and Roberto Giacobazzi and Isabella Mastroeni}, editor = {Mila Dalla Preda and Natalia Stakhanova and Jeffrey Todd McDonald}, title = {Active Android malware analysis: an approach based on stochastic games}, booktitle = {Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California, USA, December 5-6, 2016}, pages = {5:1--5:10}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3015135.3015140}, doi = {10.1145/3015135.3015140}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/SarteaPFGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2016ssprew, editor = {Mila Dalla Preda and Natalia Stakhanova and Jeffrey Todd McDonald}, title = {Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California, USA, December 5-6, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3015135}, doi = {10.1145/3015135}, isbn = {978-1-4503-4841-6}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2016ssprew.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.