Login / Signup
SSPREW@ACSAC
2016
2018
2016
2018
Keyphrases
Publications
2018
Adam M. Gautier
,
Todd R. Andel
,
Ryan Benton
On-Device Detection via Anomalous Environmental Factors.
SSPREW@ACSAC
(2018)
Gabriele Viglianisi
,
Michele Carminati
,
Mario Polino
,
Andrea Continella
,
Stefano Zanero
SysTaint: Assisting Reversing of Malicious Network Communications.
SSPREW@ACSAC
(2018)
William Mahoney
,
Joseph Franco
,
Greg Hoff
,
Jeffrey Todd McDonald
Leave It to Weaver.
SSPREW@ACSAC
(2018)
Mohammed Noraden Alsaleh
,
Jinpeng Wei
,
Ehab Al-Shaer
,
Mohiuddin Ahmed
gExtractor: Towards Automated Extraction of Malware Deception Parameters.
SSPREW@ACSAC
(2018)
Ramtine Tofighi-Shirazi
,
Maria Christofi
,
Philippe Elbaz-Vincent
,
Thanh Ha Le
DoSE: Deobfuscation based on Semantic Equivalence.
SSPREW@ACSAC
(2018)
Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop, San Juan, PR, USA, December 3-4, 2018
SSPREW@ACSAC
(2018)
Joonhyung Hwang
,
Taisook Han
Identifying Input-Dependent Jumps from Obfuscated Execution using Dynamic Data Flow Graphs.
SSPREW@ACSAC
(2018)
2016
Josselin Feist
,
Laurent Mounier
,
Sébastien Bardin
,
Robin David
,
Marie-Laure Potet
Finding the needle in the heap: combining static analysis and dynamic symbolic execution to trigger use-after-free.
SSPREW@ACSAC
(2016)
Riccardo Sartea
,
Mila Dalla Preda
,
Alessandro Farinelli
,
Roberto Giacobazzi
,
Isabella Mastroeni
Active Android malware analysis: an approach based on stochastic games.
SSPREW@ACSAC
(2016)
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California, USA, December 5-6, 2016
SSPREW@ACSAC
(2016)
Shabnam Aboughadareh
,
Christoph Csallner
Detecting rootkits with the RAI runtime application inventory.
SSPREW@ACSAC
(2016)
Yuan Xiang Gu
,
Harold Johnson
,
Clifford Liem
,
Andrew Wajs
,
Michael J. Wiener
White-box cryptography: practical protection on hostile hosts.
SSPREW@ACSAC
(2016)
Samuel Bennett Moore
,
Mark Yampolskiy
,
Jacob Gatlin
,
Jeffrey Todd McDonald
,
Todd R. Andel
Buffer overflow attack's power consumption signatures.
SSPREW@ACSAC
(2016)
Bert Abrath
,
Bart Coppens
,
Stijn Volckaert
,
Joris Wijnant
,
Bjorn De Sutter
Tightly-coupled self-debugging software protection.
SSPREW@ACSAC
(2016)
Aleieldin Salem
,
Sebastian Banescu
Metadata recovery from obfuscated programs using machine learning.
SSPREW@ACSAC
(2016)
Ramya Manikyam
,
Jeffrey Todd McDonald
,
William R. Mahoney
,
Todd R. Andel
,
Samuel H. Russ
Comparing the effectiveness of commercial obfuscators against MATE attacks.
SSPREW@ACSAC
(2016)