default search action
6th SSPREW@ACSAC 2016: Los Angeles, CA, USA
- Mila Dalla Preda, Natalia Stakhanova, Jeffrey Todd McDonald:
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California, USA, December 5-6, 2016. ACM 2016, ISBN 978-1-4503-4841-6 - Aleieldin Salem, Sebastian Banescu:
Metadata recovery from obfuscated programs using machine learning. 1:1-1:11 - Josselin Feist, Laurent Mounier, Sébastien Bardin, Robin David, Marie-Laure Potet:
Finding the needle in the heap: combining static analysis and dynamic symbolic execution to trigger use-after-free. 2:1-2:12 - Shabnam Aboughadareh, Christoph Csallner:
Detecting rootkits with the RAI runtime application inventory. 3:1-3:12 - Yuan Xiang Gu, Harold Johnson, Clifford Liem, Andrew Wajs, Michael J. Wiener:
White-box cryptography: practical protection on hostile hosts. 4:1-4:8 - Riccardo Sartea, Mila Dalla Preda, Alessandro Farinelli, Roberto Giacobazzi, Isabella Mastroeni:
Active Android malware analysis: an approach based on stochastic games. 5:1-5:10 - Samuel Bennett Moore, Mark Yampolskiy, Jacob Gatlin, Jeffrey Todd McDonald, Todd R. Andel:
Buffer overflow attack's power consumption signatures. 6:1-6:7 - Bert Abrath, Bart Coppens, Stijn Volckaert, Joris Wijnant, Bjorn De Sutter:
Tightly-coupled self-debugging software protection. 7:1-7:10 - Ramya Manikyam, Jeffrey Todd McDonald, William R. Mahoney, Todd R. Andel, Samuel H. Russ:
Comparing the effectiveness of commercial obfuscators against MATE attacks. 8:1-8:11
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.