


default search action
6th SSPREW@ACSAC 2016: Los Angeles, CA, USA
- Mila Dalla Preda, Natalia Stakhanova, Jeffrey Todd McDonald:

Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California, USA, December 5-6, 2016. ACM 2016, ISBN 978-1-4503-4841-6 - Aleieldin Salem, Sebastian Banescu

:
Metadata recovery from obfuscated programs using machine learning. 1:1-1:11 - Josselin Feist, Laurent Mounier, Sébastien Bardin, Robin David, Marie-Laure Potet:

Finding the needle in the heap: combining static analysis and dynamic symbolic execution to trigger use-after-free. 2:1-2:12 - Shabnam Aboughadareh, Christoph Csallner

:
Detecting rootkits with the RAI runtime application inventory. 3:1-3:12 - Yuan Xiang Gu, Harold Johnson, Clifford Liem, Andrew Wajs, Michael J. Wiener:

White-box cryptography: practical protection on hostile hosts. 4:1-4:8 - Riccardo Sartea, Mila Dalla Preda, Alessandro Farinelli

, Roberto Giacobazzi, Isabella Mastroeni:
Active Android malware analysis: an approach based on stochastic games. 5:1-5:10 - Samuel Bennett Moore, Mark Yampolskiy, Jacob Gatlin, Jeffrey Todd McDonald, Todd R. Andel:

Buffer overflow attack's power consumption signatures. 6:1-6:7 - Bert Abrath, Bart Coppens, Stijn Volckaert, Joris Wijnant, Bjorn De Sutter:

Tightly-coupled self-debugging software protection. 7:1-7:10 - Ramya Manikyam, Jeffrey Todd McDonald, William R. Mahoney

, Todd R. Andel, Samuel H. Russ:
Comparing the effectiveness of commercial obfuscators against MATE attacks. 8:1-8:11

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














