Search dblp for Publications

export results for "toc:db/conf/acsac/ssprew2018.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acsac/AlsalehWAA18,
  author       = {Mohammed Noraden Alsaleh and
                  Jinpeng Wei and
                  Ehab Al{-}Shaer and
                  Mohiuddin Ahmed},
  editor       = {Jeffrey Todd McDonald and
                  S{\'{e}}bastien Bardin and
                  Natalia Stakhanova},
  title        = {gExtractor: Towards Automated Extraction of Malware Deception Parameters},
  booktitle    = {Proceedings of the 8th Software Security, Protection, and Reverse
                  Engineering Workshop, San Juan, PR, USA, December 3-4, 2018},
  pages        = {2:1--2:12},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3289239.3289244},
  doi          = {10.1145/3289239.3289244},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AlsalehWAA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GautierAB18,
  author       = {Adam M. Gautier and
                  Todd R. Andel and
                  Ryan Benton},
  editor       = {Jeffrey Todd McDonald and
                  S{\'{e}}bastien Bardin and
                  Natalia Stakhanova},
  title        = {On-Device Detection via Anomalous Environmental Factors},
  booktitle    = {Proceedings of the 8th Software Security, Protection, and Reverse
                  Engineering Workshop, San Juan, PR, USA, December 3-4, 2018},
  pages        = {5:1--5:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3289239.3289246},
  doi          = {10.1145/3289239.3289246},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GautierAB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HwangH18,
  author       = {Joonhyung Hwang and
                  Taisook Han},
  editor       = {Jeffrey Todd McDonald and
                  S{\'{e}}bastien Bardin and
                  Natalia Stakhanova},
  title        = {Identifying Input-Dependent Jumps from Obfuscated Execution using
                  Dynamic Data Flow Graphs},
  booktitle    = {Proceedings of the 8th Software Security, Protection, and Reverse
                  Engineering Workshop, San Juan, PR, USA, December 3-4, 2018},
  pages        = {3:1--3:12},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3289239.3291460},
  doi          = {10.1145/3289239.3291460},
  timestamp    = {Fri, 21 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HwangH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MahoneyFHM18,
  author       = {William Mahoney and
                  Joseph Franco and
                  Greg Hoff and
                  Jeffrey Todd McDonald},
  editor       = {Jeffrey Todd McDonald and
                  S{\'{e}}bastien Bardin and
                  Natalia Stakhanova},
  title        = {Leave It to Weaver},
  booktitle    = {Proceedings of the 8th Software Security, Protection, and Reverse
                  Engineering Workshop, San Juan, PR, USA, December 3-4, 2018},
  pages        = {6:1--6:9},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3289239.3291459},
  doi          = {10.1145/3289239.3291459},
  timestamp    = {Fri, 21 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MahoneyFHM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Tofighi-Shirazi18,
  author       = {Ramtine Tofighi{-}Shirazi and
                  Maria Christofi and
                  Philippe Elbaz{-}Vincent and
                  Thanh Ha Le},
  editor       = {Jeffrey Todd McDonald and
                  S{\'{e}}bastien Bardin and
                  Natalia Stakhanova},
  title        = {DoSE: Deobfuscation based on Semantic Equivalence},
  booktitle    = {Proceedings of the 8th Software Security, Protection, and Reverse
                  Engineering Workshop, San Juan, PR, USA, December 3-4, 2018},
  pages        = {1:1--1:12},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3289239.3289243},
  doi          = {10.1145/3289239.3289243},
  timestamp    = {Fri, 21 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Tofighi-Shirazi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ViglianisiCPCZ18,
  author       = {Gabriele Viglianisi and
                  Michele Carminati and
                  Mario Polino and
                  Andrea Continella and
                  Stefano Zanero},
  editor       = {Jeffrey Todd McDonald and
                  S{\'{e}}bastien Bardin and
                  Natalia Stakhanova},
  title        = {SysTaint: Assisting Reversing of Malicious Network Communications},
  booktitle    = {Proceedings of the 8th Software Security, Protection, and Reverse
                  Engineering Workshop, San Juan, PR, USA, December 3-4, 2018},
  pages        = {4:1--4:12},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3289239.3289245},
  doi          = {10.1145/3289239.3289245},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ViglianisiCPCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2018ssprew,
  editor       = {Jeffrey Todd McDonald and
                  S{\'{e}}bastien Bardin and
                  Natalia Stakhanova},
  title        = {Proceedings of the 8th Software Security, Protection, and Reverse
                  Engineering Workshop, San Juan, PR, USA, December 3-4, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3289239},
  doi          = {10.1145/3289239},
  isbn         = {978-1-4503-6096-8},
  timestamp    = {Fri, 21 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2018ssprew.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics