Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acsac/ssprew2018.bht:"
@inproceedings{DBLP:conf/acsac/AlsalehWAA18, author = {Mohammed Noraden Alsaleh and Jinpeng Wei and Ehab Al{-}Shaer and Mohiuddin Ahmed}, editor = {Jeffrey Todd McDonald and S{\'{e}}bastien Bardin and Natalia Stakhanova}, title = {gExtractor: Towards Automated Extraction of Malware Deception Parameters}, booktitle = {Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop, San Juan, PR, USA, December 3-4, 2018}, pages = {2:1--2:12}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3289239.3289244}, doi = {10.1145/3289239.3289244}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AlsalehWAA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GautierAB18, author = {Adam M. Gautier and Todd R. Andel and Ryan Benton}, editor = {Jeffrey Todd McDonald and S{\'{e}}bastien Bardin and Natalia Stakhanova}, title = {On-Device Detection via Anomalous Environmental Factors}, booktitle = {Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop, San Juan, PR, USA, December 3-4, 2018}, pages = {5:1--5:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3289239.3289246}, doi = {10.1145/3289239.3289246}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GautierAB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HwangH18, author = {Joonhyung Hwang and Taisook Han}, editor = {Jeffrey Todd McDonald and S{\'{e}}bastien Bardin and Natalia Stakhanova}, title = {Identifying Input-Dependent Jumps from Obfuscated Execution using Dynamic Data Flow Graphs}, booktitle = {Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop, San Juan, PR, USA, December 3-4, 2018}, pages = {3:1--3:12}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3289239.3291460}, doi = {10.1145/3289239.3291460}, timestamp = {Fri, 21 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HwangH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MahoneyFHM18, author = {William Mahoney and Joseph Franco and Greg Hoff and Jeffrey Todd McDonald}, editor = {Jeffrey Todd McDonald and S{\'{e}}bastien Bardin and Natalia Stakhanova}, title = {Leave It to Weaver}, booktitle = {Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop, San Juan, PR, USA, December 3-4, 2018}, pages = {6:1--6:9}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3289239.3291459}, doi = {10.1145/3289239.3291459}, timestamp = {Fri, 21 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MahoneyFHM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Tofighi-Shirazi18, author = {Ramtine Tofighi{-}Shirazi and Maria Christofi and Philippe Elbaz{-}Vincent and Thanh Ha Le}, editor = {Jeffrey Todd McDonald and S{\'{e}}bastien Bardin and Natalia Stakhanova}, title = {DoSE: Deobfuscation based on Semantic Equivalence}, booktitle = {Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop, San Juan, PR, USA, December 3-4, 2018}, pages = {1:1--1:12}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3289239.3289243}, doi = {10.1145/3289239.3289243}, timestamp = {Fri, 21 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Tofighi-Shirazi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ViglianisiCPCZ18, author = {Gabriele Viglianisi and Michele Carminati and Mario Polino and Andrea Continella and Stefano Zanero}, editor = {Jeffrey Todd McDonald and S{\'{e}}bastien Bardin and Natalia Stakhanova}, title = {SysTaint: Assisting Reversing of Malicious Network Communications}, booktitle = {Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop, San Juan, PR, USA, December 3-4, 2018}, pages = {4:1--4:12}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3289239.3289245}, doi = {10.1145/3289239.3289245}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ViglianisiCPCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2018ssprew, editor = {Jeffrey Todd McDonald and S{\'{e}}bastien Bardin and Natalia Stakhanova}, title = {Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop, San Juan, PR, USA, December 3-4, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3289239}, doi = {10.1145/3289239}, isbn = {978-1-4503-6096-8}, timestamp = {Fri, 21 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2018ssprew.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.