Search dblp for Publications

export results for "toc:db/conf/ccs/spro2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/BanescuLKP16,
  author       = {Sebastian Banescu and
                  Ciprian Lucaci and
                  Benjamin Kr{\"{a}}mer and
                  Alexander Pretschner},
  editor       = {Brecht Wyseur and
                  Bjorn De Sutter},
  title        = {{VOT4CS:} {A} Virtualization Obfuscation Tool for C{\#}},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS
                  2016, Vienna, Austria, October 24-28, 2016},
  pages        = {39--49},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995306.2995312},
  doi          = {10.1145/2995306.2995312},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BanescuLKP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BarhelemyERR16,
  author       = {Lucas Barthelemy and
                  Ninon Eyrolles and
                  Gu{\'{e}}na{\"{e}}l Renault and
                  Rapha{\"{e}}l Roblin},
  editor       = {Brecht Wyseur and
                  Bjorn De Sutter},
  title        = {Binary Permutation Polynomial Inversion and Application to Obfuscation
                  Techniques},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS
                  2016, Vienna, Austria, October 24-28, 2016},
  pages        = {51--59},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995306.2995310},
  doi          = {10.1145/2995306.2995310},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BarhelemyERR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CoffmanKWG16,
  author       = {Joel Coffman and
                  Daniel M. Kelly and
                  Christopher C. Wellons and
                  Andrew S. Gearhart},
  editor       = {Brecht Wyseur and
                  Bjorn De Sutter},
  title        = {{ROP} Gadget Prevalence and Survival under Compiler-based Binary Diversification
                  Schemes},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS
                  2016, Vienna, Austria, October 24-28, 2016},
  pages        = {15--26},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995306.2995309},
  doi          = {10.1145/2995306.2995309},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/CoffmanKWG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EyrollesGV16,
  author       = {Ninon Eyrolles and
                  Louis Goubin and
                  Marion Videau},
  editor       = {Brecht Wyseur and
                  Bjorn De Sutter},
  title        = {Defeating MBA-based Obfuscation},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS
                  2016, Vienna, Austria, October 24-28, 2016},
  pages        = {27--38},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995306.2995308},
  doi          = {10.1145/2995306.2995308},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/EyrollesGV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/IbrahimB16,
  author       = {Amjad Ibrahim and
                  Sebastian Banescu},
  editor       = {Brecht Wyseur and
                  Bjorn De Sutter},
  title        = {StIns4CS: {A} State Inspection Tool for C{\#}},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS
                  2016, Vienna, Austria, October 24-28, 2016},
  pages        = {61--71},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995306.2995313},
  doi          = {10.1145/2995306.2995313},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/IbrahimB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/McMillionS16,
  author       = {Brendan McMillion and
                  Nick Sullivan},
  editor       = {Brecht Wyseur and
                  Bjorn De Sutter},
  title        = {Attacking White-Box {AES} Constructions},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS
                  2016, Vienna, Austria, October 24-28, 2016},
  pages        = {85--90},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995306.2995314},
  doi          = {10.1145/2995306.2995314},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/McMillionS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MunaiahM16,
  author       = {Nuthan Munaiah and
                  Andrew Meneely},
  editor       = {Brecht Wyseur and
                  Bjorn De Sutter},
  title        = {Beyond the Attack Surface: Assessing Security Risk with Random Walks
                  on Call Graphs},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS
                  2016, Vienna, Austria, October 24-28, 2016},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995306.2995311},
  doi          = {10.1145/2995306.2995311},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MunaiahM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Schunter16,
  author       = {Matthias Schunter},
  editor       = {Brecht Wyseur and
                  Bjorn De Sutter},
  title        = {Intel Software Guard Extensions: Introduction and Open Research Challenges},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS
                  2016, Vienna, Austria, October 24-28, 2016},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995306.2995307},
  doi          = {10.1145/2995306.2995307},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Schunter16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SutterBCFZWD16,
  author       = {Bjorn De Sutter and
                  Cataldo Basile and
                  Mariano Ceccato and
                  Paolo Falcarin and
                  Michael Zunke and
                  Brecht Wyseur and
                  J{\'{e}}r{\^{o}}me d'Annoville},
  editor       = {Brecht Wyseur and
                  Bjorn De Sutter},
  title        = {The {ASPIRE} Framework for Software Protection},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS
                  2016, Vienna, Austria, October 24-28, 2016},
  pages        = {91--92},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995306.2995316},
  doi          = {10.1145/2995306.2995316},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SutterBCFZWD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ViticchieBACAC16,
  author       = {Alessio Viticchi{\'{e}} and
                  Cataldo Basile and
                  Andrea Avancini and
                  Mariano Ceccato and
                  Bert Abrath and
                  Bart Coppens},
  editor       = {Brecht Wyseur and
                  Bjorn De Sutter},
  title        = {Reactive Attestation: Automatic Detection and Reaction to Software
                  Tampering Attacks},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS
                  2016, Vienna, Austria, October 24-28, 2016},
  pages        = {73--84},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995306.2995315},
  doi          = {10.1145/2995306.2995315},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ViticchieBACAC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016spro,
  editor       = {Brecht Wyseur and
                  Bjorn De Sutter},
  title        = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS
                  2016, Vienna, Austria, October 24-28, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995306},
  doi          = {10.1145/2995306},
  isbn         = {978-1-4503-4576-7},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2016spro.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics