Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/popl/pprew2014.bht:"
@inproceedings{DBLP:conf/popl/DangerGP14, author = {Jean{-}Luc Danger and Sylvain Guilley and Florian Praden}, editor = {Suresh Jagannathan and Peter Sewell}, title = {Hardware-enforced Protection against Software Reverse-Engineering based on an Instruction Set Encoding}, booktitle = {Proceedings of the 3rd {ACM} {SIGPLAN} Program Protection and Reverse Engineering Workshop 2014, {PPREW} 2014, January 25, 2014, San Diego, CA, {USA}}, pages = {5:1--5:11}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2556464.2556469}, doi = {10.1145/2556464.2556469}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/DangerGP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/DeshotelsNL14, author = {Luke Deshotels and Vivek Notani and Arun Lakhotia}, editor = {Suresh Jagannathan and Peter Sewell}, title = {DroidLegacy: Automated Familial Classification of Android Malware}, booktitle = {Proceedings of the 3rd {ACM} {SIGPLAN} Program Protection and Reverse Engineering Workshop 2014, {PPREW} 2014, January 25, 2014, San Diego, CA, {USA}}, pages = {3:1--3:12}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2556464.2556467}, doi = {10.1145/2556464.2556467}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/popl/DeshotelsNL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/JinCGHCGHN14, author = {Wesley Jin and Cory F. Cohen and Jeffrey Gennari and Charles Hines and Sagar Chaki and Arie Gurfinkel and Jeffrey Havrilla and Priya Narasimhan}, editor = {Suresh Jagannathan and Peter Sewell}, title = {Recovering {C++} Objects From Binaries Using Inter-Procedural Data-Flow Analysis}, booktitle = {Proceedings of the 3rd {ACM} {SIGPLAN} Program Protection and Reverse Engineering Workshop 2014, {PPREW} 2014, January 25, 2014, San Diego, CA, {USA}}, pages = {1:1--1:11}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2556464.2556465}, doi = {10.1145/2556464.2556465}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/JinCGHCGHN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/PredaMG14, author = {Mila Dalla Preda and Isabella Mastroeni and Roberto Giacobazzi}, editor = {Suresh Jagannathan and Peter Sewell}, title = {Analyzing program dependencies for malware detection}, booktitle = {Proceedings of the 3rd {ACM} {SIGPLAN} Program Protection and Reverse Engineering Workshop 2014, {PPREW} 2014, January 25, 2014, San Diego, CA, {USA}}, pages = {6:1--6:7}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2556464.2556470}, doi = {10.1145/2556464.2556470}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/PredaMG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/RauzyG14, author = {Pablo Rauzy and Sylvain Guilley}, editor = {Suresh Jagannathan and Peter Sewell}, title = {Formal Analysis of {CRT-RSA} Vigilant's Countermeasure Against the BellCoRe Attack: {A} Pledge for Formal Methods in the Field of Implementation Security}, booktitle = {Proceedings of the 3rd {ACM} {SIGPLAN} Program Protection and Reverse Engineering Workshop 2014, {PPREW} 2014, January 25, 2014, San Diego, CA, {USA}}, pages = {2:1--2:10}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2556464.2556466}, doi = {10.1145/2556464.2556466}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/RauzyG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/SimonK14, author = {Axel Simon and Julian Kranz}, editor = {Suresh Jagannathan and Peter Sewell}, title = {The {GDSL} toolkit: Generating Frontends for the Analysis of Machine Code}, booktitle = {Proceedings of the 3rd {ACM} {SIGPLAN} Program Protection and Reverse Engineering Workshop 2014, {PPREW} 2014, January 25, 2014, San Diego, CA, {USA}}, pages = {7:1--7:6}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2556464.2559596}, doi = {10.1145/2556464.2559596}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/SimonK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/WangFLACG14, author = {Huaijun Wang and Dingyi Fang and Guanghui Li and Na An and Xiaojiang Chen and Yuanxiang Gu}, editor = {Suresh Jagannathan and Peter Sewell}, title = {{TDVMP:} Improved Virtual Machine-Based Software Protection with Time Diversity}, booktitle = {Proceedings of the 3rd {ACM} {SIGPLAN} Program Protection and Reverse Engineering Workshop 2014, {PPREW} 2014, January 25, 2014, San Diego, CA, {USA}}, pages = {4:1--4:9}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2556464.2556468}, doi = {10.1145/2556464.2556468}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/WangFLACG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/popl/2014pprew, editor = {Suresh Jagannathan and Peter Sewell}, title = {Proceedings of the 3rd {ACM} {SIGPLAN} Program Protection and Reverse Engineering Workshop 2014, {PPREW} 2014, January 25, 2014, San Diego, CA, {USA}}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2556464}, isbn = {978-1-4503-2649-0}, timestamp = {Mon, 18 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/popl/2014pprew.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.