Search dblp for Publications

export results for "toc:db/conf/popl/pprew2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/popl/DangerGP14,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Florian Praden},
  editor       = {Suresh Jagannathan and
                  Peter Sewell},
  title        = {Hardware-enforced Protection against Software Reverse-Engineering
                  based on an Instruction Set Encoding},
  booktitle    = {Proceedings of the 3rd {ACM} {SIGPLAN} Program Protection and Reverse
                  Engineering Workshop 2014, {PPREW} 2014, January 25, 2014, San Diego,
                  CA, {USA}},
  pages        = {5:1--5:11},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2556464.2556469},
  doi          = {10.1145/2556464.2556469},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/DangerGP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/DeshotelsNL14,
  author       = {Luke Deshotels and
                  Vivek Notani and
                  Arun Lakhotia},
  editor       = {Suresh Jagannathan and
                  Peter Sewell},
  title        = {DroidLegacy: Automated Familial Classification of Android Malware},
  booktitle    = {Proceedings of the 3rd {ACM} {SIGPLAN} Program Protection and Reverse
                  Engineering Workshop 2014, {PPREW} 2014, January 25, 2014, San Diego,
                  CA, {USA}},
  pages        = {3:1--3:12},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2556464.2556467},
  doi          = {10.1145/2556464.2556467},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/DeshotelsNL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/JinCGHCGHN14,
  author       = {Wesley Jin and
                  Cory F. Cohen and
                  Jeffrey Gennari and
                  Charles Hines and
                  Sagar Chaki and
                  Arie Gurfinkel and
                  Jeffrey Havrilla and
                  Priya Narasimhan},
  editor       = {Suresh Jagannathan and
                  Peter Sewell},
  title        = {Recovering {C++} Objects From Binaries Using Inter-Procedural Data-Flow
                  Analysis},
  booktitle    = {Proceedings of the 3rd {ACM} {SIGPLAN} Program Protection and Reverse
                  Engineering Workshop 2014, {PPREW} 2014, January 25, 2014, San Diego,
                  CA, {USA}},
  pages        = {1:1--1:11},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2556464.2556465},
  doi          = {10.1145/2556464.2556465},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/JinCGHCGHN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/PredaMG14,
  author       = {Mila Dalla Preda and
                  Isabella Mastroeni and
                  Roberto Giacobazzi},
  editor       = {Suresh Jagannathan and
                  Peter Sewell},
  title        = {Analyzing program dependencies for malware detection},
  booktitle    = {Proceedings of the 3rd {ACM} {SIGPLAN} Program Protection and Reverse
                  Engineering Workshop 2014, {PPREW} 2014, January 25, 2014, San Diego,
                  CA, {USA}},
  pages        = {6:1--6:7},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2556464.2556470},
  doi          = {10.1145/2556464.2556470},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/PredaMG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/RauzyG14,
  author       = {Pablo Rauzy and
                  Sylvain Guilley},
  editor       = {Suresh Jagannathan and
                  Peter Sewell},
  title        = {Formal Analysis of {CRT-RSA} Vigilant's Countermeasure Against the
                  BellCoRe Attack: {A} Pledge for Formal Methods in the Field of Implementation
                  Security},
  booktitle    = {Proceedings of the 3rd {ACM} {SIGPLAN} Program Protection and Reverse
                  Engineering Workshop 2014, {PPREW} 2014, January 25, 2014, San Diego,
                  CA, {USA}},
  pages        = {2:1--2:10},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2556464.2556466},
  doi          = {10.1145/2556464.2556466},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/RauzyG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/SimonK14,
  author       = {Axel Simon and
                  Julian Kranz},
  editor       = {Suresh Jagannathan and
                  Peter Sewell},
  title        = {The {GDSL} toolkit: Generating Frontends for the Analysis of Machine
                  Code},
  booktitle    = {Proceedings of the 3rd {ACM} {SIGPLAN} Program Protection and Reverse
                  Engineering Workshop 2014, {PPREW} 2014, January 25, 2014, San Diego,
                  CA, {USA}},
  pages        = {7:1--7:6},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2556464.2559596},
  doi          = {10.1145/2556464.2559596},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/SimonK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/WangFLACG14,
  author       = {Huaijun Wang and
                  Dingyi Fang and
                  Guanghui Li and
                  Na An and
                  Xiaojiang Chen and
                  Yuanxiang Gu},
  editor       = {Suresh Jagannathan and
                  Peter Sewell},
  title        = {{TDVMP:} Improved Virtual Machine-Based Software Protection with Time
                  Diversity},
  booktitle    = {Proceedings of the 3rd {ACM} {SIGPLAN} Program Protection and Reverse
                  Engineering Workshop 2014, {PPREW} 2014, January 25, 2014, San Diego,
                  CA, {USA}},
  pages        = {4:1--4:9},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2556464.2556468},
  doi          = {10.1145/2556464.2556468},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/WangFLACG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/popl/2014pprew,
  editor       = {Suresh Jagannathan and
                  Peter Sewell},
  title        = {Proceedings of the 3rd {ACM} {SIGPLAN} Program Protection and Reverse
                  Engineering Workshop 2014, {PPREW} 2014, January 25, 2014, San Diego,
                  CA, {USA}},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {http://dl.acm.org/citation.cfm?id=2556464},
  isbn         = {978-1-4503-2649-0},
  timestamp    = {Mon, 18 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/2014pprew.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics