Saumya K Debray

  • 2280 Citations
  • 25 h-Index
1984 …2017

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

Semantics Engineering & Materials Science
Malware Engineering & Materials Science
Computer programming languages Engineering & Materials Science
Logic Programs Mathematics
Logic programming Engineering & Materials Science
Data storage equipment Engineering & Materials Science
Optimization Mathematics
Reverse engineering Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1984 2017

  • 2280 Citations
  • 25 h-Index
  • 66 Conference contribution
  • 38 Article

Analysis oF exception-based control transfers

Yadegari, B., Stephens, J. & Debray, S. Mar 22 2017 CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 205-216 12 p.

Research output: ResearchConference contribution

Dynamic analysis

Control dependencies in interpretive systems

Yadegari, B. & Debray, S. 2017 Runtime Verification - 17th International Conference, RV 2017, Proceedings. Springer Verlag, Vol. 10548 LNCS, p. 312-329 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10548 LNCS)

Research output: ResearchConference contribution

Dynamic Control
Program Slicing
Algorithm Analysis
Code Generation
Reverse Engineering
25 Citations

A generic approach to automatic deobfuscation of executable code

Yadegari, B., Johannesmeyer, B., Whitely, B. & Debray, S. Jul 17 2015 Proceedings - IEEE Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers Inc., Vol. 2015-July, p. 674-691 18 p. 7163054

Research output: ResearchConference contribution

Malware
Semantics
5 Citations

Identifying and understanding self-checksumming defenses in software

Qiu, J., Yadegari, B., Johannesmeyer, B., Debray, S. & Su, X. Mar 2 2015 CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 207-218 12 p.

Research output: ResearchConference contribution

Intellectual property
Cables
Experiments
7 Citations

Symbolic execution of obfuscated code

Yadegari, B. & Debray, S. Oct 12 2015 Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 2015-October, p. 732-744 13 p.

Research output: ResearchConference contribution

Malware