Saumya K Debray

  • 2691 Citations
  • 27 h-Index
1984 …2018
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Dive into the research topics where Saumya K Debray is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Logic programming Engineering & Materials Science
Computer programming languages Engineering & Materials Science
Semantics Engineering & Materials Science
Logic Programs Mathematics
Data flow analysis Engineering & Materials Science
Reverse engineering Engineering & Materials Science
Prolog Mathematics
Compaction Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1984 2018

  • 2691 Citations
  • 27 h-Index
  • 73 Conference contribution
  • 37 Article
2 Citations (Scopus)

Probabilistic Obfuscation Through Covert Channels

Stephens, J., Yadegari, B., Collberg, C. S., Debray, S. K. & Scheidegger, C. E., Jul 6 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. Institute of Electrical and Electronics Engineers Inc., p. 243-257 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Engines
3 Citations (Scopus)

Analysis oF exception-based control transfers

Yadegari, B., Stephens, J. & Debray, S. K., Mar 22 2017, CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 205-216 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynamic analysis

Control dependencies in interpretive systems

Yadegari, B. & Debray, S. K., 2017, Runtime Verification - 17th International Conference, RV 2017, Proceedings. Springer Verlag, Vol. 10548 LNCS. p. 312-329 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10548 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynamic Control
Program Slicing
Algorithm Analysis
Code Generation
Reverse Engineering
58 Citations (Scopus)

A generic approach to automatic deobfuscation of executable code

Yadegari, B., Johannesmeyer, B., Whitely, B. & Debray, S. K., Jul 17 2015, Proceedings - IEEE Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers Inc., Vol. 2015-July. p. 674-691 18 p. 7163054

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Semantics
Malware
8 Citations (Scopus)

Identifying and understanding self-checksumming defenses in software

Qiu, J., Yadegari, B., Johannesmeyer, B., Debray, S. K. & Su, X., Mar 2 2015, CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 207-218 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intellectual property
Cables
Experiments