Saumya K Debray

  • 2508 Citations
  • 27 h-Index
1984 …2018
If you made any changes in Pure these will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the experts' scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

Logic programming Engineering & Materials Science
Computer programming languages Engineering & Materials Science
Semantics Engineering & Materials Science
Logic Programs Mathematics
Data flow analysis Engineering & Materials Science
Reverse engineering Engineering & Materials Science
Prolog Mathematics
Compaction Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1984 2018

  • 2508 Citations
  • 27 h-Index
  • 73 Conference contribution
  • 37 Article
1 Citations

Probabilistic Obfuscation Through Covert Channels

Stephens, J., Yadegari, B., Collberg, C., Debray, S. & Scheidegger, C., Jul 6 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. Institute of Electrical and Electronics Engineers Inc., p. 243-257 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Engines
2 Citations

Analysis oF exception-based control transfers

Yadegari, B., Stephens, J. & Debray, S. Mar 22 2017 CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 205-216 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynamic analysis

Control dependencies in interpretive systems

Yadegari, B. & Debray, S. 2017 Runtime Verification - 17th International Conference, RV 2017, Proceedings. Springer Verlag, Vol. 10548 LNCS, p. 312-329 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10548 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynamic Control
Program Slicing
Algorithm Analysis
Code Generation
Reverse Engineering
40 Citations

A generic approach to automatic deobfuscation of executable code

Yadegari, B., Johannesmeyer, B., Whitely, B. & Debray, S., Jul 17 2015, Proceedings - IEEE Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers Inc., Vol. 2015-July, p. 674-691 18 p. 7163054

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Semantics
Malware
7 Citations

Identifying and understanding self-checksumming defenses in software

Qiu, J., Yadegari, B., Johannesmeyer, B., Debray, S. & Su, X. Mar 2 2015 CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 207-218 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intellectual property
Cables
Experiments