Saumya K Debray

  • 2796 Citations
  • 28 h-Index
1984 …2018

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Saumya K Debray is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

  • 2796 Citations
  • 28 h-Index
  • 73 Conference contribution
  • 37 Article

Probabilistic Obfuscation Through Covert Channels

Stephens, J., Yadegari, B., Collberg, C. S., Debray, S. K. & Scheidegger, C. E., Jul 6 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. Institute of Electrical and Electronics Engineers Inc., p. 243-257 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 4 Scopus citations

    Analysis oF exception-based control transfers

    Yadegari, B., Stephens, J. & Debray, S. K., Mar 22 2017, CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 205-216 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 4 Scopus citations

    Control dependencies in interpretive systems

    Yadegari, B. & Debray, S. K., 2017, Runtime Verification - 17th International Conference, RV 2017, Proceedings. Springer Verlag, Vol. 10548 LNCS. p. 312-329 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10548 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A generic approach to automatic deobfuscation of executable code

    Yadegari, B., Johannesmeyer, B., Whitely, B. & Debray, S. K., Jul 17 2015, Proceedings - IEEE Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers Inc., Vol. 2015-July. p. 674-691 18 p. 7163054

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 73 Scopus citations

    Identifying and understanding self-checksumming defenses in software

    Qiu, J., Yadegari, B., Johannesmeyer, B., Debray, S. K. & Su, X., Mar 2 2015, CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 207-218 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 10 Scopus citations