Saumya K Debray

  • 2956 Citations
  • 30 h-Index
1984 …2018

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Saumya K Debray is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

Probabilistic Obfuscation Through Covert Channels

Stephens, J., Yadegari, B., Collberg, C. S., Debray, S. K. & Scheidegger, C. E., Jul 6 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. Institute of Electrical and Electronics Engineers Inc., p. 243-257 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 4 Scopus citations

    Analysis oF exception-based control transfers

    Yadegari, B., Stephens, J. & Debray, S. K., Mar 22 2017, CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 205-216 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 5 Scopus citations

    Control dependencies in interpretive systems

    Yadegari, B. & Debray, S. K., 2017, Runtime Verification - 17th International Conference, RV 2017, Proceedings. Springer Verlag, Vol. 10548 LNCS. p. 312-329 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10548 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A generic approach to automatic deobfuscation of executable code

    Yadegari, B., Johannesmeyer, B., Whitely, B. & Debray, S., Jul 17 2015, Proceedings - 2015 IEEE Symposium on Security and Privacy, SP 2015. Institute of Electrical and Electronics Engineers Inc., p. 674-691 18 p. 7163054. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2015-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 76 Scopus citations

    Identifying and understanding self-checksumming defenses in software

    Qiu, J., Yadegari, B., Johannesmeyer, B., Debray, S. & Su, X., Mar 2 2015, CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 207-218 12 p. (CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 10 Scopus citations