Saumya K Debray

  • 2796 Citations
  • 28 h-Index
1984 …2018

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 2796 Citations
  • 28 h-Index
  • 73 Conference contribution
  • 37 Article
2018

Probabilistic Obfuscation Through Covert Channels

Stephens, J., Yadegari, B., Collberg, C. S., Debray, S. K. & Scheidegger, C. E., Jul 6 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. Institute of Electrical and Electronics Engineers Inc., p. 243-257 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations
2017

Analysis oF exception-based control transfers

Yadegari, B., Stephens, J. & Debray, S. K., Mar 22 2017, CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 205-216 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Control dependencies in interpretive systems

Yadegari, B. & Debray, S. K., 2017, Runtime Verification - 17th International Conference, RV 2017, Proceedings. Springer Verlag, Vol. 10548 LNCS. p. 312-329 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10548 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2015

A generic approach to automatic deobfuscation of executable code

Yadegari, B., Johannesmeyer, B., Whitely, B. & Debray, S. K., Jul 17 2015, Proceedings - IEEE Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers Inc., Vol. 2015-July. p. 674-691 18 p. 7163054

Research output: Chapter in Book/Report/Conference proceedingConference contribution

73 Scopus citations

Identifying and understanding self-checksumming defenses in software

Qiu, J., Yadegari, B., Johannesmeyer, B., Debray, S. K. & Su, X., Mar 2 2015, CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 207-218 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Symbolic execution of obfuscated code

Yadegari, B. & Debray, S. K., Oct 12 2015, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 2015-October. p. 732-744 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

32 Scopus citations

Unveiling metamorphism by abstract interpretation of code properties

Dalla Preda, M., Giacobazzi, R. & Debray, S. K., 2015, In : Theoretical Computer Science. 577, 1, p. 74-97 24 p.

Research output: Contribution to journalArticle

5 Scopus citations
2014

A framework for understanding dynamic anti-analysis defenses

Qiu, J., Yadegari, B., Johannesmeyer, B., Debray, S. K. & Su, X., Dec 9 2014, Proceedings of the 4th Program Protection and Reverse Engineering Workshop, PPREW 2014. Association for Computing Machinery, Vol. 12-December-2014. a2

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Bit-level taint analysis

Yadegari, B. & Debray, S. K., Dec 4 2014, Proceedings - 2014 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014. Institute of Electrical and Electronics Engineers Inc., p. 255-264 10 p. 6975659

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Scopus citations
2013

A simple client-side defense against environment-dependent web-based malware

Lu, G., Chadha, K. & Debray, S. K., 2013, Proceedings of the 2013 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013. IEEE Computer Society, p. 124-131 8 p. 6703694

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Weaknesses in defenses against web-borne malware (short paper)

Lu, G. & Debray, S. K., 2013, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7967 LNCS. p. 139-149 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7967 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations
2012

Application of micro-specialization to query evaluation operators

Zhang, R., Snodgrass, R. T. & Debray, S. K., 2012, Proceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012. p. 315-321 7 p. 6313699

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Automatic simplification of obfuscated JavaScript code: A semantics-based approach

Lu, G. & Debray, S. K., 2012, Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability, SERE 2012. p. 31-40 10 p. 6258292

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Scopus citations

Automatic simplification of obfuscated JavaScript code

Lu, G., Coogan, K. & Debray, S. K., 2012, Communications in Computer and Information Science. Vol. 285 CCIS. p. 348-359 12 p. (Communications in Computer and Information Science; vol. 285 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Micro-specialization: Dynamic code specialization of database management systems

Zhang, R., Debray, S. K. & Snodgrass, R. T., 2012, Proceedings - International Symposium on Code Generation and Optimization, CGO 2012. p. 63-73 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Micro-specialization in DBMSes

Zhang, R., Snodgrass, R. T. & Debray, S. K., 2012, Proceedings - International Conference on Data Engineering. p. 690-701 12 p. 6228125

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations
2011

Deobfuscation of virtualization-obfuscated software: A semantics-based approach

Coogan, K., Lu, G. & Debray, S. K., 2011, Proceedings of the ACM Conference on Computer and Communications Security. p. 275-284 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

60 Scopus citations

Equational reasoning on x86 assembly code

Coogan, K. & Debray, S. K., 2011, Proceedings - 11th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2011. p. 75-84 10 p. 6065199

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations
2010

Modelling metamorphism by abstract interpretation

Dalla Preda, M., Giacobazzi, R., Debray, S. K., Coogan, K. & Townsend, G. M., 2010, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6337 LNCS. p. 218-235 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6337 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Scopus citations

Reverse engineering self-modifying code: Unpacker extraction

Debray, S. K. & Patel, J., 2010, Proceedings - Working Conference on Reverse Engineering, WCRE. p. 131-140 10 p. 5645447

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Scopus citations
2009

Automatic static unpacking of malware binaries

Coogan, K., Debray, S. K., Kaochar, T. & Townsend, G., 2009, Proceedings - Working Conference on Reverse Engineering, WCRE. p. 167-176 10 p. 5328814

Research output: Chapter in Book/Report/Conference proceedingConference contribution

34 Scopus citations

Static detection of disassembly errors

Krishnamoorthy, N., Debray, S. K. & Fligg, K., 2009, Proceedings - Working Conference on Reverse Engineering, WCRE. p. 259-268 10 p. 5328781

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations
2008

A semantics-based approach to malware detection

Preda, M. D., Christodorescu, M., Jha, S. & Debray, S. K., Aug 1 2008, In : ACM Transactions on Programming Languages and Systems. 30, 5, 25.

Research output: Contribution to journalArticle

64 Scopus citations
2007

A semantics-based approach to malware detection

Preda, M. D., Christodorescu, M., Jha, S. & Debray, S. K., 2007, Conference Record of the Annual ACM Symposium on Principles of Programming Languages. p. 377-388 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

77 Scopus citations

A semantics-based approach to malware detection

Dalla Preda, M., Christodorescu, M., Jha, S. & Debray, S. K., Jan 2007, In : ACM SIGPLAN Notices. 42, 1, p. 376-388 13 p.

Research output: Contribution to journalArticle

16 Scopus citations

Code compaction of an operating system kernel

He, H., Trimble, J., Perianayagam, S., Debray, S. K. & Andrews, G., 2007, International Symposium on Code Generation and Optimization, CGO 2007. p. 283-295 13 p. 4145122

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

The revenge of the overlay: Automatic compaction of OS kernel code via on-demand code loading

He, H., Debray, S. K. & Andrews, G. R., 2007, EMSOFT'07: Proceedings of the Seventh ACM and IEEE International Conference on Embedded Software. p. 75-83 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations
2005

Code compression

Debray, S. K., 2005, Lecture Notes in Computer Science. Hermenegildo, M. & Cabeza, D. (eds.). Vol. 3350. p. 5-6 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Deobfuscation reverse engineering obfuscated code

Udupa, S. K., Debray, S. K. & Madou, M., 2005, Proceedings - Working Conference on Reverse Engineering, WCRE. Vol. 2005. p. 45-56 12 p. 1566145

Research output: Chapter in Book/Report/Conference proceedingConference contribution

115 Scopus citations

Editorial: Programming languages track

Jo, C. H., Mernik, M., Bryant, B. R., Ancona, M., Auguston, M., Cheung, S. C., Debray, S. K., Doh, K. G., Gabbrielli, M., Harris, T., Heering, J., Jeffery, C., Johnstone, A., Leung, H. F., Lins, R. D., Logozzo, F., Martínez López, P. E., Meijer, E., Michaelson, G., Pareja-Flores, C. & 4 others, Saraiva, J., Sloane, T., Wile, D. & Winkler, J., 2005, In : Unknown Journal. 2, p. 1383-1384 2 p.

Research output: Contribution to journalArticle

Increasing undergraduate involvement in computer science research

Collberg, C. S., Debray, S. K., Kobourov, S. G. & Westbrook, D. S., 2005, 8th IFIP World Conference on Computers in Education, WCCE 2005. Emerald Group Publishing Ltd.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software protection through dynamic code mutation

Madou, M., Anckaert, B., Moseley, P., Debray, S. K., De Sutter, B. & De Bosschere, K., 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3786 LNCS. p. 194-206 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3786 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

38 Scopus citations

Unpredication, unscheduling, unspeculation: Reverse engineering itanium executables

Snavely, N., Debray, S. K. & Andrews, G. R., Feb 2005, In : IEEE Transactions on Software Engineering. 31, 2, p. 99-115 17 p.

Research output: Contribution to journalArticle

2 Scopus citations

Visualizing the behavior of dynamically modifiable code

Dux, B., Iyer, A., Debray, S. K., Forrester, D. & Kobourov, S. G., 2005, Proceedings - IEEE Workshop on Program Comprehension. Cordy, J. R., Gall, H. & Maletic, J. I. (eds.). p. 337-340 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations
2004

Dynamic path-based software watermarking

Collberg, C. S., Carter, E., Debray, S. K., Huntwork, A. & Stepp, M., 2004, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). Association for Computing Machinery (ACM), Vol. 1. p. 107-118 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

70 Scopus citations

Dynamic path-based software watermarking

Collberg, C. S., Carter, E., Debray, S. K., Huntwork, A., Kececioglu, J. D., Linn, C. & Stepp, M., Jun 2004, In : ACM SIGPLAN Notices. 39, 6, p. 107-118 12 p.

Research output: Contribution to journalArticle

39 Scopus citations

Writing efficient programs: Performance issues in an undergraduate CS curriculum

Debray, S. K., 2004, Proceedings of the SIGCSE Technical Symposium on Computer Science Education. p. 275-279 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Writing efficient programs performance issues in an undergraduate CS curriculum

Debray, S. K., Mar 2004, SIGCSE Bulletin (Association for Computing Machinery, Special Interest Group on Computer Science Education). 1 ed. Vol. 36. p. 275-279 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations
2003

Checking program profiles

Moseley, P., Debray, S. K. & Andrews, G., 2003, Proceedings - 3rd IEEE International Workshop on Source Code Analysis and Manipulation, SCAM 2003. Institute of Electrical and Electronics Engineers Inc., p. 193-202 10 p. 1238045

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Cold code decompression at runtime

Debray, S. K. & Evans, W. S., Aug 2003, In : Communications of the ACM. 46, 8, p. 54-60 7 p.

Research output: Contribution to journalArticle

5 Scopus citations

Load redundancy elimination on executable code

Fernández, M., Espasa, R. & Debray, S. K., Aug 2003, In : Concurrency Computation Practice and Experience. 15, 10, p. 979-997 19 p.

Research output: Contribution to journalArticle

1 Scopus citations

Obfuscation of executable code to improve resistance to static disassembly

Linn, C. & Debray, S. K., 2003, Proceedings of the ACM Conference on Computer and Communications Security. Atluri, V. & Liu, P. (eds.). p. 290-299 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

406 Scopus citations

Unscheduling, unpredication, unspeculation: Reverse engineering Itanium executables

Snavely, N., Debray, S. K. & Andrews, G., 2003, Proceedings - Working Conference on Reverse Engineering, WCRE. IEEE Computer Society, Vol. 2003-January. p. 4-13 10 p. 1287232

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations
2002

Disassembly of executable code revisited

Schwarz, B., Debray, S. K. & Andrews, G., 2002, Proceedings - Working Conference on Reverse Engineering, WCRE. IEEE Computer Society, Vol. 2002-January. p. 45-54 10 p. 1173063

Research output: Chapter in Book/Report/Conference proceedingConference contribution

121 Scopus citations

Making compiler design relevant for students who will (most likely) never design a compiler

Debray, S. K., 2002, SIGCSE Bulletin (Association for Computing Machinery, Special Interest Group on Computer Science Education). p. 341-345 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Scopus citations

Profile-directed optimization of event-based programs

Rajagopalan, M., Debray, S. K., Hiltunen, M. A. & Schlichting, R. D., 2002, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). p. 106-116 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Scopus citations

Profile-guided code compression

Debray, S. K. & Evans, W., 2002, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). p. 95-105 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

69 Scopus citations
2001

alto: a link-time optimizer for the Compaq Alpha

Muth, R., Debray, S. K., Watterson, S. & De Bosschere, K., Jan 2001, In : Software - Practice and Experience. 31, 1, p. 67-101 35 p.

Research output: Contribution to journalArticle

73 Scopus citations

Combining global code and data compaction

De Sutter, B., De Bus, B., De Bosschere, K. & Debray, S. K., Aug 1 2001, Proceedings of the 2001 ACM SIGPLAN Workshop on Optimization of Middleware and Distributed Systems, OM 2001. Association for Computing Machinery, Inc, p. 39-47 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Combining global code and data compaction

De Sutter, B., De Bus, B., De Bosschere, K. & Debray, S. K., Aug 1 2001, Proceedings of the 2001 ACM SIGPLAN Workshop on Optimization of Middleware and Distributed Systems, OM 2001. Association for Computing Machinery, Inc, p. 29-38 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution