Saumya K Debray

  • 2791 Citations
  • 28 h-Index
1984 …2018
If you made any changes in Pure, your changes will be visible here soon.

Research Output 1984 2018

  • 2791 Citations
  • 28 h-Index
  • 73 Conference contribution
  • 37 Article
2018
4 Citations (Scopus)

Probabilistic Obfuscation Through Covert Channels

Stephens, J., Yadegari, B., Collberg, C. S., Debray, S. K. & Scheidegger, C. E., Jul 6 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. Institute of Electrical and Electronics Engineers Inc., p. 243-257 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Engines
2017
3 Citations (Scopus)

Analysis oF exception-based control transfers

Yadegari, B., Stephens, J. & Debray, S. K., Mar 22 2017, CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 205-216 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynamic analysis

Control dependencies in interpretive systems

Yadegari, B. & Debray, S. K., 2017, Runtime Verification - 17th International Conference, RV 2017, Proceedings. Springer Verlag, Vol. 10548 LNCS. p. 312-329 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10548 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynamic Control
Program Slicing
Algorithm Analysis
Code Generation
Reverse Engineering
2015
73 Citations (Scopus)

A generic approach to automatic deobfuscation of executable code

Yadegari, B., Johannesmeyer, B., Whitely, B. & Debray, S. K., Jul 17 2015, Proceedings - IEEE Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers Inc., Vol. 2015-July. p. 674-691 18 p. 7163054

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Semantics
Malware
10 Citations (Scopus)

Identifying and understanding self-checksumming defenses in software

Qiu, J., Yadegari, B., Johannesmeyer, B., Debray, S. K. & Su, X., Mar 2 2015, CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 207-218 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intellectual property
Cables
Experiments
32 Citations (Scopus)

Symbolic execution of obfuscated code

Yadegari, B. & Debray, S. K., Oct 12 2015, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 2015-October. p. 732-744 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
5 Citations (Scopus)

Unveiling metamorphism by abstract interpretation of code properties

Dalla Preda, M., Giacobazzi, R. & Debray, S. K., 2015, In : Theoretical Computer Science. 577, 1, p. 74-97 24 p.

Research output: Contribution to journalArticle

Abstract Interpretation
Semantics
Signature
Diversification
Finite automata
2014
5 Citations (Scopus)

A framework for understanding dynamic anti-analysis defenses

Qiu, J., Yadegari, B., Johannesmeyer, B., Debray, S. K. & Su, X., Dec 9 2014, Proceedings of the 4th Program Protection and Reverse Engineering Workshop, PPREW 2014. Association for Computing Machinery, Vol. 12-December-2014. a2

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
15 Citations (Scopus)

Bit-level taint analysis

Yadegari, B. & Debray, S. K., Dec 4 2014, Proceedings - 2014 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014. Institute of Electrical and Electronics Engineers Inc., p. 255-264 10 p. 6975659

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments
2013

A simple client-side defense against environment-dependent web-based malware

Lu, G., Chadha, K. & Debray, S. K., 2013, Proceedings of the 2013 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013. IEEE Computer Society, p. 124-131 8 p. 6703694

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detectors
Malware
Experiments
1 Citation (Scopus)

Weaknesses in defenses against web-borne malware (short paper)

Lu, G. & Debray, S. K., 2013, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7967 LNCS. p. 139-149 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7967 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
JavaScript
Syntactics
Security systems
Strings
2012
5 Citations (Scopus)

Application of micro-specialization to query evaluation operators

Zhang, R., Snodgrass, R. T. & Debray, S. K., 2012, Proceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012. p. 315-321 7 p. 6313699

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Citations (Scopus)

Automatic simplification of obfuscated JavaScript code: A semantics-based approach

Lu, G. & Debray, S. K., 2012, Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability, SERE 2012. p. 31-40 10 p. 6258292

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web browsers
Semantics
Experiments
Malware
3 Citations (Scopus)

Automatic simplification of obfuscated JavaScript code

Lu, G., Coogan, K. & Debray, S. K., 2012, Communications in Computer and Information Science. Vol. 285 CCIS. p. 348-359 12 p. (Communications in Computer and Information Science; vol. 285 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynamic analysis
Experiments
8 Citations (Scopus)

Micro-specialization: Dynamic code specialization of database management systems

Zhang, R., Debray, S. K. & Snodgrass, R. T., 2012, Proceedings - International Symposium on Code Generation and Optimization, CGO 2012. p. 63-73 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Program processors
10 Citations (Scopus)

Micro-specialization in DBMSes

Zhang, R., Snodgrass, R. T. & Debray, S. K., 2012, Proceedings - International Conference on Data Engineering. p. 690-701 12 p. 6228125

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Taxonomies
Metadata
Program processors
2011
60 Citations (Scopus)

Deobfuscation of virtualization-obfuscated software: A semantics-based approach

Coogan, K., Lu, G. & Debray, S. K., 2011, Proceedings of the ACM Conference on Computer and Communications Security. p. 275-284 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Semantics
Engineers
Static analysis
Dynamic analysis
Virtualization
7 Citations (Scopus)

Equational reasoning on x86 assembly code

Coogan, K. & Debray, S. K., 2011, Proceedings - 11th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2011. p. 75-84 10 p. 6065199

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Malware
2010
17 Citations (Scopus)

Modelling metamorphism by abstract interpretation

Dalla Preda, M., Giacobazzi, R., Debray, S. K., Coogan, K. & Townsend, G. M., 2010, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6337 LNCS. p. 218-235 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6337 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract Interpretation
Semantics
Modeling
Malware
Signature
17 Citations (Scopus)

Reverse engineering self-modifying code: Unpacker extraction

Debray, S. K. & Patel, J., 2010, Proceedings - Working Conference on Reverse Engineering, WCRE. p. 131-140 10 p. 5645447

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reverse engineering
Malware
2009
33 Citations (Scopus)

Automatic static unpacking of malware binaries

Coogan, K., Debray, S. K., Kaochar, T. & Townsend, G., 2009, Proceedings - Working Conference on Reverse Engineering, WCRE. p. 167-176 10 p. 5328814

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer viruses
Packers
Static analysis
Flow control
Malware
14 Citations (Scopus)

Static detection of disassembly errors

Krishnamoorthy, N., Debray, S. K. & Fligg, K., 2009, Proceedings - Working Conference on Reverse Engineering, WCRE. p. 259-268 10 p. 5328781

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reverse engineering
Decision trees
Learning systems
Semantics
2008
64 Citations (Scopus)

A semantics-based approach to malware detection

Preda, M. D., Christodorescu, M., Jha, S. & Debray, S. K., Aug 1 2008, In : ACM Transactions on Programming Languages and Systems. 30, 5, 25.

Research output: Contribution to journalArticle

Semantics
Detectors
Syntactics
Malware
Acoustic waves
2007
16 Citations (Scopus)

A semantics-based approach to malware detection

Dalla Preda, M., Christodorescu, M., Jha, S. & Debray, S. K., Jan 2007, In : ACM SIGPLAN Notices. 42, 1, p. 376-388 13 p.

Research output: Contribution to journalArticle

Semantics
Detectors
Syntactics
Malware
Concretes
77 Citations (Scopus)

A semantics-based approach to malware detection

Preda, M. D., Christodorescu, M., Jha, S. & Debray, S. K., 2007, Conference Record of the Annual ACM Symposium on Principles of Programming Languages. p. 377-388 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Semantics
Detectors
Syntactics
Malware
Concretes
9 Citations (Scopus)

Code compaction of an operating system kernel

He, H., Trimble, J., Perianayagam, S., Debray, S. K. & Andrews, G., 2007, International Symposium on Code Generation and Optimization, CGO 2007. p. 283-295 13 p. 4145122

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer operating systems
Flow control
Compaction
Data storage equipment
Embedded systems
6 Citations (Scopus)

The revenge of the overlay: Automatic compaction of OS kernel code via on-demand code loading

He, H., Debray, S. K. & Andrews, G. R., 2007, EMSOFT'07: Proceedings of the Seventh ACM and IEEE International Conference on Embedded Software. p. 75-83 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Compaction
Data storage equipment
Computer operating systems
Embedded systems
Computer hardware
2005

Code compression

Debray, S. K., 2005, Lecture Notes in Computer Science. Hermenegildo, M. & Cabeza, D. (eds.). Vol. 3350. p. 5-6 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

114 Citations (Scopus)

Deobfuscation reverse engineering obfuscated code

Udupa, S. K., Debray, S. K. & Madou, M., 2005, Proceedings - Working Conference on Reverse Engineering, WCRE. Vol. 2005. p. 45-56 12 p. 1566145

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reverse engineering
Software engineering
Engineers
Costs

Editorial: Programming languages track

Jo, C. H., Mernik, M., Bryant, B. R., Ancona, M., Auguston, M., Cheung, S. C., Debray, S. K., Doh, K. G., Gabbrielli, M., Harris, T., Heering, J., Jeffery, C., Johnstone, A., Leung, H. F., Lins, R. D., Logozzo, F., Martínez López, P. E., Meijer, E., Michaelson, G., Pareja-Flores, C. & 4 others, Saraiva, J., Sloane, T., Wile, D. & Winkler, J., 2005, In : Unknown Journal. 2, p. 1383-1384 2 p.

Research output: Contribution to journalArticle

Computer programming languages

Increasing undergraduate involvement in computer science research

Collberg, C. S., Debray, S. K., Kobourov, S. G. & Westbrook, D. S., 2005, 8th IFIP World Conference on Computers in Education, WCCE 2005. Emerald Group Publishing Ltd.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

computer science
Computer science
Students
student
academic career
38 Citations (Scopus)

Software protection through dynamic code mutation

Madou, M., Anckaert, B., Moseley, P., Debray, S. K., De Sutter, B. & De Bosschere, K., 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3786 LNCS. p. 194-206 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3786 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reverse engineering
Mutation
Software
Reverse Engineering
Computer crime
2 Citations (Scopus)

Unpredication, unscheduling, unspeculation: Reverse engineering itanium executables

Snavely, N., Debray, S. K. & Andrews, G. R., Feb 2005, In : IEEE Transactions on Software Engineering. 31, 2, p. 99-115 17 p.

Research output: Contribution to journalArticle

Reverse engineering
Data storage equipment
5 Citations (Scopus)

Visualizing the behavior of dynamically modifiable code

Dux, B., Iyer, A., Debray, S. K., Forrester, D. & Kobourov, S. G., 2005, Proceedings - IEEE Workshop on Program Comprehension. Cordy, J. R., Gall, H. & Maletic, J. I. (eds.). p. 337-340 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Flow graphs
2004
70 Citations (Scopus)

Dynamic path-based software watermarking

Collberg, C. S., Carter, E., Debray, S. K., Huntwork, A. & Stepp, M., 2004, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). Association for Computing Machinery (ACM), Vol. 1. p. 107-118 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watermarking
Computer crime
Semantics
Costs
39 Citations (Scopus)

Dynamic path-based software watermarking

Collberg, C. S., Carter, E., Debray, S. K., Huntwork, A., Kececioglu, J. D., Linn, C. & Stepp, M., Jun 2004, In : ACM SIGPLAN Notices. 39, 6, p. 107-118 12 p.

Research output: Contribution to journalArticle

Watermarking
Computer crime
Semantics
Costs

Writing efficient programs: Performance issues in an undergraduate CS curriculum

Debray, S. K., 2004, Proceedings of the SIGCSE Technical Symposium on Computer Science Education. p. 275-279 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Curricula
Monitoring
Tuning
2 Citations (Scopus)

Writing efficient programs performance issues in an undergraduate CS curriculum

Debray, S. K., Mar 2004, SIGCSE Bulletin (Association for Computing Machinery, Special Interest Group on Computer Science Education). 1 ed. Vol. 36. p. 275-279 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

curriculum
college students
Curriculum
Curricula
Monitoring
2003
5 Citations (Scopus)

Checking program profiles

Moseley, P., Debray, S. K. & Andrews, G., 2003, Proceedings - 3rd IEEE International Workshop on Source Code Analysis and Manipulation, SCAM 2003. Institute of Electrical and Electronics Engineers Inc., p. 193-202 10 p. 1238045

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Monitoring
5 Citations (Scopus)

Cold code decompression at runtime

Debray, S. K. & Evans, W. S., Aug 2003, In : Communications of the ACM. 46, 8, p. 54-60 7 p.

Research output: Contribution to journalArticle

Data compression
Fragment
Data Compression
Profiling
Penalty
1 Citation (Scopus)

Load redundancy elimination on executable code

Fernández, M., Espasa, R. & Debray, S. K., Aug 2003, In : Concurrency Computation Practice and Experience. 15, 10, p. 979-997 19 p.

Research output: Contribution to journalArticle

Redundancy
Elimination
Latency
Data storage equipment
Optimization
405 Citations (Scopus)

Obfuscation of executable code to improve resistance to static disassembly

Linn, C. & Debray, S. K., 2003, Proceedings of the ACM Conference on Computer and Communications Security. Atluri, V. & Liu, P. (eds.). p. 290-299 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer crime
Reverse engineering
Intellectual property
Engineers
6 Citations (Scopus)

Unscheduling, unpredication, unspeculation: Reverse engineering Itanium executables

Snavely, N., Debray, S. K. & Andrews, G., 2003, Proceedings - Working Conference on Reverse Engineering, WCRE. IEEE Computer Society, Vol. 2003-January. p. 4-13 10 p. 1287232

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reverse engineering
Data storage equipment
2002
121 Citations (Scopus)

Disassembly of executable code revisited

Schwarz, B., Debray, S. K. & Andrews, G., 2002, Proceedings - Working Conference on Reverse Engineering, WCRE. IEEE Computer Society, Vol. 2002-January. p. 45-54 10 p. 1173063

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reverse engineering
18 Citations (Scopus)

Making compiler design relevant for students who will (most likely) never design a compiler

Debray, S. K., 2002, SIGCSE Bulletin (Association for Computing Machinery, Special Interest Group on Computer Science Education). p. 341-345 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

students
Students
computer science
Curriculum
Computer science
18 Citations (Scopus)

Profile-directed optimization of event-based programs

Rajagopalan, M., Debray, S. K., Hiltunen, M. A. & Schlichting, R. D., 2002, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). p. 106-116 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Graphical user interfaces
Network protocols
69 Citations (Scopus)

Profile-guided code compression

Debray, S. K. & Evans, W., 2002, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). p. 95-105 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data compression
Data storage equipment
Application programs
Hardware
2001
73 Citations (Scopus)

alto: a link-time optimizer for the Compaq Alpha

Muth, R., Debray, S. K., Watterson, S. & De Bosschere, K., Jan 2001, In : Software - Practice and Experience. 31, 1, p. 67-101 35 p.

Research output: Contribution to journalArticle

17 Citations (Scopus)

Combining global code and data compaction

De Sutter, B., De Bus, B., De Bosschere, K. & Debray, S. K., Aug 2001, In : SIGPLAN Notices (ACM Special Interest Group on Programming Languages). 36, 8, p. 29-38 10 p.

Research output: Contribution to journalArticle

Compaction
Data storage equipment

Combining global code and data compaction

De Sutter, B., De Bus, B., De Bosschere, K. & Debray, S. K., Aug 1 2001, Proceedings of the 2001 ACM SIGPLAN Workshop on Optimization of Middleware and Distributed Systems, OM 2001. Association for Computing Machinery, Inc, p. 29-38 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Compaction
Data storage equipment