Saumya K Debray

  • 2040 Citations
  • 23 h-Index
1984 …2018

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2018

Probabilistic Obfuscation Through Covert Channels

Stephens, J., Yadegari, B., Collberg, C. S., Debray, S. K. & Scheidegger, C. E., Jul 6 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. Institute of Electrical and Electronics Engineers Inc., p. 243-257 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations
2017

Analysis oF exception-based control transfers

Yadegari, B., Stephens, J. & Debray, S. K., Mar 22 2017, CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 205-216 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Control dependencies in interpretive systems

Yadegari, B. & Debray, S. K., 2017, Runtime Verification - 17th International Conference, RV 2017, Proceedings. Springer Verlag, Vol. 10548 LNCS. p. 312-329 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10548 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2015

A generic approach to automatic deobfuscation of executable code

Yadegari, B., Johannesmeyer, B., Whitely, B. & Debray, S. K., Jul 17 2015, Proceedings - IEEE Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers Inc., Vol. 2015-July. p. 674-691 18 p. 7163054

Research output: Chapter in Book/Report/Conference proceedingConference contribution

73 Scopus citations

Identifying and understanding self-checksumming defenses in software

Qiu, J., Yadegari, B., Johannesmeyer, B., Debray, S. & Su, X., Mar 2 2015, CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 207-218 12 p. (CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Symbolic execution of obfuscated code

Yadegari, B. & Debray, S. K., Oct 12 2015, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 2015-October. p. 732-744 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

32 Scopus citations
2014

A framework for understanding dynamic anti-analysis defenses

Qiu, J., Yadegari, B., Johannesmeyer, B., Debray, S. K. & Su, X., Dec 9 2014, Proceedings of the 4th Program Protection and Reverse Engineering Workshop, PPREW 2014. Association for Computing Machinery, Vol. 12-December-2014. a2

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Bit-level taint analysis

Yadegari, B. & Debray, S., Dec 4 2014, Proceedings - 2014 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014. Institute of Electrical and Electronics Engineers Inc., p. 255-264 10 p. 6975659. (Proceedings - 2014 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Scopus citations
2013

A simple client-side defense against environment-dependent web-based malware

Lu, G., Chadha, K. & Debray, S., Jan 1 2013, Proceedings of the 2013 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013. IEEE Computer Society, p. 124-131 8 p. 6703694. (Proceedings of the 2013 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Weaknesses in defenses against web-borne malware (short paper)

Lu, G. & Debray, S., Aug 12 2013, Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Proceedings. p. 139-149 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7967 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations
2012

Application of micro-specialization to query evaluation operators

Zhang, R., Snodgrass, R. T. & Debray, S., Nov 19 2012, Proceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012. p. 315-321 7 p. 6313699. (Proceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Automatic simplification of obfuscated JavaScript code: A semantics-based approach

Lu, G. & Debray, S., Oct 1 2012, Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability, SERE 2012. p. 31-40 10 p. 6258292. (Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability, SERE 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Scopus citations

Automatic simplification of obfuscated JavaScript code

Lu, G., Coogan, K. & Debray, S., May 22 2012, Information Systems, Technology and Management - 6th International Conference, ICISTM 2012, Proceedings. p. 348-359 12 p. (Communications in Computer and Information Science; vol. 285 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Micro-specialization: Dynamic code specialization of database management systems

Zhang, R., Debray, S. & Snodgrass, R. T., Jul 9 2012, Proceedings - International Symposium on Code Generation and Optimization, CGO 2012. p. 63-73 11 p. (Proceedings - International Symposium on Code Generation and Optimization, CGO 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations
2011

Deobfuscation of virtualization-obfuscated software: A semantics-based approach

Coogan, K., Lu, G. & Debray, S., Nov 14 2011, CCS'11 - Proceedings of the 18th ACM Conference on Computer and Communications Security. p. 275-284 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

60 Scopus citations

Equational reasoning on x86 assembly code

Coogan, K. & Debray, S., Nov 29 2011, Proceedings - 11th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2011. p. 75-84 10 p. 6065199. (Proceedings - 11th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations
2010

Modelling metamorphism by abstract interpretation

Dalla Preda, M., Giacobazzi, R., Debray, S., Coogan, K. & Townsend, G. M., Nov 12 2010, Static Analysis - 17th International Symposium, SAS 2010, Proceedings. p. 218-235 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6337 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Scopus citations

Reverse engineering self-modifying code: Unpacker extraction

Debray, S. & Patel, J., Dec 1 2010, Proceedings - 17th Working Conference on Reverse Engineering, WCRE 2010. p. 131-140 10 p. 5645447. (Proceedings - Working Conference on Reverse Engineering, WCRE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Scopus citations
2009

Automatic static unpacking of malware binaries

Coogan, K., Debray, S., Kaochar, T. & Townsend, G., Dec 1 2009, Proceedings - 16th Working Conference on Reverse Engineering, WCRE 2009. p. 167-176 10 p. 5328814. (Proceedings - Working Conference on Reverse Engineering, WCRE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

34 Scopus citations

Static detection of disassembly errors

Krishnamoorthy, N., Debray, S. & Fligg, K., Dec 1 2009, Proceedings - 16th Working Conference on Reverse Engineering, WCRE 2009. p. 259-268 10 p. 5328781. (Proceedings - Working Conference on Reverse Engineering, WCRE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations
2007

A semantics-based approach to malware detection

Preda, M. D., Christodorescu, M., Jha, S. & Debray, S., Sep 3 2007, Conference Record of POPL 2007: The 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages - Papers Presented at the Symposium. p. 377-388 12 p. (Conference Record of the Annual ACM Symposium on Principles of Programming Languages).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

77 Scopus citations

Code compaction of an operating system kernel

He, H., Trimble, J., Perianayagam, S., Debray, S. & Andrews, G., Aug 13 2007, International Symposium on Code Generation and Optimization, CGO 2007. p. 283-295 13 p. 4145122. (International Symposium on Code Generation and Optimization, CGO 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

The revenge of the overlay: Automatic compaction of OS kernel code via on-demand code loading

He, H., Debray, S. K. & Andrews, G. R., Dec 1 2007, EMSOFT'07: Proceedings of the Seventh ACM and IEEE International Conference on Embedded Software. p. 75-83 9 p. (EMSOFT'07: Proceedings of the Seventh ACM and IEEE International Conference on Embedded Software).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations
2005

Deobfuscation reverse engineering obfuscated code

Udupa, S. K., Debray, S. K. & Madou, M., Dec 1 2005, WCRE: 12th Working Conference on Reverse Engineering 2005. p. 45-56 12 p. 1566145. (Proceedings - Working Conference on Reverse Engineering, WCRE; vol. 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

115 Scopus citations

Increasing undergraduate involvement in computer science research

Collberg, C., Debray, S., Kobourov, S. & Westbrook, S., Jan 1 2005, 8th IFIP World Conference on Computers in Education, WCCE 2005. Emerald Group Publishing Ltd., (8th IFIP World Conference on Computers in Education, WCCE 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software protection through dynamic code mutation

Madou, M., Anckaert, B., Moseley, P., Debray, S., De Sutter, B. & De Bosschere, K., Dec 1 2005, Information Security Applications - 6th International Workshop, WISA 2005, Revised Selected Papers. p. 194-206 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3786 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

38 Scopus citations
2004

Writing efficient programs: Performance issues in an undergraduate CS curriculum

Debray, S., Jun 14 2004, Proceedings of the Thirty-Fifth SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2004. p. 275-279 5 p. (Proceedings of the SIGCSE Technical Symposium on Computer Science Education).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2003

Checking program profiles

Moseley, P., Debray, S. K. & Andrews, G., 2003, Proceedings - 3rd IEEE International Workshop on Source Code Analysis and Manipulation, SCAM 2003. Institute of Electrical and Electronics Engineers Inc., p. 193-202 10 p. 1238045

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Unscheduling, unpredication, unspeculation: Reverse engineering Itanium executables

Snavely, N., Debray, S. K. & Andrews, G., 2003, Proceedings - Working Conference on Reverse Engineering, WCRE. IEEE Computer Society, Vol. 2003-January. p. 4-13 10 p. 1287232

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations
2002

Disassembly of executable code revisited

Schwarz, B., Debray, S. & Andrews, G., Jan 1 2002, Proceedings - 9th Working Conference on Reverse Engineering, WCRE 2002. Burd, E. & van Deursen, A. (eds.). IEEE Computer Society, p. 45-54 10 p. 1173063. (Proceedings - Working Conference on Reverse Engineering, WCRE; vol. 2002-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

121 Scopus citations
2001

Combining global code and data compaction

De Sutter, B., De Bus, B., De Bosschere, K. & Debray, S. K., Aug 1 2001, Proceedings of the 2001 ACM SIGPLAN Workshop on Optimization of Middleware and Distributed Systems, OM 2001. Association for Computing Machinery, Inc, p. 39-47 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Combining global code and data compaction

De Sutter, B., De Bus, B., De Bosschere, K. & Debray, S. K., Aug 1 2001, Proceedings of the 2001 ACM SIGPLAN Workshop on Optimization of Middleware and Distributed Systems, OM 2001. Association for Computing Machinery, Inc, p. 29-38 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Combining global code and data compaction

De Sutter, B., De Bus, B., De Bosschere, K. & Debray, S. K., Aug 1 2001, LCTES 2001 - Proceedings of the ACM SIGPLAN Workshop on Languages, Compilers and Tools for Embedded Systems. Association for Computing Machinery, Inc, p. 29-38 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Goal-directed value Profiling

Watterson, S. & Debray, S., Jan 1 2001, Compiler Construction - 10th International Conference, CC 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2001, Proceedings. Wilhelm, R. (ed.). Springer-Verlag, p. 319-333 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2027).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Load redundancy elimination on executable code

Fernández, M., Espasa, R. & Debray, S. K., 2001, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2150. p. 221-229 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2150).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations
2000

Code specialization based on value profiles

Muth, R., Watterson, S. & Debray, S., Jan 1 2000, Static Analysis - 7th International Symposium, SAS 2000, Proceedings. Springer-Verlag, p. 340-361 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1824 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

21 Scopus citations

Constraint-based termination analysis for cyclic active database rules

Debray, S. & Hickey, T., Jan 1 2000, Computational Logic - CL 2000 - 1st International Conference, Proceedings. Dahl, V., Furbach, U., Kerber, M., Palamidessi, C., Stuckey, P. J., Pereira, L. M., Sagiv, Y., Lloyd, J. & Lau, K-K. (eds.). Springer-Verlag, p. 1121-1136 16 p. (Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science); vol. 1861).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations
1999

Link-time improvement of scheme programs

Debray, S. K., Muth, R. & Watterson, S., 1999, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1575. p. 76-91 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1575).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1997

On the complexity of function pointer may-alias analysis

Muth, R. & Debray, S. K., 1997, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1214. p. 381-392 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1214).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Resource-bounded partial evaluation

Debray, S., Jan 1 1997, Proceedings of the 1997 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation, PEPM 1997. Association for Computing Machinery, p. 179-192 14 p. (Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations
1995

Abstract interpretation and low-level code optimization

Debray, S., Jun 23 1995, Proceedings of the 1995 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation, PEPM 1995. Association for Computing Machinery, p. 111-121 11 p. (Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation; vol. Part F129370).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations
1994

Call forwarding: a simple interprocedural optimization technique for dynamically typed languages

De Bosschere, K., Debray, S., Gudeman, D. & Kannan, S., Jan 1 1994, Conference Record of the Annual ACM Symposium on Principles of Programming Languages. Publ by ACM, p. 409-420 12 p. (Conference Record of the Annual ACM Symposium on Principles of Programming Languages).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Estimating the computational cost of logic programs

Debray, S. K., López Garćia, P., Hermenegildo, M. & Lin, N. W., Jan 1 1994, Static Analysis - 1st International Static Analysis Symposium, SAS '94, Proceedings. Le Charlier, B. (ed.). Springer-Verlag, p. 255-265 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 864 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

22 Scopus citations
1993

Compositional analysis of modular logic programs

Codish, M., Debray, S. K. & Giacobazzi, R., Jan 1 1993, Conference Record of the Annual ACM Symposium on Principles of Programming Languages. Publ by ACM, p. 451-464 14 p. (Conference Record of the Annual ACM Symposium on Principles of Programming Languages).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

36 Scopus citations
1992

Compiler optimizations for low-level redundancy elimination: An application of meta-level Prolog primitives

Debray, S. K., 1992, Meta-Programming in Logic - 3rd International Workshop, META-1992, Proceedings. Springer Verlag, Vol. 649 LNCS. p. 120-134 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 649 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

On the complexity of dataflow analysis of logic programs

Debray, S. K., 1992, Automata, Languages and Programming - 19th International Colloquium, Proceedings. Springer Verlag, Vol. 623 LNCS. p. 509-520 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 623 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations
1990

Static estimation of query sizes in horn programs

Debray, S. K. & Lin, N. W., 1990, ICDT 1990 - 3rd International Conference on Database Theory, Proceedings. Springer Verlag, Vol. 470 LNCS. p. 514-528 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 470 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Task granularity analysis in logic programs

Debray, S. K., Lin, N. W. & Hermenegildo, M., Jun 1 1990, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). Association for Computing Machinery, Vol. 20-22-June-1990. p. 174-188 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Scopus citations
1988

Efficient dataflow analysis of logic programs

Debray, S. K., Jan 13 1988, Proceedings of the 15th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 1988. Association for Computing Machinery, Vol. Part F130193. p. 260-273 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Unfold/fold transformations and loop optimization of logic programs

Debray, S. K., Jun 1 1988, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). Association for Computing Machinery, Vol. 20-24-June-1988. p. 297-307 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Scopus citations