Obfuscation of executable code to improve resistance to static disassembly C Linn, S Debray Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 1008 | 2003 |
Reasoning about naming systems M Bowman, SK Debray, LL Peterson ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (5), 795-825, 1993 | 593 | 1993 |
Compiler techniques for code compaction SK Debray, W Evans, R Muth, B De Sutter ACM Transactions on Programming languages and Systems (TOPLAS) 22 (2), 378-415, 2000 | 409* | 2000 |
Disassembly of executable code revisited B Schwarz, S Debray, G Andrews Ninth Working Conference on Reverse Engineering, 2002. Proceedings., 45-54, 2002 | 392 | 2002 |
A semantics-based approach to malware detection MD Preda, M Christodorescu, S Jha, S Debray ACM SIGPLAN Notices 42 (1), 377-388, 2007 | 344 | 2007 |
Automatic mode inference for logic programs SK Debray, DS Warren The Journal of Logic Programming 5 (3), 207-229, 1988 | 303 | 1988 |
Deobfuscation: Reverse engineering obfuscated code SK Udupa, SK Debray, M Madou 12th Working Conference on Reverse Engineering (WCRE'05), 10 pp.-54, 2005 | 297 | 2005 |
A Generic Approach to Automatic Deobfuscation of Executable Code B Yadegari, B Johannesmeyer, B Whitely, S Debray IEEE Symposium on Security and Privacy 36, 2015 | 254 | 2015 |
Cost analysis of logic programs SK Debray, NW Lin ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (5), 826-875, 1993 | 246 | 1993 |
Dynamic path-based software watermarking C Collberg, E Carter, S Debray, A Huntwork, J Kececioglu, C Linn, ... Proceedings of the ACM SIGPLAN 2004 conference on Programming language …, 2004 | 228 | 2004 |
Task granularity analysis in logic programs SK Debray, NW Lin, M Hermnegildo ACM SIGPLAN Notices 25 (6), 174-188, 1990 | 223 | 1990 |
Static inference of modes and data dependencies in logic programs SK Debray ACM Transactions on Programming Languages and Systems (TOPLAS) 11 (3), 418-450, 1989 | 210 | 1989 |
alto: a link‐time optimizer for the Compaq Alpha R Muth, SK Debray, S Watterson, K De Bosschere Software: Practice and Experience 31 (1), 67-101, 2001 | 207 | 2001 |
Deobfuscation of virtualization-obfuscated software: a semantics-based approach K Coogan, G Lu, S Debray Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 194 | 2011 |
Binary Obfuscation Using Signals. IV Popov, SK Debray, GR Andrews USENIX Security Symposium, 275-290, 2007 | 192 | 2007 |
Alias analysis of executable code S Debray, R Muth, M Weippert Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of …, 1998 | 181 | 1998 |
On the practicality of global flow analysis of logic programs R Warren, MV Hermenegildo MIT Press, 1988 | 175 | 1988 |
Global flow analysis as a practical compilation tool MV Hermenegildo, R Warren, SK Debray The Journal of Logic Programming 13 (4), 349-366, 1992 | 169 | 1992 |
Plto: A link-time optimizer for the Intel IA-32 architecture B Schwarz, S Debray, G Andrews, M Legendre Proc. 2001 Workshop on Binary Translation (WBT-2001) 114, 2001 | 164 | 2001 |
Generalized semantics and abstract interpretation for constraint logic programs R Giacobazzi, SK Debray, G Levi The Journal of Logic Programming 25 (3), 191-247, 1995 | 152 | 1995 |