Obfuscation of executable code to improve resistance to static disassembly C Linn, S Debray Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 891 | 2003 |
Reasoning about naming systems M Bowman, SK Debray, LL Peterson ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (5), 795-825, 1993 | 511 | 1993 |
Compiler techniques for code compaction SK Debray, W Evans, R Muth, B De Sutter ACM Transactions on Programming languages and Systems (TOPLAS) 22 (2), 378-415, 2000 | 354* | 2000 |
Disassembly of executable code revisited B Schwarz, S Debray, G Andrews Ninth Working Conference on Reverse Engineering, 2002. Proceedings., 45-54, 2002 | 341 | 2002 |
A semantics-based approach to malware detection MD Preda, M Christodorescu, S Jha, S Debray ACM SIGPLAN Notices 42 (1), 377-388, 2007 | 302 | 2007 |
Automatic mode inference for logic programs SK Debray, DS Warren The Journal of Logic Programming 5 (3), 207-229, 1988 | 277 | 1988 |
Deobfuscation: Reverse engineering obfuscated code SK Udupa, SK Debray, M Madou 12th Working Conference on Reverse Engineering (WCRE'05), 10 pp.-54, 2005 | 248 | 2005 |
Cost analysis of logic programs SK Debray, NW Lin ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (5), 826-875, 1993 | 225 | 1993 |
Dynamic path-based software watermarking C Collberg, E Carter, S Debray, A Huntwork, J Kececioglu, C Linn, ... Proceedings of the ACM SIGPLAN 2004 conference on Programming language …, 2004 | 210 | 2004 |
Task granularity analysis in logic programs SK Debray, NW Lin, M Hermnegildo ACM SIGPLAN Notices 25 (6), 174-188, 1990 | 199 | 1990 |
Static inference of modes and data dependencies in logic programs SK Debray ACM Transactions on Programming Languages and Systems (TOPLAS) 11 (3), 418-450, 1989 | 199 | 1989 |
alto: a link‐time optimizer for the Compaq Alpha R Muth, SK Debray, S Watterson, K De Bosschere Software: Practice and Experience 31 (1), 67-101, 2001 | 194* | 2001 |
Binary Obfuscation Using Signals. IV Popov, SK Debray, GR Andrews USENIX Security Symposium, 275-290, 2007 | 176 | 2007 |
A Generic Approach to Automatic Deobfuscation of Executable Code B Yadegari, B Johannesmeyer, B Whitely, S Debray IEEE Symposium on Security and Privacy 36, 2015 | 171 | 2015 |
Alias analysis of executable code S Debray, R Muth, M Weippert Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of …, 1998 | 166 | 1998 |
Deobfuscation of virtualization-obfuscated software: a semantics-based approach K Coogan, G Lu, S Debray Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 151 | 2011 |
Global flow analysis as a practical compilation tool MV Hermenegildo, R Warren, SK Debray The Journal of Logic Programming 13 (4), 349-366, 1992 | 150 | 1992 |
On the practicality of global flow analysis of logic programs R Warren, M Hermenegildo, SK Debray ICLP/SLP, 684-699, 1988 | 148 | 1988 |
Plto: A link-time optimizer for the Intel IA-32 architecture B Schwarz, S Debray, G Andrews, M Legendre Proc. 2001 Workshop on Binary Translation (WBT-2001), 2001 | 142 | 2001 |
Denotational and operational semantics for Prolog SK Debray, P Mishra The Journal of Logic Programming 5 (1), 61-91, 1988 | 133 | 1988 |