default search action
5. PPREW@ACSAC 2015: Los Angeles, CA, USA
- Jeffrey Todd McDonald, Mila Dalla Preda, Natalia Stakhanova:
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, PPREW@ACSAC, Los Angeles, CA, USA, December 8, 2015. ACM 2015, ISBN 978-1-4503-3642-0 - Michael J. Wiener:
Applying Software Protection to White-Box Cryptography. 1:1-1:2 - Bogdan Copos, Praveen Murthy:
InputFinder: Reverse Engineering Closed Binaries using Hardware Performance Counters. 2:1-2:12 - Naoki Fujieda, Kiyohiro Sato, Shuichi Ichikawa:
A Complement to Enhanced Instruction Register File against Embedded Software Falsification. 3:1-3:7 - Brendan Dolan-Gavitt, Josh Hodosh, Patrick Hulin, Tim Leek, Ryan Whelan:
Repeatable Reverse Engineering with PANDA. 4:1-4:11 - Franck de Goër, Roland Groz, Laurent Mounier:
Lightweight heuristics to retrieve parameter associations from binaries. 5:1-5:12 - Luke Jones, Ryan Whelan, Jeremy Blackthorne, Graham Baker:
Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism. 6:1-6:11 - Aisha I. Ali-Gombe, Irfan Ahmed, Golden G. Richard III, Vassil Roussev:
OpSeq: Android Malware Fingerprinting. 7:1-7:12 - Yuichiro Kanzaki, Clark D. Thomborson, Akito Monden, Christian S. Collberg:
Pinpointing and Hiding Surprising Fragments in an Obfuscated Program. 8:1-8:9 - Ashutosh Jain, Hugo Gonzalez, Natalia Stakhanova:
Enriching reverse engineering through visual exploration of Android binaries. 9:1-9:9
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.