![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/conf/popl/pprew2013.bht:"
@inproceedings{DBLP:conf/popl/BourquinKR13, author = {Martial Bourquin and Andy King and Edward Robbins}, editor = {Jeffrey Todd McDonald and Mila Dalla Preda}, title = {BinSlayer: accurate comparison of binary executables}, booktitle = {Proceedings of the 2nd {ACM} {SIGPLAN} Program Protection and Reverse Engineering Workshop 2013, PPREW@POPL 2013, January 26, 2013, Rome, Italy}, pages = {4:1--4:10}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2430553.2430557}, doi = {10.1145/2430553.2430557}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/popl/BourquinKR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/GhoshHD13, author = {Sudeep Ghosh and Jason Hiser and Jack W. Davidson}, editor = {Jeffrey Todd McDonald and Mila Dalla Preda}, title = {Software protection for dynamically-generated code}, booktitle = {Proceedings of the 2nd {ACM} {SIGPLAN} Program Protection and Reverse Engineering Workshop 2013, PPREW@POPL 2013, January 26, 2013, Rome, Italy}, pages = {1:1--1:12}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2430553.2430554}, doi = {10.1145/2430553.2430554}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/GhoshHD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/LakhotiaPG13, author = {Arun Lakhotia and Mila Dalla Preda and Roberto Giacobazzi}, editor = {Jeffrey Todd McDonald and Mila Dalla Preda}, title = {Fast location of similar code fragments using semantic 'juice'}, booktitle = {Proceedings of the 2nd {ACM} {SIGPLAN} Program Protection and Reverse Engineering Workshop 2013, PPREW@POPL 2013, January 26, 2013, Rome, Italy}, pages = {5:1--5:6}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2430553.2430558}, doi = {10.1145/2430553.2430558}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/LakhotiaPG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/PayerG13, author = {Mathias Payer and Thomas R. Gross}, editor = {Jeffrey Todd McDonald and Mila Dalla Preda}, title = {String oriented programming: when {ASLR} is not enough}, booktitle = {Proceedings of the 2nd {ACM} {SIGPLAN} Program Protection and Reverse Engineering Workshop 2013, PPREW@POPL 2013, January 26, 2013, Rome, Italy}, pages = {2:1--2:9}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2430553.2430555}, doi = {10.1145/2430553.2430555}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/PayerG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/ZwangerF13, author = {Viviane Zwanger and Felix C. Freiling}, editor = {Jeffrey Todd McDonald and Mila Dalla Preda}, title = {Kernel mode {API} spectroscopy for incident response and digital forensics}, booktitle = {Proceedings of the 2nd {ACM} {SIGPLAN} Program Protection and Reverse Engineering Workshop 2013, PPREW@POPL 2013, January 26, 2013, Rome, Italy}, pages = {3:1--3:11}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2430553.2430556}, doi = {10.1145/2430553.2430556}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/ZwangerF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/popl/2013pprew, editor = {Jeffrey Todd McDonald and Mila Dalla Preda}, title = {Proceedings of the 2nd {ACM} {SIGPLAN} Program Protection and Reverse Engineering Workshop 2013, PPREW@POPL 2013, January 26, 2013, Rome, Italy}, publisher = {{ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2430553}, isbn = {978-1-4503-1857-0}, timestamp = {Wed, 30 Mar 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/popl/2013pprew.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.