Search dblp for Publications

export results for "toc:db/conf/popl/pprew2013.bht:"

 download as .bib file

@inproceedings{DBLP:conf/popl/BourquinKR13,
  author       = {Martial Bourquin and
                  Andy King and
                  Edward Robbins},
  editor       = {Jeffrey Todd McDonald and
                  Mila Dalla Preda},
  title        = {BinSlayer: accurate comparison of binary executables},
  booktitle    = {Proceedings of the 2nd {ACM} {SIGPLAN} Program Protection and Reverse
                  Engineering Workshop 2013, PPREW@POPL 2013, January 26, 2013, Rome,
                  Italy},
  pages        = {4:1--4:10},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2430553.2430557},
  doi          = {10.1145/2430553.2430557},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/BourquinKR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/GhoshHD13,
  author       = {Sudeep Ghosh and
                  Jason Hiser and
                  Jack W. Davidson},
  editor       = {Jeffrey Todd McDonald and
                  Mila Dalla Preda},
  title        = {Software protection for dynamically-generated code},
  booktitle    = {Proceedings of the 2nd {ACM} {SIGPLAN} Program Protection and Reverse
                  Engineering Workshop 2013, PPREW@POPL 2013, January 26, 2013, Rome,
                  Italy},
  pages        = {1:1--1:12},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2430553.2430554},
  doi          = {10.1145/2430553.2430554},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/GhoshHD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/LakhotiaPG13,
  author       = {Arun Lakhotia and
                  Mila Dalla Preda and
                  Roberto Giacobazzi},
  editor       = {Jeffrey Todd McDonald and
                  Mila Dalla Preda},
  title        = {Fast location of similar code fragments using semantic 'juice'},
  booktitle    = {Proceedings of the 2nd {ACM} {SIGPLAN} Program Protection and Reverse
                  Engineering Workshop 2013, PPREW@POPL 2013, January 26, 2013, Rome,
                  Italy},
  pages        = {5:1--5:6},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2430553.2430558},
  doi          = {10.1145/2430553.2430558},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/LakhotiaPG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/PayerG13,
  author       = {Mathias Payer and
                  Thomas R. Gross},
  editor       = {Jeffrey Todd McDonald and
                  Mila Dalla Preda},
  title        = {String oriented programming: when {ASLR} is not enough},
  booktitle    = {Proceedings of the 2nd {ACM} {SIGPLAN} Program Protection and Reverse
                  Engineering Workshop 2013, PPREW@POPL 2013, January 26, 2013, Rome,
                  Italy},
  pages        = {2:1--2:9},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2430553.2430555},
  doi          = {10.1145/2430553.2430555},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/PayerG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/ZwangerF13,
  author       = {Viviane Zwanger and
                  Felix C. Freiling},
  editor       = {Jeffrey Todd McDonald and
                  Mila Dalla Preda},
  title        = {Kernel mode {API} spectroscopy for incident response and digital forensics},
  booktitle    = {Proceedings of the 2nd {ACM} {SIGPLAN} Program Protection and Reverse
                  Engineering Workshop 2013, PPREW@POPL 2013, January 26, 2013, Rome,
                  Italy},
  pages        = {3:1--3:11},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2430553.2430556},
  doi          = {10.1145/2430553.2430556},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/ZwangerF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/popl/2013pprew,
  editor       = {Jeffrey Todd McDonald and
                  Mila Dalla Preda},
  title        = {Proceedings of the 2nd {ACM} {SIGPLAN} Program Protection and Reverse
                  Engineering Workshop 2013, PPREW@POPL 2013, January 26, 2013, Rome,
                  Italy},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2430553},
  isbn         = {978-1-4503-1857-0},
  timestamp    = {Wed, 30 Mar 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/2013pprew.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics