Debray, Saumya
80  Ergebnisse:
Personensuche X
?
1

Automatically Localizing Dynamic Code Generation Bugs in JI..:

, In: Proceedings of the 32nd ACM SIGPLAN International Conference on Compiler Construction,
Lim, HeuiChan ; Debray, Saumya - p. 145-155 , 2023
 
?
2

Modeling code manipulation in JIT compilers:

, In: Proceedings of the 11th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis,
Lim, HeuiChan ; Kang, Xiyu ; Debray, Saumya - p. 9-15 , 2022
 
?
3

Optimization to the Rescue : Evading Binary Code Stylome..:

, In: Proceedings of the 2021 Research on offensive and defensive techniques in the Context of Man At The End (MATE) Attacks,
 
?
4

Automated bug localization in JIT compilers:

, In: Proceedings of the 17th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments,
Lim, HeuiChan ; Debray, Saumya - p. 153-164 , 2021
 
?
5

A Framework for Automatic Exploit Generation for JIT Compil..:

, In: Proceedings of the 2021 Research on offensive and defensive techniques in the Context of Man At The End (MATE) Attacks,
Kang, Xiyu ; Debray, Saumya - p. 11-19 , 2021
 
?
6

Representing and reasoning about dynamic code:

, In: Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering,
Bartels, Jesse ; Stephens, Jon ; Debray, Saumya - p. 312-323 , 2020
 
?
7

Language-Agnostic Optimization and Parallelization for Inte..:

, In: Languages and Compilers for Parallel Computing; Lecture Notes in Computer Science,
 
?
8

Probabilistic Obfuscation Through Covert Channels:

, In: 2018 IEEE European Symposium on Security and Privacy (EuroS&P),
 
?
9

Analysis of Exception-Based Control Transfers:

, In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy,
Yadegari, Babak ; Stephens, Jon ; Debray, Saumya - p. 205-216 , 2017
 
?
10

Identifying and Understanding Self-Checksumming Defenses in..:

, In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy,
Qiu, Jing ; Yadegari, Babak ; Johannesmeyer, Brian.. - p. 207-218 , 2015
 
?
12

Symbolic Execution of Obfuscated Code:

, In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security,
Yadegari, Babak ; Debray, Saumya - p. 732-744 , 2015
 
?
13

A Framework for Understanding Dynamic Anti-Analysis Defense:

, In: Proceedings of the 4th Program Protection and Reverse Engineering Workshop,
 
?
14

Micro-specialization : dynamic code specialization of da..:

, In: Proceedings of the Tenth International Symposium on Code Generation and Optimization,
 
?
15

Deobfuscation of virtualization-obfuscated software : a ..:

, In: Proceedings of the 18th ACM conference on Computer and communications security,
Coogan, Kevin ; Lu, Gen ; Debray, Saumya - p. 275-284 , 2011
 
1-15