Zobrazeno 1 - 10
of 36
pro vyhledávání: '"Babak Yadegari"'
Autor:
Julio Cárdenas-Rodríguez, Bonnie L. Hurwitz, Jon Stephens, Theo Sackos, Sam Badger, Benjamin Gaska, Kat Volk, Brandon Neth, Ian J. Bertolacci, Anthony Encinas, Barbara Kreaseck, Michelle Mills Strout, Sarah Willer, Jesse Bartels, Babak Yadegari, Saumya K. Debray, Katherine E. Isaacs, Sabin Devkota
Publikováno v:
Languages and Compilers for Parallel Computing ISBN: 9783030352240
LCPC
LCPC
Scientists are increasingly turning to interpreted languages, such as Python, Java, R, Matlab, and Perl, to implement their data analysis algorithms. While such languages permit rapid software development, their implementations often run into perform
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8b05f25aee4cc99b3821d3d10f46b67a
https://doi.org/10.1007/978-3-030-35225-7_4
https://doi.org/10.1007/978-3-030-35225-7_4
Publikováno v:
EuroS&P
This paper presents a program obfuscation framework that uses covert channels through the program's execution environment to obfuscate information flow through the program. Unlike prior works on obfuscation, the use of covert channels removes visible
Publikováno v:
Computer Fraud & Security. 2013:11-19
For many years, malware has been the subject of intensive study by researchers in industry and academia. Malware production, while not being an organised business, has reached a level where automatic malicious code generators/engines are easily found
Publikováno v:
CODASPY
Dynamic taint analysis and symbolic execution find many important applications in security-related program analyses. However, current techniques for such analyses do not take proper account of control transfers due to exceptions. As a result, they ca
Autor:
Babak Yadegari, Saumya K. Debray
Publikováno v:
Runtime Verification ISBN: 9783319675305
RV
RV
Interpreters and just-in-time (JIT) compilers are ubiquitous in modern computer systems, making it important to have good program analyses for reasoning about such systems. Control dependence, which plays a fundamental role in a number of program ana
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::eeb610ff0c37a989c4e3a618481f0a02
https://doi.org/10.1007/978-3-319-67531-2_19
https://doi.org/10.1007/978-3-319-67531-2_19
Autor:
Babak Yadegari, Saumya K. Debray
Publikováno v:
ACM Conference on Computer and Communications Security
Symbolic and concolic execution nd important applications in a number of security-related program analyses, including analysis of malicious code. However, malicious code tend to very often be obfuscated, and current concolic analysis techniques have
Publikováno v:
IEEE Symposium on Security and Privacy
Malicious software are usually obfuscated to avoid detection and resist analysis. When new malware is encountered, such obfuscations have to be penetrated or removed ("deobfuscated") in order to understand the internal logic of the code and devise co
Publikováno v:
CODASPY
Software self-checksumming is widely used as an anti-tampering mechanism for protecting intellectual property and deterring piracy. This makes it important to understand the strengths and weaknesses of various approaches to self-checksumming. This pa
Publikováno v:
PPREW@ACSAC
Malicious code often use a variety of anti-analysis and anti-tampering defenses to hinder analysis. Researchers trying to understand the internal logic of the malware have to penetrate these defenses. Existing research on such anti-analysis defenses
Autor:
Babak Yadegari, Saumya K. Debray
Publikováno v:
SCAM
Taint analysis has a wide variety of applications in software analysis, making the precision of taint analysis an important consideration. Current taint analysis algorithms, including previous work on bit-precise taint analyses, suffer from shortcomi