The SCEAS System
Navigation Menu

Search the dblp DataBase


Matias Madou: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mila Dalla Preda, Matias Madou, Koen De Bosschere, Roberto Giacobazzi
    Opaque Predicates Detection by Abstract Interpretation. [Citation Graph (0, 0)][DBLP]
    AMAST, 2006, pp:81-95 [Conf]
  2. Matias Madou, Bjorn De Sutter, Bruno De Bus, Ludo Van Put, Koen De Bosschere
    Link-Time Compaction of MIPS Programs. [Citation Graph (0, 0)][DBLP]
    ESA/VLSI, 2004, pp:70-75 [Conf]
  3. Matias Madou, Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere
    Hybrid static-dynamic attacks against software protection mechanisms. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2005, pp:75-82 [Conf]
  4. Matias Madou, Ludo Van Put, Koen De Bosschere
    Understanding Obfuscated Code. [Citation Graph (0, 0)][DBLP]
    ICPC, 2006, pp:268-274 [Conf]
  5. Ludo Van Put, Bjorn De Sutter, Matias Madou, Bruno De Bus, Dominique Chanet, Kristof Smits, Koen De Bosschere
    LANCET: a nifty code editing tool. [Citation Graph (0, 0)][DBLP]
    PASTE, 2005, pp:75-81 [Conf]
  6. Matias Madou, Ludo Van Put, Koen De Bosschere
    LOCO: an interactive code (De)obfuscation tool. [Citation Graph (0, 0)][DBLP]
    PEPM, 2006, pp:140-144 [Conf]
  7. Matias Madou, Bertrand Anckaert, Bruno De Bus, Koen De Bosschere, Jan Cappaert, Bart Preneel
    On the Effectiveness of Source Code Transformations for Binary Obfuscation. [Citation Graph (0, 0)][DBLP]
    Software Engineering Research and Practice, 2006, pp:527-533 [Conf]
  8. Sharath K. Udupa, Saumya K. Debray, Matias Madou
    Deobfuscation: Reverse Engineering Obfuscated Code. [Citation Graph (0, 0)][DBLP]
    WCRE, 2005, pp:45-54 [Conf]
  9. Matias Madou, Bertrand Anckaert, Patrick Moseley, Saumya K. Debray, Bjorn De Sutter, Koen De Bosschere
    Software Protection Through Dynamic Code Mutation. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:194-206 [Conf]
  10. Bertrand Anckaert, Matias Madou, Koen De Bosschere
    A Model for Self-Modifying Code. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:232-248 [Conf]

  11. Program obfuscation: a quantitative approach. [Citation Graph (, )][DBLP]

  12. Matching Control Flow of Program Versions. [Citation Graph (, )][DBLP]

  13. Towards Tamper Resistant Code Encryption: Practice and Experience. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002