|
Search the dblp DataBase
Matias Madou:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Mila Dalla Preda, Matias Madou, Koen De Bosschere, Roberto Giacobazzi
Opaque Predicates Detection by Abstract Interpretation. [Citation Graph (0, 0)][DBLP] AMAST, 2006, pp:81-95 [Conf]
- Matias Madou, Bjorn De Sutter, Bruno De Bus, Ludo Van Put, Koen De Bosschere
Link-Time Compaction of MIPS Programs. [Citation Graph (0, 0)][DBLP] ESA/VLSI, 2004, pp:70-75 [Conf]
- Matias Madou, Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere
Hybrid static-dynamic attacks against software protection mechanisms. [Citation Graph (0, 0)][DBLP] Digital Rights Management Workshop, 2005, pp:75-82 [Conf]
- Matias Madou, Ludo Van Put, Koen De Bosschere
Understanding Obfuscated Code. [Citation Graph (0, 0)][DBLP] ICPC, 2006, pp:268-274 [Conf]
- Ludo Van Put, Bjorn De Sutter, Matias Madou, Bruno De Bus, Dominique Chanet, Kristof Smits, Koen De Bosschere
LANCET: a nifty code editing tool. [Citation Graph (0, 0)][DBLP] PASTE, 2005, pp:75-81 [Conf]
- Matias Madou, Ludo Van Put, Koen De Bosschere
LOCO: an interactive code (De)obfuscation tool. [Citation Graph (0, 0)][DBLP] PEPM, 2006, pp:140-144 [Conf]
- Matias Madou, Bertrand Anckaert, Bruno De Bus, Koen De Bosschere, Jan Cappaert, Bart Preneel
On the Effectiveness of Source Code Transformations for Binary Obfuscation. [Citation Graph (0, 0)][DBLP] Software Engineering Research and Practice, 2006, pp:527-533 [Conf]
- Sharath K. Udupa, Saumya K. Debray, Matias Madou
Deobfuscation: Reverse Engineering Obfuscated Code. [Citation Graph (0, 0)][DBLP] WCRE, 2005, pp:45-54 [Conf]
- Matias Madou, Bertrand Anckaert, Patrick Moseley, Saumya K. Debray, Bjorn De Sutter, Koen De Bosschere
Software Protection Through Dynamic Code Mutation. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:194-206 [Conf]
- Bertrand Anckaert, Matias Madou, Koen De Bosschere
A Model for Self-Modifying Code. [Citation Graph (0, 0)][DBLP] Information Hiding, 2006, pp:232-248 [Conf]
Program obfuscation: a quantitative approach. [Citation Graph (, )][DBLP]
Matching Control Flow of Program Versions. [Citation Graph (, )][DBLP]
Towards Tamper Resistant Code Encryption: Practice and Experience. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|