Abstract is missing.
- InputFinder: Reverse Engineering Closed Binaries using Hardware Performance CountersBogdan Copos, Praveen Murthy. [doi]
- OpSeq: Android Malware FingerprintingAisha Ali Gombe, Irfan Ahmed, Golden G. Richard III, Vassil Roussev. [doi]
- A Complement to Enhanced Instruction Register File against Embedded Software FalsificationNaoki Fujieda, Kiyohiro Sato, Shuichi Ichikawa. [doi]
- Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique MetamorphismLuke Jones, Ryan Whelan, Jeremy Blackthorne, Graham Baker. [doi]
- Repeatable Reverse Engineering with PANDABrendan Dolan-Gavitt, Josh Hodosh, Patrick Hulin, Tim Leek, Ryan Whelan. [doi]
- Enriching reverse engineering through visual exploration of Android binariesAshutosh Jain, Hugo Gonzalez, Natalia Stakhanova. [doi]
- Pinpointing and Hiding Surprising Fragments in an Obfuscated ProgramYuichiro Kanzaki, Clark D. Thomborson, Akito Monden, Christian S. Collberg. [doi]
- Applying Software Protection to White-Box CryptographyMichael J. Wiener. [doi]
- Lightweight heuristics to retrieve parameter associations from binariesFranck de Goër, Roland Groz, Laurent Mounier. [doi]