Slicing obfuscations: design, correctness, and evaluation A Majumdar, SJ Drape, CD Thomborson Proceedings of the 2007 ACM workshop on Digital Rights Management, 70-81, 2007 | 59 | 2007 |
Obfuscation of Abstract Data− Types S Drape | 50 | 2004 |
A survey of control-flow obfuscations A Majumdar, C Thomborson, S Drape Information Systems Security: Second International Conference, ICISS 2006 …, 2006 | 49 | 2006 |
Transforming the. net intermediate language using path logic programming S Drape, O de Moor, G Sittampalam Proceedings of the 4th ACM SIGPLAN international conference on Principles …, 2002 | 42 | 2002 |
Intellectual property protection using obfuscation S Drape | 35 | 2010 |
Slicing aided design of obfuscating transforms S Drape, A Majumdar, C Thomborson 6th IEEE/ACIS International Conference on Computer and Information Science …, 2007 | 31 | 2007 |
Specifying imperative data obfuscations S Drape, C Thomborson, A Majumdar Information Security: 10th International Conference, ISC 2007, Valparaíso …, 2007 | 26 | 2007 |
Generalising the array split obfuscation S Drape Information Sciences 177 (1), 202-219, 2007 | 24 | 2007 |
Metrics-based evaluation of slicing obfuscations A Majumdar, S Drape, C Thomborson Third International Symposium on Information Assurance and Security, 472-477, 2007 | 16 | 2007 |
The use of matrices in obfuscation S Drape, I Voiculescu | 10 | 2008 |
Design and evaluation of slicing obfuscations S Drape, A Majumdar CDMTCS ‚The University of Auckland, 2007 | 10 | 2007 |
Creating transformations for matrix obfuscation S Drape, I Voiculescu Static Analysis: 16th International Symposium, SAS 2009, Los Angeles, CA …, 2009 | 8 | 2009 |
An obfuscation for binary trees S Drape TENCON 2006-2006 IEEE Region 10 Conference, 1-4, 2006 | 6 | 2006 |
Incremental program analysis via language factors, 2002 O de Moor, S Drape, D Lacey, G Sittampalam Disponible à: citeseer. ist. psu. edu/demoor02incremental. html, 0 | 4 | |
Incremental program analysis via language factors O de Moor, S Drape, D Lacey, G Sittampalam submitted for publication, 2002 | 3 | 2002 |
Using Haskell to Model Tree Obfuscations S Drape | 2 | 2004 |
The Matrix Obfuscated S Drape | 1 | 2004 |
Obfuscating Set Representations S Drape | 1 | 2004 |
Functional Cryptography S Drape | 1 | 2001 |
The Suitability of Different Binary Tree Obfuscations S Drape CDMTCS ‚The University of Auckland, 2007 | | 2007 |