Follow
Stephen Drape
Stephen Drape
Unknown affiliation
No verified email
Title
Cited by
Cited by
Year
Slicing obfuscations: design, correctness, and evaluation
A Majumdar, SJ Drape, CD Thomborson
Proceedings of the 2007 ACM workshop on Digital Rights Management, 70-81, 2007
592007
Obfuscation of Abstract Data− Types
S Drape
502004
A survey of control-flow obfuscations
A Majumdar, C Thomborson, S Drape
Information Systems Security: Second International Conference, ICISS 2006 …, 2006
492006
Transforming the. net intermediate language using path logic programming
S Drape, O de Moor, G Sittampalam
Proceedings of the 4th ACM SIGPLAN international conference on Principles …, 2002
422002
Intellectual property protection using obfuscation
S Drape
352010
Slicing aided design of obfuscating transforms
S Drape, A Majumdar, C Thomborson
6th IEEE/ACIS International Conference on Computer and Information Science …, 2007
312007
Specifying imperative data obfuscations
S Drape, C Thomborson, A Majumdar
Information Security: 10th International Conference, ISC 2007, Valparaíso …, 2007
262007
Generalising the array split obfuscation
S Drape
Information Sciences 177 (1), 202-219, 2007
242007
Metrics-based evaluation of slicing obfuscations
A Majumdar, S Drape, C Thomborson
Third International Symposium on Information Assurance and Security, 472-477, 2007
162007
The use of matrices in obfuscation
S Drape, I Voiculescu
102008
Design and evaluation of slicing obfuscations
S Drape, A Majumdar
CDMTCS ‚The University of Auckland, 2007
102007
Creating transformations for matrix obfuscation
S Drape, I Voiculescu
Static Analysis: 16th International Symposium, SAS 2009, Los Angeles, CA …, 2009
82009
An obfuscation for binary trees
S Drape
TENCON 2006-2006 IEEE Region 10 Conference, 1-4, 2006
62006
Incremental program analysis via language factors, 2002
O de Moor, S Drape, D Lacey, G Sittampalam
Disponible à: citeseer. ist. psu. edu/demoor02incremental. html, 0
4
Incremental program analysis via language factors
O de Moor, S Drape, D Lacey, G Sittampalam
submitted for publication, 2002
32002
Using Haskell to Model Tree Obfuscations
S Drape
22004
The Matrix Obfuscated
S Drape
12004
Obfuscating Set Representations
S Drape
12004
Functional Cryptography
S Drape
12001
The Suitability of Different Binary Tree Obfuscations
S Drape
CDMTCS ‚The University of Auckland, 2007
2007
The system can't perform the operation now. Try again later.
Articles 1–20