Default Cover Image

2015 IEEE/ACM 1st International Workshop on Software Protection (SPRO)

May 19 2015 to May 19 2015

Florence, Italy

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-vi
Message from the ChairsFreely available from IEEE.pp. vii-viii
Committees and ReviewersFreely available from IEEE.pp. ix-x
Sponsors and SupportersFreely available from IEEE.pp. xi-xi
Software Security: Squaring the Circle?Full-text access may be available. Sign in or learn about subscription options.pp. 1-1
Making Advanced Software Protection Tools Usable for Non-expertsFull-text access may be available. Sign in or learn about subscription options.pp. 2-2
Obfuscator-LLVM -- Software Protection for the MassesFull-text access may be available. Sign in or learn about subscription options.pp. 3-9
Matryoshka: Strengthening Software Protection via Nested Virtual MachinesFull-text access may be available. Sign in or learn about subscription options.pp. 10-16
Using Virtual Machine Protections to Enhance Whitebox CryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 17-23
Obfuscating Windows DLLsFull-text access may be available. Sign in or learn about subscription options.pp. 24-30
Code Artificiality: A Metric for the Code Stealth Based on an N-Gram ModelFull-text access may be available. Sign in or learn about subscription options.pp. 31-37
Assessment of Data Obfuscation with Residue Number CodingFull-text access may be available. Sign in or learn about subscription options.pp. 38-44
A Framework for Measuring Software Obfuscation Resilience against Automated AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 45-51
Automatic Discovery of Software Attacks via Backward ReasoningFull-text access may be available. Sign in or learn about subscription options.pp. 52-58
Infections as Abstract Symbolic Finite Automata: Formal Model and ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 59-65
Author IndexFreely available from IEEE.pp. 66-66
[Publisher's information]Freely available from IEEE.pp. 68-68
Showing 20 out of 20