Provider: Schloss Dagstuhl - Leibniz Center for Informatics
Database: dblp computer science bibliography
Content:text/plain; charset="utf-8"
TY - Informal or Other Publication
ID - DBLP:journals/corr/JiangNA16
AU - Jiang, Heju
AU - Nagra, Jasvir
AU - Ahammad, Parvez
TI - SoK: Applying Machine Learning in Security - A Survey.
JO - CoRR
VL - abs/1611.03186
PY - 2016//
UR - http://arxiv.org/abs/1611.03186
ER -
TY - CPAPER
ID - DBLP:conf/acsac/CollbergMMN12
AU - Collberg, Christian S.
AU - Martin, Sam
AU - Myers, Jonathan
AU - Nagra, Jasvir
TI - Distributed application tamper detection via continuous software updates.
BT - 28th Annual Computer Security Applications Conference, ACSAC 2012, Orlando, FL, USA, 3-7 December 2012
SP - 319
EP - 328
PY - 2012//
DO - 10.1145/2420950.2420997
UR - https://doi.org/10.1145/2420950.2420997
ER -
TY - CPAPER
ID - DBLP:conf/sp/TalyEMMN11
AU - Taly, Ankur
AU - Erlingsson, Úlfar
AU - Mitchell, John C.
AU - Miller, Mark S.
AU - Nagra, Jasvir
TI - Automated Analysis of Security-Critical JavaScript APIs.
BT - 32nd IEEE Symposium on Security and Privacy, SP 2011, 22-25 May 2011, Berkeley, California, USA
SP - 363
EP - 378
PY - 2011//
DO - 10.1109/SP.2011.39
UR - https://doi.org/10.1109/SP.2011.39
UR - https://doi.ieeecomputersociety.org/10.1109/SP.2011.39
ER -
TY - BOOK
ID - DBLP:books/daglib/0036993
AU - Collberg, Christian S.
AU - Nagra, Jasvir
TI - Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection.
T3 - Addison-Wesley Software Security Series
SP - I
EP - XXVII
SP - 1
EP - 748
PY - 2010//
PB - Addison-Wesley
SN - ISBN 978-0-321-54925-9
ER -
TY - JOUR
ID - DBLP:journals/ase/CeccatoPNCT09
AU - Ceccato, Mariano
AU - Preda, Mila Dalla
AU - Nagra, Jasvir
AU - Collberg, Christian S.
AU - Tonella, Paolo
TI - Trading-off security and performance in barrier slicing for remote software entrusting.
JO - Autom. Softw. Eng.
VL - 16
IS - 2
SP - 235
EP - 261
PY - 2009//
DO - 10.1007/S10515-009-0047-Y
UR - https://doi.org/10.1007/s10515-009-0047-y
UR - https://www.wikidata.org/entity/Q113444945
ER -
TY - CPAPER
ID - DBLP:conf/iwpc/CeccatoPNFRTT09
AU - Ceccato, Mariano
AU - Penta, Massimiliano Di
AU - Nagra, Jasvir
AU - Falcarin, Paolo
AU - Ricca, Filippo
AU - Torchiano, Marco
AU - Tonella, Paolo
TI - The effectiveness of source code obfuscation: An experimental assessment.
BT - The 17th IEEE International Conference on Program Comprehension, ICPC 2009, Vancouver, British Columbia, Canada, May 17-19, 2009
SP - 178
EP - 187
PY - 2009//
DO - 10.1109/ICPC.2009.5090041
UR - https://doi.org/10.1109/ICPC.2009.5090041
UR - https://doi.ieeecomputersociety.org/10.1109/ICPC.2009.5090041
ER -
TY - CPAPER
ID - DBLP:conf/ccs/CeccatoPNFRTT08
AU - Ceccato, Mariano
AU - Penta, Massimiliano Di
AU - Nagra, Jasvir
AU - Falcarin, Paolo
AU - Ricca, Filippo
AU - Torchiano, Marco
AU - Tonella, Paolo
TI - Towards experimental evaluation of code obfuscation techniques.
BT - Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008
SP - 39
EP - 46
PY - 2008//
DO - 10.1145/1456362.1456371
UR - https://doi.org/10.1145/1456362.1456371
ER -
TY - CPAPER
ID - DBLP:conf/pdp/CeccatoNT08
AU - Ceccato, Mariano
AU - Nagra, Jasvir
AU - Tonella, Paolo
TI - Distributing Trust Verification to Increase Application Performance.
BT - 16th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2008), 13-15 February 2008, Toulouse, France
SP - 604
EP - 610
PY - 2008//
DO - 10.1109/PDP.2008.69
UR - https://doi.org/10.1109/PDP.2008.69
UR - https://doi.ieeecomputersociety.org/10.1109/PDP.2008.69
ER -
TY - CPAPER
ID - DBLP:conf/scam/CeccatoPNCT07
AU - Ceccato, Mariano
AU - Preda, Mila Dalla
AU - Nagra, Jasvir
AU - Collberg, Christian S.
AU - Tonella, Paolo
TI - Barrier Slicing for Remote Software Trusting.
BT - Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France
SP - 27
EP - 36
PY - 2007//
DO - 10.1109/SCAM.2007.27
UR - https://doi.org/10.1109/SCAM.2007.27
UR - https://doi.ieeecomputersociety.org/10.1109/SCAM.2007.27
ER -
TY - CPAPER
ID - DBLP:conf/acsw/ThomborsonNSH04
AU - Thomborson, Clark D.
AU - Nagra, Jasvir
AU - Somaraju, Ram
AU - He, Charles
TI - Tamper-proo ng Software Watermarks.
BT - ACSW Frontiers 2004, 2004 ACSW Workshops - the Australasian Information Security Workshop (AISW2004), the Australasian Workshop on Data Mining and Web Intelligence (DMWI2004), and the Australasian Workshop on Software Internationalisation (AWSI2004) . Dunedin, New Zealand, January 2004
SP - 27
EP - 36
PY - 2004//
UR - http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV32Thomborson.html
ER -
TY - CPAPER
ID - DBLP:conf/ih/NagraT04
AU - Nagra, Jasvir
AU - Thomborson, Clark D.
TI - Threading Software Watermarks.
BT - Information Hiding, 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers
SP - 208
EP - 223
PY - 2004//
DO - 10.1007/978-3-540-30114-1_15
UR - https://doi.org/10.1007/978-3-540-30114-1_15
ER -
TY - CPAPER
ID - DBLP:conf/softvis/CollbergKNPW03
AU - Collberg, Christian S.
AU - Kobourov, Stephen G.
AU - Nagra, Jasvir
AU - Pitts, Jacob
AU - Wampler, Kevin
TI - A System for Graph-Based Visualization of the Evolution of Software.
BT - Proceedings ACM 2003 Symposium on Software Visualization, San Diego, California, USA, June 11-13, 2003
SP - 77
EP - 86
PY - 2003//
DO - 10.1145/774833.774844
UR - https://doi.org/10.1145/774833.774844
UR - https://www.wikidata.org/entity/Q56428730
ER -
TY - CPAPER
ID - DBLP:conf/acsc/NagraTC02
AU - Nagra, Jasvir
AU - Thomborson, Clark D.
AU - Collberg, Christian S.
TI - A Functional Taxonomy for Software Watermarking.
BT - Computer Science 2002, Twenty-Fifth Australasian Computer Science Conference (ACSC2002), Monash University, Melbourne, Victoria, Australia, January/February 2002
SP - 177
EP - 186
PY - 2002//
UR - http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV4Nagra.html
ER -