-

Publications of M Madou

Conference publications

  1. Jan Cappaert, Bart Preneel, Bertrand Anckaert, Matias Madou and Koen De Bosschere Towards Tamper Resistant Code Encryption: Practice and Experience Proceedings of the 4th Information Security Practice and Experience Conference(4991), pp. 86-100 (2008)
  2. Bertrand Anckaert, Matias Madou, Bjorn De Sutter, Bruno De Bus, Koen De Bosschere and Bart Preneel Program Obfuscation: A Quantitative Approach Proceedings of the 2007 ACM workshop on Quality of protection, pp. 15-20 (2007)
  3. Bertrand Anckaert, Matias Madou and Koen De Bosschere A Model for Self-Modifying Code Proceedings of the 8th Information Hiding Conference, Vol. 4437(4437), pp. 232-248 (2007)
  4. Mila Dalla Preda, Matias Madou, Koen De Bosschere and Roberto Giacobazzi Opaque Predicates Detection by Abstract Interpretation Algebraic Methodology and Software Technology, 11th International Conference (AMAST06), Vol. 4019, pp. 81-95 (2006)
  5. Matias Madou, Ludo Van Put and Koen De Bosschere Understanding Obfuscated Code Proceedings of the 14th IEEE International Conference on Program Comprehension (ICPC06), pp. 268-271 (2006)
  6. Matias Madou, Bertrand Anckaert, Bruno De Bus, Koen De Bosschere, Jan Cappaert and Bart Preneel On the Effectiveness of Source Code Transformations for Binary Obfuscation Proceedings of the International Conference on Software Engineering Research and Practice (SERP06), pp. 527-533 (2006)
  7. Mila Dalla Preda, Matias Madou, Koen De Bosschere and Roberto Giacobazzi Opaque Predicates Detection by Abstract Interpretation Proceedings of the 1st International Workshop on Emerging Applications of Abstract Interpretation (EAAI06), pp. 35-50 (2006)
  8. Matias Madou, Ludo Van Put and Koen De Bosschere Loco: An Interactive Code (De)Obfuscation tool Proceedings of ACM SIGPLAN 2006 Workshop on Partial Evaluation and Program Manipulation (PEPM `06), pp. 140-144 (2006)
  9. Matias Madou, Bertrand Anckaert, Patrick Moseley, Saumya Debray, Bjorn De Sutter and Koen De Bosschere Software Protection Through Dynamic Code Mutation Information Security Applications: 6th International Workshop (WISA 2005), Vol. 3786, pp. 194 - 206 (2006)
  10. Matias Madou, Bertrand Anckaert, Bjorn De Sutter and Koen De Bosschere Hybrid Static-Dynamic Attacks against Software Protection Mechanisms Proceedings of the Fifth ACM Workshop on Digital Rights Management, pp. 75-82 (2005)
  11. Sharath Udupa, Saumya Debray and Matias Madou Deobfuscation Reverse Engineering Obfuscated Code Proceedings of the Twelfth Working Conference on Reverse Engineering, pp. 45-54 (2005)
  12. Matias Madou and Bertrand Anckaert Code Obfuscation Transformations Sixth FTW PhD Symposium, pp. on CD (2005)
  13. Bertrand Anckaert and Matias Madou A Model for Self-Modifying Code Architectures and Compilers for Embedded Systems(ACES05): Symposium proceedings, pp. 1-4 (2005)
  14. Ludo Van Put, Bjorn De Sutter, Matias Madou, Bruno De Bus, Dominique Chanet, Kristof Smits and Koen De Bosschere LANCET: a nifty code editing tool Proceedings of the 6th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering (PASTE`05), pp. 75-81 (2005)
  15. Matias Madou, Ludo Van Put and Koen De Bosschere Loco: An interactive Code (De)Obfuscation tool Architectures and Compilers for Embedded Systems(ACES05): Symposium Proceedings, pp. 5-8 (2005)
  16. Matias Madou, Bertrand Anckaert and Koen De Bosschere Code (De)Obfuscation Advanced Computer Architecture and Compilation for Embedded Systems (ACACES05), pp. 291-294 (2005)
  17. Matias Madou Obfuscation at link-time Fifth FTW PhD Symposium, pp. on CD (2004)
  18. Matias Madou Obfuscation at link-time Program Acceleration through Application and Architecture driven Code Transformations: Symposium Proceedings, pp. 87-89 (2004)
  19. Matias Madou, Bjorn De Sutter, Bruno De Bus, Ludo Van Put and Koen De Bosschere Link-time Compaction of MIPS Programs Proceedings of the International Conference on Embedded Systems & Applications, pp. 70-75 (2004)

Other publications

  1. Matias Madou Application security through program obfuscation pp. XVIII, 145 (2006)
  2. M. Madou BIRMA: Binary Rewriter for the MIPS Architecture Afstudeerwerk FTW, UGent, pp. (2003)