


Остановите войну!
for scientists:


default search action
David A. Wagner 0001
Person information

- affiliation: University of California, Berkeley, CA, USA
Other persons with the same name
- David A. Wagner
- David A. Wagner 0002 — Jet Propulsion Lab, Pasadena, CA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j22]Dhanya K. A.
, P. Vinod
, Suleiman Y. Yerima
, Abul Bashar
, David A. Wagner, Abhiram T., Alan Antony, Ashil K. Shavanas, T. Gireesh Kumar
:
Obfuscated Malware Detection in IoT Android Applications Using Markov Images and CNN. IEEE Syst. J. 17(2): 2756-2766 (2023) - [c180]Chawin Sitawarin, Kornrapat Pongmala, Yizheng Chen, Nicholas Carlini, David A. Wagner:
Part-Based Models Improve Adversarial Robustness. ICLR 2023 - [c179]Yizheng Chen
, Zhoujie Ding
, Lamya Alowain
, Xinyun Chen
, David A. Wagner
:
DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection. RAID 2023: 654-668 - [c178]Yizheng Chen, Zhoujie Ding, David A. Wagner:
Continuous Learning for Android Malware Detection. USENIX Security Symposium 2023: 1127-1144 - [c177]Julien Piet, Aashish Sharma, Vern Paxson, David A. Wagner:
Network Detection of Interactive SSH Impostors Using Deep Learning. USENIX Security Symposium 2023: 4283-4300 - [i41]Yizheng Chen, Zhoujie Ding, David A. Wagner:
Continuous Learning for Android Malware Detection. CoRR abs/2302.04332 (2023) - [i40]Yizheng Chen, Zhoujie Ding, Xinyun Chen, David A. Wagner:
DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection. CoRR abs/2304.00409 (2023) - [i39]Chawin Sitawarin, Jaewon Chang, David Huang, Wesson Altoyan, David A. Wagner:
Defending Against Transfer Attacks From Public Models. CoRR abs/2310.17645 (2023) - [i38]Norman Mu, Sarah Chen, Zifan Wang, Sizhe Chen, David Karamardian, Lulwa Aljeraisy, Dan Hendrycks, David A. Wagner:
Can LLMs Follow Simple Rules? CoRR abs/2311.04235 (2023) - 2022
- [j21]Nathan Malkin, David A. Wagner, Serge Egelman:
Can Humans Detect Malicious Always-Listening Assistants? A Framework for Crowdsourcing Test Drives. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-28 (2022) - [c176]Norman Mu, Alexander Kirillov, David A. Wagner, Saining Xie:
SLIP: Self-supervision Meets Language-Image Pre-training. ECCV (26) 2022: 529-544 - [c175]Chawin Sitawarin, Zachary J. Golan-Strieb, David A. Wagner:
Demystifying the Adversarial Robustness of Random Transformation Defenses. ICML 2022: 20232-20252 - [c174]Nathan Malkin, David A. Wagner, Serge Egelman:
Runtime Permissions for Privacy in Proactive Intelligent Assistants. SOUPS @ USENIX Security Symposium 2022: 633-651 - [i37]Chawin Sitawarin, Zachary J. Golan-Strieb, David A. Wagner:
Demystifying the Adversarial Robustness of Random Transformation Defenses. CoRR abs/2207.03574 (2022) - [i36]Chawin Sitawarin, Kornrapat Pongmala, Yizheng Chen, Nicholas Carlini, David A. Wagner:
Part-Based Models Improve Adversarial Robustness. CoRR abs/2209.09117 (2022) - [i35]Nabeel Hingun, Chawin Sitawarin, Jerry Li, David A. Wagner:
REAP: A Large-Scale Realistic Adversarial Patch Benchmark. CoRR abs/2212.05680 (2022) - 2021
- [c173]Chawin Sitawarin, Supriyo Chakraborty, David A. Wagner:
SAT: Improving Adversarial Training via Curriculum-Based Loss Smoothing. AISec@CCS 2021: 25-36 - [c172]Zhanyuan Zhang, Yizheng Chen, David A. Wagner:
SEAT: Similarity Encoder by Adversarial Training for Detecting Model Extraction Attack Queries. AISec@CCS 2021: 37-48 - [c171]Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David A. Wagner:
Learning Security Classifiers with Verified Global Robustness Properties. CCS 2021: 477-494 - [c170]Chawin Sitawarin, Evgenios M. Kornaropoulos, Dawn Song, David A. Wagner:
Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams. NeurIPS 2021: 15486-15497 - [c169]Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Hopper: Modeling and Detecting Lateral Movement. USENIX Security Symposium 2021: 3093-3110 - [i34]Henry Xu, An Ju, David A. Wagner:
Model-Agnostic Defense for Lane Detection against Adversarial Attack. CoRR abs/2103.00663 (2021) - [i33]Dequan Wang, An Ju, Evan Shelhamer, David A. Wagner, Trevor Darrell:
Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks. CoRR abs/2105.08714 (2021) - [i32]Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David A. Wagner:
Learning Security Classifiers with Verified Global Robustness Properties. CoRR abs/2105.11363 (2021) - [i31]Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Hopper: Modeling and Detecting Lateral Movement (Extended Report). CoRR abs/2105.13442 (2021) - [i30]Norman Mu, Alexander Kirillov, David A. Wagner, Saining Xie:
SLIP: Self-supervision meets Language-Image Pre-training. CoRR abs/2112.12750 (2021) - 2020
- [c168]Michael McCoyd
, Won Park
, Steven Chen, Neil Shah, Ryan Roggenkemper, Minjune Hwang
, Jason Xinyu Liu
, David A. Wagner:
Minority Reports Defense: Defending Against Adversarial Patches. ACNS Workshops 2020: 564-582 - [c167]An Ju, David A. Wagner:
E-ABS: Extending the Analysis-By-Synthesis Robust Classification Model to More Complex Image Domains. AISec@CCS 2020: 25-36 - [c166]Chawin Sitawarin, David A. Wagner:
Minimum-Norm Adversarial Examples on KNN and KNN based Models. SP (Workshops) 2020: 34-40 - [c165]Zhanyuan Zhang, Benson Yuan, Michael McCoyd, David A. Wagner:
Clipped BagNet: Defending Against Sticker Attacks with Clipped Bag-of-features. SP (Workshops) 2020: 55-61 - [i29]Chawin Sitawarin, David A. Wagner:
Minimum-Norm Adversarial Examples on KNN and KNN-Based Models. CoRR abs/2003.06559 (2020) - [i28]Chawin Sitawarin, Supriyo Chakraborty, David A. Wagner:
Improving Adversarial Robustness Through Progressive Hardening. CoRR abs/2003.09347 (2020) - [i27]Michael McCoyd, Won Park, Steven Chen, Neil Shah, Ryan Roggenkemper, Minjune Hwang, Jason Xinyu Liu, David A. Wagner:
Minority Reports Defense: Defending Against Adversarial Patches. CoRR abs/2004.13799 (2020) - [i26]Neil Shah, Grant Ho, Marco Schweighauser, M. H. Afifi, Asaf Cidon, David A. Wagner:
A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts. CoRR abs/2007.14030 (2020) - [i25]Chawin Sitawarin, Evgenios M. Kornaropoulos, Dawn Song, David A. Wagner:
Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams. CoRR abs/2011.09719 (2020)
2010 – 2019
- 2019
- [j20]Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera
, Serge Egelman, David A. Wagner:
Privacy Attitudes of Smart Speaker Users. Proc. Priv. Enhancing Technol. 2019(4): 250-271 (2019) - [c164]Nathan Malkin, Serge Egelman
, David A. Wagner:
Privacy controls for always-listening devices. NSPW 2019: 78-91 - [c163]Chawin Sitawarin, David A. Wagner:
On the Robustness of Deep K-Nearest Neighbors. IEEE Symposium on Security and Privacy Workshops 2019: 1-7 - [c162]Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Detecting and Characterizing Lateral Phishing at Scale. USENIX Security Symposium 2019: 1273-1290 - [i24]Chawin Sitawarin, David A. Wagner:
On the Robustness of Deep K-Nearest Neighbors. CoRR abs/1903.08333 (2019) - [i23]Steven Chen, Nicholas Carlini, David A. Wagner:
Stateful Detection of Black-Box Adversarial Attacks. CoRR abs/1907.05587 (2019) - [i22]Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Detecting and Characterizing Lateral Phishing at Scale. CoRR abs/1910.00790 (2019) - 2018
- [j19]Primal Wijesekera
, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman
, David A. Wagner, Konstantin Beznosov:
Dynamically Regulating Mobile Application Permissions. IEEE Secur. Priv. 16(1): 64-71 (2018) - [c161]Primal Wijesekera
, Joel Reardon, Irwin Reyes, Lynn Tsai, Jung-Wei Chen, Nathan Good, David A. Wagner, Konstantin Beznosov, Serge Egelman
:
Contextualizing Privacy Decisions for Better Prediction (and Protection). CHI 2018: 268 - [c160]Inigo Incer, Michael Theodorides, Sadia Afroz, David A. Wagner:
Adversarially Robust Malware Detection Using Monotonic Classification. IWSPA@CODASPY 2018: 54-63 - [c159]Anish Athalye, Nicholas Carlini, David A. Wagner:
Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples. ICML 2018: 274-283 - [c158]Nicholas Carlini, David A. Wagner:
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. IEEE Symposium on Security and Privacy Workshops 2018: 1-7 - [c157]Michael McCoyd, David A. Wagner:
Background Class Defense Against Adversarial Examples. IEEE Symposium on Security and Privacy Workshops 2018: 96-102 - [c156]Steven Chen, Won Park, Joanna Yang, David A. Wagner:
Inferring Phone Location State. WiMob 2018: 42-47 - [i21]Nicholas Carlini, David A. Wagner:
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. CoRR abs/1801.01944 (2018) - [i20]Anish Athalye, Nicholas Carlini, David A. Wagner:
Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples. CoRR abs/1802.00420 (2018) - 2017
- [j18]Linda Naeun Lee, David Fifield, Nathan Malkin, Ganesh Iyer, Serge Egelman, David A. Wagner:
A Usability Evaluation of Tor Launcher. Proc. Priv. Enhancing Technol. 2017(3): 90 (2017) - [c155]David A. Wagner:
Security and Machine Learning. CCS 2017: 1 - [c154]Nicholas Carlini, David A. Wagner:
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods. AISec@CCS 2017: 3-14 - [c153]Michael Theodorides, David A. Wagner:
Breaking active-set backward-edge CFI. HOST 2017: 85-89 - [c152]Christopher Thompson, David A. Wagner:
A Large-Scale Study of Modern Code Review and Security in Open Source Projects. PROMISE 2017: 83-92 - [c151]Lynn Tsai, Primal Wijesekera, Joel Reardon, Irwin Reyes, Serge Egelman, David A. Wagner, Nathan Good, Jung-Wei Chen:
Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences. SOUPS 2017: 145-162 - [c150]Nicholas Carlini, David A. Wagner:
Towards Evaluating the Robustness of Neural Networks. IEEE Symposium on Security and Privacy 2017: 39-57 - [c149]Primal Wijesekera
, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman
, David A. Wagner, Konstantin Beznosov:
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences. IEEE Symposium on Security and Privacy 2017: 1077-1093 - [c148]Grant Ho, Aashish Sharma, Mobin Javed, Vern Paxson, David A. Wagner:
Detecting Credential Spearphishing in Enterprise Settings. USENIX Security Symposium 2017: 469-485 - [c147]Thurston H. Y. Dang, Petros Maniatis, David A. Wagner:
Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers. USENIX Security Symposium 2017: 815-832 - [i19]Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David A. Wagner, Konstantin Beznosov:
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences. CoRR abs/1703.02090 (2017) - [i18]Nicholas Carlini, David A. Wagner:
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods. CoRR abs/1705.07263 (2017) - [i17]Nicholas Carlini, David A. Wagner:
MagNet and "Efficient Defenses Against Adversarial Attacks" are Not Robust to Adversarial Examples. CoRR abs/1711.08478 (2017) - 2016
- [j17]David A. Wagner:
Fairness and the coin flip: technical perspective. Commun. ACM 59(4): 75 (2016) - [c146]Christopher Thompson, David A. Wagner:
Securing Recognizers for Rich Video Applications. SPSM@CCS 2016: 53-62 - [c145]Grant Ho, Derek Leung, Pratyush Mishra, Ashkan Hosseini, Dawn Song, David A. Wagner:
Smart Locks: Lessons for Securing Commodity Internet of Things Devices. AsiaCCS 2016: 461-472 - [c144]Jethro G. Beekman, John L. Manferdelli, David A. Wagner:
Attestation Transparency: Building secure Internet services for legacy clients. AsiaCCS 2016: 687-698 - [c143]Nathan Malkin, Serge Egelman, David A. Wagner:
Recovering High-Value Secrets with SGX and Social Authentication. WAY@SOUPS 2016 - [c142]Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David A. Wagner, Wenchao Zhou:
Hidden Voice Commands. USENIX Security Symposium 2016: 513-530 - [i16]Nicholas Carlini, David A. Wagner:
Defensive Distillation is Not Robust to Adversarial Examples. CoRR abs/1607.04311 (2016) - [i15]Michael McCoyd, David A. Wagner:
Spoofing 2D Face Detection: Machines See People Who Aren't There. CoRR abs/1608.02128 (2016) - [i14]Nicholas Carlini, David A. Wagner:
Towards Evaluating the Robustness of Neural Networks. CoRR abs/1608.04644 (2016) - 2015
- [c141]Thurston H. Y. Dang, Petros Maniatis, David A. Wagner:
The Performance Cost of Shadow Stacks and Stack Canaries. AsiaCCS 2015: 555-566 - [c140]Rebecca S. Portnoff, Linda Naeun Lee, Serge Egelman
, Pratyush Mishra, Derek Leung, David A. Wagner:
Somebody's Watching Me?: Assessing the Effectiveness of Webcam Indicator Lights. CHI 2015: 1649-1658 - [c139]Nicholas Carlini, Antonio Barresi, Mathias Payer, David A. Wagner, Thomas R. Gross:
Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. USENIX Security Symposium 2015: 161-176 - [c138]Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David A. Wagner, Konstantin Beznosov:
Android Permissions Remystified: A Field Study on Contextual Integrity. USENIX Security Symposium 2015: 499-514 - [i13]Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David A. Wagner, Konstantin Beznosov:
Android Permissions Remystified: A Field Study on Contextual Integrity. CoRR abs/1504.03747 (2015) - [i12]Linda Naeun Lee, Serge Egelman, Joong Hwa Lee, David A. Wagner:
Risk Perceptions for Wearable Devices. CoRR abs/1504.05694 (2015) - 2014
- [c137]David A. Wagner:
Developing Social Capital in Online Communities: The Challenge of Fluidity. AMCIS 2014 - [c136]Serge Egelman
, Sakshi Jain, Rebecca S. Portnoff, Kerwell Liao, Sunny Consolvo, David A. Wagner:
Are You Ready to Lock? CCS 2014: 750-761 - [c135]Joshua Tan, Khanh Nguyen, Michael Theodorides, Heidi Negrón-Arroyo, Christopher Thompson, Serge Egelman
, David A. Wagner:
The effect of developer-specified explanations for permission requests on smartphone user behavior. CHI 2014: 91-100 - [c134]Nicholas Carlini, David A. Wagner:
ROP is Still Dangerous: Breaking Modern Defenses. USENIX Security Symposium 2014: 385-399 - 2013
- [c133]Elizabeth Ha, David A. Wagner:
Do Android users write about electric sheep? Examining consumer reviews in Google Play. CCNC 2013: 149-157 - [c132]Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler, David A. Wagner:
An Empirical Study on the Effectiveness of Security Code Review. ESSoS 2013: 197-212 - [c131]Cynthia Sturton, Rohit Sinha, Thurston H. Y. Dang, Sakshi Jain, Michael McCoyd, Wei Yang Tan, Petros Maniatis, Sanjit A. Seshia, David A. Wagner:
Symbolic software model validation. MEMOCODE 2013: 97-108 - [c130]Christopher Thompson, Maritza L. Johnson, Serge Egelman
, David A. Wagner, Jennifer King
:
When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources. SOUPS 2013: 1:1-1:14 - [c129]Matthew Finifter, Devdatta Akhawe, David A. Wagner:
An Empirical Study of Vulnerability Rewards Programs. USENIX Security Symposium 2013: 273-288 - [c128]Eric Kim, Nicholas Carlini, Andrew Chang, George Yiu, Kai Wang, David A. Wagner:
Improved Support for Machine-assisted Ballot-level Audits. EVT/WOTE 2013 - [c127]Erika Chin, David A. Wagner:
Bifocals: Analyzing WebView Vulnerabilities in Android Applications. WISA 2013: 138-159 - [p1]Serge Egelman
, Adrienne Porter Felt, David A. Wagner:
Choice Architecture and Smartphone Privacy: There's a Price for That. The Economics of Information Security and Privacy 2013: 211-236 - 2012
- [j16]Philip B. Stark
, David A. Wagner:
Evidence-Based Elections. IEEE Secur. Priv. 10(5): 33-41 (2012) - [c126]Adrienne Porter Felt, Serge Egelman
, David A. Wagner:
I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns. SPSM@CCS 2012: 33-44 - [c125]Drew Fisher, Leah Dorner, David A. Wagner:
Short paper: location privacy: user behavior in the field. SPSM@CCS 2012: 51-56 - [c124]David Kantola, Erika Chin, Warren He, David A. Wagner:
Reducing attack surfaces for intra-application communication in android. SPSM@CCS 2012: 69-80 - [c123]Paul Pearce, Adrienne Porter Felt, Gabriel Nunez, David A. Wagner:
AdDroid: privilege separation for applications and advertisers in Android. AsiaCCS 2012: 71-72 - [c122]Rohit Sinha, Cynthia Sturton, Petros Maniatis, Sanjit A. Seshia, David A. Wagner:
Verification with small and short worlds. FMCAD 2012: 68-77 - [c121]Erika Chin, Adrienne Porter Felt, Vyas Sekar, David A. Wagner:
Measuring user confidence in smartphone security and privacy. SOUPS 2012: 1 - [c120]Adrienne Porter Felt, Elizabeth Ha, Serge Egelman
, Ariel Haney, Erika Chin, David A. Wagner:
Android permissions: user attention, comprehension, and behavior. SOUPS 2012: 3 - [c119]Patrick Baxter, Anne Edmundson, Keishla Ortiz, Ana Maria Quevedo, Samuel Rodríguez, Cynthia Sturton, David A. Wagner:
Automated Analysis of Election Audit Logs. EVT/WOTE 2012 - [c118]Nicholas Carlini, Adrienne Porter Felt, David A. Wagner:
An Evaluation of the Google Chrome Extension Security Architecture. USENIX Security Symposium 2012: 97-111 - [c117]Adrienne Porter Felt, Serge Egelman, Matthew Finifter, Devdatta Akhawe, David A. Wagner:
How to Ask for Permission. HotSec 2012 - [c116]Kai Wang, Nicholas Carlini, Eric Kim, Ivan Motyashov, Daniel Nguyen, David A. Wagner:
Operator-Assisted Tabulation of Optical Scan Ballots. EVT/WOTE 2012 - [c115]Serge Egelman, Adrienne Porter Felt, David A. Wagner:
Choice Architecture and Smartphone Privacy: There's a Price for That. WEIS 2012 - 2011
- [j15]Moses D. Liskov, Ronald L. Rivest, David A. Wagner:
Tweakable Block Ciphers. J. Cryptol. 24(3): 588-613 (2011) - [c114]Adrienne Porter Felt, Matthew Finifter, Erika Chin, Steve Hanna, David A. Wagner:
A survey of mobile malware in the wild. SPSM@CCS 2011: 3-14 - [c113]Adrienne Porter Felt, Matthew Finifter, Joel Weinberger, David A. Wagner:
Diesel: applying privilege separation to database access. AsiaCCS 2011: 416-422 - [c112]Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David A. Wagner:
Android permissions demystified. CCS 2011: 627-638 - [c111]Erika Chin, Adrienne Porter Felt, Kate Greenwood, David A. Wagner:
Analyzing inter-application communication in Android. MobiSys 2011: 239-252 - [c110]Cynthia Sturton, Matthew Hicks, David A. Wagner, Samuel T. King:
Defeating UCI: Building Stealthy and Malicious Hardware. IEEE Symposium on Security and Privacy 2011: 64-77 - [c109]Theron Ji, Eric Kim, Raji Srikantan, Alan Tsai, Arel Cordero, David A. Wagner:
An Analysis of Write-in Marks on Optical Scan Ballots. EVT/WOTE 2011 - [c108]Adrienne Porter Felt, Kate Greenwood, David A. Wagner:
The Effectiveness of Application Permissions. WebApps 2011 - 2010
- [c107]Adrian Mettler, David A. Wagner, Tyler Close:
Joe-E: A Security-Oriented Subset of Java. NDSS 2010 - [c106]Adrian Mettler, David A. Wagner:
Class properties for security review in an object-capability subset of Java: (short paper). PLAS 2010: 7 - [c105]Arel Cordero, Theron Ji, Alan Tsai, Keaton Mowery, David A. Wagner:
Efficient User-Guided Ballot Image Verification. EVT/WOTE 2010 - [c104]Akshay Krishnamurthy, Adrian Mettler, David A. Wagner:
Fine-grained privilege separation for web applications. WWW 2010: 551-560
2000 – 2009
- 2009
- [j14]Hsin-Yi Tsai, Yu-Lun Huang, David A. Wagner:
A graph approach to quantitative analysis of control-flow obfuscating transformations. IEEE Trans. Inf. Forensics Secur. 4(2): 257-267 (2009) - [c103]