@inproceedings{conf/sp/YakdanDG016, added-at = {2023-03-24T00:00:00.000+0100}, author = {Yakdan, Khaled and Dechand, Sergej and Gerhards-Padilla, Elmar and Smith, Matthew}, biburl = {https://www.bibsonomy.org/bibtex/2b7f4e1d2ee55b52f4e3ed059b5044ae0/dblp}, booktitle = {IEEE Symposium on Security and Privacy}, crossref = {conf/sp/2016}, ee = {https://doi.ieeecomputersociety.org/10.1109/SP.2016.18}, interhash = {0e1d498c8f3fa06b5f9a920d86a28550}, intrahash = {b7f4e1d2ee55b52f4e3ed059b5044ae0}, isbn = {978-1-5090-0824-7}, keywords = {dblp}, pages = {158-177}, publisher = {IEEE Computer Society}, timestamp = {2024-04-10T19:09:32.000+0200}, title = {Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study.}, url = {http://dblp.uni-trier.de/db/conf/sp/sp2016.html#YakdanDG016}, year = 2016 } @inproceedings{yakdan2016helping, added-at = {2016-12-06T19:34:21.000+0100}, author = {Yakdan, K. and Dechand, S. and Gerhards-Padilla, E. and Smith, M.}, biburl = {https://www.bibsonomy.org/bibtex/279cca559b3e5a90554e4fcfa10baa79d/smithl3s}, booktitle = {2016 IEEE Symposium on Security and Privacy (SP)}, doi = {10.1109/SP.2016.18}, interhash = {0e1d498c8f3fa06b5f9a920d86a28550}, intrahash = {79cca559b3e5a90554e4fcfa10baa79d}, keywords = {(software);DREAM++;Hex-Rays analysis;semantics-preserving code code;binary code;computer code;malicious codes;Malware;Manuals;Optimization;Reverse decompiler;Acceleration;Binary decompiler;Regin decompiler;assembly engineering;Security family;academic invasive malware myown security;decompilation;decompiled software;malware software;source transformations;usability-optimized}, month = may, pages = {158-177}, timestamp = {2016-12-06T19:34:21.000+0100}, title = {Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study}, year = 2016 }