Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Penn State University" +contributor:("Dinghao Wu, Dissertation Advisor/Co-Advisor"). Showing records 1 – 6 of 6 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Penn State University

1. Xu, Dongpeng. Opaque Predicate: Attack and Defense in Obfuscated Binary Code.

Degree: 2018, Penn State University

 An opaque predicate is a predicate whose value is known to the obfuscator but is difficult to deduce. It can be seamlessly applied together with… (more)

Subjects/Keywords: Opaque Predicate; Software Obfuscation; Cryptographic Function Detection; Binary Code Analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xu, D. (2018). Opaque Predicate: Attack and Defense in Obfuscated Binary Code. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/15522dux103

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Xu, Dongpeng. “Opaque Predicate: Attack and Defense in Obfuscated Binary Code.” 2018. Thesis, Penn State University. Accessed April 21, 2021. https://submit-etda.libraries.psu.edu/catalog/15522dux103.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Xu, Dongpeng. “Opaque Predicate: Attack and Defense in Obfuscated Binary Code.” 2018. Web. 21 Apr 2021.

Vancouver:

Xu D. Opaque Predicate: Attack and Defense in Obfuscated Binary Code. [Internet] [Thesis]. Penn State University; 2018. [cited 2021 Apr 21]. Available from: https://submit-etda.libraries.psu.edu/catalog/15522dux103.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Xu D. Opaque Predicate: Attack and Defense in Obfuscated Binary Code. [Thesis]. Penn State University; 2018. Available from: https://submit-etda.libraries.psu.edu/catalog/15522dux103

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

2. Wang, Shuai. Advanced Reverse Engineering Techniques for Binary Code Security Retrofitting and Analysis.

Degree: 2018, Penn State University

 In software security, many techniques and applications depend on binary code reverse engineering, i.e., analyzing and retrofitting executables with the source code unavailable. Despite the… (more)

Subjects/Keywords: reverse engineering; software security; binary code analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, S. (2018). Advanced Reverse Engineering Techniques for Binary Code Security Retrofitting and Analysis. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/15591szw175

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Shuai. “Advanced Reverse Engineering Techniques for Binary Code Security Retrofitting and Analysis.” 2018. Thesis, Penn State University. Accessed April 21, 2021. https://submit-etda.libraries.psu.edu/catalog/15591szw175.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Shuai. “Advanced Reverse Engineering Techniques for Binary Code Security Retrofitting and Analysis.” 2018. Web. 21 Apr 2021.

Vancouver:

Wang S. Advanced Reverse Engineering Techniques for Binary Code Security Retrofitting and Analysis. [Internet] [Thesis]. Penn State University; 2018. [cited 2021 Apr 21]. Available from: https://submit-etda.libraries.psu.edu/catalog/15591szw175.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang S. Advanced Reverse Engineering Techniques for Binary Code Security Retrofitting and Analysis. [Thesis]. Penn State University; 2018. Available from: https://submit-etda.libraries.psu.edu/catalog/15591szw175

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

3. Wang, Pei. Advanced Software Obfuscation Techniques and Applications.

Degree: 2018, Penn State University

 Obfuscation is an important software protection technique that prevents automated or human analyses from revealing the internal design and implementation details of software. There has… (more)

Subjects/Keywords: obfuscation; software protection; reverse engineering; empirical study; mobile apps

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, P. (2018). Advanced Software Obfuscation Techniques and Applications. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/15686pxw172

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Pei. “Advanced Software Obfuscation Techniques and Applications.” 2018. Thesis, Penn State University. Accessed April 21, 2021. https://submit-etda.libraries.psu.edu/catalog/15686pxw172.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Pei. “Advanced Software Obfuscation Techniques and Applications.” 2018. Web. 21 Apr 2021.

Vancouver:

Wang P. Advanced Software Obfuscation Techniques and Applications. [Internet] [Thesis]. Penn State University; 2018. [cited 2021 Apr 21]. Available from: https://submit-etda.libraries.psu.edu/catalog/15686pxw172.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang P. Advanced Software Obfuscation Techniques and Applications. [Thesis]. Penn State University; 2018. Available from: https://submit-etda.libraries.psu.edu/catalog/15686pxw172

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

4. Jiang, Yufei. Program Analysis Based Bloatware Mitigation and Software Customization.

Degree: 2017, Penn State University

 Modern software engineering allows us to build more complex software than ever before. On the other hand, it increasingly brings different types of redundancy into… (more)

Subjects/Keywords: Bloatware; Program Analysis; Feature Creep; Software Customization; Bytecode; Android

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jiang, Y. (2017). Program Analysis Based Bloatware Mitigation and Software Customization. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/14286yzj107

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jiang, Yufei. “Program Analysis Based Bloatware Mitigation and Software Customization.” 2017. Thesis, Penn State University. Accessed April 21, 2021. https://submit-etda.libraries.psu.edu/catalog/14286yzj107.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jiang, Yufei. “Program Analysis Based Bloatware Mitigation and Software Customization.” 2017. Web. 21 Apr 2021.

Vancouver:

Jiang Y. Program Analysis Based Bloatware Mitigation and Software Customization. [Internet] [Thesis]. Penn State University; 2017. [cited 2021 Apr 21]. Available from: https://submit-etda.libraries.psu.edu/catalog/14286yzj107.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jiang Y. Program Analysis Based Bloatware Mitigation and Software Customization. [Thesis]. Penn State University; 2017. Available from: https://submit-etda.libraries.psu.edu/catalog/14286yzj107

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

5. Ming, Jiang. Pipelined Symbolic Taint Analysis.

Degree: 2016, Penn State University

 The multifaceted benefits of taint analysis have led to its wide adoption in security applications, such as software attack detection, attack provenance investigation, and data… (more)

Subjects/Keywords: taint analysis; pipelining taint analysis; offline symbolic taint analysis; multi-core architectures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ming, J. (2016). Pipelined Symbolic Taint Analysis. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/v979v304g

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ming, Jiang. “Pipelined Symbolic Taint Analysis.” 2016. Thesis, Penn State University. Accessed April 21, 2021. https://submit-etda.libraries.psu.edu/catalog/v979v304g.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ming, Jiang. “Pipelined Symbolic Taint Analysis.” 2016. Web. 21 Apr 2021.

Vancouver:

Ming J. Pipelined Symbolic Taint Analysis. [Internet] [Thesis]. Penn State University; 2016. [cited 2021 Apr 21]. Available from: https://submit-etda.libraries.psu.edu/catalog/v979v304g.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ming J. Pipelined Symbolic Taint Analysis. [Thesis]. Penn State University; 2016. Available from: https://submit-etda.libraries.psu.edu/catalog/v979v304g

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

6. Liu, Xiao. Neural Program Synthesis for Compiler Fuzzing.

Degree: 2020, Penn State University

 Compilers are among the most fundamental programming tools for building software However, production compilers remain buggy. GNU compiler collection (GCC), a a long-lasting software released… (more)

Subjects/Keywords: compiler testing; fuzz testing; neural program synthesis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, X. (2020). Neural Program Synthesis for Compiler Fuzzing. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/17272xvl5190

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Xiao. “Neural Program Synthesis for Compiler Fuzzing.” 2020. Thesis, Penn State University. Accessed April 21, 2021. https://submit-etda.libraries.psu.edu/catalog/17272xvl5190.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Xiao. “Neural Program Synthesis for Compiler Fuzzing.” 2020. Web. 21 Apr 2021.

Vancouver:

Liu X. Neural Program Synthesis for Compiler Fuzzing. [Internet] [Thesis]. Penn State University; 2020. [cited 2021 Apr 21]. Available from: https://submit-etda.libraries.psu.edu/catalog/17272xvl5190.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu X. Neural Program Synthesis for Compiler Fuzzing. [Thesis]. Penn State University; 2020. Available from: https://submit-etda.libraries.psu.edu/catalog/17272xvl5190

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.