Skip to main content

Stephen Drape : Publications

Click here to download all publications in a single bibtex file

@techreport{RR-10-02,
  title = "Intellectual Property Protection using Obfuscation",
  author = "Stephen Drape",
  year = "2010",
  affiliation = "OUCL",
  month = "March",
  number = "RR-10-02",
  pages = "51",
}
@inproceedings{drapesas09,
  title = "Creating transformations for matrix obfuscation",
  author = "Stephen Drape and Irina Voiculescu",
  year = "2009",
  booktitle = "Proceedings of SAS 2009",
  institution = "The 16th International Static Analysis Symposium",
  location = "Los Angeles, CA",
  month = "August",
  doi = "10.1007/978-3-642-03237-0_19",
}
@techreport{RR-08-12,
  title = "The Use of Matrices in Obfuscation",
  author = "Stephen Drape and Irina Voiculescu",
  year = "2008",
  institution = "Oxford University Computing Laboratory",
  month = "December",
  number = "RR-08-12",
}
@inproceedings{majumdar07metrics,
  title = "Metrics-based Evaluation of Slicing Obfuscations",
  author = "Anirban Majumdar and Stephen Drape and Clark Thomborson",
  year = "2007",
  booktitle = "Proceeding of the Third International Symposium on Information Assurance and Security",
  month = "August",
  pages = "472--477",
  publisher = "IEEE Computer Society",
  doi = "10.1109/IAS.2007.50",
}
@techreport{drape07tech1,
  title = "The Suitability of Different Binary Tree Obfuscations",
  author = "Stephen Drape",
  year = "2007",
  address = "Auckland, New Zealand",
  institution = "CDMTCS, The University of Auckland",
  month = "June",
  number = "310",
}
@techreport{drape07tech2,
  title = "Design and Evaluation of Slicing Obfuscations",
  author = "Stephen Drape and Anirban Majumdar",
  year = "2007",
  address = "Auckland, New Zealand",
  institution = "CDMTCS, The University of Auckland",
  month = "June",
  number = "311",
}
@article{drape07split,
  title = "Generalising the Array Split Obfuscation",
  author = "Stephen Drape",
  year = "2007",
  journal = "Information Sciences",
  month = "January",
  number = "1",
  pages = "202--219",
  publisher = "Elsevier",
  volume = "177",
  doi = "10.1016/j.ins.2006.03.012",
}
@inproceedings{majumdar07slicing,
  title = "Slicing Obfuscations: Design, Correctness and Evaluation",
  author = "Anirban Majumdar and Stephen Drape and Clark Thomborson",
  year = "2007",
  booktitle = "DRM '07: Proceedings of the 2007 ACM workshop on Digital Rights Management",
  isbn = "978-1-59593-884-8",
  location = "Alexandria, Virginia, USA",
  pages = "70--81",
  publisher = "ACM Press",
  doi = "/10.1145/1314276.1314290",
}
@inproceedings{drape07specifying,
  title = "Specifying Imperative Data Obfuscations",
  author = "Stephen Drape and Clark Thomborson and Anirban Majumdar",
  year = "2007",
  booktitle = "Proceeding of the 10th Information Security Conference (ISC 07)",
  issn = "0302-9743",
  pages = "299--314",
  publisher = "Springer",
  series = "Lecture Notes in Computer Science",
  volume = "4779",
  doi = "10.1007/978-3-540-75496-1_20",
}
@inproceedings{drape07slicing,
  title = "Slicing Aided Design of Obfuscating Transforms",
  author = "Stephen Drape and Anirban Majumdar and Clark Thomborson",
  year = "2007",
  address = "Melbourne, Australia",
  booktitle = "Proceedings of the 6th International Computing and Information Systems Conference (ICIS 2007)",
  pages = "1019--1024",
  publisher = "IEEE Computer Society",
  doi = "10.1109/ICIS.2007.167",
}
@inproceedings{majumdar06survey,
  title = "A Survey of Control-Flow Obfuscations.",
  author = "Anirban Majumdar and Clark D. Thomborson and Stephen Drape",
  year = "2006",
  booktitle = "Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India",
  month = "December",
  pages = "353-356",
  doi = "10.1007/11961635_26",
}
@inproceedings{drape06obfuscation,
  title = "An Obfuscation for Binary Trees",
  author = "Stephen Drape",
  year = "2006",
  booktitle = "TENCON 2006: 2006 IEEE Region 10 Conference",
  month = "November",
  doi = "10.1109/TENCON.2006.343985",
}
@techreport{drape04tree,
  title = "Using Haskell to Model Tree Obfuscations",
  author = "Stephen Drape",
  year = "2004",
  institution = "Oxford University Computing Laboratory",
  month = "July",
  number = "RR-04-17",
}
@techreport{drape04matrix,
  title = "The Matrix Obfuscated",
  author = "Stephen Drape",
  year = "2004",
  institution = "Oxford University Computing Laboratory",
  month = "June",
  number = "RR-04-12",
}
@techreport{drape04set,
  title = "Obfuscating Set Representations",
  author = "Stephen Drape",
  year = "2004",
  institution = "Oxford University Computing Laboratory",
  month = "May",
  number = "RR-04-09",
}
@phdthesis{drape04dphil,
  title = "Obfuscation of Abstract Data-Types",
  author = "Stephen Drape",
  year = "2004",
  school = "Oxford University Computing Laboratory",
}
@book{PP11-16,
  title = "Problem Pages 11-16",
  author = "Barbara Cullingworth and Steve Drape",
  year = "2003",
  isbn = "0906588529",
  publisher = "The Mathematical Association",
}
@book{PP14-19,
  title = "Problem Pages 14-19",
  author = "Charlie Stripp and Steve Drape",
  year = "2002",
  isbn = "0906588456",
  publisher = "The Mathematical Association",
}
@inproceedings{drape02trans,
  title = "Transforming the .NET Intermediate Language Using Path Logic Programming",
  author = "Stephen Drape and Oege de Moor and Ganesh Sittampalam",
  year = "2002",
  booktitle = "Principles and Practice of Declarative Programming",
  pages = "133--144",
  publisher = "ACM Press",
}
@mastersthesis{drape01msc,
  title = "Functional Cryptography",
  author = "Stephen Drape",
  year = "2001",
}