| 2009 |
13 | | Chen Chen,
Cindy Xide Lin,
Matt Fredrikson,
Mihai Christodorescu,
Xifeng Yan,
Jiawei Han:
Mining Graph Patterns Efficiently via Randomized Summaries.
PVLDB 2(1): 742-753 (2009) |
| 2008 |
12 | | Mihai Christodorescu,
Somesh Jha,
Christopher Kruegel:
Mining specifications of malicious behavior.
ISEC 2008: 5-14 |
11 | | Mila Dalla Preda,
Mihai Christodorescu,
Somesh Jha,
Saumya K. Debray:
A semantics-based approach to malware detection.
ACM Trans. Program. Lang. Syst. 30(5): (2008) |
| 2007 |
10 | | Lorenzo Martignoni,
Mihai Christodorescu,
Somesh Jha:
OmniUnpack: Fast, Generic, and Safe Unpacking of Malware.
ACSAC 2007: 431-441 |
9 | | Mihai Christodorescu,
Somesh Jha,
Christopher Kruegel:
Mining specifications of malicious behavior.
ESEC/SIGSOFT FSE 2007: 5-14 |
8 | | Mila Dalla Preda,
Mihai Christodorescu,
Somesh Jha,
Saumya K. Debray:
A semantics-based approach to malware detection.
POPL 2007: 377-388 |
7 | | Mihai Christodorescu,
Somesh Jha,
Johannes Kinder,
Stefan Katzenbeisser,
Helmut Veith:
Software transformations to improve malware detection.
Journal in Computer Virology 3(4): 253-265 (2007) |
| 2005 |
6 | | Shai Rubin,
Mihai Christodorescu,
Vinod Ganapathy,
Jonathon T. Giffin,
Louis Kruger,
Hao Wang,
Nicholas Kidd:
An auctioning reputation system based on anomaly.
ACM Conference on Computer and Communications Security 2005: 270-279 |
5 | | Jonathon T. Giffin,
Mihai Christodorescu,
Louis Kruger:
Strengthening Software Self-Checksumming via Self-Modifying Code.
ACSAC 2005: 23-32 |
4 | | Mihai Christodorescu,
Somesh Jha,
Sanjit A. Seshia,
Dawn Xiaodong Song,
Randal E. Bryant:
Semantics-Aware Malware Detection.
IEEE Symposium on Security and Privacy 2005: 32-46 |
3 | | Mihai Christodorescu,
Nicholas Kidd,
Wen-Han Goh:
String analysis for x86 binaries.
PASTE 2005: 88-95 |
| 2004 |
2 | | Mihai Christodorescu,
Somesh Jha:
Testing malware detectors.
ISSTA 2004: 34-44 |
| 2001 |
1 | | Barton P. Miller,
Mihai Christodorescu,
Robert Iverson,
Tevfik Kosar,
Alexander Mirgorodskii,
Florentina I. Popovici:
Playing Inside the Black Box: Using Dynamic Instrumentation to Create Security Holes.
Parallel Processing Letters 11(2/3): 267-280 (2001) |