Mahinthan Chandramohan

According to our database1, Mahinthan Chandramohan authored at least 23 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search with Emulation.
IEEE Trans. Software Eng., 2019

2018
A multi-view context-aware approach to Android malware detection and malicious code localization.
Empir. Softw. Eng., 2018

ROPSentry: Runtime defense against ROP attacks using hardware performance counters.
Comput. Secur., 2018

2017
Context-Aware, Adaptive, and Scalable Android Malware Detection Through Online Learning.
IEEE Trans. Emerg. Top. Comput. Intell., 2017

graph2vec: Learning Distributed Representations of Graphs.
CoRR, 2017

Context-aware, Adaptive and Scalable Android Malware Detection through Online Learning (extended version).
CoRR, 2017

Steelix: program-state based binary fuzzing.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

SPAIN: security patch analysis for binaries towards understanding the pain and pills.
Proceedings of the 39th International Conference on Software Engineering, 2017

2016
Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware.
IEEE Trans. Inf. Forensics Secur., 2016

subgraph2vec: Learning Distributed Representations of Rooted Sub-graphs from Large Graphs.
CoRR, 2016

BinGo: cross-architecture cross-OS binary search.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Mystique: Evolving Android Malware for Auditing Anti-Malware Tools.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Detection and classification of malicious JavaScript via attack behavior modelling.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

An Adaptive Markov Strategy for Effective Network Intrusion Detection.
Proceedings of the 27th IEEE International Conference on Tools with Artificial Intelligence, 2015

2013
A scalable approach for malware detection through bounded feature space behavior modeling.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

2012
Detection of Mobile Malware in the Wild.
Computer, 2012

Has this bug been reported?
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012

Scalable malware clustering through coarse-grained behavior modeling.
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012

Detection of Buffer Overflow Vulnerabilities in C/C++ with Pattern Based Limited Symbolic Evaluation.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
Evolutionary design of agent-based simulation experiments.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

2010
Evolvable simulations applied to Automated Red Teaming: A preliminary study.
Proceedings of the 2010 Winter Simulation Conference, 2010

Autonomous Bee Colony Optimization for multi-objective function.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

2009
Application of Multi-objective Bee Colony Optimization Algorithm to Automated Red Teaming.
Proceedings of the 2009 Winter Simulation Conference, 2009


  Loading...