According to our database1, Mihai Christodorescu authored at least 43 papers between 2001 and 2020.
Legend:Book In proceedings Article PhD thesis Other
Towards a Two-Tier Hierarchical Infrastructure: An Offline Payment System for Central Bank Digital Currencies.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the Security and Privacy in Communication Networks, 2017
Learning Execution Contexts from System Call Distribution for Anomaly Detection in Smart Embedded System.
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017
Proc. Priv. Enhancing Technol., 2016
Passive security intelligence to analyze the security risks of mobile/BYOD activities.
IBM J. Res. Dev., 2016
The DragonBeam Framework: Hardware-Protected Security Modules for In-Place Intrusion Detection.
Proceedings of the 9th ACM International on Systems and Storage Conference, 2016
Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, 2016
Intrusion Detection Using Execution Contexts Learned from System Call Distributions of Real-Time Embedded Systems.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
What matters to users?: factors that affect users' willingness to share information with online advertisers.
Proceedings of the Symposium On Usable Privacy and Security, 2013
Proceedings of the International Symposium on Software Testing and Analysis, 2012
Second workshop on building analysis datasets and gathering experience returns for security (BADGERS'12).
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the Moving Target Defense, 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Runtime Verification - Second International Conference, 2011
Proceedings of the Automated Deduction - CADE-23 - 23rd International Conference on Automated Deduction, Wroclaw, Poland, July 31, 2011
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the Link Mining: Models, Algorithms, and Applications, 2010
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
ACM Trans. Program. Lang. Syst., 2008
Proceedings of the Proceeding of the 1st Annual India Software Engineering Conference, 2008
Proceedings of the Malware Detection, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
Proceedings of the 2005 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis For Software Tools and Engineering, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2004
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003
Playing Inside the Black Box: Using Dynamic Instrumentation to Create Security Holes.
Parallel Process. Lett., 2001