Mihai Christodorescu

According to our database1, Mihai Christodorescu authored at least 56 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Do Large Code Models Understand Programming Concepts? A Black-box Approach.
CoRR, 2024

2023
Identifying and Mitigating the Security Risks of Generative AI.
Found. Trends Priv. Secur., 2023

Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations.
CoRR, 2023

Identifying and Mitigating the Security Risks of Generative AI.
CoRR, 2023

Formal Analysis of the API Proxy Problem.
CoRR, 2023

2022
CoRA: Collaborative Risk-Aware Authentication.
IACR Cryptol. ePrint Arch., 2022

A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets.
IACR Cryptol. ePrint Arch., 2022

Privacy-Preserving Application-to-Application Authentication Using Dynamic Runtime Behaviors.
CoRR, 2022

An Optimal Energy Efficient Design of Artificial Noise for Preventing Power Leakage based Side-Channel Attacks.
CoRR, 2022

Optimal Energy Efficient Design of Artificial Noise to Prevent Side-Channel Attacks.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

Robust Learning against Relational Adversaries.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

2021
Amortized Threshold Symmetric-key Encryption.
IACR Cryptol. ePrint Arch., 2021

Universal Payment Channels: An Interoperability Platform for Digital Currencies.
CoRR, 2021

2020
Privacy-Preserving Payment Splitting.
Proc. Priv. Enhancing Technol., 2020

Towards a Two-Tier Hierarchical Infrastructure: An Offline Payment System for Central Bank Digital Currencies.
CoRR, 2020

Robust Learning against Logical Adversaries.
CoRR, 2020

2019
The House That Knows You: User Authentication Based on IoT Data.
CoRR, 2019

COSET: A Benchmark for Evaluating Neural Program Embeddings.
CoRR, 2019

2018
VeritasDB: High Throughput Key-Value Store with Integrity.
IACR Cryptol. ePrint Arch., 2018

The House That Knows You: User Authentication Based on IoT Data.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
REMOTEGATE: Incentive-Compatible Remote Configuration of Security Gateways.
CoRR, 2017

Enhancing Android Security Through App Splitting.
Proceedings of the Security and Privacy in Communication Networks, 2017

Learning Execution Contexts from System Call Distribution for Anomaly Detection in Smart Embedded System.
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017

2016
(Do Not) Track Me Sometimes: Users' Contextual Preferences for Web Tracking.
Proc. Priv. Enhancing Technol., 2016

Passive security intelligence to analyze the security risks of mobile/BYOD activities.
IBM J. Res. Dev., 2016

The DragonBeam Framework: Hardware-Protected Security Modules for In-Place Intrusion Detection.
Proceedings of the 9th ACM International on Systems and Storage Conference, 2016

PIFT: Predictive Information-Flow Tracking.
Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, 2016

2015
Intrusion Detection Using Execution Contexts Learned from System Call Distributions of Real-Time Embedded Systems.
CoRR, 2015

2014
Stream computing for large-scale, multi-channel cyber threat analytics.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

TroGuard: context-aware protection against web-based socially engineered trojans.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Practical Comprehensive Bounds on Surreptitious Communication over DNS.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

What matters to users?: factors that affect users' willingness to share information with online advertisers.
Proceedings of the Symposium On Usable Privacy and Security, 2013

2012
A quantitative study of accuracy in system call-based malware detection.
Proceedings of the International Symposium on Software Testing and Analysis, 2012

Second workshop on building analysis datasets and gathering experience returns for security (BADGERS'12).
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
End-to-End Software Diversification of Internet Services.
Proceedings of the Moving Target Defense, 2011

Dynamic Analysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Monitoring Data Structures Using Hardware Transactional Memory.
Proceedings of the Runtime Verification - Second International Conference, 2011

Dynamic Behavior Matching: A Complexity Analysis and New Approximation Algorithms.
Proceedings of the Automated Deduction - CADE-23 - 23rd International Conference on Automated Deduction, Wroclaw, Poland, July 31, 2011

2010
A Declarative Framework for Intrusion Analysis.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

AccessMiner: using system-centric models for malware protection.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Mining Large Information Networks by Graph Summarization.
Proceedings of the Link Mining: Models, Algorithms, and Applications, 2010

2009
Mining Graph Patterns Efficiently via Randomized Summaries.
Proc. VLDB Endow., 2009

Cloud security is not (just) virtualization security: a short paper.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2008
A semantics-based approach to malware detection.
ACM Trans. Program. Lang. Syst., 2008

Mining specifications of malicious behavior.
Proceedings of the Proceeding of the 1st Annual India Software Engineering Conference, 2008

2007
Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?
Proceedings of the Malware Detection, 2007

Software transformations to improve malware detection.
J. Comput. Virol., 2007

OmniUnpack: Fast, Generic, and Safe Unpacking of Malware.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2005
Semantics-Aware Malware Detection.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

String analysis for x86 binaries.
Proceedings of the 2005 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis For Software Tools and Engineering, 2005

An auctioning reputation system based on anomaly.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Strengthening Software Self-Checksumming via Self-Modifying Code.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Testing malware detectors.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2004

2003
Static Analysis of Executables to Detect Malicious Patterns.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003

2001
Playing Inside the Black Box: Using Dynamic Instrumentation to Create Security Holes.
Parallel Process. Lett., 2001


  Loading...