Mihai Christodorescu

According to our database1, Mihai Christodorescu authored at least 42 papers between 2001 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
The House That Knows You: User Authentication Based on IoT Data.
CoRR, 2019

COSET: A Benchmark for Evaluating Neural Program Embeddings.
CoRR, 2019

2018
VeritasDB: High Throughput Key-Value Store with Integrity.
IACR Cryptology ePrint Archive, 2018

The House That Knows You: User Authentication Based on IoT Data.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
REMOTEGATE: Incentive-Compatible Remote Configuration of Security Gateways.
CoRR, 2017

Enhancing Android Security Through App Splitting.
Proceedings of the Security and Privacy in Communication Networks, 2017

Learning Execution Contexts from System Call Distribution for Anomaly Detection in Smart Embedded System.
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017

2016
(Do Not) Track Me Sometimes: Users' Contextual Preferences for Web Tracking.
PoPETs, 2016

Passive security intelligence to analyze the security risks of mobile/BYOD activities.
IBM Journal of Research and Development, 2016

The DragonBeam Framework: Hardware-Protected Security Modules for In-Place Intrusion Detection.
Proceedings of the 9th ACM International on Systems and Storage Conference, 2016

PIFT: Predictive Information-Flow Tracking.
Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, 2016

2015
Intrusion Detection Using Execution Contexts Learned from System Call Distributions of Real-Time Embedded Systems.
CoRR, 2015

2014
Stream computing for large-scale, multi-channel cyber threat analytics.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

TroGuard: context-aware protection against web-based socially engineered trojans.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Practical Comprehensive Bounds on Surreptitious Communication over DNS.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

What matters to users?: factors that affect users' willingness to share information with online advertisers.
Proceedings of the Symposium On Usable Privacy and Security, 2013

Synthesizing near-optimal malware specifications from suspicious behaviors.
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013

2012
A quantitative study of accuracy in system call-based malware detection.
Proceedings of the International Symposium on Software Testing and Analysis, 2012

Second workshop on building analysis datasets and gathering experience returns for security (BADGERS'12).
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
End-to-End Software Diversification of Internet Services.
Proceedings of the Moving Target Defense, 2011

Dynamic Analysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Monitoring Data Structures Using Hardware Transactional Memory.
Proceedings of the Runtime Verification - Second International Conference, 2011

Dynamic Behavior Matching: A Complexity Analysis and New Approximation Algorithms.
Proceedings of the Automated Deduction - CADE-23 - 23rd International Conference on Automated Deduction, Wroclaw, Poland, July 31, 2011

2010
A Declarative Framework for Intrusion Analysis.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

AccessMiner: using system-centric models for malware protection.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Mining Large Information Networks by Graph Summarization.
Proceedings of the Link Mining: Models, Algorithms, and Applications, 2010

2009
Mining Graph Patterns Efficiently via Randomized Summaries.
PVLDB, 2009

Cloud security is not (just) virtualization security: a short paper.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2008
A semantics-based approach to malware detection.
ACM Trans. Program. Lang. Syst., 2008

2007
Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?
Proceedings of the Malware Detection, 2007

Software transformations to improve malware detection.
Journal in Computer Virology, 2007

Mining specifications of malicious behavior.
Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2007

A semantics-based approach to malware detection.
Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2007

OmniUnpack: Fast, Generic, and Safe Unpacking of Malware.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2005
Semantics-Aware Malware Detection.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

String analysis for x86 binaries.
Proceedings of the 2005 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis For Software Tools and Engineering, 2005

An auctioning reputation system based on anomaly.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Strengthening Software Self-Checksumming via Self-Modifying Code.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Testing malware detectors.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2004

2003
Static Analysis of Executables to Detect Malicious Patterns.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003

2001
Playing Inside the Black Box: Using Dynamic Instrumentation to Create Security Holes.
Parallel Processing Letters, 2001


  Loading...