Mihai Christodorescu

According to our database1, Mihai Christodorescu authored at least 42 papers between 2001 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Robust Learning against Logical Adversaries.
CoRR, 2020

Privacy-Preserving Payment Splitting.
CoRR, 2019

The House That Knows You: User Authentication Based on IoT Data.
CoRR, 2019

COSET: A Benchmark for Evaluating Neural Program Embeddings.
CoRR, 2019

VeritasDB: High Throughput Key-Value Store with Integrity.
IACR Cryptol. ePrint Arch., 2018

The House That Knows You: User Authentication Based on IoT Data.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

REMOTEGATE: Incentive-Compatible Remote Configuration of Security Gateways.
CoRR, 2017

Enhancing Android Security Through App Splitting.
Proceedings of the Security and Privacy in Communication Networks, 2017

Learning Execution Contexts from System Call Distribution for Anomaly Detection in Smart Embedded System.
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017

(Do Not) Track Me Sometimes: Users' Contextual Preferences for Web Tracking.
PoPETs, 2016

Passive security intelligence to analyze the security risks of mobile/BYOD activities.
IBM J. Res. Dev., 2016

The DragonBeam Framework: Hardware-Protected Security Modules for In-Place Intrusion Detection.
Proceedings of the 9th ACM International on Systems and Storage Conference, 2016

PIFT: Predictive Information-Flow Tracking.
Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, 2016

Intrusion Detection Using Execution Contexts Learned from System Call Distributions of Real-Time Embedded Systems.
CoRR, 2015

Stream computing for large-scale, multi-channel cyber threat analytics.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

TroGuard: context-aware protection against web-based socially engineered trojans.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

Practical Comprehensive Bounds on Surreptitious Communication over DNS.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

What matters to users?: factors that affect users' willingness to share information with online advertisers.
Proceedings of the Symposium On Usable Privacy and Security, 2013

A quantitative study of accuracy in system call-based malware detection.
Proceedings of the International Symposium on Software Testing and Analysis, 2012

Second workshop on building analysis datasets and gathering experience returns for security (BADGERS'12).
Proceedings of the ACM Conference on Computer and Communications Security, 2012

End-to-End Software Diversification of Internet Services.
Proceedings of the Moving Target Defense, 2011

Dynamic Analysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Monitoring Data Structures Using Hardware Transactional Memory.
Proceedings of the Runtime Verification - Second International Conference, 2011

Dynamic Behavior Matching: A Complexity Analysis and New Approximation Algorithms.
Proceedings of the Automated Deduction - CADE-23 - 23rd International Conference on Automated Deduction, Wroclaw, Poland, July 31, 2011

A Declarative Framework for Intrusion Analysis.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

AccessMiner: using system-centric models for malware protection.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Mining Large Information Networks by Graph Summarization.
Proceedings of the Link Mining: Models, Algorithms, and Applications, 2010

Mining Graph Patterns Efficiently via Randomized Summaries.
Proc. VLDB Endow., 2009

Cloud security is not (just) virtualization security: a short paper.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

A semantics-based approach to malware detection.
ACM Trans. Program. Lang. Syst., 2008

Mining specifications of malicious behavior.
Proceedings of the Proceeding of the 1st Annual India Software Engineering Conference, 2008

Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?
Proceedings of the Malware Detection, 2007

Software transformations to improve malware detection.
J. Comput. Virol., 2007

OmniUnpack: Fast, Generic, and Safe Unpacking of Malware.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

Semantics-Aware Malware Detection.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

String analysis for x86 binaries.
Proceedings of the 2005 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis For Software Tools and Engineering, 2005

An auctioning reputation system based on anomaly.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Strengthening Software Self-Checksumming via Self-Modifying Code.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

Testing malware detectors.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2004

Static Analysis of Executables to Detect Malicious Patterns.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003

Playing Inside the Black Box: Using Dynamic Instrumentation to Create Security Holes.
Parallel Process. Lett., 2001