Thomas H. Austin

Orcid: 0000-0003-2428-0687

Affiliations:
  • San Jose State University, San Jose, CA, USA


According to our database1, Thomas H. Austin authored at least 44 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Autonomous Lending Organization on Ethereum with Credit Scoring.
Proceedings of the Silicon Valley Cybersecurity Conference, 2023

2022
TontineCoin: Survivor-based Proof-of-Stake.
Peer-to-Peer Netw. Appl., 2022

A Blockchain-Based Tamper-Resistant Logging Framework.
Proceedings of the Silicon Valley Cybersecurity Conference - Third Conference, 2022

2021
Crowdfunding Non-fungible Tokens on the Blockchain.
Proceedings of the Silicon Valley Cybersecurity Conference - Second Conference, 2021

2020
BioBlockchain: Useful Proof-of-Work with Multiple Sequence Alignment.
Proceedings of the Silicon Valley Cybersecurity Conference - First Conference, 2020

SpartanGold: A Blockchain for Education, Experimentation, and Rapid Prototyping.
Proceedings of the Silicon Valley Cybersecurity Conference - First Conference, 2020

TontineCoin: Murder-Based Proof-of-Stake.
Proceedings of the 2nd IEEE International Conference on Decentralized Applications and Infrastructures, 2020

SharedWealth: Disincentivizing Mining Pools Through Burning and Minting.
Proceedings of the Business Information Systems Workshops, 2020

2019
Ping-Pong Governance: Token Locking for Enabling Blockchain Self-governance.
Proceedings of the 1st International Conference on Mathematical Research for Blockchain Economy, 2019

Lock and Load: A Model for Free Blockchain Transactions through Token Locking.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2019

2018
Function Call Graphs Versus Machine Learning for Malware Detection.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

Access Control Mechanism to Mitigate Cordova Plugin Attacks in Hybrid Applications.
J. Inf. Process., 2018

Autocorrelation Analysis of Financial Botnet Traffic.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2017
Clustering for malware classification.
J. Comput. Virol. Hacking Tech., 2017

A comparison of static, dynamic, and hybrid analysis for malware detection.
J. Comput. Virol. Hacking Tech., 2017

Multiple Facets for Dynamic Information Flow with Exceptions.
ACM Trans. Program. Lang. Syst., 2017

SocioBot: a Twitter-based botnet.
Int. J. Secur. Networks, 2017

Using Precise Taint Tracking for Auto-sanitization.
Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, 2017

Access Control for Plugins in Cordova-Based Hybrid Applications.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Support vector machines and malware detection.
J. Comput. Virol. Hacking Tech., 2016

Clustering versus SVM for malware detection.
J. Comput. Virol. Hacking Tech., 2016

Web-based Volunteer Computing for Solving the Elliptic Curve Discrete Logarithm Problem.
Int. J. Netw. Comput., 2016

Faceted Dynamic Information Flow via Control and Data Monads.
Proceedings of the Principles of Security and Trust - 5th International Conference, 2016

Precise, dynamic information flow for database-backed applications.
Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2016

Advanced transcriptase for JavaScript malware.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

Malware Detection Using Dynamic Birthmarks.
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016

Static Analysis of Malicious Java Applets.
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016

2015
Hunting for metamorphic JavaScript malware.
J. Comput. Virol. Hacking Tech., 2015

Dueling hidden Markov models for virus analysis.
J. Comput. Virol. Hacking Tech., 2015

Singular value decomposition and metamorphic detection.
J. Comput. Virol. Hacking Tech., 2015

Hidden Markov models for malware classification.
J. Comput. Virol. Hacking Tech., 2015

Compression-based analysis of metamorphic malware.
Int. J. Secur. Networks, 2015

End-To-End Policy-Agnostic Security for Database-Backed Applications.
CoRR, 2015

Volunteer Computing for Solving an Elliptic Curve Discrete Logarithm Problem.
Proceedings of the Third International Symposium on Computing and Networking, 2015

2014
Metamorphic code generation from LLVM bytecode.
J. Comput. Virol. Hacking Tech., 2014

2013
Dynamic Information Flow Analysis for JavaScript in a Web Browser.
PhD thesis, 2013

Faceted execution of policy-agnostic programs.
Proceedings of the 2013 ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, 2013

Exploring Hidden Markov Models for Virus Analysis: A Semantic Approach.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2012
Multiple facets for dynamic information flow.
Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2012

A Functional View of Imperative Information Flow.
Proceedings of the Programming Languages and Systems - 10th Asian Symposium, 2012

2011
Virtual values for language extension.
Proceedings of the 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2011

2010
Designing a Secure Programming Language.
Proceedings of the Handbook of Information and Communication Security, 2010

Permissive dynamic information flow analysis.
Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, 2010

2009
Efficient purely-dynamic information flow analysis.
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009


  Loading...