dblp.uni-trier.dewww.uni-trier.de

Mihai Christodorescu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
12EEMihai Christodorescu, Somesh Jha, Christopher Kruegel: Mining specifications of malicious behavior. ISEC 2008: 5-14
11EEMila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray: A semantics-based approach to malware detection. ACM Trans. Program. Lang. Syst. 30(5): (2008)
2007
10EELorenzo Martignoni, Mihai Christodorescu, Somesh Jha: OmniUnpack: Fast, Generic, and Safe Unpacking of Malware. ACSAC 2007: 431-441
9EEMihai Christodorescu, Somesh Jha, Christopher Kruegel: Mining specifications of malicious behavior. ESEC/SIGSOFT FSE 2007: 5-14
8EEMila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray: A semantics-based approach to malware detection. POPL 2007: 377-388
7EEMihai Christodorescu, Somesh Jha, Johannes Kinder, Stefan Katzenbeisser, Helmut Veith: Software transformations to improve malware detection. Journal in Computer Virology 3(4): 253-265 (2007)
2005
6EEShai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang, Nicholas Kidd: An auctioning reputation system based on anomaly. ACM Conference on Computer and Communications Security 2005: 270-279
5EEJonathon T. Giffin, Mihai Christodorescu, Louis Kruger: Strengthening Software Self-Checksumming via Self-Modifying Code. ACSAC 2005: 23-32
4EEMihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant: Semantics-Aware Malware Detection. IEEE Symposium on Security and Privacy 2005: 32-46
3EEMihai Christodorescu, Nicholas Kidd, Wen-Han Goh: String analysis for x86 binaries. PASTE 2005: 88-95
2004
2EEMihai Christodorescu, Somesh Jha: Testing malware detectors. ISSTA 2004: 34-44
2001
1 Barton P. Miller, Mihai Christodorescu, Robert Iverson, Tevfik Kosar, Alexander Mirgorodskii, Florentina I. Popovici: Playing Inside the Black Box: Using Dynamic Instrumentation to Create Security Holes. Parallel Processing Letters 11(2/3): 267-280 (2001)

Coauthor Index

1Randal E. Bryant [4]
2Saumya K. Debray [8] [11]
3Vinod Ganapathy [6]
4Jonathon T. Giffin [5] [6]
5Wen-Han Goh [3]
6Robert Iverson [1]
7Somesh Jha [2] [4] [7] [8] [9] [10] [11] [12]
8Stefan Katzenbeisser [7]
9Nicholas Kidd [3] [6]
10Johannes Kinder [7]
11Tevfik Kosar [1]
12Christopher Krügel (Christopher Kruegel) [9] [12]
13Louis Kruger [5] [6]
14Lorenzo Martignoni [10]
15Barton P. Miller [1]
16Alexander Mirgorodskii [1]
17Florentina I. Popovici [1]
18Mila Dalla Preda [8] [11]
19Shai Rubin [6]
20Sanjit A. Seshia [4]
21Dawn Xiaodong Song [4]
22Helmut Veith [7]
23Hao Wang [6]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)