Year |
Citation |
Score |
2016 |
Yoon MK, Christodorescu M, Sha L, Mohan S. The dragonbeam framework: Hardware-protected security modules for in-place intrusion detection Systor 2016 - Proceedings of the 9th Acm International Systems and Storage Conference. DOI: 10.1145/2928275.2928290 |
0.368 |
|
2012 |
Canali D, Lanzi A, Balzarotti D, Kruegel C, Christodorescu M, Kirda E. A quantitative study of accuracy in system call-based malware detection 2012 International Symposium On Software Testing and Analysis, Issta 2012 - Proceedings. 122-132. DOI: 10.1145/04000800.2336768 |
0.333 |
|
2010 |
Lanzi A, Balzarotti D, Kruegel C, Christodorescu M, Kirda E. AccessMiner: Using system-centric models for malware protection Proceedings of the Acm Conference On Computer and Communications Security. 399-412. DOI: 10.1145/1866307.1866353 |
0.41 |
|
2010 |
Fredrikson M, Christodorescu M, Giffin J, Jha S. A declarative framework for intrusion analysis Advances in Information Security. 46: 179-200. DOI: 10.1007/978-1-4419-0140-8_9 |
0.321 |
|
2008 |
Preda MD, Christodorescu M, Jha S, Debray S. A semantics-based approach to malware detection Acm Transactions On Programming Languages and Systems. 30: 25. DOI: 10.1145/1387673.1387674 |
0.418 |
|
2008 |
Christodorescu M, Jha S, Kruegel C. Mining specifications of malicious behavior Proceedings of the 2008 1st India Software Engineering Conference, Isec'08. 5-14. DOI: 10.1145/1342211.1342215 |
0.302 |
|
2007 |
Preda MD, Christodorescu M, Jha S, Debray S. A semantics-based approach to malware detection Conference Record of the Annual Acm Symposium On Principles of Programming Languages. 377-388. DOI: 10.1145/1190216.1190270 |
0.341 |
|
2007 |
Christodorescu M, Jha S, Kinder J, Katzenbeisser S, Veith H. Software transformations to improve malware detection Journal in Computer Virology. 3: 253-265. DOI: 10.1007/S11416-007-0059-8 |
0.399 |
|
2007 |
Christodorescu M, Jha S, Maughan D, Song D, Wang C. Malware detection Advances in Information Security. 27. |
0.32 |
|
2005 |
Christodorescu M, Jha S, Seshia SA, Song D, Bryant RE. Semantics-aware malware detection Proceedings - Ieee Symposium On Security and Privacy. 32-46. DOI: 10.1109/SP.2005.20 |
0.398 |
|
2004 |
Christodorescu M, Jha S. Testing malware detectors Issta 2004 - Proceedings of the Acm Sigsoft International Symposium On Software Testing and Analysis. 34-44. |
0.337 |
|
2001 |
Miller BP, Christodorescu M, Iverson R, Kosar T, Mirgorodskii A, Popovici FI. Playing Inside The Black Box: Using Dynamic Instrumentation To Create Security Holes Parallel Processing Letters. 11: 267-280. DOI: 10.1142/S0129626401000579 |
0.32 |
|
2001 |
Miller BP, Christodorescu M, Iverson R, Kosar T, Mirgorodskii A, Popovici F. Playing inside the black box: Using dynamic instrumentation to create security holes Parallel Processing Letters. 11: 267-280. |
0.308 |
|
Show low-probability matches. |