The SCEAS System
Navigation Menu

Search the dblp DataBase


Mihai Christodorescu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jonathon T. Giffin, Mihai Christodorescu, Louis Kruger
    Strengthening Software Self-Checksumming via Self-Modifying Code. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:23-32 [Conf]
  2. Shai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang, Nicholas Kidd
    An auctioning reputation system based on anomaly. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:270-279 [Conf]
  3. Mihai Christodorescu, Somesh Jha
    Testing malware detectors. [Citation Graph (0, 0)][DBLP]
    ISSTA, 2004, pp:34-44 [Conf]
  4. Mihai Christodorescu, Nicholas Kidd, Wen-Han Goh
    String analysis for x86 binaries. [Citation Graph (0, 0)][DBLP]
    PASTE, 2005, pp:88-95 [Conf]
  5. Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray
    A semantics-based approach to malware detection. [Citation Graph (0, 0)][DBLP]
    POPL, 2007, pp:377-388 [Conf]
  6. Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant
    Semantics-Aware Malware Detection. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:32-46 [Conf]
  7. Barton P. Miller, Mihai Christodorescu, Robert Iverson, Tevfik Kosar, Alexander Mirgorodskii, Florentina I. Popovici
    Playing Inside the Black Box: Using Dynamic Instrumentation to Create Security Holes. [Citation Graph (0, 0)][DBLP]
    Parallel Processing Letters, 2001, v:11, n:2/3, pp:267-280 [Journal]
  8. Mihai Christodorescu, Somesh Jha, Christopher Kruegel
    Mining specifications of malicious behavior. [Citation Graph (0, 0)][DBLP]
    ESEC/SIGSOFT FSE, 2007, pp:5-14 [Conf]

  9. OmniUnpack: Fast, Generic, and Safe Unpacking of Malware. [Citation Graph (, )][DBLP]

  10. Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors. [Citation Graph (, )][DBLP]

  11. Mining specifications of malicious behavior. [Citation Graph (, )][DBLP]

Search in 0.001secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002