Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Mihai Christodorescu
2010 – today
- 2013
[c17]Pedro Giovanni Leon, Blase Ur, Yang Wang, Manya Sleeper, Rebecca Balebako, Richard Shay, Lujo Bauer, Mihai Christodorescu, Lorrie Faith Cranor: What matters to users?: factors that affect users' willingness to share information with online advertisers. SOUPS 2013: 7- 2012
[c16]Mihai Christodorescu: Second workshop on building analysis datasets and gathering experience returns for security (BADGERS'12). ACM Conference on Computer and Communications Security 2012: 1066-1067
[c15]Davide Canali, Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda: A quantitative study of accuracy in system call-based malware detection. ISSTA 2012: 122-132- 2011
[c14]Matthew Fredrikson, Mihai Christodorescu, Somesh Jha: Dynamic Behavior Matching: A Complexity Analysis and New Approximation Algorithms. CADE 2011: 252-267
[c13]Shakeel Butt, Vinod Ganapathy, Arati Baliga, Mihai Christodorescu: Monitoring Data Structures Using Hardware Transactional Memory. RV 2011: 345-359
[p3]Mihai Christodorescu, Matthew Fredrikson, Somesh Jha, Jonathon T. Giffin: End-to-End Software Diversification of Internet Services. Moving Target Defense 2011: 117-130
[r1]Mihai Christodorescu, Vinod Ganapathy: Dynamic Analysis. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 365-367- 2010
[c12]Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda: AccessMiner: using system-centric models for malware protection. ACM Conference on Computer and Communications Security 2010: 399-412
[c11]Matt Fredrikson, Somesh Jha, Mihai Christodorescu, Reiner Sailer, Xifeng Yan: Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors. IEEE Symposium on Security and Privacy 2010: 45-60
[p2]Matt Fredrikson, Mihai Christodorescu, Jonathon T. Giffin, Somesh Jha: A Declarative Framework for Intrusion Analysis. Cyber Situational Awareness 2010: 179-200
2000 – 2009
- 2009
[j4]Chen Chen, Cindy Xide Lin, Matt Fredrikson, Mihai Christodorescu, Xifeng Yan, Jiawei Han: Mining Graph Patterns Efficiently via Randomized Summaries. PVLDB 2(1): 742-753 (2009)
[c10]Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales, Daniele Sgandurra, Diego Zamboni: Cloud security is not (just) virtualization security: a short paper. CCSW 2009: 97-102- 2008
[j3]Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray: A semantics-based approach to malware detection. ACM Trans. Program. Lang. Syst. 30(5) (2008)
[c9]Mihai Christodorescu, Somesh Jha, Christopher Kruegel: Mining specifications of malicious behavior. ISEC 2008: 5-14- 2007
[j2]Mihai Christodorescu, Somesh Jha, Johannes Kinder, Stefan Katzenbeisser, Helmut Veith: Software transformations to improve malware detection. Journal in Computer Virology 3(4): 253-265 (2007)
[c8]Lorenzo Martignoni, Mihai Christodorescu, Somesh Jha: OmniUnpack: Fast, Generic, and Safe Unpacking of Malware. ACSAC 2007: 431-441
[c7]Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray: A semantics-based approach to malware detection. POPL 2007: 377-388
[c6]Mihai Christodorescu, Somesh Jha, Christopher Kruegel: Mining specifications of malicious behavior. ESEC/SIGSOFT FSE 2007: 5-14
[p1]Mihai Christodorescu, Shai Rubin: Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy? Malware Detection 2007: 193-209
[e1]Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang (Eds.): Malware Detection. Advances in Information Security 27, Springer 2007, ISBN 978-0-387-32720-4- 2005
[c5]Jonathon T. Giffin, Mihai Christodorescu, Louis Kruger: Strengthening Software Self-Checksumming via Self-Modifying Code. ACSAC 2005: 23-32
[c4]Shai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang, Nicholas Kidd: An auctioning reputation system based on anomaly. ACM Conference on Computer and Communications Security 2005: 270-279
[c3]Mihai Christodorescu, Nicholas Kidd, Wen-Han Goh: String analysis for x86 binaries. PASTE 2005: 88-95
[c2]Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant: Semantics-Aware Malware Detection. IEEE Symposium on Security and Privacy 2005: 32-46- 2004
[c1]- 2001
[j1]Barton P. Miller, Mihai Christodorescu, Robert Iverson, Tevfik Kosar, Alexander Mirgorodskii, Florentina I. Popovici: Playing Inside the Black Box: Using Dynamic Instrumentation to Create Security Holes. Parallel Processing Letters 11(2/3): 267-280 (2001)
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 10:56 CEST by the dblp team



