Mihai Christodorescu
Mihai Christodorescu
Visa Research
Verified email at christodorescu.org - Homepage
Cited by
Cited by
Semantics-aware malware detection
M Christodorescu, S Jha, SA Seshia, D Song, RE Bryant
2005 IEEE Symposium on Security and Privacy (S&P'05), 32-46, 2005
Static analysis of executables to detect malicious patterns
M Christodorescu, S Jha
Wisconsin Univ-Madison Dept of Computer Sciences, 2006
Mining specifications of malicious behavior
M Christodorescu, S Jha, C Kruegel
Proceedings of the the 6th joint meeting of the European software …, 2007
Testing malware detectors
M Christodorescu, S Jha
ACM SIGSOFT Software Engineering Notes 29 (4), 34-44, 2004
Omniunpack: Fast, generic, and safe unpacking of malware
L Martignoni, M Christodorescu, S Jha
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
A semantics-based approach to malware detection
MD Preda, M Christodorescu, S Jha, S Debray
ACM SIGPLAN Notices 42 (1), 377-388, 2007
Cloud security is not (just) virtualization security: a short paper
M Christodorescu, R Sailer, DL Schales, D Sgandurra, D Zamboni
Proceedings of the 2009 ACM workshop on Cloud computing security, 97-102, 2009
Synthesizing near-optimal malware specifications from suspicious behaviors
M Fredrikson, S Jha, M Christodorescu, R Sailer, X Yan
2010 IEEE Symposium on Security and Privacy, 45-60, 2010
Accessminer: using system-centric models for malware protection
A Lanzi, D Balzarotti, C Kruegel, M Christodorescu, E Kirda
Proceedings of the 17th ACM conference on Computer and communications …, 2010
A quantitative study of accuracy in system call-based malware detection
D Canali, A Lanzi, D Balzarotti, C Kruegel, M Christodorescu, E Kirda
Proceedings of the 2012 International Symposium on Software Testing and …, 2012
Protection of user data in hosted application environments
M Christodorescu, D Pendarakis, KK Singh
US Patent 9,245,126, 2016
What matters to users? factors that affect users' willingness to share information with online advertisers
PG Leon, B Ur, Y Wang, M Sleeper, R Balebako, R Shay, L Bauer, ...
Proceedings of the ninth symposium on usable privacy and security, 1-12, 2013
Adaptive observation of behavioral features on a mobile device
A Valencia, M Salajegheh, V Sridhara, M Christodorescu, R Gupta
US Patent 9,330,257, 2016
Malware normalization
M Christodorescu, J Kinder, S Jha, S Katzenbeisser, H Veith
University of Wisconsin-Madison Department of Computer Sciences, 2005
Strengthening software self-checksumming via self-modifying code
JT Giffin, M Christodorescu, L Kruger
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-32, 2005
Adaptive cyber-security analytics
L Amini, M Christodorescu, MA Cohen, S Parthasarathy, J Rao, R Sailer, ...
US Patent 9,032,521, 2015
Mining graph patterns efficiently via randomized summaries
C Chen, CX Lin, M Fredrikson, M Christodorescu, X Yan, J Han
Proceedings of the VLDB Endowment 2 (1), 742-753, 2009
Optimizing performance of integrity monitoring
N Aaraj, M Christodorescu, D Pendarakis, R Sailer, DL Schales
US Patent 8,949,797, 2015
An auctioning reputation system based on anomaly
S Rubin, M Christodorescu, V Ganapathy, JT Giffin, L Kruger, H Wang, ...
Proceedings of the 12th ACM conference on computer and communications …, 2005
Inter-module authentication for securing application execution integrity within a computing device
M Christodorescu, R Gupta, V Sridhara
US Patent 9,742,559, 2017
The system can't perform the operation now. Try again later.
Articles 1–20