Semantics-aware malware detection M Christodorescu, S Jha, SA Seshia, D Song, RE Bryant 2005 IEEE symposium on security and privacy (S&P'05), 32-46, 2005 | 1161 | 2005 |
Static analysis of executables to detect malicious patterns M Christodorescu, S Jha 12th USENIX Security Symposium (USENIX Security 03), 2003 | 1058 | 2003 |
Mining specifications of malicious behavior M Christodorescu, S Jha, C Kruegel Proceedings of the the 6th joint meeting of the European software …, 2007 | 636 | 2007 |
Testing malware detectors M Christodorescu, S Jha ACM SIGSOFT Software Engineering Notes 29 (4), 34-44, 2004 | 487 | 2004 |
Omniunpack: Fast, generic, and safe unpacking of malware L Martignoni, M Christodorescu, S Jha Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007 | 347 | 2007 |
A semantics-based approach to malware detection MD Preda, M Christodorescu, S Jha, S Debray ACM SIGPLAN Notices 42 (1), 377-388, 2007 | 344 | 2007 |
Cloud security is not (just) virtualization security: a short paper M Christodorescu, R Sailer, DL Schales, D Sgandurra, D Zamboni Proceedings of the 2009 ACM workshop on Cloud computing security, 97-102, 2009 | 292 | 2009 |
Protection of user data in hosted application environments M Christodorescu, D Pendarakis, KK Singh US Patent 9,245,126, 2016 | 278 | 2016 |
Synthesizing near-optimal malware specifications from suspicious behaviors M Fredrikson, S Jha, M Christodorescu, R Sailer, X Yan 2010 IEEE Symposium on Security and Privacy, 45-60, 2010 | 276 | 2010 |
Accessminer: using system-centric models for malware protection A Lanzi, D Balzarotti, C Kruegel, M Christodorescu, E Kirda Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 257 | 2010 |
A quantitative study of accuracy in system call-based malware detection D Canali, A Lanzi, D Balzarotti, C Kruegel, M Christodorescu, E Kirda Proceedings of the 2012 International Symposium on Software Testing and …, 2012 | 196 | 2012 |
What matters to users? Factors that affect users' willingness to share information with online advertisers PG Leon, B Ur, Y Wang, M Sleeper, R Balebako, R Shay, L Bauer, ... Proceedings of the ninth symposium on usable privacy and security, 1-12, 2013 | 192 | 2013 |
Adaptive observation of behavioral features on a mobile device A Valencia, M Salajegheh, V Sridhara, M Christodorescu, R Gupta US Patent 9,330,257, 2016 | 182 | 2016 |
Adaptive cyber-security analytics L Amini, M Christodorescu, MA Cohen, S Parthasarathy, J Rao, R Sailer, ... US Patent 9,032,521, 2015 | 153 | 2015 |
Inter-module authentication for securing application execution integrity within a computing device M Christodorescu, R Gupta, V Sridhara US Patent 9,742,559, 2017 | 136 | 2017 |
Malware normalization M Christodorescu, J Kinder, S Jha, S Katzenbeisser, H Veith University of Wisconsin-Madison Department of Computer Sciences, 2005 | 130 | 2005 |
Behavioral analysis to automate direct and indirect local monitoring of internet of things device health R Gupta, M Salajegheh, M Christodorescu, V Sridhara, G Krishnamurthi US Patent 9,979,606, 2018 | 124 | 2018 |
Strengthening software self-checksumming via self-modifying code JT Giffin, M Christodorescu, L Kruger 21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-32, 2005 | 117 | 2005 |
Methods and systems for automated anonymous crowdsourcing of characterized device behaviors M Salajegheh, M Mahmoudi, V Sridhara, M Christodorescu, GC Cascaval US Patent 10,063,585, 2018 | 108 | 2018 |
High-throughput data integrity via trusted computing R Sinha, M Christodorescu US Patent 11,140,134, 2021 | 99 | 2021 |