Mihai Christodorescu
According to our database1,
Mihai Christodorescu
authored at least 59 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
Do Large Code Models Understand Programming Concepts? Counterfactual Analysis for Code Predicates.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
2023
Found. Trends Priv. Secur., 2023
Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations.
CoRR, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Privacy-Preserving Application-to-Application Authentication Using Dynamic Runtime Behaviors.
CoRR, 2022
An Optimal Energy Efficient Design of Artificial Noise for Preventing Power Leakage based Side-Channel Attacks.
CoRR, 2022
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
2021
CoRR, 2021
2020
Towards a Two-Tier Hierarchical Infrastructure: An Offline Payment System for Central Bank Digital Currencies.
CoRR, 2020
2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
CoRR, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Learning Execution Contexts from System Call Distribution for Anomaly Detection in Smart Embedded System.
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017
2016
Proc. Priv. Enhancing Technol., 2016
Passive security intelligence to analyze the security risks of mobile/BYOD activities.
IBM J. Res. Dev., 2016
The DragonBeam Framework: Hardware-Protected Security Modules for In-Place Intrusion Detection.
Proceedings of the 9th ACM International on Systems and Storage Conference, 2016
Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, 2016
2015
Intrusion Detection Using Execution Contexts Learned from System Call Distributions of Real-Time Embedded Systems.
CoRR, 2015
2014
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
What matters to users?: factors that affect users' willingness to share information with online advertisers.
Proceedings of the Symposium On Usable Privacy and Security, 2013
2012
Proceedings of the International Symposium on Software Testing and Analysis, 2012
Second workshop on building analysis datasets and gathering experience returns for security (BADGERS'12).
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the Moving Target Defense, 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Runtime Verification - Second International Conference, 2011
Proceedings of the Automated Deduction - CADE-23 - 23rd International Conference on Automated Deduction, Wroclaw, Poland, July 31, 2011
2010
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the Link Mining: Models, Algorithms, and Applications, 2010
2009
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
2008
ACM Trans. Program. Lang. Syst., 2008
Proceedings of the Proceeding of the 1st Annual India Software Engineering Conference, 2008
2007
Proceedings of the Malware Detection, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
Proceedings of the 2005 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis For Software Tools and Engineering, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2004
2003
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003
2001
Playing Inside the Black Box: Using Dynamic Instrumentation to Create Security Holes.
Parallel Process. Lett., 2001