Mihai Christodorescu
Doctoral Candidate
1210 W Dayton St
Office 7372
Madison, WI 53706-1685
|
Books
-
Malware Detection
Mihai Christodorescu, Somesh Jha, Douglas Maughan (HSARPA), Dawn Song, and Cliff Wang (ARL/ARO), editors.Volume 27 of Advances in Information Security. Springer-Verlag, October 2006.
ISBN: 0387327207, ISBN-13: 9780387327204.
Conference Papers
-
Mining Specifications of Malicious Behavior
Published on September 5, 2007, in the Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2007), September 3-7, 2007, Dubrovnik, Croatia.ESEC/FSE'07 acceptance rate: TBD. -
A Semantics-Based Approach to Malware Detection
Published on January 19, 2007, in the Proceedings of the 34th Annual Symposium on Principles of Programming Languages (POPL 2007), January 17-19, 2007, Nice, France.POPL'07 acceptance rate: 18.18% (36/198). -
Strengthening Software Self-Checksumming via Self-Modifying Code
Published on December 6, 2005, in the Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005).ACSAC'05 acceptance rate: 22.8% (45/197). -
Anomaly Detection as a Reputation System for Online Auctioning
Published on November 10, 2005, in the Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005).CCS'05 acceptance rate: 15.2% (38/250).Downloads: PDF -
String Analysis for x86 Binaries
Published on September 6, 2005, in the Proceedings of the 6th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE 2005).PASTE'05 acceptance rate: 44.7% (17/38). -
Semantics-Aware Malware Detection
Published on May 9, 2005, in the Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005).S&P'05 acceptance rate: 8.9% (17/192). -
Testing Malware Detectors
Published on July 12, 2004, in the Proceedings of the International Symposium on Software Testing and Analysis (ISSTA 2004).Award: Distinguished ACM SIGSOFT Paper.ISSTA'04 acceptance rate: 27.9% (26/93). -
Static Analysis of Executables to Detect Malicious Patterns
Published on August 4, 2003, in the Proceedings of the 12th USENIX Security Symposium (Security 2003).Security'03 acceptance rate: 16.4% (21/128).
Invited Papers
-
Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?
Published in “Malware Detection,” volume 27 of Advances in Information Security. Springer-Verlag, October 2006.This edited volume represents the proceedings of the 2005 ARO-DHS Special Workshop on Malware Detection, Aug. 10-11, 2005, Arlington, VA, USA.
Journal Papers
-
Playing Inside the Black Box: Using Dynamic Instrumentation to Create Security Holes
Published on February 9, 2001, in Parallel Processing Letters, Vol. 11, Nos. 2 & 3 (2001), pp. 267-280.
Technical Reports
-
Malware Normalization
Published on November 22, 2005, as Technical Report # 1539 at the Department of Computer Sciences, University of Wisconsin, Madison. -
Strengthening Software Self-Checksumming via Self-Modifying Code
Published on September 16, 2005, as Technical Report # 1531 at the Department of Computer Sciences, University of Wisconsin, Madison. -
Opening Pandora’s Box: Using Binary Code Rewrite to Bypass License Checks
Published on April 8, 2003, as Technical Report # 1479 at the Department of Computer Sciences, University of Wisconsin, Madison. -
Static Analysis For Executables to Detect Malicious Patterns
Published on February 18, 2003, as Technical Report # 1467 at the Department of Computer Sciences, University of Wisconsin, Madison.Downloads: PDF Postscript