Efficient purely-dynamic information flow analysis TH Austin, C Flanagan Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and …, 2009 | 246 | 2009 |
Multiple facets for dynamic information flow TH Austin, C Flanagan Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2012 | 213 | 2012 |
Permissive dynamic information flow analysis TH Austin, C Flanagan Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and …, 2010 | 177 | 2010 |
A comparison of static, dynamic, and hybrid analysis for malware detection A Damodaran, F Di Troia, CA Visaggio, TH Austin, M Stamp Journal of Computer Virology and Hacking Techniques 13 (1), 1-12, 2017 | 174 | 2017 |
Hidden Markov models for malware classification C Annachhatre, TH Austin, M Stamp Journal of Computer Virology and Hacking Techniques 11 (2), 59-73, 2015 | 97 | 2015 |
Exploring hidden Markov models for virus analysis: a semantic approach TH Austin, E Filiol, S Josse, M Stamp 2013 46th Hawaii International Conference on System Sciences, 5039-5048, 2013 | 90 | 2013 |
Precise, dynamic information flow for database-backed applications J Yang, T Hance, TH Austin, A Solar-Lezama, C Flanagan, S Chong ACM SIGPLAN Notices 51 (6), 631-647, 2016 | 57 | 2016 |
Faceted execution of policy-agnostic programs TH Austin, J Yang, C Flanagan, A Solar-Lezama Proceedings of the Eighth ACM SIGPLAN workshop on Programming languages and …, 2013 | 56 | 2013 |
Support vector machines and malware detection T Singh, F Di Troia, VA Corrado, TH Austin, M Stamp Journal of Computer Virology and Hacking Techniques 12 (4), 203-212, 2016 | 51 | 2016 |
Clustering for malware classification S Pai, F Di Troia, CA Visaggio, TH Austin, M Stamp Journal of Computer Virology and Hacking Techniques 13 (2), 95-107, 2017 | 42 | 2017 |
Virtual values for language extension TH Austin, T Disney, C Flanagan Proceedings of the 2011 ACM international conference on Object oriented …, 2011 | 37 | 2011 |
Malware detection using dynamic birthmarks S Vemparala, F Di Troia, VA Corrado, TH Austin, M Stamo Proceedings of the 2016 ACM on International Workshop on Security And …, 2016 | 26 | 2016 |
Faceted dynamic information flow via control and data monads T Schmitz, D Rhodes, TH Austin, K Knowles, C Flanagan International Conference on Principles of Security and Trust, 3-23, 2016 | 25 | 2016 |
Dueling hidden Markov models for virus analysis A Kalbhor, TH Austin, E Filiol, S Josse, M Stamp Journal of Computer Virology and Hacking Techniques 11 (2), 103-118, 2015 | 25 | 2015 |
Clustering versus SVM for malware detection U Narra, F Di Troia, VA Corrado, TH Austin, M Stamp Journal of Computer Virology and Hacking Techniques 12 (4), 213-224, 2016 | 22 | 2016 |
Singular value decomposition and metamorphic detection RK Jidigam, TH Austin, M Stamp Journal of Computer Virology and Hacking Techniques 11 (4), 203-216, 2015 | 21 | 2015 |
Hunting for metamorphic JavaScript malware M Musale, TH Austin, M Stamp Journal of Computer Virology and Hacking Techniques 11 (2), 89-102, 2015 | 21 | 2015 |
Metamorphic code generation from LLVM bytecode T Tamboli, TH Austin, M Stamp Journal of Computer Virology and Hacking Techniques 10 (3), 177-187, 2014 | 17 | 2014 |
Compression-based analysis of metamorphic malware J Lee, TH Austin, M Stamp International Journal of Security and Networks 10 (2), 124-136, 2015 | 16 | 2015 |
Multiple facets for dynamic information flow with exceptions TH Austin, T Schmitz, C Flanagan ACM Transactions on Programming Languages and Systems (TOPLAS) 39 (3), 1-56, 2017 | 15 | 2017 |