A comparison of static, dynamic, and hybrid analysis for malware detection A Damodaran, FD Troia, CA Visaggio, TH Austin, M Stamp Journal of Computer Virology and Hacking Techniques 13, 1-12, 2017 | 500 | 2017 |
Efficient purely-dynamic information flow analysis TH Austin, C Flanagan Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and …, 2009 | 309 | 2009 |
Multiple facets for dynamic information flow TH Austin, C Flanagan Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2012 | 261 | 2012 |
Permissive dynamic information flow analysis TH Austin, C Flanagan Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and …, 2010 | 205 | 2010 |
Hidden Markov models for malware classification C Annachhatre, TH Austin, M Stamp Journal of Computer Virology and Hacking Techniques 11, 59-73, 2015 | 167 | 2015 |
Exploring hidden Markov models for virus analysis: A semantic approach TH Austin, E Filiol, S Josse, M Stamp 2013 46th Hawaii International Conference on System Sciences, 5039-5048, 2013 | 106 | 2013 |
Precise, dynamic information flow for database-backed applications J Yang, T Hance, TH Austin, A Solar-Lezama, C Flanagan, S Chong ACM Sigplan Notices 51 (6), 631-647, 2016 | 87 | 2016 |
Support vector machines and malware detection T Singh, F Di Troia, VA Corrado, TH Austin, M Stamp Journal of Computer Virology and Hacking Techniques 12, 203-212, 2016 | 82 | 2016 |
Clustering for malware classification S Pai, FD Troia, CA Visaggio, TH Austin, M Stamp Journal of Computer Virology and Hacking Techniques 13, 95-107, 2017 | 81 | 2017 |
Faceted execution of policy-agnostic programs TH Austin, J Yang, C Flanagan, A Solar-Lezama Proceedings of the Eighth ACM SIGPLAN workshop on Programming languages and …, 2013 | 73 | 2013 |
Septic discitis. GA McCain, M Harth, DA Bell, TF Disney, T Austin, E Ralph The Journal of Rheumatology 8 (1), 100-109, 1981 | 56 | 1981 |
Malware detection using dynamic birthmarks S Vemparala, F Di Troia, VA Corrado, TH Austin, M Stamo Proceedings of the 2016 ACM on international workshop on security and …, 2016 | 54 | 2016 |
Systems and methods of blockchain platform for distributed applications TH Austin, S Basu US Patent 11,165,862, 2021 | 46 | 2021 |
Clustering versus SVM for malware detection U Narra, FD Troia, VA Corrado, TH Austin, M Stamp Journal of Computer Virology and Hacking Techniques 12, 213-224, 2016 | 44 | 2016 |
Virtual values for language extension TH Austin, T Disney, C Flanagan Proceedings of the 2011 ACM international conference on Object oriented …, 2011 | 40 | 2011 |
Dueling hidden Markov models for virus analysis A Kalbhor, TH Austin, E Filiol, S Josse, M Stamp Journal of Computer Virology and Hacking Techniques 11, 103-118, 2015 | 33 | 2015 |
Singular value decomposition and metamorphic detection RK Jidigam, TH Austin, M Stamp Journal of Computer Virology and Hacking Techniques 11, 203-216, 2015 | 32 | 2015 |
Hunting for metamorphic JavaScript malware M Musale, TH Austin, M Stamp Journal of Computer Virology and Hacking Techniques 11, 89-102, 2015 | 31 | 2015 |
Multiple facets for dynamic information flow with exceptions TH Austin, T Schmitz, C Flanagan ACM Transactions on Programming Languages and Systems (TOPLAS) 39 (3), 1-56, 2017 | 28 | 2017 |
Faceted dynamic information flow via control and data monads T Schmitz, D Rhodes, TH Austin, K Knowles, C Flanagan International Conference on Principles of Security and Trust, 3-23, 2016 | 26 | 2016 |