Search

Your search keyword '"Christodorescu, Mihai"' showing total 142 results

Search Constraints

Start Over You searched for: Author "Christodorescu, Mihai" Remove constraint Author: "Christodorescu, Mihai"
142 results on '"Christodorescu, Mihai"'

Search Results

1. Natural Language Outlines for Code: Literate Programming in the LLM Era

2. Securing the Future of GenAI: Policy and Technology

3. Do Large Code Models Understand Programming Concepts? A Black-box Approach

4. Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations

5. Identifying and Mitigating the Security Risks of Generative AI

6. Formal Analysis of the API Proxy Problem

7. Privacy-Preserving Application-to-Application Authentication Using Dynamic Runtime Behaviors

8. Universal Payment Channels: An Interoperability Platform for Digital Currencies

9. A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-Sized Sets

10. Towards a Two-Tier Hierarchical Infrastructure: An Offline Payment System for Central Bank Digital Currencies

11. Robust and Accurate Authorship Attribution via Program Normalization

12. Privacy-Preserving Payment Splitting

14. The House That Knows You: User Authentication Based on IoT Data

15. COSET: A Benchmark for Evaluating Neural Program Embeddings

16. REMOTEGATE: Incentive-Compatible Remote Configuration of Security Gateways

17. Learning Execution Contexts from System Call Distributions for Intrusion Detection in Embedded Systems

18. Enhancing Android Security Through App Splitting

19. Mining graph patterns efficiently via randomized summaries

20. Software transformations to improve malware detection

21. Identifying and Mitigating the Security Risks of Generative AI

24. Monitoring Data Structures Using Hardware Transactional Memory

26. Dynamic Behavior Matching: A Complexity Analysis and New Approximation Algorithms

29. Dynamic Analysis

30. An Optimal Energy Efficient Design of Artificial Noise for Preventing Power Leakage based Side-Channel Attacks

32. A semantics-based approach to malware detection

37. The House That Knows You

41. AccessMiner: using system-centric models for malware protection

43. PIFT

45. TroGuard

46. Semantics Aware Malware Detection

47. Malware Normalization

50. Static Analysis of Executables to Detect Malicious Patterns

Catalog

Books, media, physical & digital resources