Thomas H. Austin
Thomas H. Austin
Associate Professor of Computer Science, San Jose State University
Verified email at bias2build.com - Homepage
Title
Cited by
Cited by
Year
Efficient purely-dynamic information flow analysis
TH Austin, C Flanagan
Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and …, 2009
2722009
A comparison of static, dynamic, and hybrid analysis for malware detection
A Damodaran, F Di Troia, CA Visaggio, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 13 (1), 1-12, 2017
2312017
Multiple facets for dynamic information flow
TH Austin, C Flanagan
Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2012
2282012
Permissive dynamic information flow analysis
TH Austin, C Flanagan
Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and …, 2010
1912010
Hidden Markov models for malware classification
C Annachhatre, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 11 (2), 59-73, 2015
1122015
Exploring hidden Markov models for virus analysis: a semantic approach
TH Austin, E Filiol, S Josse, M Stamp
2013 46th Hawaii International Conference on System Sciences, 5039-5048, 2013
952013
Faceted execution of policy-agnostic programs
TH Austin, J Yang, C Flanagan, A Solar-Lezama
Proceedings of the Eighth ACM SIGPLAN workshop on Programming languages and …, 2013
642013
Precise, dynamic information flow for database-backed applications
J Yang, T Hance, TH Austin, A Solar-Lezama, C Flanagan, S Chong
ACM SIGPLAN Notices 51 (6), 631-647, 2016
632016
Support vector machines and malware detection
T Singh, F Di Troia, VA Corrado, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 12 (4), 203-212, 2016
572016
Clustering for malware classification
S Pai, F Di Troia, CA Visaggio, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 13 (2), 95-107, 2017
532017
Virtual values for language extension
TH Austin, T Disney, C Flanagan
Proceedings of the 2011 ACM international conference on Object oriented …, 2011
382011
Malware detection using dynamic birthmarks
S Vemparala, F Di Troia, VA Corrado, TH Austin, M Stamo
Proceedings of the 2016 ACM on International Workshop on Security And …, 2016
352016
Dueling hidden Markov models for virus analysis
A Kalbhor, TH Austin, E Filiol, S Josse, M Stamp
Journal of Computer Virology and Hacking Techniques 11 (2), 103-118, 2015
302015
Clustering versus SVM for malware detection
U Narra, F Di Troia, VA Corrado, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 12 (4), 213-224, 2016
292016
Faceted dynamic information flow via control and data monads
T Schmitz, D Rhodes, TH Austin, K Knowles, C Flanagan
International Conference on Principles of Security and Trust, 3-23, 2016
282016
Hunting for metamorphic JavaScript malware
M Musale, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 11 (2), 89-102, 2015
262015
Singular value decomposition and metamorphic detection
RK Jidigam, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 11 (4), 203-216, 2015
242015
Compression-based analysis of metamorphic malware
J Lee, TH Austin, M Stamp
International Journal of Security and Networks 10 (2), 124-136, 2015
222015
Multiple facets for dynamic information flow with exceptions
TH Austin, T Schmitz, C Flanagan
ACM Transactions on Programming Languages and Systems (TOPLAS) 39 (3), 1-56, 2017
192017
Metamorphic code generation from LLVM bytecode
T Tamboli, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 10 (3), 177-187, 2014
192014
The system can't perform the operation now. Try again later.
Articles 1–20