Construction of abstract state graphs with PVS S Graf, H Saidi International Conference on Computer Aided Verification, 72-83, 1997 | 1876 | 1997 |
Aurasium: Practical policy enforcement for android applications R Xu, H Saïdi, R Anderson 21st {USENIX} Security Symposium ({USENIX} Security 12), 539-552, 2012 | 575 | 2012 |
Signal monitoring apparatus analyzing voice communication content CD Blair, RL Keenan US Patent 6,757,361, 2004 | 247 | 2004 |
Abstract and model check while you prove H Saïdi, N Shankar International Conference on Computer Aided Verification, 443-454, 1999 | 244 | 1999 |
An overview of SAL S Bensalem, V Ganesh, Y Lakhnech, C Munoz, S Owre, H Rueß, ... NASA CONFERENCE PUBLICATION, 187-195, 2000 | 241 | 2000 |
A multi-perspective analysis of the storm (peacomm) worm P Porras, H Saidi, V Yegneswaran Technical report, Computer Science Laboratory, SRI International, 2007 | 201 | 2007 |
An analysis of conficker’s logic and rendezvous points P Porras, H Saidi, V Yegneswaran Computer Science Laboratory, SRI International, Tech. Rep, 36, 2009 | 182 | 2009 |
Powerful techniques for the automatic generation of invariants S Bensalem, Y Lakhnech, H Saidi International Conference on Computer Aided Verification, 323-335, 1996 | 163 | 1996 |
A Foray into Conficker's Logic and Rendezvous Points. PA Porras, H Saïdi, V Yegneswaran LEET 9, 7, 2009 | 161 | 2009 |
Eureka: A framework for enabling static malware analysis M Sharif, V Yegneswaran, H Saidi, P Porras, W Lee European Symposium on Research in Computer Security, 481-500, 2008 | 147 | 2008 |
Model checking guided abstraction and analysis H Saidi International Static Analysis Symposium, 377-396, 2000 | 141 | 2000 |
Binding of polychlorinated biphenyls to the aryl hydrocarbon receptor. SA Kafafi, HY Afeefy, AH Ali, HK Said, AG Kafafi Environmental Health Perspectives 101 (5), 422-428, 1993 | 113 | 1993 |
A technique for invariant generation A Tiwari, H Rueß, H Saidi, N Shankar International Conference on Tools and Algorithms for the Construction and …, 2001 | 105 | 2001 |
An analysis of the ikee. b iphone botnet P Porras, H Saidi, V Yegneswaran International Conference on Security and Privacy in Mobile Information and …, 2010 | 97 | 2010 |
Conficker C analysis P Porras, H Saidi, V Yegneswaran SRI International 1, 1-1, 2009 | 84 | 2009 |
An architecture for an adaptive intrusion-tolerant server A Valdes, M Almgren, S Cheung, Y Deswarte, B Dutertre, J Levy, H Saidi, ... International Workshop on Security Protocols, 158-178, 2002 | 73 | 2002 |
Polymorphic computing architectures CS Lockett, SA Oberg, SM Forsberg, H Saidi, JE Casper US Patent 9,501,666, 2016 | 69 | 2016 |
Intrusion tolerant software architectures V Stavridou, B Dutertre, RA Riemenschneider, H Saidi Proceedings DARPA Information Survivability Conference and Exposition II …, 2001 | 66 | 2001 |
Method and system for application-based policy monitoring and enforcement on a mobile device H Saidi, R Xu US Patent 8,844,036, 2014 | 62 | 2014 |
Verifying invariants using theorem proving S Graf, H Saïdi International Conference on Computer Aided Verification, 196-207, 1996 | 62 | 1996 |