Somesh Jha
Affiliations: | University of Wisconsin, Madison, Madison, WI |
Area:
Computer ScienceGoogle:
"Somesh Jha"Parents
Sign in to add mentorEdmund M. Clarke | grad student | 1996 | Carnegie Mellon | |
(Symmetry and Induction in Model Checking) |
Children
Sign in to add traineeMihai Christodorescu | grad student | 2007 | UW Madison |
Vinod Ganapathy | grad student | 2007 | UW Madison |
Louis P. Kruger | grad student | 2011 | UW Madison |
Daniel Luchaup | grad student | 2015 | UW Madison |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Haq IU, Chica S, Caballero J, et al. (2018) Malware lineage in the wild Computers & Security. 78: 347-363 |
Octeau D, Luchaup D, Jha S, et al. (2016) Composite Constant Propagation and its Application to Android Program Analysis Ieee Transactions On Software Engineering. 42: 999-1014 |
Franz M, Deiseroth B, Hamacher K, et al. (2013) Secure computations on non-integer values with applications to privacy-preserving sequence analysis Information Security Technical Report. 17: 117-128 |
Luchaup D, Smith R, Estan C, et al. (2011) Speculative parallel pattern matching Ieee Transactions On Information Forensics and Security. 6: 438-451 |
Jha S, Katzenbeisser S, Schallhart C, et al. (2010) Semantic integrity in large-scale online simulations Acm Transactions On Internet Technology. 10: 2 |
Preda MD, Christodorescu M, Jha S, et al. (2008) A semantics-based approach to malware detection Acm Transactions On Programming Languages and Systems. 30: 25 |
Brumley D, Newsome J, Song D, et al. (2008) Theory and techniques for automated generation of vulnerability-based signatures Ieee Transactions On Dependable and Secure Computing. 5: 224-241 |
Jha S, Li N, Tripunitara M, et al. (2008) Toward formal verification of role-based access control policies Ieee Transactions On Dependable and Secure Computing. 5: 242-255 |
Christodorescu M, Jha S, Kinder J, et al. (2007) Software transformations to improve malware detection Journal in Computer Virology. 3: 253-265 |
Chaki S, Clarke E, Jha S, et al. (2005) An Iterative Framework for Simulation Conformance Journal of Logic and Computation. 15: 465-488 |