Somesh Jha

Affiliations: 
University of Wisconsin, Madison, Madison, WI 
Area:
Computer Science
Google:
"Somesh Jha"

Parents

Sign in to add mentor
Edmund M. Clarke grad student 1996 Carnegie Mellon
 (Symmetry and Induction in Model Checking)

Children

Sign in to add trainee
Mihai Christodorescu grad student 2007 UW Madison
Vinod Ganapathy grad student 2007 UW Madison
Louis P. Kruger grad student 2011 UW Madison
Daniel Luchaup grad student 2015 UW Madison
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Haq IU, Chica S, Caballero J, et al. (2018) Malware lineage in the wild Computers & Security. 78: 347-363
Octeau D, Luchaup D, Jha S, et al. (2016) Composite Constant Propagation and its Application to Android Program Analysis Ieee Transactions On Software Engineering. 42: 999-1014
Franz M, Deiseroth B, Hamacher K, et al. (2013) Secure computations on non-integer values with applications to privacy-preserving sequence analysis Information Security Technical Report. 17: 117-128
Luchaup D, Smith R, Estan C, et al. (2011) Speculative parallel pattern matching Ieee Transactions On Information Forensics and Security. 6: 438-451
Jha S, Katzenbeisser S, Schallhart C, et al. (2010) Semantic integrity in large-scale online simulations Acm Transactions On Internet Technology. 10: 2
Preda MD, Christodorescu M, Jha S, et al. (2008) A semantics-based approach to malware detection Acm Transactions On Programming Languages and Systems. 30: 25
Brumley D, Newsome J, Song D, et al. (2008) Theory and techniques for automated generation of vulnerability-based signatures Ieee Transactions On Dependable and Secure Computing. 5: 224-241
Jha S, Li N, Tripunitara M, et al. (2008) Toward formal verification of role-based access control policies Ieee Transactions On Dependable and Secure Computing. 5: 242-255
Christodorescu M, Jha S, Kinder J, et al. (2007) Software transformations to improve malware detection Journal in Computer Virology. 3: 253-265
Chaki S, Clarke E, Jha S, et al. (2005) An Iterative Framework for Simulation Conformance Journal of Logic and Computation. 15: 465-488
See more...