Thomas H. Austin, Ph.D.
Affiliations: | 2013 | Computer Science | University of California, Santa Cruz, Santa Cruz, CA, United States |
Area:
Computer ScienceGoogle:
"Thomas Austin"Parents
Sign in to add mentorCormac Flanagan | grad student | 2013 | UC Santa Cruz | |
(Dynamic information flow analysis for JavaScript in a web browser.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Austin TH, Schmitz T, Flanagan C. (2017) Multiple Facets for Dynamic Information Flow with Exceptions Acm Transactions On Programming Languages and Systems. 39: 1-56 |
Kajitani S, Nogami Y, Miyoshi S, et al. (2016) Web-based Volunteer Computing for Solving the Elliptic Curve Discrete Logarithm Problem International Journal of Networking and Computing. 6: 181-194 |
Yang J, Hance T, Austin TH, et al. (2016) Precise, dynamic information flow for database-backed applications Proceedings of the Acm Sigplan Conference On Programming Language Design and Implementation (Pldi). 13: 631-647 |
Ganesh N, Di Troia F, Corrado VA, et al. (2016) Static analysis of malicious Java applets Iwspa 2016 - Proceedings of the 2016 Acm International Workshop On Security and Privacy Analytics, Co-Located With Codaspy 2016. 58-63 |
Schmitz T, Rhodes D, Austin TH, et al. (2016) Faceted dynamic information flow via control and data monads Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9635: 3-23 |
Lee J, Austin TH, Stamp M. (2015) Compression-based analysis of metamorphic malware International Journal of Security and Networks. 10: 124-136 |
Damodaran A, Troia FD, Visaggio CA, et al. (2015) A comparison of static, dynamic, and hybrid analysis for malware detection Journal of Computer Virology and Hacking Techniques. 1-12 |
Kalbhor A, Austin TH, Filiol E, et al. (2015) Dueling hidden Markov models for virus analysis Journal of Computer Virology and Hacking Techniques. 11: 103-118 |
Musale M, Austin TH, Stamp M. (2015) Hunting for metamorphic JavaScript malware Journal of Computer Virology and Hacking Techniques. 11: 89-102 |
Jidigam RK, Austin TH, Stamp M. (2015) Singular value decomposition and metamorphic detection Journal of Computer Virology and Hacking Techniques. 11: 203-216 |