Mohamed R. Chouchane, Ph.D. - Publications

2008 University of Louisiana at Lafayette, Lafayette, LA, United States 
Computer Science

6 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2008 Chouchane MR, Walenstein A, Lakhotia A. Using markov chains to filter machine-morphed variants of malicious programs 3rd International Conference On Malicious and Unwanted Software, Malware 2008. 77-84. DOI: 10.1109/MALWARE.2008.4690861  0.92
2008 Walenstein A, Mathur R, Chouchane MR, Lakhotia A. Constructing malware normalizers using term rewriting Journal in Computer Virology. 4: 307-322. DOI: 10.1007/S11416-008-0081-5  0.68
2007 Chouchane MR, Walenstein A, Lakhotia A. Statistical signatures for fast filtering of instruction-substituting metamorphic malware Worm'07 - Proceedings of the 2007 Acm Workshop On Recurring Malcode. 31-37. DOI: 10.1145/1314389.1314397  0.88
2006 Chouchane MR, Lakhotia A. Using engine signature to detect metamorphic malware Proceedings of the 4th Acm Workshop On Recurring Malcode, Worm'06. Co-Located With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 73-78. DOI: 10.1145/1179542.1179558  1
2006 Walenstein A, Mathur R, Chouchane MR, Lakhotia A. Normalizing metamorphic malware using term rewriting Proceedings - Sixth Ieee International Workshop On Source Code Analysis and Manipulation, Scam 2006. 75-84. DOI: 10.1109/SCAM.2006.20  0.6
2005 Venable M, Chouchane MR, Karim ME, Lakhotia A. Analyzing memory accesses in obfuscated x86 executables Lecture Notes in Computer Science. 3548: 1-18.  0.8
Show low-probability matches.