Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware

Sanjeev Das , Yang Liu , Wei Zhang , Mahintham Chandramohan
IEEE Transactions on Information Forensics and Security 11 ( 2) 289 -302

193
2016
ROPSentry: Runtime Defense Against ROP Attacks Using Hardware Performance Counters

Sanjeev Das , Bihuan Chen , Mahintham Chandramohan , Yang Liu
Computers & Security 73 374 -388

5
2018
Mystique: Evolving Android Malware for Auditing Anti-Malware Tools

Guozhu Meng , Yinxing Xue , Chandramohan Mahinthan , Annamalai Narayanan
computer and communications security 365 -376

27
2016
Evolvable simulations applied to automated red teaming: a preliminary study

James Decraene , Malcolm Yoke Hean Low , Chwee Seng Choo , Mahinthan Chandramohan
winter simulation conference 1444 -1455

11
2010
Application of multi-objective bee colony optimization algorithm to automated red teaming

Malcolm Yoke Hean Low , Chwee Seng Choo , Mahinthan Chandramohan
winter simulation conference 1798 -1808

16
2009
graph2vec: Learning Distributed Representations of Graphs

Yang Liu , Mahinthan Chandramohan , Annamalai Narayanan , Lihui Chen
arXiv: Artificial Intelligence

568
2017
Detection of Buffer Overflow Vulnerabilities in C/C++ with Pattern Based Limited Symbolic Evaluation

Sun Ding , Hee Beng Kuan Tan , Kaiping Liu , Mahinthan Chandramohan
2012 IEEE 36th Annual Computer Software and Applications Conference Workshops 559 -564

2
2012
BinGo: cross-architecture cross-OS binary search

Mahinthan Chandramohan , Yinxing Xue , Zhengzi Xu , Yang Liu
foundations of software engineering 678 -689

64
2016
Context-Aware, Adaptive, and Scalable Android Malware Detection Through Online Learning

Annamalai Narayanan , Mahinthan Chandramohan , Lihui Chen , Yang Liu
IEEE Transactions on Emerging Topics in Computational Intelligence 1 ( 3) 157 -175

22
2017
Scalable malware clustering through coarse-grained behavior modeling

Mahinthan Chandramohan , Hee Beng Kuan Tan , Lwin Khin Shar
Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering - FSE '12 27

11
2012
Has this bug been reported?

Kaiping Liu , Hee Beng Kuan Tan , Mahinthan Chandramohan ,
Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering - FSE '12 28

13
2012
A scalable approach for malware detection through bounded feature space behavior modeling

Mahinthan Chandramohan , Hee Beng Kuan Tan , Lionel C. Briand , Lwin Khin Shar
automated software engineering 312 -322

19
2013
SPAIN: security patch analysis for binaries towards understanding the pain and pills

Zhengzi Xu , Bihuan Chen , Mahinthan Chandramohan , Yang Liu
international conference on software engineering 462 -472

41
2017
Detection of Mobile Malware in the Wild

Mahinthan Chandramohan , Hee Beng Kuan Tan
IEEE Computer 45 ( 9) 65 -71

65
2012
Autonomous Bee Colony Optimization for multi-objective function

Fanchao Zeng , James Decraene , Malcolm Yoke Hean Low , Philip Hingston
congress on evolutionary computation 1 -8

16
2010
A multi-view context-aware approach to Android malware detection and malicious code localization

Annamalai Narayanan , Mahinthan Chandramohan , Lihui Chen , Yang Liu
Empirical Software Engineering 23 ( 3) 1222 -1274

42
2018
Detection and classification of malicious JavaScript via attack behavior modelling

Yinxing Xue , Junjie Wang , Yang Liu , Hao Xiao
international symposium on software testing and analysis 48 -59

19
2015
Scalable analysis for malware and vulnerability detection in binaries

Mahinthan Chandramohan
Nanyang Technological University

2018
Steelix: program-state based binary fuzzing

Yuekang Li , Bihuan Chen , Mahinthan Chandramohan , Shang-Wei Lin
foundations of software engineering 627 -637

276
2017
An Adaptive Markov Strategy for Effective Network Intrusion Detection

Jianye Hao , Yinxing Xue , Mahinthan Chandramohan , Yang Liu
international conference on tools with artificial intelligence 1085 -1092

2
2015