Construction of abstract state graphs with PVS S Graf, H Saidi CAV 97, 72-83, 1997 | 1996 | 1997 |
Aurasium: practical policy enforcement for android applications. R Xu, H Saïdi, RJ Anderson USENIX security symposium 2012, 2012 | 616 | 2012 |
Abstract and model check while you prove H Saïdi, N Shankar Computer Aided Verification: 11th International Conference, CAV’99 Trento …, 1999 | 250 | 1999 |
An overview of SAL S Bensalem, V Ganesh, Y Lakhnech, C Munoz, S Owre, H Rueß, ... Lfm2000: Fifth NASA Langley Formal Methods Workshop, 2000 | 249 | 2000 |
A multi-perspective analysis of the storm (peacomm) worm P Porras, H Saidi, V Yegneswaran Technical report, Computer Science Laboratory, SRI International, 2007 | 203 | 2007 |
An analysis of conficker’s logic and rendezvous points P Porras, H Saidi, V Yegneswaran Computer Science Laboratory, SRI International, Tech. Rep 36, 2009 | 199 | 2009 |
A Foray into Conficker's Logic and Rendezvous Points. PA Porras, H Saïdi, V Yegneswaran LEET 9, 7, 2009 | 174 | 2009 |
Powerful techniques for the automatic generation of invariants S Bensalem, Y Lakhnech, H Saidi Computer Aided Verification: 8th International Conference, CAV'96 New …, 1996 | 168 | 1996 |
Eureka: A Framework for Enabling Static Malware Analysis. MI Sharif, V Yegneswaran, H Saidi, PA Porras, W Lee ESORICS 8, 481-500, 2008 | 163 | 2008 |
Model checking guided abstraction and analysis H Saidi Static Analysis: 7th International Symposium, SAS 2000, Santa Barbara, CA …, 2000 | 144 | 2000 |
A technique for invariant generation A Tiwari, H Rueß, H Saïdi, N Shankar Tools and Algorithms for the Construction and Analysis of Systems: 7th …, 2001 | 116 | 2001 |
An analysis of the ikee. b iphone botnet P Porras, H Saidi, V Yegneswaran Security and Privacy in Mobile Information and Communication Systems: Second …, 2010 | 102 | 2010 |
Polymorphic computing architectures CS Lockett, SA Oberg, SM Forsberg, H Saidi, JE Casper US Patent 9,501,666, 2016 | 89 | 2016 |
Conficker C analysis P Porras, H Saidi, V Yegneswaran SRI International 1, 1-1, 2009 | 88 | 2009 |
Method and system for application-based policy monitoring and enforcement on a mobile device H Saidi, R Xu US Patent 8,844,036, 2014 | 80 | 2014 |
An architecture for an adaptive intrusion-tolerant server A Valdes, M Almgren, S Cheung, Y Deswarte, B Dutertre, J Levy, H Saidi, ... Security Protocols: 10th International Workshop, Cambridge, UK, April 17-19 …, 2004 | 74 | 2004 |
Intrusion tolerant software architectures V Stavridou, B Dutertre, RA Riemenschneider, H Saidi Proceedings DARPA Information Survivability Conference and Exposition II …, 2001 | 67 | 2001 |
Method and system for application-based policy monitoring and enforcement on a mobile device H Saidi, R Xu US Patent App. 14/480,726, 2014 | 66 | 2014 |
Verifying invariants using theorem proving S Graf, H Saïdi Computer Aided Verification: 8th International Conference, CAV'96 New …, 1996 | 61 | 1996 |
Smartphone security limitations: conflicting traditions N Husted, H Saïdi, A Gehani Proceedings of the 2011 Workshop on Governance of Technology, Information …, 2011 | 52 | 2011 |