Follow
Thomas H. Austin
Thomas H. Austin
Associate Professor of Computer Science, San Jose State University
Verified email at bias2build.com - Homepage
Title
Cited by
Cited by
Year
A comparison of static, dynamic, and hybrid analysis for malware detection
A Damodaran, FD Troia, CA Visaggio, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 13, 1-12, 2017
4662017
Efficient purely-dynamic information flow analysis
TH Austin, C Flanagan
Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and …, 2009
3092009
Multiple facets for dynamic information flow
TH Austin, C Flanagan
Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2012
2642012
Permissive dynamic information flow analysis
TH Austin, C Flanagan
Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and …, 2010
2042010
Hidden Markov models for malware classification
C Annachhatre, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 11, 59-73, 2015
1602015
Exploring hidden Markov models for virus analysis: A semantic approach
TH Austin, E Filiol, S Josse, M Stamp
2013 46th Hawaii International Conference on System Sciences, 5039-5048, 2013
1042013
Precise, dynamic information flow for database-backed applications
J Yang, T Hance, TH Austin, A Solar-Lezama, C Flanagan, S Chong
ACM Sigplan Notices 51 (6), 631-647, 2016
862016
Clustering for malware classification
S Pai, FD Troia, CA Visaggio, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 13, 95-107, 2017
772017
Support vector machines and malware detection
T Singh, F Di Troia, VA Corrado, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 12, 203-212, 2016
742016
Faceted execution of policy-agnostic programs
TH Austin, J Yang, C Flanagan, A Solar-Lezama
Proceedings of the Eighth ACM SIGPLAN workshop on Programming languages and …, 2013
732013
Malware detection using dynamic birthmarks
S Vemparala, F Di Troia, VA Corrado, TH Austin, M Stamo
Proceedings of the 2016 ACM on international workshop on security and …, 2016
522016
Clustering versus SVM for malware detection
U Narra, FD Troia, VA Corrado, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 12, 213-224, 2016
412016
Systems and methods of blockchain platform for distributed applications
TH Austin, S Basu
US Patent 11,165,862, 2021
402021
Virtual values for language extension
TH Austin, T Disney, C Flanagan
Proceedings of the 2011 ACM international conference on Object oriented …, 2011
402011
Dueling hidden Markov models for virus analysis
A Kalbhor, TH Austin, E Filiol, S Josse, M Stamp
Journal of Computer Virology and Hacking Techniques 11, 103-118, 2015
332015
Hunting for metamorphic JavaScript malware
M Musale, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 11, 89-102, 2015
312015
Singular value decomposition and metamorphic detection
RK Jidigam, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 11, 203-216, 2015
292015
Non-fungible token blockchain processing
S Basu, TH Austin
US Patent App. 17/672,842, 2022
282022
Multiple facets for dynamic information flow with exceptions
TH Austin, T Schmitz, C Flanagan
ACM Transactions on Programming Languages and Systems (TOPLAS) 39 (3), 1-56, 2017
272017
Faceted dynamic information flow via control and data monads
T Schmitz, D Rhodes, TH Austin, K Knowles, C Flanagan
International Conference on Principles of Security and Trust, 3-23, 2016
272016
The system can't perform the operation now. Try again later.
Articles 1–20