Volgen
Dr. Hassen Saidi
Dr. Hassen Saidi
Sr Computer Scientist, SRI International
Geverifieerd e-mailadres voor csl.sri.com - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Construction of abstract state graphs with PVS
S Graf, H Saidi
Computer Aided Verification: 9th International Conference, CAV'97 Haifa …, 1997
20231997
Aurasium: Practical policy enforcement for android applications
R Xu, H Saïdi, R Anderson
21st USENIX Security Symposium (USENIX Security 12), 539-552, 2012
6372012
Abstract and model check while you prove
H Saïdi, N Shankar
Computer Aided Verification: 11th International Conference, CAV’99 Trento …, 1999
2491999
An overview of SAL
S Bensalem, V Ganesh, Y Lakhnech, C Munoz, S Owre, H Rueß, ...
NASA CONFERENCE PUBLICATION, 187-195, 2000
2342000
A multi-perspective analysis of the storm (peacomm) worm
P Porras, H Saidi, V Yegneswaran
Technical report, Computer Science Laboratory, SRI International, 2007
2062007
An analysis of conficker’s logic and rendezvous points
P Porras, H Saidi, V Yegneswaran
Computer Science Laboratory, SRI International, Tech. Rep 36, 2009
1982009
Eureka: A framework for enabling static malware analysis
M Sharif, V Yegneswaran, H Saidi, P Porras, W Lee
Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008
1792008
A Foray into Conficker's Logic and Rendezvous Points.
PA Porras, H Saïdi, V Yegneswaran
LEET 9, 7, 2009
1762009
Powerful techniques for the automatic generation of invariants
S Bensalem, Y Lakhnech, H Saidi
Computer Aided Verification: 8th International Conference, CAV'96 New …, 1996
1751996
Model checking guided abstraction and analysis
H Saidi
International Static Analysis Symposium, 377-396, 2000
1422000
A technique for invariant generation
A Tiwari, H Rueß, H Saïdi, N Shankar
International Conference on Tools and Algorithms for the Construction and …, 2001
1212001
An analysis of the ikee. b iphone botnet
P Porras, H Saidi, V Yegneswaran
Security and Privacy in Mobile Information and Communication Systems: Second …, 2010
1022010
Polymorphic computing architectures
CS Lockett, SA Oberg, SM Forsberg, H Saidi, JE Casper
US Patent 9,501,666, 2016
1002016
Conficker C analysis
P Porras, H Saidi, V Yegneswaran
SRI International 1, 1-1, 2009
902009
Method and system for application-based policy monitoring and enforcement on a mobile device
H Saidi, R Xu
US Patent 8,844,036, 2014
862014
Method and system for application-based policy monitoring and enforcement on a mobile device
H Saidi, R Xu
US Patent App. 14/480,726, 2014
742014
An architecture for an adaptive intrusion-tolerant server
A Valdes, M Almgren, S Cheung, Y Deswarte, B Dutertre, J Levy, H Saidi, ...
Security Protocols: 10th International Workshop, Cambridge, UK, April 17-19 …, 2004
742004
Intrusion tolerant software architectures
V Stavridou, B Dutertre, RA Riemenschneider, H Saidi
Proceedings DARPA Information Survivability Conference and Exposition II …, 2001
682001
Verifying invariants using theorem proving
S Graf, H Saïdi
Computer Aided Verification: 8th International Conference, CAV'96 New …, 1996
641996
Operating system-independent integrity verification
S Oberg, CS Lockett, S Forsberg, H Saidi, JE Casper
US Patent 10,073,966, 2018
572018
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20