Andrew Walenstein
Andrew Walenstein
Director, Security R&D, BlackBerry
Verified email at blackberry.com
Title
Cited by
Cited by
Year
Malware phylogeny generation using permutations of code
ME Karim, A Walenstein, A Lakhotia, L Parida
Journal in Computer Virology 1 (1), 13-23, 2005
2992005
Normalizing metamorphic malware using term rewriting
A Walenstein, R Mathur, MR Chouchane, A Lakhotia
2006 Sixth IEEE International Workshop on Source Code Analysis and …, 2006
1022006
Problems Creating Task-relevant Clone Detection Reference Data.
A Walenstein, N Jyoti, J Li, Y Yang, A Lakhotia
WCRE 3, 285, 2003
962003
The software similarity problem in malware analysis
A Walenstein, A Lakhotia
Dagstuhl Seminar Proceedings, 2007
942007
Cognitive support in software engineering tools: A distributed cognition framework
A Walenstein
Simon Fraser University, 2002
942002
Exploiting similarity between variants to defeat malware
A Walenstein, M Venable, M Hayes, C Thompson, A Lakhotia
Proc. BlackHat DC Conf, 2007
812007
A secure microservice framework for iot
D Lu, D Huang, A Walenstein, D Medhi
2017 IEEE Symposium on Service-Oriented System Engineering (SOSE), 9-18, 2017
592017
The design space of metamorphic malware
A Walenstein, R Mathur, MR Chouchane, A Lakhotia
2nd International Conference on i-Warfare and Security (ICIW 2007). 2nd …, 2007
522007
Theory-based analysis of cognitive support in software comprehension tools
A Walenstein
Proceedings 10th International Workshop on Program Comprehension, 75-84, 2002
482002
Reverse engineering tools as media for imperfect knowledge
JH Jahnke, A Walenstein
Proceedings Seventh Working Conference on Reverse Engineering, 22-31, 2000
442000
Tracking concept drift in malware families
A Singh, A Walenstein, A Lakhotia
Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012
432012
Finding Boundary Objects in SE and HCI: An Approach Through Engineering-oriented Design Theories.
A Walenstein
ICSE Workshop on SE-HCI, 92-99, 2003
432003
Towards a clone detection benchmark suite and results archive
A Lakhotia, J Li, A Walenstein, Y Yang
11th IEEE International Workshop on Program Comprehension, 2003., 285-286, 2003
422003
Similarity in programs
A Walenstein, M El-Ramly, JR Cordy, WS Evans, K Mahdavi, M Pizka, ...
Dagstuhl Seminar Proceedings, 2007
412007
Observing and measuring cognitive support: Steps toward systematic tool evaluation and engineering
A Walenstein
11th IEEE International Workshop on Program Comprehension, 2003., 185-194, 2003
412003
Vilo: a rapid learning nearest-neighbor classifier for malware triage
A Lakhotia, A Walenstein, C Miles, A Singh
Journal of Computer Virology and Hacking Techniques 9 (3), 109-123, 2013
362013
Evaluation of malware phylogeny modelling systems using automated variant generation
M Hayes, A Walenstein, A Lakhotia
Journal in Computer Virology 5 (4), 335-343, 2009
352009
A survey of anomaly detection for connected vehicle cybersecurity and safety
GK Rajbahadur, AJ Malton, A Walenstein, AE Hassan
2018 IEEE Intelligent Vehicles Symposium (IV), 421-426, 2018
332018
Statistical signatures for fast filtering of instruction-substituting metamorphic malware
MR Chouchane, A Walenstein, A Lakhotia
Proceedings of the 2007 ACM workshop on Recurring malcode, 31-37, 2007
312007
Phylogeny generation
A Lakhotia, ME Karim, A Walenstein
US Patent 7,873,947, 2011
282011
The system can't perform the operation now. Try again later.
Articles 1–20