Andrew Walenstein
Andrew Walenstein
Director, Security R&D, BlackBerry
Verified email at
Cited by
Cited by
Malware phylogeny generation using permutations of code
ME Karim, A Walenstein, A Lakhotia, L Parida
Journal in Computer Virology 1 (1-2), 13-23, 2005
The software similarity problem in malware analysis
A Walenstein, A Lakhotia
Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2007
Normalizing metamorphic malware using term rewriting
A Walenstein, R Mathur, MR Chouchane, A Lakhotia
2006 Sixth IEEE International Workshop on Source Code Analysis and …, 2006
Problems Creating Task-relevant Clone Detection Reference Data.
A Walenstein, N Jyoti, J Li, Y Yang, A Lakhotia
WCRE 3, 285, 2003
A secure microservice framework for iot
D Lu, D Huang, A Walenstein, D Medhi
2017 IEEE Symposium on Service-Oriented System Engineering (SOSE), 9-18, 2017
Cognitive support in software engineering tools: A distributed cognition framework
A Walenstein
Simon Fraser University, 2002
Exploiting similarity between variants to defeat malware
A Walenstein, M Venable, M Hayes, C Thompson, A Lakhotia
Proc. BlackHat DC Conf, 2007
A survey of anomaly detection for connected vehicle cybersecurity and safety
GK Rajbahadur, AJ Malton, A Walenstein, AE Hassan
2018 IEEE Intelligent Vehicles Symposium (IV), 421-426, 2018
Tracking concept drift in malware families
A Singh, A Walenstein, A Lakhotia
Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012
The design space of metamorphic malware
A Walenstein, R Mathur, MR Chouchane, A Lakhotia
2nd International Conference on i-Warfare and Security (ICIW 2007). 2nd …, 2007
Similarity in programs
A Walenstein, M El-Ramly, JR Cordy, WS Evans, K Mahdavi, M Pizka, ...
Dagstuhl Seminar Proceedings, 2007
Theory-based analysis of cognitive support in software comprehension tools
A Walenstein
Proceedings 10th International Workshop on Program Comprehension, 75-84, 2002
Finding Boundary Objects in SE and HCI: An Approach Through Engineering-oriented Design Theories.
A Walenstein
ICSE Workshop on SE-HCI, 92-99, 2003
Towards a clone detection benchmark suite and results archive
A Lakhotia, J Li, A Walenstein, Y Yang
11th IEEE International Workshop on Program Comprehension, 2003., 285-286, 2003
Reverse engineering tools as media for imperfect knowledge
JH Jahnke, A Walenstein
Proceedings Seventh Working Conference on Reverse Engineering, 22-31, 2000
Vilo: a rapid learning nearest-neighbor classifier for malware triage
A Lakhotia, A Walenstein, C Miles, A Singh
Journal of Computer Virology and Hacking Techniques 9 (3), 109-123, 2013
Observing and measuring cognitive support: Steps toward systematic tool evaluation and engineering
A Walenstein
11th IEEE International Workshop on Program Comprehension, 2003., 185-194, 2003
Evaluation of malware phylogeny modelling systems using automated variant generation
M Hayes, A Walenstein, A Lakhotia
Journal in Computer Virology 5, 335-343, 2009
Phylogeny generation
A Lakhotia, ME Karim, A Walenstein
US Patent 7,873,947, 2011
Statistical signatures for fast filtering of instruction-substituting metamorphic malware
MR Chouchane, A Walenstein, A Lakhotia
Proceedings of the 2007 ACM workshop on Recurring malcode, 31-37, 2007
The system can't perform the operation now. Try again later.
Articles 1–20