BibTeX records: Manuel Egele

download as .bib file

@article{DBLP:journals/tpds/AksarSSALBKEC24,
  author       = {Burak Aksar and
                  Efe Sencan and
                  Benjamin Schwaller and
                  Omar Aaziz and
                  Vitus J. Leung and
                  Jim M. Brandt and
                  Brian Kulis and
                  Manuel Egele and
                  Ayse K. Coskun},
  title        = {Runtime Performance Anomaly Diagnosis in Production {HPC} Systems
                  Using Active Learning},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {35},
  number       = {4},
  pages        = {693--706},
  year         = {2024},
  url          = {https://doi.org/10.1109/TPDS.2024.3365462},
  doi          = {10.1109/TPDS.2024.3365462},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/AksarSSALBKEC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/BlairRE23,
  author       = {William Blair and
                  William K. Robertson and
                  Manuel Egele},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {ThreadLock: Native Principal Isolation Through Memory Protection Keys},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {966--979},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3595797},
  doi          = {10.1145/3579856.3595797},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/BlairRE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/RajapakshaDEJ23,
  author       = {Chathura Rajapaksha and
                  Leila Delshadtehrani and
                  Manuel Egele and
                  Ajay Joshi},
  title        = {SIGFuzz: {A} Framework for Discovering Microarchitectural Timing Side
                  Channels},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2023, Antwerp, Belgium, April 17-19, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.23919/DATE56975.2023.10136966},
  doi          = {10.23919/DATE56975.2023.10136966},
  timestamp    = {Wed, 07 Jun 2023 22:08:03 +0200},
  biburl       = {https://dblp.org/rec/conf/date/RajapakshaDEJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/CanakciRDNTEJ23,
  author       = {Sadullah Canakci and
                  Chathura Rajapaksha and
                  Leila Delshadtehrani and
                  Anoop Mysore Nataraja and
                  Michael Bedford Taylor and
                  Manuel Egele and
                  Ajay Joshi},
  title        = {ProcessorFuzz: Processor Fuzzing with Control and Status Registers
                  Guidance},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2023, San Jose, CA, USA, May 1-4, 2023},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/HOST55118.2023.10133714},
  doi          = {10.1109/HOST55118.2023.10133714},
  timestamp    = {Mon, 11 Sep 2023 17:53:23 +0200},
  biburl       = {https://dblp.org/rec/conf/host/CanakciRDNTEJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BulekovDHE23,
  author       = {Alexander Bulekov and
                  Bandan Das and
                  Stefan Hajnoczi and
                  Manuel Egele},
  title        = {No Grammar, No Problem: Towards Fuzzing the Linux Kernel without System-Call
                  Descriptions},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/no-grammar-no-problem-towards-fuzzing-the-linux-kernel-without-system-call-descriptions/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/BulekovDHE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sc/AksarSSALBKEC23,
  author       = {Burak Aksar and
                  Efe Sencan and
                  Benjamin Schwaller and
                  Omar Aaziz and
                  Vitus J. Leung and
                  Jim M. Brandt and
                  Brian Kulis and
                  Manuel Egele and
                  Ayse K. Coskun},
  editor       = {Dorian Arnold and
                  Rosa M. Badia and
                  Kathryn M. Mohror},
  title        = {Prodigy: Towards Unsupervised Anomaly Detection in Production {HPC}
                  Systems},
  booktitle    = {Proceedings of the International Conference for High Performance Computing,
                  Networking, Storage and Analysis, {SC} 2023, Denver, CO, USA, November
                  12-17, 2023},
  pages        = {26:1--26:14},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3581784.3607076},
  doi          = {10.1145/3581784.3607076},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sc/AksarSSALBKEC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AngelakopoulosS23,
  author       = {Ioannis Angelakopoulos and
                  Gianluca Stringhini and
                  Manuel Egele},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel
                  modules},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5021--5038},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/angelakopoulos},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AngelakopoulosS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JahanshahiANE23,
  author       = {Rasoul Jahanshahi and
                  Babak Amin Azad and
                  Nick Nikiforakis and
                  Manuel Egele},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Minimalist: Semi-automated Debloating of {PHP} Web Applications through
                  Static Analysis},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5557--5573},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/jahanshahi},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/JahanshahiANE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AzadJTEN23,
  author       = {Babak Amin Azad and
                  Rasoul Jahanshahi and
                  Chris Tsoukaladelis and
                  Manuel Egele and
                  Nick Nikiforakis},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {AnimateDead: Debloating Web Applications Using Concolic Execution},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5575--5591},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/azad},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AzadJTEN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BlairMAW0KE22,
  author       = {William Blair and
                  Andrea Mambretti and
                  Sajjad Arshad and
                  Michael Weissbacher and
                  William Robertson and
                  Engin Kirda and
                  Manuel Egele},
  title        = {HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities
                  Through Guided Micro-Fuzzing},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {4},
  pages        = {33:1--33:35},
  year         = {2022},
  url          = {https://doi.org/10.1145/3532184},
  doi          = {10.1145/3532184},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BlairMAW0KE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/CanakciMGJE22,
  author       = {Sadullah Canakci and
                  Nikolay Matyunin and
                  Kalman Graffi and
                  Ajay Joshi and
                  Manuel Egele},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {TargetFuzz: Using DARTs to Guide Directed Greybox Fuzzers},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {561--573},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3501276},
  doi          = {10.1145/3488932.3501276},
  timestamp    = {Tue, 24 May 2022 13:40:31 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/CanakciMGJE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JiangGHTRTEZP22,
  author       = {Zhiyuan Jiang and
                  Shuitao Gan and
                  Adrian Herrera and
                  Flavio Toffalini and
                  Lucio Romerio and
                  Chaojing Tang and
                  Manuel Egele and
                  Chao Zhang and
                  Mathias Payer},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Evocatio: Conjuring Bug Capabilities from a Single PoC},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {1599--1613},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560575},
  doi          = {10.1145/3548606.3560575},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JiangGHTRTEZP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/BlairRE22,
  author       = {William Blair and
                  William K. Robertson and
                  Manuel Egele},
  editor       = {Lorenzo Cavallaro and
                  Daniel Gruss and
                  Giancarlo Pellegrino and
                  Giorgio Giacinto},
  title        = {MPKAlloc: Efficient Heap Meta-data Integrity Through Hardware Memory
                  Protection Keys},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 19th International Conference, {DIMVA} 2022, Cagliari, Italy, June
                  29 - July 1, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13358},
  pages        = {136--155},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09484-2\_8},
  doi          = {10.1007/978-3-031-09484-2\_8},
  timestamp    = {Fri, 01 Jul 2022 15:28:37 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/BlairRE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BulekovDHE22,
  author       = {Alexander Bulekov and
                  Bandan Das and
                  Stefan Hajnoczi and
                  Manuel Egele},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Morphuzz: Bending (Input) Space to Fuzz Virtual Devices},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {1221--1238},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/bulekov},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BulekovDHE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-08461,
  author       = {Ioannis Agadakos and
                  Manuel Egele and
                  William K. Robertson},
  title        = {Polytope: Practical Memory Access Control for {C++} Applications},
  journal      = {CoRR},
  volume       = {abs/2201.08461},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.08461},
  eprinttype    = {arXiv},
  eprint       = {2201.08461},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-08461.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-01789,
  author       = {Sadullah Canakci and
                  Chathura Rajapaksha and
                  Anoop Mysore Nataraja and
                  Leila Delshadtehrani and
                  Michael B. Taylor and
                  Manuel Egele and
                  Ajay Joshi},
  title        = {ProcessorFuzz: Guiding Processor Fuzzing using Control and Status
                  Registers},
  journal      = {CoRR},
  volume       = {abs/2209.01789},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.01789},
  doi          = {10.48550/ARXIV.2209.01789},
  eprinttype    = {arXiv},
  eprint       = {2209.01789},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-01789.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dt/ZhouGJEJ21,
  author       = {Boyou Zhou and
                  Anmol Gupta and
                  Rasoul Jahanshahi and
                  Manuel Egele and
                  Ajay Joshi},
  title        = {A Cautionary Tale About Detecting Malware Using Hardware Performance
                  Counters and Machine Learning},
  journal      = {{IEEE} Des. Test},
  volume       = {38},
  number       = {3},
  pages        = {39--50},
  year         = {2021},
  url          = {https://doi.org/10.1109/MDAT.2021.3063338},
  doi          = {10.1109/MDAT.2021.3063338},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dt/ZhouGJEJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/ManesHHCESW21,
  author       = {Valentin J. M. Man{\`{e}}s and
                  HyungSeok Han and
                  Choongwoo Han and
                  Sang Kil Cha and
                  Manuel Egele and
                  Edward J. Schwartz and
                  Maverick Woo},
  title        = {The Art, Science, and Engineering of Fuzzing: {A} Survey},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {47},
  number       = {11},
  pages        = {2312--2331},
  year         = {2021},
  url          = {https://doi.org/10.1109/TSE.2019.2946563},
  doi          = {10.1109/TSE.2019.2946563},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tse/ManesHHCESW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DelshadtehraniC21,
  author       = {Leila Delshadtehrani and
                  Sadullah Canakci and
                  William Blair and
                  Manuel Egele and
                  Ajay Joshi},
  title        = {FlexFilt: Towards Flexible Instruction Filtering for Security},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {646--659},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488019},
  doi          = {10.1145/3485832.3488019},
  timestamp    = {Tue, 07 Dec 2021 18:41:40 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DelshadtehraniC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/AliyevaE21,
  author       = {Assel Aliyeva and
                  Manuel Egele},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {Oversharing Is Not Caring: How {CNAME} Cloaking Can Expose Your Session
                  Cookies},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {123--134},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3437524},
  doi          = {10.1145/3433210.3437524},
  timestamp    = {Wed, 09 Jun 2021 15:14:39 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/AliyevaE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/FasanoBMLBDEFLG21,
  author       = {Andrew Fasano and
                  Tiemoko Ballo and
                  Marius Muench and
                  Tim Leek and
                  Alexander Bulekov and
                  Brendan Dolan{-}Gavitt and
                  Manuel Egele and
                  Aur{\'{e}}lien Francillon and
                  Long Lu and
                  Nick Gregory and
                  Davide Balzarotti and
                  William Robertson},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {SoK: Enabling Security Analyses of Embedded Systems via Rehosting},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {687--701},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3453093},
  doi          = {10.1145/3433210.3453093},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/FasanoBMLBDEFLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/CanakciDETEJ21,
  author       = {Sadullah Canakci and
                  Leila Delshadtehrani and
                  Furkan Eris and
                  Michael Bedford Taylor and
                  Manuel Egele and
                  Ajay Joshi},
  title        = {DirectFuzz: Automated Test Generation for {RTL} Designs using Directed
                  Graybox Fuzzing},
  booktitle    = {58th {ACM/IEEE} Design Automation Conference, {DAC} 2021, San Francisco,
                  CA, USA, December 5-9, 2021},
  pages        = {529--534},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DAC18074.2021.9586289},
  doi          = {10.1109/DAC18074.2021.9586289},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dac/CanakciDETEJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/DelshadtehraniC21,
  author       = {Leila Delshadtehrani and
                  Sadullah Canakci and
                  Manuel Egele and
                  Ajay Joshi},
  title        = {SealPK: Sealable Protection Keys for {RISC-V}},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2021, Grenoble, France, February 1-5, 2021},
  pages        = {1278--1281},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/DATE51398.2021.9473932},
  doi          = {10.23919/DATE51398.2021.9473932},
  timestamp    = {Wed, 21 Jul 2021 10:04:34 +0200},
  biburl       = {https://dblp.org/rec/conf/date/DelshadtehraniC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europar/AksarSALBEC21,
  author       = {Burak Aksar and
                  Benjamin Schwaller and
                  Omar Aaziz and
                  Vitus J. Leung and
                  Jim M. Brandt and
                  Manuel Egele and
                  Ayse K. Coskun},
  editor       = {Leonel Sousa and
                  Nuno Roma and
                  Pedro Tom{\'{a}}s},
  title        = {E2EWatch: An End-to-End Anomaly Diagnosis Framework for Production
                  {HPC} Systems},
  booktitle    = {Euro-Par 2021: Parallel Processing - 27th International Conference
                  on Parallel and Distributed Computing, Lisbon, Portugal, September
                  1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12820},
  pages        = {70--85},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85665-6\_5},
  doi          = {10.1007/978-3-030-85665-6\_5},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europar/AksarSALBEC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ZungurBSE21,
  author       = {Onur Zungur and
                  Antonio Bianchi and
                  Gianluca Stringhini and
                  Manuel Egele},
  title        = {AppJitsu: Investigating the Resiliency of Android Applications},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2021, Vienna, Austria, September 6-10, 2021},
  pages        = {457--471},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuroSP51992.2021.00038},
  doi          = {10.1109/EUROSP51992.2021.00038},
  timestamp    = {Thu, 11 Nov 2021 09:11:58 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/ZungurBSE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpec/ZhangAASBLEC21,
  author       = {Yijia Zhang and
                  Burak Aksar and
                  Omar Aaziz and
                  Benjamin Schwaller and
                  Jim M. Brandt and
                  Vitus J. Leung and
                  Manuel Egele and
                  Ayse K. Coskun},
  title        = {Using Monitoring Data to Improve {HPC} Performance via Network-Data-Driven
                  Allocation},
  booktitle    = {2021 {IEEE} High Performance Extreme Computing Conference, {HPEC}
                  2021, Waltham, MA, USA, September 20-24, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/HPEC49654.2021.9622783},
  doi          = {10.1109/HPEC49654.2021.9622783},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpec/ZhangAASBLEC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/KaleliKENS21,
  author       = {Beliz Kaleli and
                  Brian Kondracki and
                  Manuel Egele and
                  Nick Nikiforakis and
                  Gianluca Stringhini},
  title        = {To Err.Is Human: Characterizing the Threat of Unintended URLs in Social
                  Media},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/to-err-is-human-characterizing-the-threat-of-unintended-urls-in-social-media/},
  timestamp    = {Thu, 17 Jun 2021 15:42:26 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/KaleliKENS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/supercomputer/Aksar0ASALBEC21,
  author       = {Burak Aksar and
                  Yijia Zhang and
                  Emre Ates and
                  Benjamin Schwaller and
                  Omar Aaziz and
                  Vitus J. Leung and
                  Jim M. Brandt and
                  Manuel Egele and
                  Ayse K. Coskun},
  editor       = {Bradford L. Chamberlain and
                  Ana Lucia Varbanescu and
                  Hatem Ltaief and
                  Piotr Luszczek},
  title        = {Proctor: {A} Semi-Supervised Performance Anomaly Diagnosis Framework
                  for Production {HPC} Systems},
  booktitle    = {High Performance Computing - 36th International Conference, {ISC}
                  High Performance 2021, Virtual Event, June 24 - July 2, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12728},
  pages        = {195--214},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78713-4\_11},
  doi          = {10.1007/978-3-030-78713-4\_11},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/supercomputer/Aksar0ASALBEC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BulekovJE21,
  author       = {Alexander Bulekov and
                  Rasoul Jahanshahi and
                  Manuel Egele},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Saphire: Sandboxing {PHP} Applications with Tailored System Call Allowlists},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2881--2898},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/bulekov},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BulekovJE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JahanshahiDE20,
  author       = {Rasoul Jahanshahi and
                  Adam Doup{\'{e}} and
                  Manuel Egele},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {You shall not pass: Mitigating {SQL} Injection Attacks on Legacy Web
                  Applications},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {445--457},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384760},
  doi          = {10.1145/3320269.3384760},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JahanshahiDE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/CanakciDZJE20,
  author       = {Sadullah Canakci and
                  Leila Delshadtehrani and
                  Boyou Zhou and
                  Ajay Joshi and
                  Manuel Egele},
  editor       = {Cl{\'{e}}mentine Maurice and
                  Leyla Bilge and
                  Gianluca Stringhini and
                  Nuno Neves},
  title        = {Efficient Context-Sensitive {CFI} Enforcement Through a Hardware Monitor},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 17th International Conference, {DIMVA} 2020, Lisbon, Portugal, June
                  24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12223},
  pages        = {259--279},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-52683-2\_13},
  doi          = {10.1007/978-3-030-52683-2\_13},
  timestamp    = {Sun, 25 Jul 2021 11:49:24 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/CanakciDZJE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/ZungurSE20,
  author       = {Onur Zungur and
                  Gianluca Stringhini and
                  Manuel Egele},
  title        = {Libspector : Context-Aware Large-Scale Network Traffic Analysis of
                  Android Applications},
  booktitle    = {50th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2020, Valencia, Spain, June 29 - July 2, 2020},
  pages        = {318--330},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/DSN48063.2020.00048},
  doi          = {10.1109/DSN48063.2020.00048},
  timestamp    = {Wed, 05 Aug 2020 14:09:10 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/ZungurSE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BlairMAW0KE20,
  author       = {William Blair and
                  Andrea Mambretti and
                  Sajjad Arshad and
                  Michael Weissbacher and
                  William Robertson and
                  Engin Kirda and
                  Manuel Egele},
  title        = {HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities
                  Through Guided Micro-Fuzzing},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/hotfuzz-discovering-algorithmic-denial-of-service-vulnerabilities-through-guided-micro-fuzzing/},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BlairMAW0KE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KondrackiAEPN20,
  author       = {Brian Kondracki and
                  Assel Aliyeva and
                  Manuel Egele and
                  Jason Polakis and
                  Nick Nikiforakis},
  title        = {Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving
                  Mobile Browsers},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {810--824},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00077},
  doi          = {10.1109/SP40000.2020.00077},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KondrackiAEPN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DelshadtehraniC20,
  author       = {Leila Delshadtehrani and
                  Sadullah Canakci and
                  Boyou Zhou and
                  Schuyler Eldridge and
                  Ajay Joshi and
                  Manuel Egele},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {PHMon: {A} Programmable Hardware Monitor and Its Security Use Cases},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {807--824},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/delshadtehrani},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DelshadtehraniC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2020,
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020},
  isbn         = {978-1-939133-18-2},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-03416,
  author       = {William Blair and
                  Andrea Mambretti and
                  Sajjad Arshad and
                  Michael Weissbacher and
                  William K. Robertson and
                  Engin Kirda and
                  Manuel Egele},
  title        = {HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities
                  Through Guided Micro-Fuzzing},
  journal      = {CoRR},
  volume       = {abs/2002.03416},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.03416},
  eprinttype    = {arXiv},
  eprint       = {2002.03416},
  timestamp    = {Wed, 12 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-03416.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-11996,
  author       = {Rasoul Jahanshahi and
                  Adam Doup{\'{e}} and
                  Manuel Egele},
  title        = {You shall not pass: Mitigating {SQL} Injection Attacks on Legacy Web
                  Applications},
  journal      = {CoRR},
  volume       = {abs/2006.11996},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.11996},
  eprinttype    = {arXiv},
  eprint       = {2006.11996},
  timestamp    = {Tue, 23 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-11996.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-02715,
  author       = {Leila Delshadtehrani and
                  Sadullah Canakci and
                  Manuel Egele and
                  Ajay Joshi},
  title        = {Efficient Sealable Protection Keys for {RISC-V}},
  journal      = {CoRR},
  volume       = {abs/2012.02715},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.02715},
  eprinttype    = {arXiv},
  eprint       = {2012.02715},
  timestamp    = {Wed, 09 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-02715.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/TuncerAZTBLEC19,
  author       = {Ozan Tuncer and
                  Emre Ates and
                  Yijia Zhang and
                  Ata Turk and
                  Jim M. Brandt and
                  Vitus J. Leung and
                  Manuel Egele and
                  Ayse K. Coskun},
  title        = {Online Diagnosis of Performance Variation in {HPC} Systems Using Machine
                  Learning},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {30},
  number       = {4},
  pages        = {883--896},
  year         = {2019},
  url          = {https://doi.org/10.1109/TPDS.2018.2870403},
  doi          = {10.1109/TPDS.2018.2870403},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tpds/TuncerAZTBLEC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/SahinAMCE19,
  author       = {Onur Sahin and
                  Assel Aliyeva and
                  Hariharan Mathavan and
                  Ayse K. Coskun and
                  Manuel Egele},
  title        = {Towards Practical Record and Replay for Mobile Applications},
  booktitle    = {Proceedings of the 56th Annual Design Automation Conference 2019,
                  {DAC} 2019, Las Vegas, NV, USA, June 02-06, 2019},
  pages        = {230},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3316781.3322476},
  doi          = {10.1145/3316781.3322476},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dac/SahinAMCE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/KaleliES19,
  author       = {Beliz Kaleli and
                  Manuel Egele and
                  Gianluca Stringhini},
  editor       = {Roberto Perdisci and
                  Cl{\'{e}}mentine Maurice and
                  Giorgio Giacinto and
                  Magnus Almgren},
  title        = {On the Perils of Leaking Referrers in Online Collaboration Services},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden,
                  June 19-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11543},
  pages        = {67--85},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22038-9\_4},
  doi          = {10.1007/978-3-030-22038-9\_4},
  timestamp    = {Tue, 29 Dec 2020 18:36:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/KaleliES19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/ZungurSSE19,
  author       = {Onur Zungur and
                  Guillermo Suarez{-}Tangil and
                  Gianluca Stringhini and
                  Manuel Egele},
  title        = {BorderPatrol: Securing {BYOD} using Fine-Grained Contextual Information},
  booktitle    = {49th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2019, Portland, OR, USA, June 24-27, 2019},
  pages        = {460--472},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSN.2019.00054},
  doi          = {10.1109/DSN.2019.00054},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/ZungurSSE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpp/AtesZABLEC19,
  author       = {Emre Ates and
                  Yijia Zhang and
                  Burak Aksar and
                  Jim M. Brandt and
                  Vitus J. Leung and
                  Manuel Egele and
                  Ayse K. Coskun},
  title        = {{HPAS:} An {HPC} Performance Anomaly Suite for Reproducing Performance
                  Variations},
  booktitle    = {Proceedings of the 48th International Conference on Parallel Processing,
                  {ICPP} 2019, Kyoto, Japan, August 05-08, 2019},
  pages        = {40:1--40:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337821.3337907},
  doi          = {10.1145/3337821.3337907},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpp/AtesZABLEC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/SahinAMCE19,
  author       = {Onur Sahin and
                  Assel Aliyeva and
                  Hariharan Mathavan and
                  Ayse K. Coskun and
                  Manuel Egele},
  title        = {{RANDR:} Record and Replay for Android Applications via Targeted Runtime
                  Instrumentation},
  booktitle    = {34th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2019, San Diego, CA, USA, November 11-15, 2019},
  pages        = {128--138},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ASE.2019.00022},
  doi          = {10.1109/ASE.2019.00022},
  timestamp    = {Sun, 19 Jan 2020 15:18:02 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/SahinAMCE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cal/DelshadtehraniE18,
  author       = {Leila Delshadtehrani and
                  Schuyler Eldridge and
                  Sadullah Canakci and
                  Manuel Egele and
                  Ajay Joshi},
  title        = {Nile: {A} Programmable Monitoring Coprocessor},
  journal      = {{IEEE} Comput. Archit. Lett.},
  volume       = {17},
  number       = {1},
  pages        = {92--95},
  year         = {2018},
  url          = {https://doi.org/10.1109/LCA.2017.2784416},
  doi          = {10.1109/LCA.2017.2784416},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cal/DelshadtehraniE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhouGJEJ18,
  author       = {Boyou Zhou and
                  Anmol Gupta and
                  Rasoul Jahanshahi and
                  Manuel Egele and
                  Ajay Joshi},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Hardware Performance Counters Can Detect Malware: Myth or Fact?},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {457--468},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196515},
  doi          = {10.1145/3196494.3196515},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhouGJEJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europar/AtesTTLBEC18,
  author       = {Emre Ates and
                  Ozan Tuncer and
                  Ata Turk and
                  Vitus J. Leung and
                  Jim M. Brandt and
                  Manuel Egele and
                  Ayse K. Coskun},
  editor       = {Marco Aldinucci and
                  Luca Padovani and
                  Massimo Torquati},
  title        = {Taxonomist: Application Detection Through Rich Monitoring Data},
  booktitle    = {Euro-Par 2018: Parallel Processing - 24th International Conference
                  on Parallel and Distributed Computing, Turin, Italy, August 27-31,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11014},
  pages        = {92--105},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96983-1\_7},
  doi          = {10.1007/978-3-319-96983-1\_7},
  timestamp    = {Tue, 23 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europar/AtesTTLBEC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SahinCE18,
  author       = {Onur Sahin and
                  Ayse K. Coskun and
                  Manuel Egele},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Proteus: Detecting Android Emulators from Instruction-Level Profiles},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {3--24},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_1},
  doi          = {10.1007/978-3-030-00470-5\_1},
  timestamp    = {Mon, 20 Nov 2023 09:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/SahinCE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-00140,
  author       = {Valentin J. M. Man{\`{e}}s and
                  HyungSeok Han and
                  Choongwoo Han and
                  Sang Kil Cha and
                  Manuel Egele and
                  Edward J. Schwartz and
                  Maverick Woo},
  title        = {Fuzzing: Art, Science, and Engineering},
  journal      = {CoRR},
  volume       = {abs/1812.00140},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.00140},
  eprinttype    = {arXiv},
  eprint       = {1812.00140},
  timestamp    = {Tue, 01 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-00140.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/EgeleSKV17,
  author       = {Manuel Egele and
                  Gianluca Stringhini and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Towards Detecting Compromised Accounts on Social Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {4},
  pages        = {447--460},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2479616},
  doi          = {10.1109/TDSC.2015.2479616},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/EgeleSKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KolodenkerKSE17,
  author       = {Eugene Kolodenker and
                  William Koch and
                  Gianluca Stringhini and
                  Manuel Egele},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {PayBreak: Defense Against Cryptographic Ransomware},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {599--611},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053035},
  doi          = {10.1145/3052973.3053035},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KolodenkerKSE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpec/ZhouEJ17,
  author       = {Boyou Zhou and
                  Manuel Egele and
                  Ajay Joshi},
  title        = {High-performance low-energy implementation of cryptographic algorithms
                  on a programmable SoC for IoT devices},
  booktitle    = {2017 {IEEE} High Performance Extreme Computing Conference, {HPEC}
                  2017, Waltham, MA, USA, September 12-14, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/HPEC.2017.8091062},
  doi          = {10.1109/HPEC.2017.8091062},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpec/ZhouEJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/KochCERK17,
  author       = {William Koch and
                  Abdelberi Chaabane and
                  Manuel Egele and
                  William K. Robertson and
                  Engin Kirda},
  editor       = {Tevfik Bultan and
                  Koushik Sen},
  title        = {Semi-automated discovery of server-based information oversharing vulnerabilities
                  in Android applications},
  booktitle    = {Proceedings of the 26th {ACM} {SIGSOFT} International Symposium on
                  Software Testing and Analysis, Santa Barbara, CA, USA, July 10 - 14,
                  2017},
  pages        = {147--157},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092703.3092708},
  doi          = {10.1145/3092703.3092708},
  timestamp    = {Tue, 06 Nov 2018 16:57:30 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/KochCERK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/supercomputer/TuncerAZTBLEC17,
  author       = {Ozan Tuncer and
                  Emre Ates and
                  Yijia Zhang and
                  Ata Turk and
                  Jim M. Brandt and
                  Vitus J. Leung and
                  Manuel Egele and
                  Ayse K. Coskun},
  editor       = {Julian M. Kunkel and
                  Rio Yokota and
                  Pavan Balaji and
                  David E. Keyes},
  title        = {Diagnosing Performance Variations in {HPC} Applications Using Machine
                  Learning},
  booktitle    = {High Performance Computing - 32nd International Conference, {ISC}
                  High Performance 2017, Frankfurt, Germany, June 18-22, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10266},
  pages        = {355--373},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-58667-0\_19},
  doi          = {10.1007/978-3-319-58667-0\_19},
  timestamp    = {Mon, 18 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/supercomputer/TuncerAZTBLEC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/MaricontiOANENS17,
  author       = {Enrico Mariconti and
                  Jeremiah Onaolapo and
                  Syed Sharique Ahmad and
                  Nicolas Nikiforou and
                  Manuel Egele and
                  Nick Nikiforakis and
                  Gianluca Stringhini},
  editor       = {Rick Barrett and
                  Rick Cummings and
                  Eugene Agichtein and
                  Evgeniy Gabrilovich},
  title        = {What's in a Name?: Understanding Profile Name Reuse on Twitter},
  booktitle    = {Proceedings of the 26th International Conference on World Wide Web,
                  {WWW} 2017, Perth, Australia, April 3-7, 2017},
  pages        = {1161--1170},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3038912.3052589},
  doi          = {10.1145/3038912.3052589},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/MaricontiOANENS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MaricontiOANENS17,
  author       = {Enrico Mariconti and
                  Jeremiah Onaolapo and
                  Syed Sharique Ahmad and
                  Nicolas Nikiforou and
                  Manuel Egele and
                  Nick Nikiforakis and
                  Gianluca Stringhini},
  title        = {What's in a Name? Understanding Profile Name Reuse on Twitter},
  journal      = {CoRR},
  volume       = {abs/1702.04256},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.04256},
  eprinttype    = {arXiv},
  eprint       = {1702.04256},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MaricontiOANENS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/OrikogboBE16,
  author       = {Damilola Orikogbo and
                  Matthias B{\"{u}}chler and
                  Manuel Egele},
  editor       = {Long Lu and
                  Mohammad Mannan},
  title        = {CRiOS: Toward Large-Scale iOS Application Analysis},
  booktitle    = {Proceedings of the 6th Workshop on Security and Privacy in Smartphones
                  and Mobile Devices, SPSM@CCS 2016, Vienna, Austria, October 24, 2016},
  pages        = {33--42},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2994473},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/OrikogboBE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/DumanKERK16,
  author       = {Sevtap Duman and
                  Kubra Kalkan{-}Cakmakci and
                  Manuel Egele and
                  William K. Robertson and
                  Engin Kirda},
  title        = {EmailProfiler: Spearphishing Filtering with Header and Stylometric
                  Features of Emails},
  booktitle    = {40th {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} 2016, Atlanta, GA, USA, June 10-14, 2016},
  pages        = {408--416},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMPSAC.2016.105},
  doi          = {10.1109/COMPSAC.2016.105},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/DumanKERK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/MaricontiOANENS16,
  author       = {Enrico Mariconti and
                  Jeremiah Onaolapo and
                  Syed Sharique Ahmad and
                  Nicolas Nikiforou and
                  Manuel Egele and
                  Nick Nikiforakis and
                  Gianluca Stringhini},
  editor       = {Michalis Polychronakis and
                  Cristiano Giuffrida},
  title        = {Why allowing profile name reuse is a bad idea},
  booktitle    = {Proceedings of the 9th European Workshop on System Security, {EUROSEC}
                  2016, London, UK, April 18-21, 2016},
  pages        = {3:1--3:6},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2905760.2905762},
  doi          = {10.1145/2905760.2905762},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosec/MaricontiOANENS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChenWBE16,
  author       = {Daming D. Chen and
                  Maverick Woo and
                  David Brumley and
                  Manuel Egele},
  title        = {Towards Automated Dynamic Analysis for Linux-based Embedded Firmware},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/towards-automated-dynamic-analysis-linux-based-embedded-firmware.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/ChenWBE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaoBNSEEKV15,
  author       = {Shuang Hao and
                  Kevin Borgolte and
                  Nick Nikiforakis and
                  Gianluca Stringhini and
                  Manuel Egele and
                  Michael Eubanks and
                  Brian Krebs and
                  Giovanni Vigna},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Drops for Stuff: An Analysis of Reshipping Mule Scams},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1081--1092},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813620},
  doi          = {10.1145/2810103.2813620},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HaoBNSEEKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/FratantonioBREK15,
  author       = {Yanick Fratantonio and
                  Antonio Bianchi and
                  William K. Robertson and
                  Manuel Egele and
                  Christopher Kruegel and
                  Engin Kirda and
                  Giovanni Vigna},
  editor       = {Magnus Almgren and
                  Vincenzo Gulisano and
                  Federico Maggi},
  title        = {On the Security and Engineering Implications of Finer-Grained Access
                  Controls for Android Developers and Users},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 12th International Conference, {DIMVA} 2015, Milan, Italy, July
                  9-10, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9148},
  pages        = {282--303},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20550-2\_15},
  doi          = {10.1007/978-3-319-20550-2\_15},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/FratantonioBREK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CaoFBEKVC15,
  author       = {Yinzhi Cao and
                  Yanick Fratantonio and
                  Antonio Bianchi and
                  Manuel Egele and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Yan Chen},
  title        = {EdgeMiner: Automatically Detecting Implicit Control Flow Transitions
                  through the Android Framework},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/edgeminer-automatically-detecting-implicit-control-flow-transitions-through-android-framework},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/CaoFBEKVC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StringhiniMJEKV15,
  author       = {Gianluca Stringhini and
                  Pierre Mourlanne and
                  Gr{\'{e}}goire Jacob and
                  Manuel Egele and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {{EVILCOHORT:} Detecting Communities of Malicious Accounts on Online
                  Services},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {563--578},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/stringhini},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/StringhiniMJEKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/EgeleSKV15,
  author       = {Manuel Egele and
                  Gianluca Stringhini and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Towards Detecting Compromised Accounts on Social Networks},
  journal      = {CoRR},
  volume       = {abs/1509.03531},
  year         = {2015},
  url          = {http://arxiv.org/abs/1509.03531},
  eprinttype    = {arXiv},
  eprint       = {1509.03531},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/EgeleSKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/EgeleWCB14,
  author       = {Manuel Egele and
                  Maverick Woo and
                  Peter Chapman and
                  David Brumley},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {Blanket Execution: Dynamic Similarity Testing for Program Binaries
                  and Components},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {303--317},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/egele},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/EgeleWCB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EgeleBFK13,
  author       = {Manuel Egele and
                  David Brumley and
                  Yanick Fratantonio and
                  Christopher Kruegel},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {An empirical study of cryptographic misuse in android applications},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {73--84},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516693},
  doi          = {10.1145/2508859.2516693},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/EgeleBFK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/StringhiniWEKVZZ13,
  author       = {Gianluca Stringhini and
                  Gang Wang and
                  Manuel Egele and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Haitao Zheng and
                  Ben Y. Zhao},
  editor       = {Konstantina Papagiannaki and
                  P. Krishna Gummadi and
                  Craig Partridge},
  title        = {Follow the green: growth and dynamics in twitter follower markets},
  booktitle    = {Proceedings of the 2013 Internet Measurement Conference, {IMC} 2013,
                  Barcelona, Spain, October 23-25, 2013},
  pages        = {163--176},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2504730.2504731},
  doi          = {10.1145/2504730.2504731},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/StringhiniWEKVZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/EgeleSKV13,
  author       = {Manuel Egele and
                  Gianluca Stringhini and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna},
  title        = {{COMPA:} Detecting Compromised Accounts on Social Networks},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/compa-detecting-compromised-accounts-social-networks},
  timestamp    = {Mon, 01 Feb 2021 08:42:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/EgeleSKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/StringhiniEKV12,
  author       = {Gianluca Stringhini and
                  Manuel Egele and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Poultry markets: on the underground economy of twitter followers},
  journal      = {Comput. Commun. Rev.},
  volume       = {42},
  number       = {4},
  pages        = {527--532},
  year         = {2012},
  url          = {https://doi.org/10.1145/2377677.2377781},
  doi          = {10.1145/2377677.2377781},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/StringhiniEKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/EgeleMKK12,
  author       = {Manuel Egele and
                  Andreas Moser and
                  Christopher Kruegel and
                  Engin Kirda},
  title        = {PoX: Protecting users from malicious Facebook applications},
  journal      = {Comput. Commun.},
  volume       = {35},
  number       = {12},
  pages        = {1507--1515},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.comcom.2012.04.016},
  doi          = {10.1016/J.COMCOM.2012.04.016},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/EgeleMKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/EgeleSKK12,
  author       = {Manuel Egele and
                  Theodoor Scholte and
                  Engin Kirda and
                  Christopher Kruegel},
  title        = {A survey on automated dynamic malware-analysis techniques and tools},
  journal      = {{ACM} Comput. Surv.},
  volume       = {44},
  number       = {2},
  pages        = {6:1--6:42},
  year         = {2012},
  url          = {https://doi.org/10.1145/2089125.2089126},
  doi          = {10.1145/2089125.2089126},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/EgeleSKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/DixitFFLMNNSEK12,
  author       = {Advait Abhay Dixit and
                  Rik Farrow and
                  Andrew D. Ferguson and
                  Katrina LaCurts and
                  Marcelo Martins and
                  Karthik Nagaraj and
                  Kevin Ngo and
                  Will Scott and
                  Manuel Egele and
                  Engin Kirda},
  title        = {{NSDI} '12 and {LEET} '12},
  journal      = {login Usenix Mag.},
  volume       = {37},
  number       = {4},
  year         = {2012},
  url          = {https://www.usenix.org/publications/login/august-2012-volume-37-number-4/9th-usenix-symposium-networked-systems-design-and},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/DixitFFLMNNSEK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DaviDEFHHNS12,
  author       = {Lucas Davi and
                  Alexandra Dmitrienko and
                  Manuel Egele and
                  Thomas Fischer and
                  Thorsten Holz and
                  Ralf Hund and
                  Stefan N{\"{u}}rnberger and
                  Ahmad{-}Reza Sadeghi},
  title        = {MoCFI: {A} Framework to Mitigate Control-Flow Attacks on Smartphones},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/mocfi-framework-mitigate-control-flow-attacks-smartphones\#overlay-context=mocfi-framework-mitigate-control-flow-attacks-smartphones},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/DaviDEFHHNS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StringhiniEZHKV12,
  author       = {Gianluca Stringhini and
                  Manuel Egele and
                  Apostolis Zarras and
                  Thorsten Holz and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Tadayoshi Kohno},
  title        = {B@bel: Leveraging Email Delivery for Spam Mitigation},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {16--32},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/stringhini},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/StringhiniEZHKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wosn/StringhiniEKV12,
  author       = {Gianluca Stringhini and
                  Manuel Egele and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Balachander Krishnamurthy and
                  Stefan Saroiu and
                  Ben Y. Zhao},
  title        = {Poultry markets: on the underground economy of twitter followers},
  booktitle    = {Proceedings of the 2012 {ACM} workshop on Workshop on Online Social
                  Networks, {WOSN} 2012, Helsinki, Finland, August 17, 2012},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2342549.2342551},
  doi          = {10.1145/2342549.2342551},
  timestamp    = {Mon, 26 Jun 2023 08:43:55 +0200},
  biburl       = {https://dblp.org/rec/conf/wosn/StringhiniEKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/EgeleKP11,
  author       = {Manuel Egele and
                  Clemens Kolbitsch and
                  Christian Platzer},
  title        = {Removing web spam links from search engine results},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {1},
  pages        = {51--62},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-009-0132-6},
  doi          = {10.1007/S11416-009-0132-6},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/EgeleKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DoupeECSYZCV11,
  author       = {Adam Doup{\'{e}} and
                  Manuel Egele and
                  Benjamin Caillat and
                  Gianluca Stringhini and
                  Gorkem Yakin and
                  Ali Zand and
                  Ludovico Cavedon and
                  Giovanni Vigna},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Hit 'em where it hurts: a live security exercise on cyber situational
                  awareness},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {51--61},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076740},
  doi          = {10.1145/2076732.2076740},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DoupeECSYZCV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DaviDEFHHNS11,
  author       = {Lucas Davi and
                  Alexandra Dmitrienko and
                  Manuel Egele and
                  Thomas Fischer and
                  Thorsten Holz and
                  Ralf Hund and
                  Stefan N{\"{u}}rnberger and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Poster: control-flow integrity for smartphones},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {749--752},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2093484},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DaviDEFHHNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-4/SzydlowskiEKV11,
  author       = {Martin Szydlowski and
                  Manuel Egele and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Jan Camenisch and
                  Dogan Kesdogan},
  title        = {Challenges for Dynamic Analysis of iOS Applications},
  booktitle    = {Open Problems in Network Security - {IFIP} {WG} 11.4 International
                  Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7039},
  pages        = {65--77},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27585-2\_6},
  doi          = {10.1007/978-3-642-27585-2\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-4/SzydlowskiEKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/EgeleKKV11,
  author       = {Manuel Egele and
                  Christopher Kruegel and
                  Engin Kirda and
                  Giovanni Vigna},
  title        = {PiOS: Detecting Privacy Leaks in iOS Applications},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
                  2011},
  publisher    = {The Internet Society},
  year         = {2011},
  url          = {https://www.ndss-symposium.org/ndss2011/pios-detecting-privacy-leaks-ios-applications-paper},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/EgeleKKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/EgeleMKK11,
  author       = {Manuel Egele and
                  Andreas Moser and
                  Christopher Kruegel and
                  Engin Kirda},
  title        = {PoX: Protecting users from malicious Facebook applications},
  booktitle    = {Ninth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications, PerCom 2011, 21-25 March 2011, Seattle, WA, USA,
                  Workshop Proceedings},
  pages        = {288--294},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/PERCOMW.2011.5766885},
  doi          = {10.1109/PERCOMW.2011.5766885},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/EgeleMKK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BalduzziEKBK10,
  author       = {Marco Balduzzi and
                  Manuel Egele and
                  Engin Kirda and
                  Davide Balzarotti and
                  Christopher Kruegel},
  editor       = {Dengguo Feng and
                  David A. Basin and
                  Peng Liu},
  title        = {A solution for the automated detection of clickjacking attacks},
  booktitle    = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
                  2010},
  pages        = {135--144},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1755688.1755706},
  doi          = {10.1145/1755688.1755706},
  timestamp    = {Fri, 03 Jun 2022 12:02:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BalduzziEKBK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/ChildersBCCCEV10,
  author       = {Nicholas Childers and
                  Bryce Boe and
                  Lorenzo Cavallaro and
                  Ludovico Cavedon and
                  Marco Cova and
                  Manuel Egele and
                  Giovanni Vigna},
  editor       = {Christian Kreibich and
                  Marko Jahnke},
  title        = {Organizing Large Scale Hacking Competitions},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  7th International Conference, {DIMVA} 2010, Bonn, Germany, July 8-9,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6201},
  pages        = {132--152},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14215-4\_8},
  doi          = {10.1007/978-3-642-14215-4\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/ChildersBCCCEV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/EgeleBKK10,
  author       = {Manuel Egele and
                  Leyla Bilge and
                  Engin Kirda and
                  Christopher Kruegel},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski and
                  Michael Schumacher and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {{CAPTCHA} smuggling: hijacking web browsing sessions to create {CAPTCHA}
                  farms},
  booktitle    = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC),
                  Sierre, Switzerland, March 22-26, 2010},
  pages        = {1865--1870},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1774088.1774483},
  doi          = {10.1145/1774088.1774483},
  timestamp    = {Sun, 02 Jun 2019 21:18:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/EgeleBKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/EgeleWKK09,
  author       = {Manuel Egele and
                  Peter Wurzinger and
                  Christopher Kruegel and
                  Engin Kirda},
  editor       = {Ulrich Flegel and
                  Danilo Bruschi},
  title        = {Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying
                  Code Injection Attacks},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5587},
  pages        = {88--106},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02918-9\_6},
  doi          = {10.1007/978-3-642-02918-9\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/EgeleWKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-4/EgeleKK09,
  author       = {Manuel Egele and
                  Engin Kirda and
                  Christopher Kruegel},
  editor       = {Jan Camenisch and
                  Dogan Kesdogan},
  title        = {Mitigating Drive-By Download Attacks: Challenges and Open Problems},
  booktitle    = {iNetSec 2009 - Open Research Problems in Network Security - {IFIP}
                  {WG} 11.4 International Workshop, Zurich, Switzerland, April 23-24,
                  2009, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {309},
  pages        = {52--62},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05437-2\_5},
  doi          = {10.1007/978-3-642-05437-2\_5},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-4/EgeleKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YinSEKK07,
  author       = {Heng Yin and
                  Dawn Xiaodong Song and
                  Manuel Egele and
                  Christopher Kruegel and
                  Engin Kirda},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Panorama: capturing system-wide information flow for malware detection
                  and analysis},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {116--127},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315261},
  doi          = {10.1145/1315245.1315261},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YinSEKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/EgeleKKYS07,
  author       = {Manuel Egele and
                  Christopher Kruegel and
                  Engin Kirda and
                  Heng Yin and
                  Dawn Xiaodong Song},
  editor       = {Jeff Chase and
                  Srinivasan Seshan},
  title        = {Dynamic Spyware Analysis},
  booktitle    = {Proceedings of the 2007 {USENIX} Annual Technical Conference, Santa
                  Clara, CA, USA, June 17-22, 2007},
  pages        = {233--246},
  publisher    = {{USENIX}},
  year         = {2007},
  url          = {http://www.usenix.org/events/usenix07/tech/egele.html},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/EgeleKKYS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/EgeleSKK06,
  author       = {Manuel Egele and
                  Martin Szydlowski and
                  Engin Kirda and
                  Christopher Kr{\"{u}}gel},
  editor       = {Roland B{\"{u}}schkes and
                  Pavel Laskov},
  title        = {Using Static Program Analysis to Aid Intrusion Detection},
  booktitle    = {Detection of Intrusions and Malware {\&} Vulnerability Assessment,
                  Third International Conference, {DIMVA} 2006, Berlin, Germany, July
                  13-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4064},
  pages        = {17--36},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11790754\_2},
  doi          = {10.1007/11790754\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/EgeleSKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics