BibTeX records: Christopher Krügel

download as .bib file

@inproceedings{DBLP:conf/eurosp/PletinckxNFKV23,
  author       = {Stijn Pletinckx and
                  Thanh{-}Dat Nguyen and
                  Tobias Fiebig and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Certifiably Vulnerable: Using Certificate Transparency Logs for Target
                  Reconnaissance},
  booktitle    = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023, Delft, Netherlands, July 3-7, 2023},
  pages        = {817--831},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSP57164.2023.00053},
  doi          = {10.1109/EUROSP57164.2023.00053},
  timestamp    = {Mon, 07 Aug 2023 15:56:23 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/PletinckxNFKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/BoseDVMGCBKV23,
  author       = {Priyanka Bose and
                  Dipanjan Das and
                  Saastha Vasan and
                  Sebastiano Mariani and
                  Ilya Grishchenko and
                  Andrea Continella and
                  Antonio Bianchi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Columbus: Android App Testing Through Systematic Callback Exploration},
  booktitle    = {45th {IEEE/ACM} International Conference on Software Engineering,
                  {ICSE} 2023, Melbourne, Australia, May 14-20, 2023},
  pages        = {1381--1392},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICSE48619.2023.00121},
  doi          = {10.1109/ICSE48619.2023.00121},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/BoseDVMGCBKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GustafsonGRJC0F23,
  author       = {Eric Gustafson and
                  Paul Grosen and
                  Nilo Redini and
                  Saagar Jha and
                  Andrea Continella and
                  Ruoyu Wang and
                  Kevin Fu and
                  Sara Rampazzi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Shimware: Toward Practical Security Retrofitting for Monolithic Firmware
                  Images},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {32--45},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607217},
  doi          = {10.1145/3607199.3607217},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GustafsonGRJC0F23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SpahnHHKV23,
  author       = {Noah Spahn and
                  Nils Hanke and
                  Thorsten Holz and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Container Orchestration Honeypot: Observing Attacks in the Wild},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {381--396},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607205},
  doi          = {10.1145/3607199.3607205},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SpahnHHKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BuschMSVKP23,
  author       = {Marcel Busch and
                  Aravind Machiry and
                  Chad Spensky and
                  Giovanni Vigna and
                  Christopher Kruegel and
                  Mathias Payer},
  title        = {TEEzz: Fuzzing Trusted Applications on {COTS} Android Devices},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {1204--1219},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179302},
  doi          = {10.1109/SP46215.2023.10179302},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BuschMSVKP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/TrickelPZDVKWBSD23,
  author       = {Erik Trickel and
                  Fabio Pagani and
                  Chang Zhu and
                  Lukas Dresel and
                  Giovanni Vigna and
                  Christopher Kruegel and
                  Ruoyu Wang and
                  Tiffany Bao and
                  Yan Shoshitaishvili and
                  Adam Doup{\'{e}}},
  title        = {Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational
                  Fuzzing to Detect {SQL} and Command Injection Vulnerabilities},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {2658--2675},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179317},
  doi          = {10.1109/SP46215.2023.10179317},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/TrickelPZDVKWBSD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GrittiRMB0GKV23,
  author       = {Fabio Gritti and
                  Nicola Ruaro and
                  Robert McLaughlin and
                  Priyanka Bose and
                  Dipanjan Das and
                  Ilya Grishchenko and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart
                  Contracts},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {1793--1810},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/gritti},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/GrittiRMB0GKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/McLaughlinKV23,
  author       = {Robert McLaughlin and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {A Large Scale Study of the Ethereum Arbitrage Ecosystem},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {3295--3312},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/mclaughlin},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/McLaughlinKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Fleischer0BBLPK23,
  author       = {Marius Fleischer and
                  Dipanjan Das and
                  Priyanka Bose and
                  Weiheng Bai and
                  Kangjie Lu and
                  Mathias Payer and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {{ACTOR:} Action-Guided Kernel Fuzzing},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5003--5020},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/fleischer},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Fleischer0BBLPK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-02344,
  author       = {Hojjat Aghakhani and
                  Wei Dai and
                  Andre Manoel and
                  Xavier Fernandes and
                  Anant Kharkar and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  David Evans and
                  Ben Zorn and
                  Robert Sim},
  title        = {TrojanPuzzle: Covertly Poisoning Code-Suggestion Models},
  journal      = {CoRR},
  volume       = {abs/2301.02344},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.02344},
  doi          = {10.48550/ARXIV.2301.02344},
  eprinttype    = {arXiv},
  eprint       = {2301.02344},
  timestamp    = {Fri, 25 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-02344.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-09806,
  author       = {Sayak Saha Roy and
                  Dipanjan Das and
                  Priyanka Bose and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Shirin Nilizadeh},
  title        = {Demystifying {NFT} Promotion and Phishing Scams},
  journal      = {CoRR},
  volume       = {abs/2301.09806},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.09806},
  doi          = {10.48550/ARXIV.2301.09806},
  eprinttype    = {arXiv},
  eprint       = {2301.09806},
  timestamp    = {Thu, 26 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-09806.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-09116,
  author       = {Priyanka Bose and
                  Dipanjan Das and
                  Saastha Vasan and
                  Sebastiano Mariani and
                  Ilya Grishchenko and
                  Andrea Continella and
                  Antonio Bianchi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Columbus: Android App Testing Through Systematic Callback Exploration},
  journal      = {CoRR},
  volume       = {abs/2302.09116},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.09116},
  doi          = {10.48550/ARXIV.2302.09116},
  eprinttype    = {arXiv},
  eprint       = {2302.09116},
  timestamp    = {Thu, 23 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-09116.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-02103,
  author       = {Christopher Salls and
                  Chani Jindal and
                  Jake Corina and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Token-Level Fuzzing},
  journal      = {CoRR},
  volume       = {abs/2304.02103},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.02103},
  doi          = {10.48550/ARXIV.2304.02103},
  eprinttype    = {arXiv},
  eprint       = {2304.02103},
  timestamp    = {Mon, 17 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-02103.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-06844,
  author       = {Priyanka Bose and
                  Dipanjan Das and
                  Fabio Gritti and
                  Nicola Ruaro and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Exploiting Unfair Advantages: Investigating Opportunistic Trading
                  in the {NFT} Market},
  journal      = {CoRR},
  volume       = {abs/2310.06844},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.06844},
  doi          = {10.48550/ARXIV.2310.06844},
  eprinttype    = {arXiv},
  eprint       = {2310.06844},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-06844.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HauserNSTRKV23,
  author       = {Christophe Hauser and
                  Shirin Nilizadeh and
                  Yan Shoshitaishvili and
                  Ni Trieu and
                  Srivatsan Ravi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Street Rep: {A} Privacy-Preserving Reputation Aggregation System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1346},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1346},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HauserNSTRKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GuptaDSVKK22,
  author       = {Rajat Gupta and
                  Lukas Patrick Dresel and
                  Noah Spahn and
                  Giovanni Vigna and
                  Christopher Kruegel and
                  Taesoo Kim},
  title        = {{POPKORN:} Popping Windows Kernel Drivers At Scale},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {854--868},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564631},
  doi          = {10.1145/3564625.3564631},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GuptaDSVKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0002BRKV22,
  author       = {Dipanjan Das and
                  Priyanka Bose and
                  Nicola Ruaro and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Understanding Security Issues in the {NFT} Ecosystem},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {667--681},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3559342},
  doi          = {10.1145/3548606.3559342},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0002BRKV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/DasBMMSVK22,
  author       = {Dipanjan Das and
                  Priyanka Bose and
                  Aravind Machiry and
                  Sebastiano Mariani and
                  Yan Shoshitaishvili and
                  Giovanni Vigna and
                  Christopher Kruegel},
  editor       = {Lorenzo Cavallaro and
                  Daniel Gruss and
                  Giancarlo Pellegrino and
                  Giorgio Giacinto},
  title        = {Hybrid Pruning: Towards Precise Pointer and Taint Analysis},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 19th International Conference, {DIMVA} 2022, Cagliari, Italy, June
                  29 - July 1, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13358},
  pages        = {1--22},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09484-2\_1},
  doi          = {10.1007/978-3-031-09484-2\_1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/DasBMMSVK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Kruegel22,
  author       = {Christopher Kruegel},
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {Looking for Signals: {A} Systems Security Perspective},
  booktitle    = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536.3533774},
  doi          = {10.1145/3531536.3533774},
  timestamp    = {Thu, 30 Jun 2022 17:02:33 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Kruegel22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Bose0C0KV22,
  author       = {Priyanka Bose and
                  Dipanjan Das and
                  Yanju Chen and
                  Yu Feng and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{SAILFISH:} Vetting Smart Contract State-Inconsistency Bugs in Seconds},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {161--178},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833721},
  doi          = {10.1109/SP46214.2022.9833721},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Bose0C0KV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/EdeASBCCSPKV22,
  author       = {Thijs van Ede and
                  Hojjat Aghakhani and
                  Noah Spahn and
                  Riccardo Bortolameotti and
                  Marco Cova and
                  Andrea Continella and
                  Maarten van Steen and
                  Andreas Peter and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{DEEPCASE:} Semi-Supervised Contextual Analysis of Security Events},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {522--539},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833671},
  doi          = {10.1109/SP46214.2022.9833671},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/EdeASBCCSPKV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RuaroPOKV22,
  author       = {Nicola Ruaro and
                  Fabio Pagani and
                  Stefano Ortolani and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{SYMBEXCEL:} Automated Analysis and Understanding of Malicious Excel
                  4.0 Macros},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {1066--1081},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833765},
  doi          = {10.1109/SP46214.2022.9833765},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/RuaroPOKV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GrittiPGDRKV22,
  author       = {Fabio Gritti and
                  Fabio Pagani and
                  Ilya Grishchenko and
                  Lukas Dresel and
                  Nilo Redini and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{HEAPSTER:} Analyzing the Security of Dynamic Allocators for Monolithic
                  Firmware Images},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {1082--1099},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833610},
  doi          = {10.1109/SP46214.2022.9833610},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GrittiPGDRKV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ScharnowskiBSGM22,
  author       = {Tobias Scharnowski and
                  Nils Bars and
                  Moritz Schloegel and
                  Eric Gustafson and
                  Marius Muench and
                  Giovanni Vigna and
                  Christopher Kruegel and
                  Thorsten Holz and
                  Ali Abbasi},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Fuzzware: Using Precise {MMIO} Modeling for Effective Firmware Fuzzing},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {1239--1256},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/scharnowski},
  timestamp    = {Thu, 16 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ScharnowskiBSGM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BurkPKV22,
  author       = {Kevin Burk and
                  Fabio Pagani and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Decomperson: How Humans Decompile and What We Can Learn From It},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {2765--2782},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/burk},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BurkPKV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/McLaughlinPSKV22,
  author       = {Robert McLaughlin and
                  Fabio Pagani and
                  Noah Spahn and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Regulator: Dynamic Analysis to Detect ReDoS},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {4219--4235},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/mclaughlin},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/McLaughlinPSKV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BotacinAOKVOGG21,
  author       = {Marcus Botacin and
                  Hojjat Aghakhani and
                  Stefano Ortolani and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Daniela Oliveira and
                  Paulo L{\'{\i}}cio de Geus and
                  Andr{\'{e}} Gr{\'{e}}gio},
  title        = {One Size Does Not Fit All: {A} Longitudinal Analysis of Brazilian
                  Financial Malware},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {11:1--11:31},
  year         = {2021},
  url          = {https://doi.org/10.1145/3429741},
  doi          = {10.1145/3429741},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BotacinAOKVOGG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/SpenskyMRUFBOKV21,
  author       = {Chad Spensky and
                  Aravind Machiry and
                  Nilo Redini and
                  Colin Unger and
                  Graham Foster and
                  Evan Blasband and
                  Hamed Okhravi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {Conware: Automated Modeling of Hardware Peripherals},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {95--109},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3437532},
  doi          = {10.1145/3433210.3437532},
  timestamp    = {Wed, 09 Jun 2021 15:14:39 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/SpenskyMRUFBOKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/MengGMABCKV21,
  author       = {Dongyu Meng and
                  Michele Guerriero and
                  Aravind Machiry and
                  Hojjat Aghakhani and
                  Priyanka Bose and
                  Andrea Continella and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {Bran: Reduce Vulnerability Search Space in Large Open Source Repositories
                  by Learning Bug Symptoms},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {731--743},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3453115},
  doi          = {10.1145/3433210.3453115},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiaccs/MengGMABCKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/QuartaIMFGBLVK21,
  author       = {Davide Quarta and
                  Michele Ianni and
                  Aravind Machiry and
                  Yanick Fratantonio and
                  Eric Gustafson and
                  Davide Balzarotti and
                  Martina Lindorfer and
                  Giovanni Vigna and
                  Christopher Kruegel},
  editor       = {Christophe Hauser and
                  Yonghwi Kwon and
                  Sebastian Banescu},
  title        = {Tarnhelm: Isolated, Transparent {\&} Confidential Execution of
                  Arbitrary Code in ARM's TrustZone},
  booktitle    = {Checkmate@CCS 2021, Proceedings of the Research on offensive and defensive
                  techniques in the Context of Man At The End {(MATE)} Attacks, Virtual
                  Event, Republic of Korea, 19 November 2021},
  pages        = {43--57},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3465413.3488571},
  doi          = {10.1145/3465413.3488571},
  timestamp    = {Tue, 23 Nov 2021 15:54:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/QuartaIMFGBLVK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/SpenskyMBOHGJKV21,
  author       = {Chad Spensky and
                  Aravind Machiry and
                  Nathan Burow and
                  Hamed Okhravi and
                  Rick Housley and
                  Zhongshu Gu and
                  Hani Jamjoom and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Glitching Demystified: Analyzing Control-flow-based Glitching Attacks
                  and Defenses},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021},
  pages        = {400--412},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN48987.2021.00051},
  doi          = {10.1109/DSN48987.2021.00051},
  timestamp    = {Mon, 09 Aug 2021 14:50:25 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/SpenskyMBOHGJKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/AghakhaniMWKV21,
  author       = {Hojjat Aghakhani and
                  Dongyu Meng and
                  Yu{-}Xiang Wang and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Bullseye Polytope: {A} Scalable Clean-Label Poisoning Attack with
                  Improved Transferability},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2021, Vienna, Austria, September 6-10, 2021},
  pages        = {159--178},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuroSP51992.2021.00021},
  doi          = {10.1109/EUROSP51992.2021.00021},
  timestamp    = {Thu, 11 Nov 2021 09:11:58 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/AghakhaniMWKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RuaroZDPBCZKV21,
  author       = {Nicola Ruaro and
                  Kyle Zeng and
                  Lukas Dresel and
                  Mario Polino and
                  Tiffany Bao and
                  Andrea Continella and
                  Stefano Zanero and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {SyML: Guiding Symbolic Execution Toward Vulnerable States Through
                  Pattern Learning},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {456--468},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471865},
  doi          = {10.1145/3471621.3471865},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/RuaroZDPBCZKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RediniCDPSMBKV21,
  author       = {Nilo Redini and
                  Andrea Continella and
                  Dipanjan Das and
                  Giulio De Pasquale and
                  Noah Spahn and
                  Aravind Machiry and
                  Antonio Bianchi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained
                  Inputs for IoT Devices},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {484--500},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00066},
  doi          = {10.1109/SP40001.2021.00066},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/RediniCDPSMBKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SallsJCKV21,
  author       = {Christopher Salls and
                  Chani Jindal and
                  Jake Corina and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Token-Level Fuzzing},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2795--2809},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/salls},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SallsJCKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GargMCKV21,
  author       = {Chinmay Garg and
                  Aravind Machiry and
                  Andrea Continella and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Toward a secure crowdsourced location tracking system},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {311--322},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467821},
  doi          = {10.1145/3448300.3467821},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/GargMCKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-08638,
  author       = {Priyanka Bose and
                  Dipanjan Das and
                  Yanju Chen and
                  Yu Feng and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{SAILFISH:} Vetting Smart Contract State-Inconsistency Bugs in Seconds},
  journal      = {CoRR},
  volume       = {abs/2104.08638},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.08638},
  eprinttype    = {arXiv},
  eprint       = {2104.08638},
  timestamp    = {Mon, 28 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-08638.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-00217,
  author       = {Chinmay Garg and
                  Aravind Machiry and
                  Andrea Continella and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Toward a Secure Crowdsourced Location Tracking System},
  journal      = {CoRR},
  volume       = {abs/2106.00217},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.00217},
  eprinttype    = {arXiv},
  eprint       = {2106.00217},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-00217.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-08893,
  author       = {Dipanjan Das and
                  Priyanka Bose and
                  Nicola Ruaro and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Understanding Security Issues in the {NFT} Ecosystem},
  journal      = {CoRR},
  volume       = {abs/2111.08893},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.08893},
  eprinttype    = {arXiv},
  eprint       = {2111.08893},
  timestamp    = {Mon, 22 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-08893.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GrittiFGPCKV20,
  author       = {Fabio Gritti and
                  Lorenzo Fontana and
                  Eric Gustafson and
                  Fabio Pagani and
                  Andrea Continella and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{SYMBION:} Interleaving Symbolic with Concrete Execution},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162164},
  doi          = {10.1109/CNS48642.2020.9162164},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GrittiFGPCKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SallsMDSKV20,
  author       = {Christopher Salls and
                  Aravind Machiry and
                  Adam Doup{\'{e}} and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Exploring Abstraction Functions in Fuzzing},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162273},
  doi          = {10.1109/CNS48642.2020.9162273},
  timestamp    = {Fri, 14 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SallsMDSKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SpenskyMBLHKV20,
  author       = {Chad Spensky and
                  Aravind Machiry and
                  Marcel Busch and
                  Kevin Leach and
                  Rick Housley and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{TRUST.IO:} Protecting Physical Interfaces on Cyber-physical Systems},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162246},
  doi          = {10.1109/CNS48642.2020.9162246},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SpenskyMBLHKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/BotacinBGGKV20,
  author       = {Marcus Botacin and
                  Giovanni Bert{\~{a}}o and
                  Paulo L. de Geus and
                  Andr{\'{e}} Gr{\'{e}}gio and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Cl{\'{e}}mentine Maurice and
                  Leyla Bilge and
                  Gianluca Stringhini and
                  Nuno Neves},
  title        = {On the Security of Application Installers and Online Software Repositories},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 17th International Conference, {DIMVA} 2020, Lisbon, Portugal, June
                  24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12223},
  pages        = {192--214},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-52683-2\_10},
  doi          = {10.1007/978-3-030-52683-2\_10},
  timestamp    = {Sun, 25 Jul 2021 11:49:24 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/BotacinBGGKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AghakhaniGMLOBV20,
  author       = {Hojjat Aghakhani and
                  Fabio Gritti and
                  Francesco Mecca and
                  Martina Lindorfer and
                  Stefano Ortolani and
                  Davide Balzarotti and
                  Giovanni Vigna and
                  Christopher Kruegel},
  title        = {When Malware is Packin' Heat; Limits of Machine Learning Classifiers
                  Based on Static Analysis Features},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/when-malware-is-packin-heat-limits-of-machine-learning-classifiers-based-on-static-analysis-features/},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/AghakhaniGMLOBV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TakahashiKVYI20,
  author       = {Takeshi Takahashi and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Katsunari Yoshioka and
                  Daisuke Inoue},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Tracing and Analyzing Web Access Paths Based on User-Side Data Collection:
                  How Do Users Reach Malicious URLs?},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {93--106},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/takahashi},
  timestamp    = {Mon, 30 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TakahashiKVYI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RediniM0SCSKV20,
  author       = {Nilo Redini and
                  Aravind Machiry and
                  Ruoyu Wang and
                  Chad Spensky and
                  Andrea Continella and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Karonte: Detecting Insecure Multi-binary Interactions in Embedded
                  Firmware},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {1544--1561},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00036},
  doi          = {10.1109/SP40000.2020.00036},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/RediniM0SCSKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MachiryRCKV20,
  author       = {Aravind Machiry and
                  Nilo Redini and
                  Eric Camellini and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{SPIDER:} Enabling Fast Patch Propagation In Related Software Repositories},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {1562--1579},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00038},
  doi          = {10.1109/SP40000.2020.00038},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MachiryRCKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ClementsGSGFKVB20,
  author       = {Abraham A. Clements and
                  Eric Gustafson and
                  Tobias Scharnowski and
                  Paul Grosen and
                  David Fritz and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Saurabh Bagchi and
                  Mathias Payer},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {1201--1218},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/clements},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ClementsGSGFKVB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/Sanchez-RolaBKV20,
  author       = {Iskander S{\'{a}}nchez{-}Rola and
                  Davide Balzarotti and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Igor Santos},
  editor       = {Yennun Huang and
                  Irwin King and
                  Tie{-}Yan Liu and
                  Maarten van Steen},
  title        = {Dirty Clicks: {A} Study of the Usability and Security Implications
                  of Click-related Behaviors on the Web},
  booktitle    = {{WWW} '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020},
  pages        = {395--406},
  publisher    = {{ACM} / {IW3C2}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3366423.3380124},
  doi          = {10.1145/3366423.3380124},
  timestamp    = {Fri, 25 Dec 2020 01:14:58 +0100},
  biburl       = {https://dblp.org/rec/conf/www/Sanchez-RolaBKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-00191,
  author       = {Hojjat Aghakhani and
                  Dongyu Meng and
                  Yu{-}Xiang Wang and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Bullseye Polytope: {A} Scalable Clean-Label Poisoning Attack with
                  Improved Transferability},
  journal      = {CoRR},
  volume       = {abs/2005.00191},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.00191},
  eprinttype    = {arXiv},
  eprint       = {2005.00191},
  timestamp    = {Thu, 30 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-00191.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-10682,
  author       = {Hojjat Aghakhani and
                  Thorsten Eisenhofer and
                  Lea Sch{\"{o}}nherr and
                  Dorothea Kolossa and
                  Thorsten Holz and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{VENOMAVE:} Clean-Label Poisoning Against Speech Recognition},
  journal      = {CoRR},
  volume       = {abs/2010.10682},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.10682},
  eprinttype    = {arXiv},
  eprint       = {2010.10682},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-10682.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HauserMS0VK19,
  author       = {Christophe Hauser and
                  Jayakrishna Menon and
                  Yan Shoshitaishvili and
                  Ruoyu Wang and
                  Giovanni Vigna and
                  Christopher Kruegel},
  editor       = {David Balenson},
  title        = {Sleak: automating address space layout derandomization},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {190--202},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359820},
  doi          = {10.1145/3359789.3359820},
  timestamp    = {Tue, 26 Nov 2019 09:46:34 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HauserMS0VK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JindalSALKV19,
  author       = {Chani Jindal and
                  Christopher Salls and
                  Hojjat Aghakhani and
                  Keith Long and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {David Balenson},
  title        = {Neurlux: dynamic malware analysis without feature engineering},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {444--455},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359835},
  doi          = {10.1145/3359789.3359835},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JindalSALKV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ChevalierCHS0KV19,
  author       = {Ronny Chevalier and
                  Stefano Cristalli and
                  Christophe Hauser and
                  Yan Shoshitaishvili and
                  Ruoyu Wang and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Danilo Bruschi and
                  Andrea Lanzi},
  editor       = {Gail{-}Joon Ahn and
                  Bhavani Thuraisingham and
                  Murat Kantarcioglu and
                  Ram Krishnan},
  title        = {BootKeeper: Validating Software Integrity Properties on Boot Firmware
                  Images},
  booktitle    = {Proceedings of the Ninth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27,
                  2019},
  pages        = {315--325},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292006.3300026},
  doi          = {10.1145/3292006.3300026},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ChevalierCHS0KV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/Redini0MSVK19,
  author       = {Nilo Redini and
                  Ruoyu Wang and
                  Aravind Machiry and
                  Yan Shoshitaishvili and
                  Giovanni Vigna and
                  Christopher Kruegel},
  editor       = {Roberto Perdisci and
                  Cl{\'{e}}mentine Maurice and
                  Giorgio Giacinto and
                  Magnus Almgren},
  title        = {BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden,
                  June 19-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11543},
  pages        = {482--501},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22038-9\_23},
  doi          = {10.1007/978-3-030-22038-9\_23},
  timestamp    = {Tue, 29 Dec 2020 18:36:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/Redini0MSVK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SongH0SNVVKSF19,
  author       = {Dokyung Song and
                  Felicitas Hetzelt and
                  Dipanjan Das and
                  Chad Spensky and
                  Yeoul Na and
                  Stijn Volckaert and
                  Giovanni Vigna and
                  Christopher Kruegel and
                  Jean{-}Pierre Seifert and
                  Michael Franz},
  title        = {PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS
                  Boundary},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/periscope-an-effective-probing-and-fuzzing-framework-for-the-hardware-os-boundary/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/SongH0SNVVKSF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GustafsonMSRMFB19,
  author       = {Eric Gustafson and
                  Marius Muench and
                  Chad Spensky and
                  Nilo Redini and
                  Aravind Machiry and
                  Yanick Fratantonio and
                  Davide Balzarotti and
                  Aur{\'{e}}lien Francillon and
                  Yung Ryn Choe and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Toward the Analysis of Embedded Firmware through Automated Re-hosting},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {135--150},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/gustafson},
  timestamp    = {Wed, 10 Feb 2021 22:02:04 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/GustafsonMSRMFB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/NilizadehAGKV19a,
  author       = {Shirin Nilizadeh and
                  Hojjat Aghakhani and
                  Eric Gustafson and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Sihem Amer{-}Yahia and
                  Mohammad Mahdian and
                  Ashish Goel and
                  Geert{-}Jan Houben and
                  Kristina Lerman and
                  Julian J. McAuley and
                  Ricardo Baeza{-}Yates and
                  Leila Zia},
  title        = {Lightning Talk - Think Outside the Dataset: Finding Fraudulent Reviews
                  using Cross-Dataset Analysis},
  booktitle    = {Companion of The 2019 World Wide Web Conference, {WWW} 2019, San Francisco,
                  CA, USA, May 13-17, 2019},
  pages        = {1288--1289},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3308560.3316477},
  doi          = {10.1145/3308560.3316477},
  timestamp    = {Sun, 22 Sep 2019 18:15:38 +0200},
  biburl       = {https://dblp.org/rec/conf/www/NilizadehAGKV19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/NilizadehAGKV19,
  author       = {Shirin Nilizadeh and
                  Hojjat Aghakhani and
                  Eric Gustafson and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Ling Liu and
                  Ryen W. White and
                  Amin Mantrach and
                  Fabrizio Silvestri and
                  Julian J. McAuley and
                  Ricardo Baeza{-}Yates and
                  Leila Zia},
  title        = {Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset
                  Analysis},
  booktitle    = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA,
                  May 13-17, 2019},
  pages        = {3108--3115},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3308558.3313647},
  doi          = {10.1145/3308558.3313647},
  timestamp    = {Sun, 22 Sep 2019 18:12:47 +0200},
  biburl       = {https://dblp.org/rec/conf/www/NilizadehAGKV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-12505,
  author       = {Ronny Chevalier and
                  Stefano Cristalli and
                  Christophe Hauser and
                  Yan Shoshitaishvili and
                  Ruoyu Wang and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Danilo Bruschi and
                  Andrea Lanzi},
  title        = {BootKeeper: Validating Software Integrity Properties on Boot Firmware
                  Images},
  journal      = {CoRR},
  volume       = {abs/1903.12505},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.12505},
  eprinttype    = {arXiv},
  eprint       = {1903.12505},
  timestamp    = {Tue, 02 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-12505.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-11376,
  author       = {Chani Jindal and
                  Christopher Salls and
                  Hojjat Aghakhani and
                  Keith Long and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Neurlux: Dynamic Malware Analysis Without Feature Engineering},
  journal      = {CoRR},
  volume       = {abs/1910.11376},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.11376},
  eprinttype    = {arXiv},
  eprint       = {1910.11376},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-11376.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MachiryRGFCKV18,
  author       = {Aravind Machiry and
                  Nilo Redini and
                  Eric Gustafson and
                  Yanick Fratantonio and
                  Yung Ryn Choe and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Using Loops For Malware Classification Resilient to Feature-unaware
                  Perturbations},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {112--123},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274731},
  doi          = {10.1145/3274694.3274731},
  timestamp    = {Wed, 05 Dec 2018 09:44:25 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MachiryRGFCKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/anrw/BorgolteFHKV18,
  author       = {Kevin Borgolte and
                  Tobias Fiebig and
                  Shuang Hao and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates},
  booktitle    = {Proceedings of the Applied Networking Research Workshop, {ANRW} 2018,
                  Montreal, QC, Canada, July 16-16, 2018},
  pages        = {4},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3232755.3232859},
  doi          = {10.1145/3232755.3232859},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/anrw/BorgolteFHKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KonothVMLKBV18,
  author       = {Radhesh Krishnan Konoth and
                  Emanuele Vineti and
                  Veelasha Moonsamy and
                  Martina Lindorfer and
                  Christopher Kruegel and
                  Herbert Bos and
                  Giovanni Vigna},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining
                  and Its Defense},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1714--1730},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243858},
  doi          = {10.1145/3243734.3243858},
  timestamp    = {Tue, 10 Nov 2020 20:00:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KonothVMLKBV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/VeenLFPVKBR18,
  author       = {Victor van der Veen and
                  Martina Lindorfer and
                  Yanick Fratantonio and
                  Harikrishnan Padmanabha Pillai and
                  Giovanni Vigna and
                  Christopher Kruegel and
                  Herbert Bos and
                  Kaveh Razavi},
  editor       = {Cristiano Giuffrida and
                  S{\'{e}}bastien Bardin and
                  Gregory Blanc},
  title        = {GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on {ARM}},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 15th International Conference, {DIMVA} 2018, Saclay, France, June
                  28-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10885},
  pages        = {92--113},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93411-2\_5},
  doi          = {10.1007/978-3-319-93411-2\_5},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/VeenLFPVKBR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BianchiFMKVCL18,
  author       = {Antonio Bianchi and
                  Yanick Fratantonio and
                  Aravind Machiry and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Simon Pak Ho Chung and
                  Wenke Lee},
  title        = {Broken Fingers: On the Usage of the Fingerprint {API} in Android},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_03B-1\_Bianchi\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/BianchiFMKVCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BorgolteFHKV18,
  author       = {Kevin Borgolte and
                  Tobias Fiebig and
                  Shuang Hao and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_06A-4\_Borgolte\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/BorgolteFHKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/FiebigBHKVF18,
  author       = {Tobias Fiebig and
                  Kevin Borgolte and
                  Shuang Hao and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Anja Feldmann},
  editor       = {Robert Beverly and
                  Georgios Smaragdakis and
                  Anja Feldmann},
  title        = {In rDNS We Trust: Revisiting a Common Data-Source's Reliability},
  booktitle    = {Passive and Active Measurement - 19th International Conference, {PAM}
                  2018, Berlin, Germany, March 26-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10771},
  pages        = {131--145},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76481-8\_10},
  doi          = {10.1007/978-3-319-76481-8\_10},
  timestamp    = {Sat, 30 Sep 2023 09:54:28 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/FiebigBHKVF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ChandramouliBKV18,
  author       = {Sai Prashanth Chandramouli and
                  Pierre{-}Marie Bajan and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  editor       = {Hisham M. Haddad and
                  Roger L. Wainwright and
                  Richard Chbeir},
  title        = {Measuring E-mail header injections on the world wide web},
  booktitle    = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing,
                  {SAC} 2018, Pau, France, April 09-13, 2018},
  pages        = {1647--1656},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3167132.3167308},
  doi          = {10.1145/3167132.3167308},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/ChandramouliBKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AghakhaniMNKV18,
  author       = {Hojjat Aghakhani and
                  Aravind Machiry and
                  Shirin Nilizadeh and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Detecting Deceptive Reviews Using Generative Adversarial Networks},
  booktitle    = {2018 {IEEE} Security and Privacy Workshops, {SP} Workshops 2018, San
                  Francisco, CA, USA, May 24, 2018},
  pages        = {89--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SPW.2018.00022},
  doi          = {10.1109/SPW.2018.00022},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AghakhaniMNKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/EckertB0SKV18,
  author       = {Moritz Eckert and
                  Antonio Bianchi and
                  Ruoyu Wang and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {HeapHopper: Bringing Bounded Model Checking to Heap Implementation
                  Security},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {99--116},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/eckert},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/EckertB0SKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0001QHBVKL18,
  author       = {Wei Meng and
                  Chenxiong Qian and
                  Shuang Hao and
                  Kevin Borgolte and
                  Giovanni Vigna and
                  Christopher Kruegel and
                  Wenke Lee},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service
                  Attacks},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {393--410},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/meng},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/0001QHBVKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-10364,
  author       = {Hojjat Aghakhani and
                  Aravind Machiry and
                  Shirin Nilizadeh and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Detecting Deceptive Reviews using Generative Adversarial Networks},
  journal      = {CoRR},
  volume       = {abs/1805.10364},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.10364},
  eprinttype    = {arXiv},
  eprint       = {1805.10364},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-10364.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/ZandMTLKV17,
  author       = {Ali Zand and
                  Gaspar Modelo{-}Howard and
                  Alok Tongaonkar and
                  Sung{-}Ju Lee and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Demystifying DDoS as a Service},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {55},
  number       = {7},
  pages        = {14--21},
  year         = {2017},
  url          = {https://doi.org/10.1109/MCOM.2017.1600980},
  doi          = {10.1109/MCOM.2017.1600980},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/ZandMTLKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MavroudisHFMKV17,
  author       = {Vasilios Mavroudis and
                  Shuang Hao and
                  Yanick Fratantonio and
                  Federico Maggi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {On the Privacy and Security of the Ultrasound Ecosystem},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {2},
  pages        = {95--112},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0018},
  doi          = {10.1515/POPETS-2017-0018},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/MavroudisHFMKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/EgeleSKV17,
  author       = {Manuel Egele and
                  Gianluca Stringhini and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Towards Detecting Compromised Accounts on Social Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {4},
  pages        = {447--460},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2479616},
  doi          = {10.1109/TDSC.2015.2479616},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/EgeleSKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BianchiGFKV17,
  author       = {Antonio Bianchi and
                  Eric Gustafson and
                  Yanick Fratantonio and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Exploitation and Mitigation of Authentication Schemes Based on Device-Public
                  Information},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {16--27},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134615},
  doi          = {10.1145/3134600.3134615},
  timestamp    = {Tue, 06 Nov 2018 16:59:23 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BianchiGFKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SallsSSKV17,
  author       = {Christopher Salls and
                  Yan Shoshitaishvili and
                  Nick Stephens and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Piston: Uncooperative Remote Runtime Patching},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {141--153},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134611},
  doi          = {10.1145/3134600.3134611},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SallsSSKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Shoshitaishvili17,
  author       = {Yan Shoshitaishvili and
                  Michael Weissbacher and
                  Lukas Dresel and
                  Christopher Salls and
                  Ruoyu Wang and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with
                  Human Assistance},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {347--362},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134105},
  doi          = {10.1145/3133956.3134105},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Shoshitaishvili17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuangHILFKV17,
  author       = {Cheng Huang and
                  Shuang Hao and
                  Luca Invernizzi and
                  Jiayong Liu and
                  Yong Fang and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Gossip: Automatically Identifying Malicious Domains from Mailing List
                  Discussions},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {494--505},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053017},
  doi          = {10.1145/3052973.3053017},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HuangHILFKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NilizadehLSZFKS17,
  author       = {Shirin Nilizadeh and
                  Francois Labreche and
                  Alireza Sedighian and
                  Ali Zand and
                  Jos{\'{e}} M. Fernandez and
                  Christopher Kruegel and
                  Gianluca Stringhini and
                  Giovanni Vigna},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{POISED:} Spotting Twitter Spam Off the Beaten Paths},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1159--1174},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134055},
  doi          = {10.1145/3133956.3134055},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NilizadehLSZFKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CorinaMSSHKV17,
  author       = {Jake Corina and
                  Aravind Machiry and
                  Christopher Salls and
                  Yan Shoshitaishvili and
                  Shuang Hao and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{DIFUZE:} Interface Aware Fuzzing for Kernel Drivers},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2123--2138},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134069},
  doi          = {10.1145/3133956.3134069},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CorinaMSSHKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BaoSWKVB17,
  author       = {Tiffany Bao and
                  Yan Shoshitaishvili and
                  Ruoyu Wang and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  David Brumley},
  title        = {How Shall We Play a Game?: {A} Game-theoretical Model for Cyber-warfare
                  Games},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {7--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.34},
  doi          = {10.1109/CSF.2017.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BaoSWKVB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ContinellaFLPZK17,
  author       = {Andrea Continella and
                  Yanick Fratantonio and
                  Martina Lindorfer and
                  Alessandro Puccetti and
                  Ali Zand and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through
                  Differential Analysis},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/obfuscation-resilient-privacy-leak-detection-mobile-apps-through-differential-analysis/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ContinellaFLPZK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MachiryGSSSWBCK17,
  author       = {Aravind Machiry and
                  Eric Gustafson and
                  Chad Spensky and
                  Christopher Salls and
                  Nick Stephens and
                  Ruoyu Wang and
                  Antonio Bianchi and
                  Yung Ryn Choe and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{BOOMERANG:} Exploiting the Semantic Gap in Trusted Execution Environments},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/boomerang-exploiting-semantic-gap-trusted-execution-environments/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/MachiryGSSSWBCK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WangSBMGGKV17,
  author       = {Ruoyu Wang and
                  Yan Shoshitaishvili and
                  Antonio Bianchi and
                  Aravind Machiry and
                  John Grosen and
                  Paul Grosen and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Ramblr: Making Reassembly Great Again},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/ramblr-making-reassembly-great-again/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WangSBMGGKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/FiebigBHKV17,
  author       = {Tobias Fiebig and
                  Kevin Borgolte and
                  Shuang Hao and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Mohamed Ali K{\^{a}}afar and
                  Steve Uhlig and
                  Johanna Amann},
  title        = {Something from Nothing (There): Collecting Global IPv6 Datasets from
                  {DNS}},
  booktitle    = {Passive and Active Measurement - 18th International Conference, {PAM}
                  2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10176},
  pages        = {30--43},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-54328-4\_3},
  doi          = {10.1007/978-3-319-54328-4\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/FiebigBHKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RediniMDFBGSKV17,
  author       = {Nilo Redini and
                  Aravind Machiry and
                  Dipanjan Das and
                  Yanick Fratantonio and
                  Antonio Bianchi and
                  Eric Gustafson and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {BootStomp: On the Security of Bootloaders in Mobile Devices},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {781--798},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/redini},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RediniMDFBGSKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MachirySCSKV17,
  author       = {Aravind Machiry and
                  Chad Spensky and
                  Jake Corina and
                  Nick Stephens and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {{DR.} {CHECKER:} {A} Soundy Analysis for Linux Kernel Drivers},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {1007--1024},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/machiry},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MachirySCSKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-02749,
  author       = {Yan Shoshitaishvili and
                  Michael Weissbacher and
                  Lukas Dresel and
                  Christopher Salls and
                  Ruoyu Wang and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with
                  Human Assistance},
  journal      = {CoRR},
  volume       = {abs/1708.02749},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.02749},
  eprinttype    = {arXiv},
  eprint       = {1708.02749},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-02749.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-09058,
  author       = {Shirin Nilizadeh and
                  Francois Labreche and
                  Alireza Sedighian and
                  Ali Zand and
                  Jos{\'{e}} M. Fernandez and
                  Christopher Kruegel and
                  Gianluca Stringhini and
                  Giovanni Vigna},
  title        = {{POISED:} Spotting Twitter Spam Off the Beaten Paths},
  journal      = {CoRR},
  volume       = {abs/1708.09058},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.09058},
  eprinttype    = {arXiv},
  eprint       = {1708.09058},
  timestamp    = {Thu, 21 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-09058.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AfonsoGBFKVDP16,
  author       = {Vitor Monte Afonso and
                  Paulo L. de Geus and
                  Antonio Bianchi and
                  Yanick Fratantonio and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Adam Doup{\'{e}} and
                  Mario Polino},
  title        = {Going Native: Using a Large-Scale Analysis of Android Apps to Create
                  a Practical Native-Code Sandboxing Policy},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/going-native-large-scale-analysis-android-apps-practical-native-code-sandboxing-policy.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/AfonsoGBFKVDP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/StephensGSDWCSK16,
  author       = {Nick Stephens and
                  John Grosen and
                  Christopher Salls and
                  Andrew Dutcher and
                  Ruoyu Wang and
                  Jacopo Corbetta and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Driller: Augmenting Fuzzing Through Selective Symbolic Execution},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/driller-augmenting-fuzzing-through-selective-symbolic-execution.pdf},
  timestamp    = {Tue, 19 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/StephensGSDWCSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MuenchPSKVB16,
  author       = {Marius Muench and
                  Fabio Pagani and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Davide Balzarotti},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Taming Transactions: Towards Hardware-Assisted Control Flow Integrity
                  Using Transactional Memory},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {24--48},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_2},
  doi          = {10.1007/978-3-319-45719-2\_2},
  timestamp    = {Fri, 27 Dec 2019 21:24:31 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/MuenchPSKVB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Shoshitaishvili16,
  author       = {Yan Shoshitaishvili and
                  Ruoyu Wang and
                  Christopher Salls and
                  Nick Stephens and
                  Mario Polino and
                  Andrew Dutcher and
                  John Grosen and
                  Siji Feng and
                  Christophe Hauser and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna},
  title        = {{SOK:} (State of) The Art of War: Offensive Techniques in Binary Analysis},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {138--157},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.17},
  doi          = {10.1109/SP.2016.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Shoshitaishvili16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FratantonioBRKK16,
  author       = {Yanick Fratantonio and
                  Antonio Bianchi and
                  William K. Robertson and
                  Engin Kirda and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {TriggerScope: Towards Detecting Logic Bombs in Android Applications},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {377--396},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.30},
  doi          = {10.1109/SP.2016.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/FratantonioBRKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016,
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2976749},
  isbn         = {978-1-4503-4139-4},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/Shoshitaishvili15,
  author       = {Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Portrait of a Privacy Invasion},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2015},
  number       = {1},
  pages        = {41--60},
  year         = {2015},
  url          = {https://doi.org/10.1515/popets-2015-0004},
  doi          = {10.1515/POPETS-2015-0004},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/Shoshitaishvili15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZandHVKK15,
  author       = {Ali Zand and
                  Amir Houmansadr and
                  Giovanni Vigna and
                  Richard A. Kemmerer and
                  Christopher Kruegel},
  title        = {Know Your Achilles' Heel: Automatic Detection of Network Critical
                  Services},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818012},
  doi          = {10.1145/2818000.2818012},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZandHVKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MuttiFBICKKV15,
  author       = {Simone Mutti and
                  Yanick Fratantonio and
                  Antonio Bianchi and
                  Luca Invernizzi and
                  Jacopo Corbetta and
                  Dhilung Kirat and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {BareDroid: Large-Scale Analysis of Android Apps on Real Devices},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {71--80},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818036},
  doi          = {10.1145/2818000.2818036},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MuttiFBICKKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FalsinaFZKVM15,
  author       = {Luca Falsina and
                  Yanick Fratantonio and
                  Stefano Zanero and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Federico Maggi},
  title        = {Grab 'n Run: Secure and Practical Dynamic Code Loading for Android
                  Applications},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {201--210},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818042},
  doi          = {10.1145/2818000.2818042},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/FalsinaFZKVM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BianchiFKV15,
  author       = {Antonio Bianchi and
                  Yanick Fratantonio and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {David Lie and
                  Glenn Wurster},
  title        = {{NJAS:} Sandboxing Unmodified Applications in non-rooted Devices Running
                  stock Android},
  booktitle    = {Proceedings of the 5th Annual {ACM} {CCS} Workshop on Security and
                  Privacy in Smartphones and Mobile Devices, {SPSM} 2015, Denver, Colorado,
                  USA, October 12, 2015},
  pages        = {27--38},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808117.2808122},
  doi          = {10.1145/2808117.2808122},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BianchiFKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/FratantonioBREK15,
  author       = {Yanick Fratantonio and
                  Antonio Bianchi and
                  William K. Robertson and
                  Manuel Egele and
                  Christopher Kruegel and
                  Engin Kirda and
                  Giovanni Vigna},
  editor       = {Magnus Almgren and
                  Vincenzo Gulisano and
                  Federico Maggi},
  title        = {On the Security and Engineering Implications of Finer-Grained Access
                  Controls for Android Developers and Users},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 12th International Conference, {DIMVA} 2015, Milan, Italy, July
                  9-10, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9148},
  pages        = {282--303},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20550-2\_15},
  doi          = {10.1007/978-3-319-20550-2\_15},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/FratantonioBREK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/CaillatGKKV15,
  author       = {Benjamin Caillat and
                  Bob Gilbert and
                  Richard A. Kemmerer and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Prison: Tracking Process Interactions to Contain Malware},
  booktitle    = {17th {IEEE} International Conference on High Performance Computing
                  and Communications, {HPCC} 2015, 7th {IEEE} International Symposium
                  on Cyberspace Safety and Security, {CSS} 2015, and 12th {IEEE} International
                  Conference on Embedded Software and Systems, {ICESS} 2015, New York,
                  NY, USA, August 24-26, 2015},
  pages        = {1282--1291},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/HPCC-CSS-ICESS.2015.297},
  doi          = {10.1109/HPCC-CSS-ICESS.2015.297},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/CaillatGKKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CaoFBEKVC15,
  author       = {Yinzhi Cao and
                  Yanick Fratantonio and
                  Antonio Bianchi and
                  Manuel Egele and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Yan Chen},
  title        = {EdgeMiner: Automatically Detecting Implicit Control Flow Transitions
                  through the Android Framework},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/edgeminer-automatically-detecting-implicit-control-flow-transitions-through-android-framework},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/CaoFBEKVC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Shoshitaishvili15,
  author       = {Yan Shoshitaishvili and
                  Ruoyu Wang and
                  Christophe Hauser and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities
                  in Binary Firmware},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/firmalice-automatic-detection-authentication-bypass-vulnerabilities-binary-firmware},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/Shoshitaishvili15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/FratantonioMBKV15a,
  author       = {Yanick Fratantonio and
                  Aravind Machiry and
                  Antonio Bianchi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Aharon Abadi and
                  Shah Rukh Humayoun and
                  Henry Muccini},
  title        = {{CLAPP:} characterizing loops in Android applications (invited talk)},
  booktitle    = {Proceedings of the 3rd International Workshop on Software Development
                  Lifecycle for Mobile, DeMobile 2015, Bergamo, Italy, August 31 - September
                  4, 2015},
  pages        = {33--34},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2804345.2804355},
  doi          = {10.1145/2804345.2804355},
  timestamp    = {Tue, 01 Feb 2022 10:45:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/FratantonioMBKV15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/FratantonioMBKV15,
  author       = {Yanick Fratantonio and
                  Aravind Machiry and
                  Antonio Bianchi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Elisabetta Di Nitto and
                  Mark Harman and
                  Patrick Heymans},
  title        = {{CLAPP:} characterizing loops in Android applications},
  booktitle    = {Proceedings of the 2015 10th Joint Meeting on Foundations of Software
                  Engineering, {ESEC/FSE} 2015, Bergamo, Italy, August 30 - September
                  4, 2015},
  pages        = {687--697},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2786805.2786873},
  doi          = {10.1145/2786805.2786873},
  timestamp    = {Tue, 06 Nov 2018 16:59:22 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/FratantonioMBKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BianchiCIFKV15,
  author       = {Antonio Bianchi and
                  Jacopo Corbetta and
                  Luca Invernizzi and
                  Yanick Fratantonio and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {What the App is That? Deception and Countermeasures in the Android
                  User Interface},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {931--948},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.62},
  doi          = {10.1109/SP.2015.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BianchiCIFKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StringhiniMJEKV15,
  author       = {Gianluca Stringhini and
                  Pierre Mourlanne and
                  Gr{\'{e}}goire Jacob and
                  Manuel Egele and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {{EVILCOHORT:} Detecting Communities of Malicious Accounts on Online
                  Services},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {563--578},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/stringhini},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/StringhiniMJEKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BorgolteKV15,
  author       = {Kevin Borgolte and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Meerkat: Detecting Website Defacements through Image-based Object
                  Recognition},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {595--610},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/borgolte},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BorgolteKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FedericoCSKV15,
  author       = {Alessandro Di Federico and
                  Amat Cama and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {How the {ELF} Ruined Christmas},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {643--658},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/di-frederico},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FedericoCSKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WeissbacherRKKV15,
  author       = {Michael Weissbacher and
                  William K. Robertson and
                  Engin Kirda and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {ZigZag: Automatically Hardening Web Applications Against Client-side
                  Validation Vulnerabilities},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {737--752},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/weissbacher},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WeissbacherRKKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/ThomasHWBGHKMSV15,
  author       = {Kurt Thomas and
                  Danny Yuxing Huang and
                  David Y. Wang and
                  Elie Bursztein and
                  Chris Grier and
                  Tom Holt and
                  Christopher Kruegel and
                  Damon McCoy and
                  Stefan Savage and
                  Giovanni Vigna},
  title        = {Framing Dependencies Introduced by Underground Commoditization},
  booktitle    = {14th Annual Workshop on the Economics of Information Security, {WEIS}
                  2015, Delft, The Netherlands, 22-23 June, 2015},
  year         = {2015},
  url          = {http://www.econinfosec.org/archive/weis2015/papers/WEIS\_2015\_thomas.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/weis/ThomasHWBGHKMSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015,
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2810103},
  isbn         = {978-1-4503-3832-5},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/EgeleSKV15,
  author       = {Manuel Egele and
                  Gianluca Stringhini and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Towards Detecting Compromised Accounts on Social Networks},
  journal      = {CoRR},
  volume       = {abs/1509.03531},
  year         = {2015},
  url          = {http://arxiv.org/abs/1509.03531},
  eprinttype    = {arXiv},
  eprint       = {1509.03531},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/EgeleSKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/NikiforakisKJKPV14,
  author       = {Nick Nikiforakis and
                  Alexandros Kapravelos and
                  Wouter Joosen and
                  Christopher Kruegel and
                  Frank Piessens and
                  Giovanni Vigna},
  title        = {On the Workings and Current Practices of Web-Based Device Fingerprinting},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {28--36},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.160},
  doi          = {10.1109/MSP.2013.160},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/NikiforakisKJKPV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BilgeSBKK14,
  author       = {Leyla Bilge and
                  Sevil Sen and
                  Davide Balzarotti and
                  Engin Kirda and
                  Christopher Kruegel},
  title        = {Exposure: {A} Passive {DNS} Analysis Service to Detect and Report
                  Malicious Domains},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {14},
  year         = {2014},
  url          = {https://doi.org/10.1145/2584679},
  doi          = {10.1145/2584679},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BilgeSBKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/PuttaswamyWSAAKZ14,
  author       = {Krishna P. N. Puttaswamy and
                  Shiyuan Wang and
                  Troy Steinbauer and
                  Divyakant Agrawal and
                  Amr El Abbadi and
                  Christopher Kruegel and
                  Ben Y. Zhao},
  title        = {Preserving Location Privacy in Geosocial Applications},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {13},
  number       = {1},
  pages        = {159--173},
  year         = {2014},
  url          = {https://doi.org/10.1109/TMC.2012.247},
  doi          = {10.1109/TMC.2012.247},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/PuttaswamyWSAAKZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Kruegel14,
  author       = {Christopher Kruegel},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {Fighting malicious code: an eternal struggle},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590348},
  doi          = {10.1145/2590296.2590348},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Kruegel14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/StringhiniHKV14,
  author       = {Gianluca Stringhini and
                  Oliver Hohlfeld and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {The harvester, the botmaster, and the spammer: on the relations between
                  the different actors in the spam landscape},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {353--364},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590302},
  doi          = {10.1145/2590296.2590302},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/StringhiniHKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/MaioKSKV14,
  author       = {Giancarlo De Maio and
                  Alexandros Kapravelos and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Sven Dietrich},
  title        = {PExy: The Other Side of Exploit Kits},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {132--151},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_8},
  doi          = {10.1007/978-3-319-08509-8\_8},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/MaioKSKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/ZarrasKSHKV14,
  author       = {Apostolis Zarras and
                  Alexandros Kapravelos and
                  Gianluca Stringhini and
                  Thorsten Holz and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Carey Williamson and
                  Aditya Akella and
                  Nina Taft},
  title        = {The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements},
  booktitle    = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014,
                  Vancouver, BC, Canada, November 5-7, 2014},
  pages        = {373--380},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663716.2663719},
  doi          = {10.1145/2663716.2663719},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/ZarrasKSHKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZandVKK14,
  author       = {Ali Zand and
                  Giovanni Vigna and
                  Richard A. Kemmerer and
                  Christopher Kruegel},
  title        = {Rippler: Delay injection for service dependency detection},
  booktitle    = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014,
                  Toronto, Canada, April 27 - May 2, 2014},
  pages        = {2157--2165},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFOCOM.2014.6848158},
  doi          = {10.1109/INFOCOM.2014.6848158},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ZandVKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/InvernizziMTKSVLM14,
  author       = {Luca Invernizzi and
                  Stanislav Miskovic and
                  Ruben Torres and
                  Christopher Kruegel and
                  Sabyasachi Saha and
                  Giovanni Vigna and
                  Sung{-}Ju Lee and
                  Marco Mellia},
  title        = {Nazca: Detecting Malware Distribution in Large-Scale Networks},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/nazca-detecting-malware-distribution-large-scale-networks},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/InvernizziMTKSVLM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/PoeplauFBKV14,
  author       = {Sebastian Poeplau and
                  Yanick Fratantonio and
                  Antonio Bianchi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading
                  in Android Applications},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/execute-analyzing-unsafe-and-malicious-dynamic-code-loading-android-applications},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/PoeplauFBKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CorbettaIKV14,
  author       = {Jacopo Corbetta and
                  Luca Invernizzi and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Eyes of a Human, Eyes of a Program: Leveraging Different Views of
                  the Web for Analysis and Detection},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {130--149},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_7},
  doi          = {10.1007/978-3-319-11379-1\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CorbettaIKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CaoSBKVC14,
  author       = {Yinzhi Cao and
                  Yan Shoshitaishvili and
                  Kevin Borgolte and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna and
                  Yan Chen},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Protecting Web-Based Single Sign-on Protocols against Relying Party
                  Impersonation Attacks through a Dedicated Bi-directional Authenticated
                  Secure Channel},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {276--298},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_14},
  doi          = {10.1007/978-3-319-11379-1\_14},
  timestamp    = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CaoSBKVC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ZandVYK14,
  author       = {Ali Zand and
                  Giovanni Vigna and
                  Xifeng Yan and
                  Christopher Kruegel},
  editor       = {Yookun Cho and
                  Sung Y. Shin and
                  Sang{-}Wook Kim and
                  Chih{-}Cheng Hung and
                  Jiman Hong},
  title        = {Extracting probable command and control signatures for detecting botnets},
  booktitle    = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of
                  Korea - March 24 - 28, 2014},
  pages        = {1657--1662},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2554850.2554896},
  doi          = {10.1145/2554850.2554896},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/ZandVYK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/IedemskaSKKV14,
  author       = {Jane Iedemska and
                  Gianluca Stringhini and
                  Richard A. Kemmerer and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {The Tricks of the Trade: What Makes Spam Campaigns Successful?},
  booktitle    = {35. {IEEE} Security and Privacy Workshops, {SPW} 2014, San Jose, CA,
                  USA, May 17-18, 2014},
  pages        = {77--83},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SPW.2014.21},
  doi          = {10.1109/SPW.2014.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/IedemskaSKKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KiratVK14,
  author       = {Dhilung Kirat and
                  Giovanni Vigna and
                  Christopher Kruegel},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {BareCloud: Bare-metal Analysis-based Evasive Malware Detection},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {287--301},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/kirat},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KiratVK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KapravelosGCKVP14,
  author       = {Alexandros Kapravelos and
                  Chris Grier and
                  Neha Chachra and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Vern Paxson},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {Hulk: Eliciting Malicious Behavior in Browser Extensions},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {641--654},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/kapravelos},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KapravelosGCKVP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/NikiforakisMSRJKPVZ14,
  author       = {Nick Nikiforakis and
                  Federico Maggi and
                  Gianluca Stringhini and
                  M. Zubair Rafique and
                  Wouter Joosen and
                  Christopher Kruegel and
                  Frank Piessens and
                  Giovanni Vigna and
                  Stefano Zanero},
  editor       = {Chin{-}Wan Chung and
                  Andrei Z. Broder and
                  Kyuseok Shim and
                  Torsten Suel},
  title        = {Stranger danger: exploring the ecosystem of ad-based {URL} shortening
                  services},
  booktitle    = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic
                  of Korea, April 7-11, 2014},
  pages        = {51--62},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2566486.2567983},
  doi          = {10.1145/2566486.2567983},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/NikiforakisMSRJKPVZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/BorgolteKV14,
  author       = {Kevin Borgolte and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Chin{-}Wan Chung and
                  Andrei Z. Broder and
                  Kyuseok Shim and
                  Torsten Suel},
  title        = {Relevant change detection: a framework for the precise extraction
                  of modified and novel web-based content as a filtering technique for
                  analysis engines},
  booktitle    = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic
                  of Korea, April 7-11, 2014, Companion Volume},
  pages        = {595--598},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2567948.2578039},
  doi          = {10.1145/2567948.2578039},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/BorgolteKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/InvernizziKV13,
  author       = {Luca Invernizzi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Charles N. Payne Jr.},
  title        = {Message in a bottle: sailing past censorship},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {39--48},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523654},
  doi          = {10.1145/2523649.2523654},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/InvernizziKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EgeleBFK13,
  author       = {Manuel Egele and
                  David Brumley and
                  Yanick Fratantonio and
                  Christopher Kruegel},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {An empirical study of cryptographic misuse in android applications},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {73--84},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516693},
  doi          = {10.1145/2508859.2516693},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/EgeleBFK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BorgolteKV13,
  author       = {Kevin Borgolte and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Delta: automatic identification of unknown web-based infection campaigns},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {109--120},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516725},
  doi          = {10.1145/2508859.2516725},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BorgolteKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/StringhiniKV13,
  author       = {Gianluca Stringhini and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Shady paths: leveraging surfing crowds to detect malicious web pages},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {133--144},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516682},
  doi          = {10.1145/2508859.2516682},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/StringhiniKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DoupeCJPKV13,
  author       = {Adam Doup{\'{e}} and
                  Weidong Cui and
                  Mariusz H. Jakubowski and
                  Marcus Peinado and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {deDacota: toward preventing server-side {XSS} via automatic code and
                  data separation},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1205--1216},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516708},
  doi          = {10.1145/2508859.2516708},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DoupeCJPKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/StringhiniWEKVZZ13,
  author       = {Gianluca Stringhini and
                  Gang Wang and
                  Manuel Egele and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Haitao Zheng and
                  Ben Y. Zhao},
  editor       = {Konstantina Papagiannaki and
                  P. Krishna Gummadi and
                  Craig Partridge},
  title        = {Follow the green: growth and dynamics in twitter follower markets},
  booktitle    = {Proceedings of the 2013 Internet Measurement Conference, {IMC} 2013,
                  Barcelona, Spain, October 23-25, 2013},
  pages        = {163--176},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2504730.2504731},
  doi          = {10.1145/2504730.2504731},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/StringhiniWEKVZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/EgeleSKV13,
  author       = {Manuel Egele and
                  Gianluca Stringhini and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna},
  title        = {{COMPA:} Detecting Compromised Accounts on Social Networks},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/compa-detecting-compromised-accounts-social-networks},
  timestamp    = {Mon, 01 Feb 2021 08:42:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/EgeleSKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LauingerSOWKK13,
  author       = {Tobias Lauinger and
                  Martin Szydlowski and
                  Kaan Onarlioglu and
                  Gilbert Wondracek and
                  Engin Kirda and
                  Christopher Kr{\"{u}}gel},
  title        = {Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click
                  Hosting},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/clickonomics-determining-effect-anti-piracy-measures-one-click-hosting},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LauingerSOWKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/EggerSKV13,
  author       = {Christoph Egger and
                  Johannes Schlumberger and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Practical Attacks against the {I2P} Network},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {432--451},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_22},
  doi          = {10.1007/978-3-642-41284-4\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/EggerSKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/PayetDKV13,
  author       = {Pierre Payet and
                  Adam Doup{\'{e}} and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Sung Y. Shin and
                  Jos{\'{e}} Carlos Maldonado},
  title        = {EARs in the wild: large-scale analysis of execution after redirect
                  vulnerabilities},
  booktitle    = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing,
                  {SAC} '13, Coimbra, Portugal, March 18-22, 2013},
  pages        = {1792--1799},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480362.2480699},
  doi          = {10.1145/2480362.2480699},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/PayetDKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/NikiforakisKJKPV13,
  author       = {Nick Nikiforakis and
                  Alexandros Kapravelos and
                  Wouter Joosen and
                  Christopher Kruegel and
                  Frank Piessens and
                  Giovanni Vigna},
  title        = {Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {541--555},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.43},
  doi          = {10.1109/SP.2013.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/NikiforakisKJKPV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KapravelosSCKV13,
  author       = {Alexandros Kapravelos and
                  Yan Shoshitaishvili and
                  Marco Cova and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Samuel T. King},
  title        = {Revolver: An Automated Approach to the Detection of Evasive Web-based
                  Malware},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {637--652},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/kapravelos},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KapravelosSCKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangSKV13,
  author       = {Ruoyu Wang and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Samuel T. King},
  title        = {Steal This Movie: Automatically Bypassing {DRM} Protection in Streaming
                  Media Services},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {687--702},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/wang\_ruoyu},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WangSKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/MaggiFZSSKV13,
  author       = {Federico Maggi and
                  Alessandro Frossi and
                  Stefano Zanero and
                  Gianluca Stringhini and
                  Brett Stone{-}Gross and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Daniel Schwabe and
                  Virg{\'{\i}}lio A. F. Almeida and
                  Hartmut Glaser and
                  Ricardo Baeza{-}Yates and
                  Sue B. Moon},
  title        = {Two years of short URLs internet measurement: security threats and
                  countermeasures},
  booktitle    = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro,
                  Brazil, May 13-17, 2013},
  pages        = {861--872},
  publisher    = {International World Wide Web Conferences Steering Committee / {ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2488388.2488463},
  doi          = {10.1145/2488388.2488463},
  timestamp    = {Sun, 22 Sep 2019 18:15:38 +0200},
  biburl       = {https://dblp.org/rec/conf/www/MaggiFZSSKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/StringhiniEKV12,
  author       = {Gianluca Stringhini and
                  Manuel Egele and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Poultry markets: on the underground economy of twitter followers},
  journal      = {Comput. Commun. Rev.},
  volume       = {42},
  number       = {4},
  pages        = {527--532},
  year         = {2012},
  url          = {https://doi.org/10.1145/2377677.2377781},
  doi          = {10.1145/2377677.2377781},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/StringhiniEKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/EgeleMKK12,
  author       = {Manuel Egele and
                  Andreas Moser and
                  Christopher Kruegel and
                  Engin Kirda},
  title        = {PoX: Protecting users from malicious Facebook applications},
  journal      = {Comput. Commun.},
  volume       = {35},
  number       = {12},
  pages        = {1507--1515},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.comcom.2012.04.016},
  doi          = {10.1016/J.COMCOM.2012.04.016},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/EgeleMKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/EgeleSKK12,
  author       = {Manuel Egele and
                  Theodoor Scholte and
                  Engin Kirda and
                  Christopher Kruegel},
  title        = {A survey on automated dynamic malware-analysis techniques and tools},
  journal      = {{ACM} Comput. Surv.},
  volume       = {44},
  number       = {2},
  pages        = {6:1--6:42},
  year         = {2012},
  url          = {https://doi.org/10.1145/2089125.2089126},
  doi          = {10.1145/2089125.2089126},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/EgeleSKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BilgeBRKK12,
  author       = {Leyla Bilge and
                  Davide Balzarotti and
                  William K. Robertson and
                  Engin Kirda and
                  Christopher Kruegel},
  editor       = {Robert H'obbes' Zakon},
  title        = {Disclosure: detecting botnet command and control servers through large-scale
                  NetFlow analysis},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {129--138},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420969},
  doi          = {10.1145/2420950.2420969},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BilgeBRKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchlumbergerKV12,
  author       = {Johannes Schlumberger and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Robert H'obbes' Zakon},
  title        = {Jarhead analysis and detection of malicious Java applets},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {249--257},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420988},
  doi          = {10.1145/2420950.2420988},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SchlumbergerKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BianchiSKV12,
  author       = {Antonio Bianchi and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Blacksheep: detecting compromised hosts in homogeneous crowds},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {341--352},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382234},
  doi          = {10.1145/2382196.2382234},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BianchiSKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuCGK12,
  author       = {Zhaoyan Xu and
                  Lingfeng Chen and
                  Guofei Gu and
                  Christopher Kruegel},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {PeerPress: utilizing enemies' {P2P} strength against them},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {581--592},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382257},
  doi          = {10.1145/2382196.2382257},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuCGK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NikiforakisIKAJKPV12,
  author       = {Nick Nikiforakis and
                  Luca Invernizzi and
                  Alexandros Kapravelos and
                  Steven {Van Acker} and
                  Wouter Joosen and
                  Christopher Kruegel and
                  Frank Piessens and
                  Giovanni Vigna},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {You are what you include: large-scale evaluation of remote javascript
                  inclusions},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {736--747},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382274},
  doi          = {10.1145/2382196.2382274},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NikiforakisIKAJKPV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/TegelerFVK12,
  author       = {Florian Tegeler and
                  Xiaoming Fu and
                  Giovanni Vigna and
                  Christopher Kruegel},
  editor       = {Chadi Barakat and
                  Renata Teixeira and
                  K. K. Ramakrishnan and
                  Patrick Thiran},
  title        = {BotFinder: finding bots in network traffic without deep packet inspection},
  booktitle    = {Conference on emerging Networking Experiments and Technologies, CoNEXT
                  '12, Nice, France - December 10 - 13, 2012},
  pages        = {349--360},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2413176.2413217},
  doi          = {10.1145/2413176.2413217},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/TegelerFVK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/JacobCNKV12,
  author       = {Gr{\'{e}}goire Jacob and
                  Paolo Milani Comparetti and
                  Matthias Neugschwandtner and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Ulrich Flegel and
                  Evangelos P. Markatos and
                  William K. Robertson},
  title        = {A Static, Packer-Agnostic Filter to Detect Similar Malware Samples},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 9th International Conference, {DIMVA} 2012, Heraklion, Crete, Greece,
                  July 26-27, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7591},
  pages        = {102--122},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37300-8\_6},
  doi          = {10.1007/978-3-642-37300-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/JacobCNKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/GregioGKV12,
  author       = {Andr{\'{e}} Ricardo Abed Gr{\'{e}}gio and
                  Paulo L{\'{\i}}cio de Geus and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Ulrich Flegel and
                  Evangelos P. Markatos and
                  William K. Robertson},
  title        = {Tracking Memory Writes for Malware Classification and Code Reuse Identification},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 9th International Conference, {DIMVA} 2012, Heraklion, Crete, Greece,
                  July 26-27, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7591},
  pages        = {134--143},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37300-8\_8},
  doi          = {10.1007/978-3-642-37300-8\_8},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/GregioGKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Kruegel12,
  author       = {Christopher Kruegel},
  editor       = {Venkat N. Venkatakrishnan and
                  Diganta Goswami},
  title        = {Fighting Malicious Software},
  booktitle    = {Information Systems Security, 8th International Conference, {ICISS}
                  2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35130-3\_1},
  doi          = {10.1007/978-3-642-35130-3\_1},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/Kruegel12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/AlkhalafCFBOK12,
  author       = {Muath Alkhalaf and
                  Shauvik Roy Choudhary and
                  Mattia Fazzini and
                  Tevfik Bultan and
                  Alessandro Orso and
                  Christopher Kruegel},
  editor       = {Mats Per Erik Heimdahl and
                  Zhendong Su},
  title        = {ViewPoints: differential string analysis for discovering client- and
                  server-side input validation inconsistencies},
  booktitle    = {International Symposium on Software Testing and Analysis, {ISSTA}
                  2012, Minneapolis, MN, USA, July 15-20, 2012},
  pages        = {56--66},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2338965.2336760},
  doi          = {10.1145/2338965.2336760},
  timestamp    = {Thu, 02 Dec 2021 11:46:17 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/AlkhalafCFBOK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/CanaliLBKCK12,
  author       = {Davide Canali and
                  Andrea Lanzi and
                  Davide Balzarotti and
                  Christopher Kruegel and
                  Mihai Christodorescu and
                  Engin Kirda},
  editor       = {Mats Per Erik Heimdahl and
                  Zhendong Su},
  title        = {A quantitative study of accuracy in system call-based malware detection},
  booktitle    = {International Symposium on Software Testing and Analysis, {ISSTA}
                  2012, Minneapolis, MN, USA, July 15-20, 2012},
  pages        = {122--132},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2338965.2336768},
  doi          = {10.1145/2338965.2336768},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/CanaliLBKCK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihoc/YangZZKZ12,
  author       = {Lei Yang and
                  Zengbin Zhang and
                  Ben Y. Zhao and
                  Christopher Kruegel and
                  Haitao Zheng},
  editor       = {Asis Nasipuri and
                  Yih{-}Chun Hu and
                  Sanjay Shakkottai},
  title        = {Enforcing dynamic spectrum access with spectrum permits},
  booktitle    = {The Thirteenth {ACM} International Symposium on Mobile Ad Hoc Networking
                  and Computing, MobiHoc '12, Hilton Head, SC, USA, June 11-14, 2012},
  pages        = {195--204},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2248371.2248400},
  doi          = {10.1145/2248371.2248400},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobihoc/YangZZKZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/YildizK12,
  author       = {Hakan Yildiz and
                  Christopher Kruegel},
  title        = {Detecting social cliques for automated privacy control in online social
                  networks},
  booktitle    = {Tenth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications, PerCom 2012, March 19-23, 2012, Lugano, Switzerland,
                  Workshop Proceedings},
  pages        = {353--359},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/PerComW.2012.6197509},
  doi          = {10.1109/PERCOMW.2012.6197509},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/YildizK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/OverveldtKV12,
  author       = {Timon Van Overveldt and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {FlashDetect: ActionScript 3 Malware Detection},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {274--293},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_14},
  doi          = {10.1007/978-3-642-33338-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/OverveldtKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/InvernizziC12,
  author       = {Luca Invernizzi and
                  Paolo Milani Comparetti and
                  Stefano Benvenuti and
                  Christopher Kruegel and
                  Marco Cova and
                  Giovanni Vigna},
  title        = {EvilSeed: {A} Guided Approach to Finding Malicious Web Pages},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {428--442},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.33},
  doi          = {10.1109/SP.2012.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/InvernizziC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StringhiniEZHKV12,
  author       = {Gianluca Stringhini and
                  Manuel Egele and
                  Apostolis Zarras and
                  Thorsten Holz and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Tadayoshi Kohno},
  title        = {B@bel: Leveraging Email Delivery for Spam Mitigation},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {16--32},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/stringhini},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/StringhiniEZHKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JacobKKV12,
  author       = {Gr{\'{e}}goire Jacob and
                  Engin Kirda and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Tadayoshi Kohno},
  title        = {{PUBCRAWL:} Protecting Users and Businesses from CRAWLers},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {507--522},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/jacob},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JacobKKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DoupeCKV12,
  author       = {Adam Doup{\'{e}} and
                  Ludovico Cavedon and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Tadayoshi Kohno},
  title        = {Enemy of the State: {A} State-Aware Black-Box Web Vulnerability Scanner},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {523--538},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/doupe},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DoupeCKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wosn/StringhiniEKV12,
  author       = {Gianluca Stringhini and
                  Manuel Egele and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Balachander Krishnamurthy and
                  Stefan Saroiu and
                  Ben Y. Zhao},
  title        = {Poultry markets: on the underground economy of twitter followers},
  booktitle    = {Proceedings of the 2012 {ACM} workshop on Workshop on Online Social
                  Networks, {WOSN} 2012, Helsinki, Finland, August 17, 2012},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2342549.2342551},
  doi          = {10.1145/2342549.2342551},
  timestamp    = {Mon, 26 Jun 2023 08:43:55 +0200},
  biburl       = {https://dblp.org/rec/conf/wosn/StringhiniEKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Kruegel11,
  author       = {Christopher Kruegel},
  title        = {Making browser extensions secure: technical perspective},
  journal      = {Commun. {ACM}},
  volume       = {54},
  number       = {9},
  pages        = {90},
  year         = {2011},
  url          = {https://doi.org/10.1145/1995376.1995397},
  doi          = {10.1145/1995376.1995397},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Kruegel11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Stone-GrossCGKKV11,
  author       = {Brett Stone{-}Gross and
                  Marco Cova and
                  Bob Gilbert and
                  Richard A. Kemmerer and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Analysis of a Botnet Takeover},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {9},
  number       = {1},
  pages        = {64--72},
  year         = {2011},
  url          = {https://doi.org/10.1109/MSP.2010.144},
  doi          = {10.1109/MSP.2010.144},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Stone-GrossCGKKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NeugschwandtnerCJK11,
  author       = {Matthias Neugschwandtner and
                  Paolo Milani Comparetti and
                  Gr{\'{e}}goire Jacob and
                  Christopher Kruegel},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {{FORECAST:} skimming off the malware cream},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076735},
  doi          = {10.1145/2076732.2076735},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NeugschwandtnerCJK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CiprianoZHKV11,
  author       = {Casey Cipriano and
                  Ali Zand and
                  Amir Houmansadr and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Nexat: a history-based approach to predict attacker actions},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {383--392},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076787},
  doi          = {10.1145/2076732.2076787},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CiprianoZHKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KiratVK11,
  author       = {Dhilung Kirat and
                  Giovanni Vigna and
                  Christopher Kruegel},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {BareBox: efficient malware analysis on bare-metal},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {403--412},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076790},
  doi          = {10.1145/2076732.2076790},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KiratVK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DoupeBKV11,
  author       = {Adam Doup{\'{e}} and
                  Bryce Boe and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Fear the {EAR:} discovering and mitigating execution after redirect
                  vulnerabilities},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {251--262},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046736},
  doi          = {10.1145/2046707.2046736},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DoupeBKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KolbitschKK11,
  author       = {Clemens Kolbitsch and
                  Engin Kirda and
                  Christopher Kruegel},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {The power of procrastination: detection and mitigation of execution-stalling
                  malicious code},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {285--296},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046740},
  doi          = {10.1145/2046707.2046740},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KolbitschKK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloud/PuttaswamyKZ11,
  author       = {Krishna P. N. Puttaswamy and
                  Christopher Kruegel and
                  Ben Y. Zhao},
  editor       = {Jeffrey S. Chase and
                  Amr El Abbadi},
  title        = {Silverline: toward data confidentiality in storage-intensive cloud
                  applications},
  booktitle    = {{ACM} Symposium on Cloud Computing in conjunction with {SOSP} 2011,
                  {SOCC} '11, Cascais, Portugal, October 26-28, 2011},
  pages        = {10},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2038916.2038926},
  doi          = {10.1145/2038916.2038926},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloud/PuttaswamyKZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/KapravelosCKV11,
  author       = {Alexandros Kapravelos and
                  Marco Cova and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Thorsten Holz and
                  Herbert Bos},
  title        = {Escape from Monkey Island: Evading High-Interaction Honeyclients},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands,
                  July 7-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6739},
  pages        = {124--143},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22424-9\_8},
  doi          = {10.1007/978-3-642-22424-9\_8},
  timestamp    = {Wed, 25 Sep 2019 18:15:55 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/KapravelosCKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/BanksFKKV11,
  author       = {Greg Banks and
                  Aristide Fattori and
                  Richard A. Kemmerer and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Thorsten Holz and
                  Herbert Bos},
  title        = {{MISHIMA:} Multilateration of Internet Hosts Hidden Using Malicious
                  Fast-Flux Agents (Short Paper)},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands,
                  July 7-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6739},
  pages        = {184--193},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22424-9\_11},
  doi          = {10.1007/978-3-642-22424-9\_11},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/BanksFKKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/SzydlowskiZKK11,
  author       = {Martin Szydlowski and
                  Ben Y. Zhao and
                  Engin Kirda and
                  Christopher Kruegel},
  editor       = {Haohong Wang and
                  Jin Li and
                  George N. Rouskas and
                  Xiaobo Zhou},
  title        = {BTLab: {A} System-Centric, Data-Driven Analysis and Measurement Platform
                  for BitTorrent Clients},
  booktitle    = {Proceedings of 20th International Conference on Computer Communications
                  and Networks, {ICCCN} 2011, Maui, Hawaii, USA, July 31 - August 4,
                  2011},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICCCN.2011.6005925},
  doi          = {10.1109/ICCCN.2011.6005925},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/SzydlowskiZKK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-4/SzydlowskiEKV11,
  author       = {Martin Szydlowski and
                  Manuel Egele and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Jan Camenisch and
                  Dogan Kesdogan},
  title        = {Challenges for Dynamic Analysis of iOS Applications},
  booktitle    = {Open Problems in Network Security - {IFIP} {WG} 11.4 International
                  Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7039},
  pages        = {65--77},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27585-2\_6},
  doi          = {10.1007/978-3-642-27585-2\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-4/SzydlowskiEKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/Stone-GrossSZKKV11,
  author       = {Brett Stone{-}Gross and
                  Ryan Stevens and
                  Apostolis Zarras and
                  Richard A. Kemmerer and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Patrick Thiran and
                  Walter Willinger},
  title        = {Understanding fraudulent activities in online ad exchanges},
  booktitle    = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} '11, Berlin, Germany, November 2-, 2011},
  pages        = {279--294},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2068816.2068843},
  doi          = {10.1145/2068816.2068843},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/Stone-GrossSZKKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/Stone-GrossCKV11,
  author       = {Brett Stone{-}Gross and
                  Marco Cova and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Peering through the iframe},
  booktitle    = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  10-15 April 2011, Shanghai, China},
  pages        = {411--415},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INFCOM.2011.5935193},
  doi          = {10.1109/INFCOM.2011.5935193},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/Stone-GrossCKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BilgeKKB11,
  author       = {Leyla Bilge and
                  Engin Kirda and
                  Christopher Kruegel and
                  Marco Balduzzi},
  title        = {{EXPOSURE:} Finding Malicious Domains Using Passive {DNS} Analysis},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
                  2011},
  publisher    = {The Internet Society},
  year         = {2011},
  url          = {https://www.ndss-symposium.org/ndss2011/exposure-finding-malicious-domains-using-passive-dns-analysis},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BilgeKKB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/EgeleKKV11,
  author       = {Manuel Egele and
                  Christopher Kruegel and
                  Engin Kirda and
                  Giovanni Vigna},
  title        = {PiOS: Detecting Privacy Leaks in iOS Applications},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
                  2011},
  publisher    = {The Internet Society},
  year         = {2011},
  url          = {https://www.ndss-symposium.org/ndss2011/pios-detecting-privacy-leaks-ios-applications-paper},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/EgeleKKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/EgeleMKK11,
  author       = {Manuel Egele and
                  Andreas Moser and
                  Christopher Kruegel and
                  Engin Kirda},
  title        = {PoX: Protecting users from malicious Facebook applications},
  booktitle    = {Ninth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications, PerCom 2011, 21-25 March 2011, Seattle, WA, USA,
                  Workshop Proceedings},
  pages        = {288--294},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/PERCOMW.2011.5766885},
  doi          = {10.1109/PERCOMW.2011.5766885},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/EgeleMKK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GilbertKKV11,
  author       = {Bob Gilbert and
                  Richard A. Kemmerer and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Dymo: Tracking Dynamic Code Identity},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_2},
  doi          = {10.1007/978-3-642-23644-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GilbertKKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/FratantonioKV11,
  author       = {Yanick Fratantonio and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Shellzer: {A} Tool for the Dynamic Analysis of Malicious Shellcode},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {61--80},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_4},
  doi          = {10.1007/978-3-642-23644-0\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/FratantonioKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JacobHKH11,
  author       = {Gr{\'{e}}goire Jacob and
                  Ralf Hund and
                  Christopher Kruegel and
                  Thorsten Holz},
  title        = {{JACKSTRAWS:} Picking Command and Control Connections from Bot Traffic},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Jacob.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JacobHKH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StringhiniHSKV11,
  author       = {Gianluca Stringhini and
                  Thorsten Holz and
                  Brett Stone{-}Gross and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{BOTMAGNIFIER:} Locating Spambots on the Internet},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Stringhini.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/StringhiniHSKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/Stone-GrossAKKS11,
  author       = {Brett Stone{-}Gross and
                  Ryan Abman and
                  Richard A. Kemmerer and
                  Christopher Kruegel and
                  Douglas G. Steigerwald},
  title        = {The Underground Economy of Fake Antivirus Software},
  booktitle    = {10th Annual Workshop on the Economics of Information Security, {WEIS}
                  2011, George Mason University, Fairfax, VA, USA, June 14-15, 2011},
  year         = {2011},
  url          = {http://weis2011.econinfosec.org/papers/The\%20Underground\%20Economy\%20of\%20Fake\%20Antivirus\%20Software.pdf},
  timestamp    = {Thu, 22 Jul 2021 16:15:44 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/Stone-GrossAKKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/Stone-GrossAKKS11a,
  author       = {Brett Stone{-}Gross and
                  Ryan Abman and
                  Richard A. Kemmerer and
                  Christopher Kruegel and
                  Douglas G. Steigerwald and
                  Giovanni Vigna},
  editor       = {Bruce Schneier},
  title        = {The Underground Economy of Fake Antivirus Software},
  booktitle    = {Economics of Information Security and Privacy {III} [papers from the
                  Tenth Workshop on Economics and Information Security, {WEIS} 2011]},
  pages        = {55--78},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4614-1981-5\_4},
  doi          = {10.1007/978-1-4614-1981-5\_4},
  timestamp    = {Fri, 16 Aug 2019 12:52:37 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/Stone-GrossAKKS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/CanaliCVK11,
  author       = {Davide Canali and
                  Marco Cova and
                  Giovanni Vigna and
                  Christopher Kruegel},
  editor       = {Sadagopan Srinivasan and
                  Krithi Ramamritham and
                  Arun Kumar and
                  M. P. Ravindra and
                  Elisa Bertino and
                  Ravi Kumar},
  title        = {Prophiler: a fast filter for the large-scale detection of malicious
                  web pages},
  booktitle    = {Proceedings of the 20th International Conference on World Wide Web,
                  {WWW} 2011, Hyderabad, India, March 28 - April 1, 2011},
  pages        = {197--206},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1963405.1963436},
  doi          = {10.1145/1963405.1963436},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/CanaliCVK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/leet/2011,
  editor       = {Christopher Kruegel},
  title        = {4th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '11, Boston, MA, USA, March 29, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/leet11},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/leet/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/JovanovicKK10,
  author       = {Nenad Jovanovic and
                  Christopher Kruegel and
                  Engin Kirda},
  title        = {Static analysis for detecting taint-style vulnerabilities in web applications},
  journal      = {J. Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {861--907},
  year         = {2010},
  url          = {https://doi.org/10.3233/JCS-2009-0385},
  doi          = {10.3233/JCS-2009-0385},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/JovanovicKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/StringhiniKV10,
  author       = {Gianluca Stringhini and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Detecting spammers on social networks},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920263},
  doi          = {10.1145/1920261.1920263},
  timestamp    = {Wed, 28 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/StringhiniKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BalduzziEKBK10,
  author       = {Marco Balduzzi and
                  Manuel Egele and
                  Engin Kirda and
                  Davide Balzarotti and
                  Christopher Kruegel},
  editor       = {Dengguo Feng and
                  David A. Basin and
                  Peng Liu},
  title        = {A solution for the automated detection of clickjacking attacks},
  booktitle    = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
                  2010},
  pages        = {135--144},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1755688.1755706},
  doi          = {10.1145/1755688.1755706},
  timestamp    = {Fri, 03 Jun 2022 12:02:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BalduzziEKBK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LanziBKCK10,
  author       = {Andrea Lanzi and
                  Davide Balzarotti and
                  Christopher Kruegel and
                  Mihai Christodorescu and
                  Engin Kirda},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {AccessMiner: using system-centric models for malware protection},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {399--412},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866353},
  doi          = {10.1145/1866307.1866353},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LanziBKCK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-4/CavedonKV10,
  author       = {Ludovico Cavedon and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Jan Camenisch and
                  Valentin S. Kisimov and
                  Maria Dubovitskaya},
  title        = {Are {BGP} Routers Open to Attack? An Experiment},
  booktitle    = {Open Research Problems in Network Security - {IFIP} {WG} 11.4 International
                  Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6555},
  pages        = {88--103},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19228-9\_8},
  doi          = {10.1007/978-3-642-19228-9\_8},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-4/CavedonKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BalzarottiCKKKV10,
  author       = {Davide Balzarotti and
                  Marco Cova and
                  Christoph Karlberger and
                  Engin Kirda and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Efficient Detection of Split Personalities in Malware},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
                  2010},
  publisher    = {The Internet Society},
  year         = {2010},
  url          = {https://www.ndss-symposium.org/ndss2010/efficient-detection-split-personalities-malware},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BalzarottiCKKKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/RobertsonMKV10,
  author       = {William K. Robertson and
                  Federico Maggi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Effective Anomaly Detection with Scarce Training Data},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
                  2010},
  publisher    = {The Internet Society},
  year         = {2010},
  url          = {https://www.ndss-symposium.org/ndss2010/effective-anomaly-detection-scarce-training-data},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/RobertsonMKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BalduzziPHKBK10,
  author       = {Marco Balduzzi and
                  Christian Platzer and
                  Thorsten Holz and
                  Engin Kirda and
                  Davide Balzarotti and
                  Christopher Kruegel},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Abusing Social Networks for Automated User Profiling},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {422--441},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_22},
  doi          = {10.1007/978-3-642-15512-3\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BalduzziPHKBK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/EgeleBKK10,
  author       = {Manuel Egele and
                  Leyla Bilge and
                  Engin Kirda and
                  Christopher Kruegel},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski and
                  Michael Schumacher and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {{CAPTCHA} smuggling: hijacking web browsing sessions to create {CAPTCHA}
                  farms},
  booktitle    = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC),
                  Sierre, Switzerland, March 22-26, 2010},
  pages        = {1865--1870},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1774088.1774483},
  doi          = {10.1145/1774088.1774483},
  timestamp    = {Sun, 02 Jun 2019 21:18:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/EgeleBKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BayerKK10,
  author       = {Ulrich Bayer and
                  Engin Kirda and
                  Christopher Kruegel},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski and
                  Michael Schumacher and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {Improving the efficiency of dynamic malware analysis},
  booktitle    = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC),
                  Sierre, Switzerland, March 22-26, 2010},
  pages        = {1871--1878},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1774088.1774484},
  doi          = {10.1145/1774088.1774484},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/BayerKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KolbitschHKK10,
  author       = {Clemens Kolbitsch and
                  Thorsten Holz and
                  Christopher Kruegel and
                  Engin Kirda},
  title        = {Inspector Gadget: Automated Extraction of Proprietary Gadgets from
                  Malware Binaries},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {29--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.10},
  doi          = {10.1109/SP.2010.10},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KolbitschHKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ComparettiSKKKZ10,
  author       = {Paolo Milani Comparetti and
                  Guido Salvaneschi and
                  Engin Kirda and
                  Clemens Kolbitsch and
                  Christopher Kruegel and
                  Stefano Zanero},
  title        = {Identifying Dormant Functionality in Malware Programs},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {61--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.12},
  doi          = {10.1109/SP.2010.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ComparettiSKKKZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WondracekHKK10,
  author       = {Gilbert Wondracek and
                  Thorsten Holz and
                  Engin Kirda and
                  Christopher Kruegel},
  title        = {A Practical Attack to De-anonymize Social Network Users},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {223--238},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.21},
  doi          = {10.1109/SP.2010.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/WondracekHKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FelmetsgerCKV10,
  author       = {Viktoria Felmetsger and
                  Ludovico Cavedon and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Toward Automated Detection of Logic Vulnerabilities in Web Applications},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {143--160},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Felmetsger.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FelmetsgerCKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/WondracekHPKK10,
  author       = {Gilbert Wondracek and
                  Thorsten Holz and
                  Christian Platzer and
                  Engin Kirda and
                  Christopher Kruegel},
  title        = {Is the Internet for Porn? An Insight Into the Online Adult Industry},
  booktitle    = {9th Annual Workshop on the Economics of Information Security, {WEIS}
                  2010, Harvard University, Cambridge, MA, USA, June 7-8, 2010},
  year         = {2010},
  url          = {http://weis2010.econinfosec.org/papers/session2/weis2010\_wondracek.pdf},
  timestamp    = {Thu, 22 Jul 2021 16:15:46 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/WondracekHPKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/CovaKV10,
  author       = {Marco Cova and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna},
  editor       = {Michael Rappa and
                  Paul Jones and
                  Juliana Freire and
                  Soumen Chakrabarti},
  title        = {Detection and analysis of drive-by-download attacks and malicious
                  JavaScript code},
  booktitle    = {Proceedings of the 19th International Conference on World Wide Web,
                  {WWW} 2010, Raleigh, North Carolina, USA, April 26-30, 2010},
  pages        = {281--290},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1772690.1772720},
  doi          = {10.1145/1772690.1772720},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/CovaKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KirdaJKV09,
  author       = {Engin Kirda and
                  Nenad Jovanovic and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Client-side cross-site scripting protection},
  journal      = {Comput. Secur.},
  volume       = {28},
  number       = {7},
  pages        = {592--604},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.cose.2009.04.008},
  doi          = {10.1016/J.COSE.2009.04.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KirdaJKV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MitterhoferKKP09,
  author       = {Stefan Mitterhofer and
                  Christopher Kr{\"{u}}gel and
                  Engin Kirda and
                  Christian Platzer},
  title        = {Server-Side Bot Detection in Massively Multiplayer Online Games},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {7},
  number       = {3},
  pages        = {29--36},
  year         = {2009},
  url          = {https://doi.org/10.1109/MSP.2009.78},
  doi          = {10.1109/MSP.2009.78},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MitterhoferKKP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ife/CarleDKKKL09,
  author       = {Georg Carle and
                  Falko Dressler and
                  Richard A. Kemmerer and
                  Hartmut K{\"{o}}nig and
                  Christopher Kruegel and
                  Pavel Laskov},
  title        = {Network attack detection and defense - Manifesto of the Dagstuhl Perspective
                  Workshop, March 2nd-6th, 2008},
  journal      = {Comput. Sci. Res. Dev.},
  volume       = {23},
  number       = {1},
  pages        = {15--25},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00450-009-0055-y},
  doi          = {10.1007/S00450-009-0055-Y},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ife/CarleDKKKL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/VignaVBRKK09,
  author       = {Giovanni Vigna and
                  Fredrik Valeur and
                  Davide Balzarotti and
                  William K. Robertson and
                  Christopher Kruegel and
                  Engin Kirda},
  title        = {Reducing errors in the anomaly-based detection of web-based attacks
                  through the combined analysis of web requests and {SQL} queries},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {305--329},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0321},
  doi          = {10.3233/JCS-2009-0321},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/VignaVBRKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Stone-GrossKAMK09,
  author       = {Brett Stone{-}Gross and
                  Christopher Kruegel and
                  Kevin C. Almeroth and
                  Andreas Moser and
                  Engin Kirda},
  title        = {{FIRE:} FInding Rogue nEtworks},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {231--240},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.29},
  doi          = {10.1109/ACSAC.2009.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Stone-GrossKAMK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FordCKV09,
  author       = {Sean Ford and
                  Marco Cova and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Analyzing and Detecting Malicious Flash Advertisements},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {363--372},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.41},
  doi          = {10.1109/ACSAC.2009.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FordCKV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Stone-GrossCCGSKKV09,
  author       = {Brett Stone{-}Gross and
                  Marco Cova and
                  Lorenzo Cavallaro and
                  Bob Gilbert and
                  Martin Szydlowski and
                  Richard A. Kemmerer and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {Your botnet is my botnet: analysis of a botnet takeover},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {635--647},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653738},
  doi          = {10.1145/1653662.1653738},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Stone-GrossCCGSKKV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/EgeleWKK09,
  author       = {Manuel Egele and
                  Peter Wurzinger and
                  Christopher Kruegel and
                  Engin Kirda},
  editor       = {Ulrich Flegel and
                  Danilo Bruschi},
  title        = {Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying
                  Code Injection Attacks},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5587},
  pages        = {88--106},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02918-9\_6},
  doi          = {10.1007/978-3-642-02918-9\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/EgeleWKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WurzingerBHGKK09,
  author       = {Peter Wurzinger and
                  Leyla Bilge and
                  Thorsten Holz and
                  Jan Goebel and
                  Christopher Kruegel and
                  Engin Kirda},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Automatically Generating Models for Botnet Detection},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {232--249},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_15},
  doi          = {10.1007/978-3-642-04444-1\_15},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WurzingerBHGKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/WurzingerPLKK09,
  author       = {Peter W{\"{u}}rzinger and
                  Christian Platzer and
                  Christian Ludl and
                  Engin Kirda and
                  Christopher Kruegel},
  title        = {{SWAP:} Mitigating {XSS} attacks using a reverse proxy},
  booktitle    = {{ICSE} Workshop on Software Engineering for Secure Systems, {SESS}
                  2009, Vancouver, BC, Canada, May 19, 2009},
  pages        = {33--39},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IWSESS.2009.5068456},
  doi          = {10.1109/IWSESS.2009.5068456},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/WurzingerPLKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-4/EgeleKK09,
  author       = {Manuel Egele and
                  Engin Kirda and
                  Christopher Kruegel},
  editor       = {Jan Camenisch and
                  Dogan Kesdogan},
  title        = {Mitigating Drive-By Download Attacks: Challenges and Open Problems},
  booktitle    = {iNetSec 2009 - Open Research Problems in Network Security - {IFIP}
                  {WG} 11.4 International Workshop, Zurich, Switzerland, April 23-24,
                  2009, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {309},
  pages        = {52--62},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05437-2\_5},
  doi          = {10.1007/978-3-642-05437-2\_5},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-4/EgeleKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/StammingerKVK09,
  author       = {Andreas Stamminger and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Engin Kirda},
  editor       = {Pierangela Samarati and
                  Moti Yung and
                  Fabio Martinelli and
                  Claudio A. Ardagna},
  title        = {Automated Spyware Collection and Analysis},
  booktitle    = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
                  Italy, September 7-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5735},
  pages        = {202--217},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04474-8\_17},
  doi          = {10.1007/978-3-642-04474-8\_17},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/StammingerKVK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BayerCHKK09,
  author       = {Ulrich Bayer and
                  Paolo Milani Comparetti and
                  Clemens Hlauschek and
                  Christopher Kr{\"{u}}gel and
                  Engin Kirda},
  title        = {Scalable, Behavior-Based Malware Clustering},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/scalable-behavior-based-malware-clustering/},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BayerCHKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MaggiRKV09,
  author       = {Federico Maggi and
                  William K. Robertson and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Protecting a Moving Target: Addressing Web Application Concept Drift},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_2},
  doi          = {10.1007/978-3-642-04342-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MaggiRKV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ComparettiWKK09,
  author       = {Paolo Milani Comparetti and
                  Gilbert Wondracek and
                  Christopher Kr{\"{u}}gel and
                  Engin Kirda},
  title        = {Prospex: Protocol Specification Extraction},
  booktitle    = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May
                  2009, Oakland, California, {USA}},
  pages        = {110--125},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SP.2009.14},
  doi          = {10.1109/SP.2009.14},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ComparettiWKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KolbitschCKKZW09,
  author       = {Clemens Kolbitsch and
                  Paolo Milani Comparetti and
                  Christopher Kruegel and
                  Engin Kirda and
                  Xiao{-}yong Zhou and
                  XiaoFeng Wang},
  editor       = {Fabian Monrose},
  title        = {Effective and Efficient Malware Detection at the End Host},
  booktitle    = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14,
                  2009, Proceedings},
  pages        = {351--366},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {http://www.usenix.org/events/sec09/tech/full\_papers/kolbitsch.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KolbitschCKKZW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/IoannidisMK09,
  author       = {Sotiris Ioannidis and
                  Evangelos P. Markatos and
                  Christopher Kruegel},
  title        = {On looking {FORWARD}},
  journal      = {{ERCIM} News},
  volume       = {2009},
  number       = {76},
  year         = {2009},
  url          = {http://ercim-news.ercim.eu/en76/rd/on-looking-forward},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/IoannidisMK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/Stone-GrossSCMAK08,
  author       = {Brett Stone{-}Gross and
                  David Sigal and
                  Rob Cohn and
                  John Morse and
                  Kevin C. Almeroth and
                  Christopher Kruegel},
  editor       = {Diego Zamboni},
  title        = {VeriKey: {A} Dynamic Certificate Verification System for Public Key
                  Exchanges},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  5th International Conference, {DIMVA} 2008, Paris, France, July 10-11,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5137},
  pages        = {44--63},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70542-0\_3},
  doi          = {10.1007/978-3-540-70542-0\_3},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/Stone-GrossSCMAK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/FoschiniTCKV08,
  author       = {Luca Foschini and
                  Ashish V. Thapliyal and
                  Lorenzo Cavallaro and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {R. Sekar and
                  Arun K. Pujari},
  title        = {A Parallel Architecture for Stateful, High-Speed Intrusion Detection},
  booktitle    = {Information Systems Security, 4th International Conference, {ICISS}
                  2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {203--220},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89862-7\_18},
  doi          = {10.1007/978-3-540-89862-7\_18},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/FoschiniTCKV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indiaSE/ChristodorescuJK08,
  author       = {Mihai Christodorescu and
                  Somesh Jha and
                  Christopher Kruegel},
  editor       = {Gautam Shroff and
                  Pankaj Jalote and
                  Sriram K. Rajamani},
  title        = {Mining specifications of malicious behavior},
  booktitle    = {Proceeding of the 1st Annual India Software Engineering Conference,
                  {ISEC} 2008, Hyderabad, India, February 19-22, 2008},
  pages        = {5--14},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1342211.1342215},
  doi          = {10.1145/1342211.1342215},
  timestamp    = {Thu, 10 Dec 2020 11:39:56 +0100},
  biburl       = {https://dblp.org/rec/conf/indiaSE/ChristodorescuJK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WondracekCKK08,
  author       = {Gilbert Wondracek and
                  Paolo Milani Comparetti and
                  Christopher Kr{\"{u}}gel and
                  Engin Kirda},
  title        = {Automatic Network Protocol Analysis},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2008, San Diego, California, USA, 10th February - 13th February
                  2008},
  publisher    = {The Internet Society},
  year         = {2008},
  url          = {https://www.ndss-symposium.org/ndss2008/automatic-network-protocol-analysis/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WondracekCKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/McAllisterKK08,
  author       = {Sean McAllister and
                  Engin Kirda and
                  Christopher Kruegel},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Leveraging User Interactions for In-Depth Testing of Web Applications},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {191--210},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_11},
  doi          = {10.1007/978-3-540-87403-4\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/McAllisterKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/StarnbergerKK08,
  author       = {Guenther Starnberger and
                  Christopher Kruegel and
                  Engin Kirda},
  editor       = {Albert Levi and
                  Peng Liu and
                  Refik Molva},
  title        = {Overbot: a botnet protocol based on Kademlia},
  booktitle    = {4th International {ICST} Conference on Security and Privacy in Communication
                  Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  pages        = {13},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1460877.1460894},
  doi          = {10.1145/1460877.1460894},
  timestamp    = {Tue, 06 Nov 2018 16:58:12 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/StarnbergerKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/MedvetKK08,
  author       = {Eric Medvet and
                  Engin Kirda and
                  Christopher Kruegel},
  editor       = {Albert Levi and
                  Peng Liu and
                  Refik Molva},
  title        = {Visual-similarity-based phishing detection},
  booktitle    = {4th International {ICST} Conference on Security and Privacy in Communication
                  Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  pages        = {22},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1460877.1460905},
  doi          = {10.1145/1460877.1460905},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/MedvetKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BalzarottiCFJKKV08,
  author       = {Davide Balzarotti and
                  Marco Cova and
                  Viktoria Felmetsger and
                  Nenad Jovanovic and
                  Engin Kirda and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Saner: Composing Static and Dynamic Analysis to Validate Sanitization
                  in Web Applications},
  booktitle    = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May
                  2008, Oakland, California, {USA}},
  pages        = {387--401},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SP.2008.22},
  doi          = {10.1109/SP.2008.22},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BalzarottiCFJKKV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CovaKV08,
  author       = {Marco Cova and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Dan Boneh and
                  Tal Garfinkel and
                  Dug Song},
  title        = {There Is No Free Phish: An Analysis of "Free" and Live Phishing
                  Kits},
  booktitle    = {2nd {USENIX} Workshop on Offensive Technologies, WOOT'08, San Jose,
                  CA, USA, July 28, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/woot08/tech/full\_papers/cova/cova.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CovaKV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2008P8102,
  editor       = {Georg Carle and
                  Falko Dressler and
                  Richard A. Kemmerer and
                  Hartmut K{\"{o}}nig and
                  Christopher Kruegel},
  title        = {Perspectives Workshop: Network Attack Detection and Defense, 2.3.
                  - 6.3.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08102},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/portals/08102/},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2008P8102.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BraunDHKKKLRS08,
  author       = {Lothar Braun and
                  Falko Dressler and
                  Thorsten Holz and
                  Engin Kirda and
                  Jan Kohlrausch and
                  Christopher Kruegel and
                  Tobias Limmer and
                  Konrad Rieck and
                  James P. G. Sterbenz},
  editor       = {Georg Carle and
                  Falko Dressler and
                  Richard A. Kemmerer and
                  Hartmut K{\"{o}}nig and
                  Christopher Kruegel},
  title        = {08102 Working Group -- Requirements for Network Monitoring from an
                  {IDS} Perspective},
  booktitle    = {Perspectives Workshop: Network Attack Detection and Defense, 2.3.
                  - 6.3.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08102},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1497},
  timestamp    = {Thu, 10 Jun 2021 13:02:08 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BraunDHKKKLRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/CarleDKKK08,
  author       = {Georg Carle and
                  Falko Dressler and
                  Richard A. Kemmerer and
                  Hartmut K{\"{o}}nig and
                  Christopher Kruegel},
  editor       = {Georg Carle and
                  Falko Dressler and
                  Richard A. Kemmerer and
                  Hartmut K{\"{o}}nig and
                  Christopher Kruegel},
  title        = {08102 Executive Summary -- Perspectives Workshop: Network Attack Detection
                  and Defense},
  booktitle    = {Perspectives Workshop: Network Attack Detection and Defense, 2.3.
                  - 6.3.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08102},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1492},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/CarleDKKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/CarleDKKKL08,
  author       = {Georg Carle and
                  Falko Dressler and
                  Richard A. Kemmerer and
                  Hartmut K{\"{o}}nig and
                  Christopher Kruegel and
                  Pavel Laskov},
  editor       = {Georg Carle and
                  Falko Dressler and
                  Richard A. Kemmerer and
                  Hartmut K{\"{o}}nig and
                  Christopher Kruegel},
  title        = {08102 Manifesto -- Perspectives Workshop: Network Attack Detection
                  and Defense},
  booktitle    = {Perspectives Workshop: Network Attack Detection and Defense, 2.3.
                  - 6.3.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08102},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1491},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/CarleDKKKL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/DacierDHKKKRS08,
  author       = {Marc Dacier and
                  Herv{\'{e}} Debar and
                  Thorsten Holz and
                  Engin Kirda and
                  Jan Kohlrausch and
                  Christopher Kruegel and
                  Konrad Rieck and
                  James P. G. Sterbenz},
  editor       = {Georg Carle and
                  Falko Dressler and
                  Richard A. Kemmerer and
                  Hartmut K{\"{o}}nig and
                  Christopher Kruegel},
  title        = {8102 Working Group -- Attack Taxonomy},
  booktitle    = {Perspectives Workshop: Network Attack Detection and Defense, 2.3.
                  - 6.3.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08102},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1495},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/DacierDHKKKRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KlinkoffKKV07,
  author       = {Patrick Klinkoff and
                  Engin Kirda and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Extending .NET security to unmanaged code},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {6},
  pages        = {417--428},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0031-0},
  doi          = {10.1007/S10207-007-0031-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KlinkoffKKV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KruegelBRV07,
  author       = {Christopher Kruegel and
                  Davide Balzarotti and
                  William K. Robertson and
                  Giovanni Vigna},
  title        = {Improving Signature Testing through Dynamic Data Flow Analysis},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {53--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.40},
  doi          = {10.1109/ACSAC.2007.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KruegelBRV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SzydlowskiKK07,
  author       = {Martin Szydlowski and
                  Christopher Kruegel and
                  Engin Kirda},
  title        = {Secure Input for Web Applications},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {375--384},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.28},
  doi          = {10.1109/ACSAC.2007.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SzydlowskiKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MoserKK07,
  author       = {Andreas Moser and
                  Christopher Kruegel and
                  Engin Kirda},
  title        = {Limits of Static Analysis for Malware Detection},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {421--430},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.21},
  doi          = {10.1109/ACSAC.2007.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MoserKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YinSEKK07,
  author       = {Heng Yin and
                  Dawn Xiaodong Song and
                  Manuel Egele and
                  Christopher Kruegel and
                  Engin Kirda},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Panorama: capturing system-wide information flow for malware detection
                  and analysis},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {116--127},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315261},
  doi          = {10.1145/1315245.1315261},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YinSEKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/LudlMKK07,
  author       = {Christian Ludl and
                  Sean McAllister and
                  Engin Kirda and
                  Christopher Kruegel},
  editor       = {Bernhard M. H{\"{a}}mmerli and
                  Robin Sommer},
  title        = {On the Effectiveness of Techniques to Detect Phishing Sites},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  4th International Conference, {DIMVA} 2007, Lucerne, Switzerland,
                  July 12-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4579},
  pages        = {20--39},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73614-1\_2},
  doi          = {10.1007/978-3-540-73614-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/LudlMKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/RaffetsederKK07,
  author       = {Thomas Raffetseder and
                  Engin Kirda and
                  Christopher Kruegel},
  title        = {Building Anti-Phishing Browser Plug-Ins: An Experience Report},
  booktitle    = {Third International Workshop on Software Engineering for Secure Systems,
                  {SESS} 2007, Minneapolis, MN, USA, May 20-26, 2007},
  pages        = {6},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SESS.2007.6},
  doi          = {10.1109/SESS.2007.6},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/RaffetsederKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/RaffetsederKK07,
  author       = {Thomas Raffetseder and
                  Christopher Kr{\"{u}}gel and
                  Engin Kirda},
  editor       = {Juan A. Garay and
                  Arjen K. Lenstra and
                  Masahiro Mambo and
                  Ren{\'{e}} Peralta},
  title        = {Detecting System Emulators},
  booktitle    = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so,
                  Chile, October 9-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4779},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75496-1\_1},
  doi          = {10.1007/978-3-540-75496-1\_1},
  timestamp    = {Fri, 03 Feb 2023 21:39:19 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/RaffetsederKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/VogtNJKKV07,
  author       = {Philipp Vogt and
                  Florian Nentwich and
                  Nenad Jovanovic and
                  Engin Kirda and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna},
  title        = {Cross Site Scripting Prevention with Dynamic Data Tainting and Static
                  Analysis},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March
                  2007},
  publisher    = {The Internet Society},
  year         = {2007},
  url          = {https://www.ndss-symposium.org/ndss2007/cross-site-scripting-prevention-dynamic-data-tainting-and-static-analysis/},
  timestamp    = {Mon, 01 Feb 2021 08:42:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/VogtNJKKV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/RosielloKKF07,
  author       = {Angelo P. E. Rosiello and
                  Engin Kirda and
                  Christopher Kruegel and
                  Fabrizio Ferrandi},
  title        = {A layout-similarity-based approach for detecting phishing pages},
  booktitle    = {Third International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September,
                  2007},
  pages        = {454--463},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/SECCOM.2007.4550367},
  doi          = {10.1109/SECCOM.2007.4550367},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/RosielloKKF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/ChristodorescuJK07,
  author       = {Mihai Christodorescu and
                  Somesh Jha and
                  Christopher Kruegel},
  editor       = {Ivica Crnkovic and
                  Antonia Bertolino},
  title        = {Mining specifications of malicious behavior},
  booktitle    = {Proceedings of the 6th joint meeting of the European Software Engineering
                  Conference and the {ACM} {SIGSOFT} International Symposium on Foundations
                  of Software Engineering, 2007, Dubrovnik, Croatia, September 3-7,
                  2007},
  pages        = {5--14},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1287624.1287628},
  doi          = {10.1145/1287624.1287628},
  timestamp    = {Tue, 01 Feb 2022 10:45:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/ChristodorescuJK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MoserKK07,
  author       = {Andreas Moser and
                  Christopher Kr{\"{u}}gel and
                  Engin Kirda},
  title        = {Exploring Multiple Execution Paths for Malware Analysis},
  booktitle    = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23
                  May 2007, Oakland, California, {USA}},
  pages        = {231--245},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SP.2007.17},
  doi          = {10.1109/SP.2007.17},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MoserKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/EgeleKKYS07,
  author       = {Manuel Egele and
                  Christopher Kruegel and
                  Engin Kirda and
                  Heng Yin and
                  Dawn Xiaodong Song},
  editor       = {Jeff Chase and
                  Srinivasan Seshan},
  title        = {Dynamic Spyware Analysis},
  booktitle    = {Proceedings of the 2007 {USENIX} Annual Technical Conference, Santa
                  Clara, CA, USA, June 17-22, 2007},
  pages        = {233--246},
  publisher    = {{USENIX}},
  year         = {2007},
  url          = {http://www.usenix.org/events/usenix07/tech/egele.html},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/EgeleKKYS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/KarlbergerBKK07,
  author       = {Christoph Karlberger and
                  G{\"{u}}nther Bayler and
                  Christopher Kruegel and
                  Engin Kirda},
  editor       = {Dan Boneh and
                  Tal Garfinkel and
                  Dug Song},
  title        = {Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam
                  Filters},
  booktitle    = {First {USENIX} Workshop on Offensive Technologies, {WOOT} '07, Boston,
                  MA, USA, August 6, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/woot-07/exploiting-redundancy-natural-language-penetrate-bayesian-spam-filters},
  timestamp    = {Mon, 01 Feb 2021 08:41:52 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/KarlbergerBKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Kruegel07,
  author       = {Christopher Kruegel},
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {Behavioral and Structural Properties of Malicious Code},
  booktitle    = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  pages        = {63--83},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1\_4},
  doi          = {10.1007/978-0-387-44599-1\_4},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Kruegel07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2007,
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0},
  doi          = {10.1007/978-3-540-74320-0},
  isbn         = {978-3-540-74319-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/KirdaK06,
  author       = {Engin Kirda and
                  Christopher Kr{\"{u}}gel},
  title        = {Protecting Users against Phishing Attacks},
  journal      = {Comput. J.},
  volume       = {49},
  number       = {5},
  pages        = {554--561},
  year         = {2006},
  url          = {https://doi.org/10.1093/comjnl/bxh169},
  doi          = {10.1093/COMJNL/BXH169},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/KirdaK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MutzVVK06,
  author       = {Darren Mutz and
                  Fredrik Valeur and
                  Giovanni Vigna and
                  Christopher Kr{\"{u}}gel},
  title        = {Anomalous system call detection},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {61--93},
  year         = {2006},
  url          = {https://doi.org/10.1145/1127345.1127348},
  doi          = {10.1145/1127345.1127348},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MutzVVK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/BayerMKK06,
  author       = {Ulrich Bayer and
                  Andreas Moser and
                  Christopher Kr{\"{u}}gel and
                  Engin Kirda},
  title        = {Dynamic Analysis of Malicious Code},
  journal      = {J. Comput. Virol.},
  volume       = {2},
  number       = {1},
  pages        = {67--77},
  year         = {2006},
  url          = {https://doi.org/10.1007/s11416-006-0012-2},
  doi          = {10.1007/S11416-006-0012-2},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/BayerMKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/EgeleSKK06,
  author       = {Manuel Egele and
                  Martin Szydlowski and
                  Engin Kirda and
                  Christopher Kr{\"{u}}gel},
  editor       = {Roland B{\"{u}}schkes and
                  Pavel Laskov},
  title        = {Using Static Program Analysis to Aid Intrusion Detection},
  booktitle    = {Detection of Intrusions and Malware {\&} Vulnerability Assessment,
                  Third International Conference, {DIMVA} 2006, Berlin, Germany, July
                  13-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4064},
  pages        = {17--36},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11790754\_2},
  doi          = {10.1007/11790754\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/EgeleSKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KlinkoffKKV06,
  author       = {Patrick Klinkoff and
                  Christopher Kr{\"{u}}gel and
                  Engin Kirda and
                  Giovanni Vigna},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {Extending .NET Security to Unmanaged Code},
  booktitle    = {Information Security, 9th International Conference, {ISC} 2006, Samos
                  Island, Greece, August 30 - September 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4176},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11836810\_1},
  doi          = {10.1007/11836810\_1},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KlinkoffKKV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/RobertsonVKK06,
  author       = {William K. Robertson and
                  Giovanni Vigna and
                  Christopher Kr{\"{u}}gel and
                  Richard A. Kemmerer},
  title        = {Using Generalization and Characterization Techniques in the Anomaly-based
                  Detection of Web Attacks},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2006, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2006},
  url          = {https://www.ndss-symposium.org/ndss2006/using-generalization-and-characterization-techniques-anomaly-based-detection-web-attacks/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/RobertsonVKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/JovanovicKK06,
  author       = {Nenad Jovanovic and
                  Christopher Kruegel and
                  Engin Kirda},
  editor       = {Vugranam C. Sreedhar and
                  Steve Zdancewic},
  title        = {Precise alias analysis for static detection of web application vulnerabilities},
  booktitle    = {Proceedings of the 2006 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2006, Ottawa, Ontario, Canada, June 10, 2006},
  pages        = {27--36},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1134744.1134751},
  doi          = {10.1145/1134744.1134751},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/JovanovicKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/KirdaKVJ06,
  author       = {Engin Kirda and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna and
                  Nenad Jovanovic},
  editor       = {Hisham Haddad},
  title        = {Noxes: a client-side solution for mitigating cross-site scripting
                  attacks},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC),
                  Dijon, France, April 23-27, 2006},
  pages        = {330--337},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1141277.1141357},
  doi          = {10.1145/1141277.1141357},
  timestamp    = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/KirdaKVJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ValeurVKK06,
  author       = {Fredrik Valeur and
                  Giovanni Vigna and
                  Christopher Kr{\"{u}}gel and
                  Engin Kirda},
  editor       = {Hisham Haddad},
  title        = {An anomaly-driven reverse proxy for web applications},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC),
                  Dijon, France, April 23-27, 2006},
  pages        = {361--368},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1141277.1141361},
  doi          = {10.1145/1141277.1141361},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/ValeurVKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/JovanovicKK06,
  author       = {Nenad Jovanovic and
                  Engin Kirda and
                  Christopher Kruegel},
  title        = {Preventing Cross Site Request Forgery Attacks},
  booktitle    = {Second International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
                  2, 2006 - September 1, 2006},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/SECCOMW.2006.359531},
  doi          = {10.1109/SECCOMW.2006.359531},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/JovanovicKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JovanovicKK06,
  author       = {Nenad Jovanovic and
                  Christopher Kr{\"{u}}gel and
                  Engin Kirda},
  title        = {Pixy: {A} Static Analysis Tool for Detecting Web Application Vulnerabilities
                  (Short Paper)},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {258--263},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.29},
  doi          = {10.1109/SP.2006.29},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/JovanovicKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KirdaK06,
  author       = {Engin Kirda and
                  Christopher Kruegel},
  editor       = {Angelos D. Keromytis},
  title        = {Behavior-based Spyware Detection},
  booktitle    = {Proceedings of the 15th {USENIX} Security Symposium, Vancouver, BC,
                  Canada, July 31 - August 4, 2006},
  publisher    = {{USENIX} Association},
  year         = {2006},
  url          = {https://www.usenix.org/conference/15th-usenix-security-symposium/behavior-based-spyware-detection},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KirdaK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/KalsKKJ06,
  author       = {Stefan Kals and
                  Engin Kirda and
                  Christopher Kr{\"{u}}gel and
                  Nenad Jovanovic},
  editor       = {Les Carr and
                  David De Roure and
                  Arun Iyengar and
                  Carole A. Goble and
                  Michael Dahlin},
  title        = {SecuBat: a web vulnerability scanner},
  booktitle    = {Proceedings of the 15th international conference on World Wide Web,
                  {WWW} 2006, Edinburgh, Scotland, UK, May 23-26, 2006},
  pages        = {247--256},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1135777.1135817},
  doi          = {10.1145/1135777.1135817},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/KalsKKJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2006,
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214},
  doi          = {10.1007/11856214},
  isbn         = {3-540-39723-X},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/KruegelVV05,
  author       = {Christopher Kruegel and
                  Fredrik Valeur and
                  Giovanni Vigna},
  title        = {Intrusion Detection and Correlation - Challenges and Solutions},
  series       = {Advances in Information Security},
  volume       = {14},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b101493},
  doi          = {10.1007/B101493},
  isbn         = {978-0-387-23398-7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/KruegelVV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/KrugelVR05,
  author       = {Christopher Kr{\"{u}}gel and
                  Giovanni Vigna and
                  William K. Robertson},
  title        = {A multi-model approach to the detection of web-based attacks},
  journal      = {Comput. Networks},
  volume       = {48},
  number       = {5},
  pages        = {717--738},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.comnet.2005.01.009},
  doi          = {10.1016/J.COMNET.2005.01.009},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/KrugelVR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/KirdaK05,
  author       = {Engin Kirda and
                  Christopher Kr{\"{u}}gel},
  title        = {Protecting Users Against Phishing Attacks with AntiPhish},
  booktitle    = {29th Annual International Computer Software and Applications Conference,
                  {COMPSAC} 2005, Edinburgh, Scotland, UK, July 25-28, 2005. Volume
                  1},
  pages        = {517--524},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/COMPSAC.2005.126},
  doi          = {10.1109/COMPSAC.2005.126},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/KirdaK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KrugelKMRV05,
  author       = {Christopher Kr{\"{u}}gel and
                  Engin Kirda and
                  Darren Mutz and
                  William K. Robertson and
                  Giovanni Vigna},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {Polymorphic Worm Detection Using Structural Information of Executables},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {207--226},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_11},
  doi          = {10.1007/11663812\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KrugelKMRV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KruegelKMRV05,
  author       = {Christopher Kruegel and
                  Engin Kirda and
                  Darren Mutz and
                  William K. Robertson and
                  Giovanni Vigna},
  editor       = {Patrick D. McDaniel},
  title        = {Automating Mimicry Attacks Using Static Binary Analysis},
  booktitle    = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD,
                  USA, July 31 - August 5, 2005},
  publisher    = {{USENIX} Association},
  year         = {2005},
  url          = {https://www.usenix.org/conference/14th-usenix-security-symposium/automating-mimicry-attacks-using-static-binary-analysis},
  timestamp    = {Mon, 01 Feb 2021 08:42:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KruegelKMRV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/crc/IIR2005/Kruegel05,
  author       = {Christopher Kr{\"{u}}gel},
  editor       = {Richard Zurawski},
  title        = {Network Security and Secure Applications},
  booktitle    = {The Industrial Information Technology Handbook},
  pages        = {1--13},
  publisher    = {{CRC} Press},
  year         = {2005},
  timestamp    = {Fri, 22 Apr 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/crc/IIR2005/Kruegel05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimva/2005,
  editor       = {Klaus Julisch and
                  Christopher Kr{\"{u}}gel},
  title        = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  Second International Conference, {DIMVA} 2005, Vienna, Austria, July
                  7-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3548},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b137798},
  doi          = {10.1007/B137798},
  isbn         = {3-540-26613-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pik/KruegelRV04,
  author       = {Christopher Kruegel and
                  William K. Robertson and
                  Giovanni Vigna},
  title        = {Using Alert Verification to Identify Successful Intrusion Attempts},
  journal      = {Prax. Inf.verarb. Kommun.},
  volume       = {27},
  number       = {4},
  pages        = {219--227},
  year         = {2004},
  url          = {https://doi.org/10.1515/PIKO.2004.219},
  doi          = {10.1515/PIKO.2004.219},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pik/KruegelRV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ValeurVKK04,
  author       = {Fredrik Valeur and
                  Giovanni Vigna and
                  Christopher Kr{\"{u}}gel and
                  Richard A. Kemmerer},
  title        = {A Comprehensive Approach to Intrusion Detection Alert Correlation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {1},
  number       = {3},
  pages        = {146--169},
  year         = {2004},
  url          = {https://doi.org/10.1109/TDSC.2004.21},
  doi          = {10.1109/TDSC.2004.21},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ValeurVKK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KrugelRV04,
  author       = {Christopher Kr{\"{u}}gel and
                  William K. Robertson and
                  Giovanni Vigna},
  title        = {Detecting Kernel-Level Rootkits Through Binary Analysis},
  booktitle    = {20th Annual Computer Security Applications Conference {(ACSAC} 2004),
                  6-10 December 2004, Tucson, AZ, {USA}},
  pages        = {91--100},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CSAC.2004.19},
  doi          = {10.1109/CSAC.2004.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KrugelRV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/KruegelR04,
  author       = {Christopher Kr{\"{u}}gel and
                  William K. Robertson},
  editor       = {Ulrich Flegel and
                  Michael Meier},
  title        = {Alert Verification Determining the Success of Intrusion Attempts},
  booktitle    = {Detection of Intrusions and Malware {\&} Vulnerability Assessment,
                  {GI} {SIG} {SIDAR} Workshop, {DIMVA} 2004, Dortmund, Germany, July
                  6.7, 2004, Proceedings},
  series       = {{LNI}},
  volume       = {{P-46}},
  pages        = {25--38},
  publisher    = {{GI}},
  year         = {2004},
  url          = {https://dl.gi.de/handle/20.500.12116/29204},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/KruegelR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KruegelRVV04,
  author       = {Christopher Kr{\"{u}}gel and
                  William K. Robertson and
                  Fredrik Valeur and
                  Giovanni Vigna},
  editor       = {Matt Blaze},
  title        = {Static Disassembly of Obfuscated Binaries},
  booktitle    = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13,
                  2004, San Diego, CA, {USA}},
  pages        = {255--270},
  publisher    = {{USENIX}},
  year         = {2004},
  url          = {http://www.usenix.org/publications/library/proceedings/sec04/tech/kruegel.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KruegelRVV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KruegelMRV03,
  author       = {Christopher Kr{\"{u}}gel and
                  Darren Mutz and
                  William K. Robertson and
                  Fredrik Valeur},
  title        = {Bayesian Event Classification for Intrusion Detection},
  booktitle    = {19th Annual Computer Security Applications Conference {(ACSAC} 2003),
                  8-12 December 2003, Las Vegas, NV, {USA}},
  pages        = {14--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CSAC.2003.1254306},
  doi          = {10.1109/CSAC.2003.1254306},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KruegelMRV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KrugelV03,
  author       = {Christopher Kr{\"{u}}gel and
                  Giovanni Vigna},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {Anomaly detection of web-based attacks},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {251--261},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948144},
  doi          = {10.1145/948109.948144},
  timestamp    = {Tue, 10 Nov 2020 20:00:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KrugelV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KruegelMVV03,
  author       = {Christopher Kr{\"{u}}gel and
                  Darren Mutz and
                  Fredrik Valeur and
                  Giovanni Vigna},
  editor       = {Einar Snekkenes and
                  Dieter Gollmann},
  title        = {On the Detection of Anomalous System Call Arguments},
  booktitle    = {Computer Security - {ESORICS} 2003, 8th European Symposium on Research
                  in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2808},
  pages        = {326--343},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39650-5\_19},
  doi          = {10.1007/978-3-540-39650-5\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KruegelMVV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euromicro/KirdaKKK03,
  author       = {Engin Kirda and
                  Clemens Kerer and
                  Christopher Kr{\"{u}}gel and
                  Roman Kurmanowytsch},
  title        = {Web Service Engineering with {DIWE}},
  booktitle    = {29th {EUROMICRO} Conference 2003, New Waves in System Architecture,
                  3-5 September 2003, Belek-Antalya, Turkey},
  pages        = {283--290},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/EURMIC.2003.1231603},
  doi          = {10.1109/EURMIC.2003.1231603},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euromicro/KirdaKKK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/RobertsonKMV03,
  author       = {William K. Robertson and
                  Christopher Kr{\"{u}}gel and
                  Darren Mutz and
                  Fredrik Valeur},
  editor       = {{\AE}leen Frisch},
  title        = {Run-time Detection of Heap-based Overflows},
  booktitle    = {Proceedings of the 17th Conference on Systems Administration {(LISA}
                  2003), San Diego, California, USA, October 26-31, 2003},
  pages        = {51--60},
  publisher    = {{USENIX}},
  year         = {2003},
  url          = {http://www.usenix.org/publications/library/proceedings/lisa03/tech/robertson.html},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lisa/RobertsonKMV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KruegelMRV03,
  author       = {Christopher Kr{\"{u}}gel and
                  Darren Mutz and
                  William K. Robertson and
                  Fredrik Valeur},
  editor       = {Giovanni Vigna and
                  Erland Jonsson and
                  Christopher Kr{\"{u}}gel},
  title        = {Topology-Based Detection of Anomalous {BGP} Messages},
  booktitle    = {Recent Advances in Intrusion Detection, 6th International Symposium,
                  {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2820},
  pages        = {17--35},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45248-5\_2},
  doi          = {10.1007/978-3-540-45248-5\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KruegelMRV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KruegelT03,
  author       = {Christopher Kr{\"{u}}gel and
                  Thomas Toth},
  editor       = {Giovanni Vigna and
                  Erland Jonsson and
                  Christopher Kr{\"{u}}gel},
  title        = {Using Decision Trees to Improve Signature-Based Intrusion Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 6th International Symposium,
                  {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2820},
  pages        = {173--191},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45248-5\_10},
  doi          = {10.1007/978-3-540-45248-5\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KruegelT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2003,
  editor       = {Giovanni Vigna and
                  Erland Jonsson and
                  Christopher Kr{\"{u}}gel},
  title        = {Recent Advances in Intrusion Detection, 6th International Symposium,
                  {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2820},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/b13476},
  doi          = {10.1007/B13476},
  isbn         = {3-540-40878-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TothK02,
  author       = {Thomas Toth and
                  Christopher Kr{\"{u}}gel},
  title        = {Evaluating the Impact of Automated Intrusion Response Mechanisms},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {301--310},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176302},
  doi          = {10.1109/CSAC.2002.1176302},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/TothK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infrasec/FenkamGJK02,
  author       = {Pascal Fenkam and
                  Harald C. Gall and
                  Mehdi Jazayeri and
                  Christopher Kr{\"{u}}gel},
  editor       = {George I. Davida and
                  Yair Frankel and
                  Owen Rees},
  title        = {{DPS} : An Architectural Style for Development of Secure Software},
  booktitle    = {Infrastructure Security, International Conference, InfraSec 2002 Bristol,
                  UK, October 1-3, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2437},
  pages        = {180--198},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45831-X\_13},
  doi          = {10.1007/3-540-45831-X\_13},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/infrasec/FenkamGJK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/KruegelT02,
  author       = {Christopher Kr{\"{u}}gel and
                  Thomas Toth},
  title        = {Distributed Pattern Detection for Intrusion Detection},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2002, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2002},
  url          = {https://www.ndss-symposium.org/ndss2002/distributed-pattern-detection-intrusion-detection/},
  timestamp    = {Mon, 01 Feb 2021 08:42:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/KruegelT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/KererKK02,
  author       = {Clemens Kerer and
                  Engin Kirda and
                  Christopher Kr{\"{u}}gel},
  editor       = {Enrico Gregori and
                  Ludmila Cherkasova and
                  Gianpaolo Cugola and
                  Fabio Panzieri and
                  Gian Pietro Picco},
  title        = {XGuide - {A} Practical Guide to XML-Based Web Engineering},
  booktitle    = {Web Engineering and Peer-to-Peer Computing, {NETWORKING} 2002 Workshops,
                  Pisa, Italy, May 19-24, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2376},
  pages        = {104--117},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45745-3\_9},
  doi          = {10.1007/3-540-45745-3\_9},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/KererKK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TothK02,
  author       = {Thomas Toth and
                  Christopher Kr{\"{u}}gel},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {Accurate Buffer Overflow Detection via Abstract Payload Execution},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {274--291},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_15},
  doi          = {10.1007/3-540-36084-0\_15},
  timestamp    = {Sat, 07 Sep 2019 11:59:24 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TothK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/KrugelTK02,
  author       = {Christopher Kr{\"{u}}gel and
                  Thomas Toth and
                  Engin Kirda},
  editor       = {Gary B. Lamont and
                  Hisham Haddad and
                  George A. Papadopoulos and
                  Brajendra Panda},
  title        = {Service specific anomaly detection for network intrusion detection},
  booktitle    = {Proceedings of the 2002 {ACM} Symposium on Applied Computing (SAC),
                  March 10-14, 2002, Madrid, Spain},
  pages        = {201--208},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/508791.508835},
  doi          = {10.1145/508791.508835},
  timestamp    = {Tue, 06 Nov 2018 11:06:47 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/KrugelTK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KrugelVVK02,
  author       = {Christopher Kr{\"{u}}gel and
                  Fredrik Valeur and
                  Giovanni Vigna and
                  Richard A. Kemmerer},
  title        = {Stateful Intrusion Detection for High-Speed Networks},
  booktitle    = {2002 {IEEE} Symposium on Security and Privacy, Berkeley, California,
                  USA, May 12-15, 2002},
  pages        = {285--293},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/SECPRI.2002.1004378},
  doi          = {10.1109/SECPRI.2002.1004378},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KrugelVVK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KrugelTK01,
  author       = {Christopher Kr{\"{u}}gel and
                  Thomas Toth and
                  Clemens Kerer},
  editor       = {Kwangjo Kim},
  title        = {Decentralized Event Correlation for Intrusion Detection},
  booktitle    = {Information Security and Cryptology - {ICISC} 2001, 4th International
                  Conference Seoul, Korea, December 6-7, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2288},
  pages        = {114--131},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45861-1\_10},
  doi          = {10.1007/3-540-45861-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KrugelTK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsec/KrugelTK01,
  author       = {Christopher Kr{\"{u}}gel and
                  Thomas Toth and
                  Engin Kirda},
  editor       = {Bart De Decker and
                  Frank Piessens and
                  Jan Smits and
                  Els Van Herreweghen},
  title        = {SPARTA, a Mobile Agent Based Instrusion Detection System},
  booktitle    = {Advances in Network and Distributed Systems Security, {IFIP} {TC11}
                  {WG11.4} First Annual Working Conference on Network Security, November
                  26-27, 2001, Leuven, Belgium},
  series       = {{IFIP} Conference Proceedings},
  volume       = {206},
  pages        = {187--198},
  publisher    = {Kluwer},
  year         = {2001},
  url          = {https://doi.org/10.1007/0-306-46958-8\_13},
  doi          = {10.1007/0-306-46958-8\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netsec/KrugelTK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/KirdaKJK01,
  author       = {Engin Kirda and
                  Clemens Kerer and
                  Mehdi Jazayeri and
                  Christopher Kr{\"{u}}gel},
  title        = {Supporting Multi-Device Enabled Web Services: Challenges and Open
                  Problems},
  booktitle    = {10th {IEEE} International Workshops on Enabling Technologies: Infrastructure
                  for Collaborative Enterprises {(WETICE} 2001), 20-22 June 2001, Cambridge,
                  MA, {USA}},
  pages        = {49--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ENABL.2001.953387},
  doi          = {10.1109/ENABL.2001.953387},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wetice/KirdaKJK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jit/KastnerKR99,
  author       = {Wolfgang Kastner and
                  Christopher Kr{\"{u}}gel and
                  Heinrich Reiter},
  editor       = {Clemens H. Cap},
  title        = {Jini - ein guter Geist f{\"{u}}r die Geb{\"{a}}udesystemtechnik},
  booktitle    = {{JIT} '99, Java-Informations-Tage 1999, D{\"{u}}sseldorf 20./21.
                  September 1999},
  series       = {Informatik Aktuell},
  pages        = {213--222},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-642-60247-4\_20},
  doi          = {10.1007/978-3-642-60247-4\_20},
  timestamp    = {Tue, 25 Jun 2019 12:38:54 +0200},
  biburl       = {https://dblp.org/rec/conf/jit/KastnerKR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics