Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Christopher Krügel
@inproceedings{DBLP:conf/eurosp/PletinckxNFKV23, author = {Stijn Pletinckx and Thanh{-}Dat Nguyen and Tobias Fiebig and Christopher Kruegel and Giovanni Vigna}, title = {Certifiably Vulnerable: Using Certificate Transparency Logs for Target Reconnaissance}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {817--831}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00053}, doi = {10.1109/EUROSP57164.2023.00053}, timestamp = {Mon, 07 Aug 2023 15:56:23 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/PletinckxNFKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/BoseDVMGCBKV23, author = {Priyanka Bose and Dipanjan Das and Saastha Vasan and Sebastiano Mariani and Ilya Grishchenko and Andrea Continella and Antonio Bianchi and Christopher Kruegel and Giovanni Vigna}, title = {Columbus: Android App Testing Through Systematic Callback Exploration}, booktitle = {45th {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2023, Melbourne, Australia, May 14-20, 2023}, pages = {1381--1392}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICSE48619.2023.00121}, doi = {10.1109/ICSE48619.2023.00121}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/BoseDVMGCBKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GustafsonGRJC0F23, author = {Eric Gustafson and Paul Grosen and Nilo Redini and Saagar Jha and Andrea Continella and Ruoyu Wang and Kevin Fu and Sara Rampazzi and Christopher Kruegel and Giovanni Vigna}, title = {Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {32--45}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607217}, doi = {10.1145/3607199.3607217}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GustafsonGRJC0F23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SpahnHHKV23, author = {Noah Spahn and Nils Hanke and Thorsten Holz and Christopher Kruegel and Giovanni Vigna}, title = {Container Orchestration Honeypot: Observing Attacks in the Wild}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {381--396}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607205}, doi = {10.1145/3607199.3607205}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SpahnHHKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BuschMSVKP23, author = {Marcel Busch and Aravind Machiry and Chad Spensky and Giovanni Vigna and Christopher Kruegel and Mathias Payer}, title = {TEEzz: Fuzzing Trusted Applications on {COTS} Android Devices}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {1204--1219}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179302}, doi = {10.1109/SP46215.2023.10179302}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/BuschMSVKP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/TrickelPZDVKWBSD23, author = {Erik Trickel and Fabio Pagani and Chang Zhu and Lukas Dresel and Giovanni Vigna and Christopher Kruegel and Ruoyu Wang and Tiffany Bao and Yan Shoshitaishvili and Adam Doup{\'{e}}}, title = {Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect {SQL} and Command Injection Vulnerabilities}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {2658--2675}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179317}, doi = {10.1109/SP46215.2023.10179317}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/TrickelPZDVKWBSD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GrittiRMB0GKV23, author = {Fabio Gritti and Nicola Ruaro and Robert McLaughlin and Priyanka Bose and Dipanjan Das and Ilya Grishchenko and Christopher Kruegel and Giovanni Vigna}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart Contracts}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {1793--1810}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/gritti}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/GrittiRMB0GKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/McLaughlinKV23, author = {Robert McLaughlin and Christopher Kruegel and Giovanni Vigna}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {A Large Scale Study of the Ethereum Arbitrage Ecosystem}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {3295--3312}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/mclaughlin}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/McLaughlinKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Fleischer0BBLPK23, author = {Marius Fleischer and Dipanjan Das and Priyanka Bose and Weiheng Bai and Kangjie Lu and Mathias Payer and Christopher Kruegel and Giovanni Vigna}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {{ACTOR:} Action-Guided Kernel Fuzzing}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5003--5020}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/fleischer}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Fleischer0BBLPK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-02344, author = {Hojjat Aghakhani and Wei Dai and Andre Manoel and Xavier Fernandes and Anant Kharkar and Christopher Kruegel and Giovanni Vigna and David Evans and Ben Zorn and Robert Sim}, title = {TrojanPuzzle: Covertly Poisoning Code-Suggestion Models}, journal = {CoRR}, volume = {abs/2301.02344}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.02344}, doi = {10.48550/ARXIV.2301.02344}, eprinttype = {arXiv}, eprint = {2301.02344}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-02344.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-09806, author = {Sayak Saha Roy and Dipanjan Das and Priyanka Bose and Christopher Kruegel and Giovanni Vigna and Shirin Nilizadeh}, title = {Demystifying {NFT} Promotion and Phishing Scams}, journal = {CoRR}, volume = {abs/2301.09806}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.09806}, doi = {10.48550/ARXIV.2301.09806}, eprinttype = {arXiv}, eprint = {2301.09806}, timestamp = {Thu, 26 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-09806.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-09116, author = {Priyanka Bose and Dipanjan Das and Saastha Vasan and Sebastiano Mariani and Ilya Grishchenko and Andrea Continella and Antonio Bianchi and Christopher Kruegel and Giovanni Vigna}, title = {Columbus: Android App Testing Through Systematic Callback Exploration}, journal = {CoRR}, volume = {abs/2302.09116}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.09116}, doi = {10.48550/ARXIV.2302.09116}, eprinttype = {arXiv}, eprint = {2302.09116}, timestamp = {Thu, 23 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-09116.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-02103, author = {Christopher Salls and Chani Jindal and Jake Corina and Christopher Kruegel and Giovanni Vigna}, title = {Token-Level Fuzzing}, journal = {CoRR}, volume = {abs/2304.02103}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.02103}, doi = {10.48550/ARXIV.2304.02103}, eprinttype = {arXiv}, eprint = {2304.02103}, timestamp = {Mon, 17 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-02103.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-06844, author = {Priyanka Bose and Dipanjan Das and Fabio Gritti and Nicola Ruaro and Christopher Kruegel and Giovanni Vigna}, title = {Exploiting Unfair Advantages: Investigating Opportunistic Trading in the {NFT} Market}, journal = {CoRR}, volume = {abs/2310.06844}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.06844}, doi = {10.48550/ARXIV.2310.06844}, eprinttype = {arXiv}, eprint = {2310.06844}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-06844.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HauserNSTRKV23, author = {Christophe Hauser and Shirin Nilizadeh and Yan Shoshitaishvili and Ni Trieu and Srivatsan Ravi and Christopher Kruegel and Giovanni Vigna}, title = {Street Rep: {A} Privacy-Preserving Reputation Aggregation System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1346}, year = {2023}, url = {https://eprint.iacr.org/2023/1346}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HauserNSTRKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GuptaDSVKK22, author = {Rajat Gupta and Lukas Patrick Dresel and Noah Spahn and Giovanni Vigna and Christopher Kruegel and Taesoo Kim}, title = {{POPKORN:} Popping Windows Kernel Drivers At Scale}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {854--868}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564631}, doi = {10.1145/3564625.3564631}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GuptaDSVKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0002BRKV22, author = {Dipanjan Das and Priyanka Bose and Nicola Ruaro and Christopher Kruegel and Giovanni Vigna}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Understanding Security Issues in the {NFT} Ecosystem}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {667--681}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3559342}, doi = {10.1145/3548606.3559342}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0002BRKV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/DasBMMSVK22, author = {Dipanjan Das and Priyanka Bose and Aravind Machiry and Sebastiano Mariani and Yan Shoshitaishvili and Giovanni Vigna and Christopher Kruegel}, editor = {Lorenzo Cavallaro and Daniel Gruss and Giancarlo Pellegrino and Giorgio Giacinto}, title = {Hybrid Pruning: Towards Precise Pointer and Taint Analysis}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 19th International Conference, {DIMVA} 2022, Cagliari, Italy, June 29 - July 1, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13358}, pages = {1--22}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09484-2\_1}, doi = {10.1007/978-3-031-09484-2\_1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/DasBMMSVK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Kruegel22, author = {Christopher Kruegel}, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {Looking for Signals: {A} Systems Security Perspective}, booktitle = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, pages = {3}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536.3533774}, doi = {10.1145/3531536.3533774}, timestamp = {Thu, 30 Jun 2022 17:02:33 +0200}, biburl = {https://dblp.org/rec/conf/ih/Kruegel22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Bose0C0KV22, author = {Priyanka Bose and Dipanjan Das and Yanju Chen and Yu Feng and Christopher Kruegel and Giovanni Vigna}, title = {{SAILFISH:} Vetting Smart Contract State-Inconsistency Bugs in Seconds}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {161--178}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833721}, doi = {10.1109/SP46214.2022.9833721}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Bose0C0KV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/EdeASBCCSPKV22, author = {Thijs van Ede and Hojjat Aghakhani and Noah Spahn and Riccardo Bortolameotti and Marco Cova and Andrea Continella and Maarten van Steen and Andreas Peter and Christopher Kruegel and Giovanni Vigna}, title = {{DEEPCASE:} Semi-Supervised Contextual Analysis of Security Events}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {522--539}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833671}, doi = {10.1109/SP46214.2022.9833671}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/EdeASBCCSPKV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RuaroPOKV22, author = {Nicola Ruaro and Fabio Pagani and Stefano Ortolani and Christopher Kruegel and Giovanni Vigna}, title = {{SYMBEXCEL:} Automated Analysis and Understanding of Malicious Excel 4.0 Macros}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {1066--1081}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833765}, doi = {10.1109/SP46214.2022.9833765}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/RuaroPOKV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GrittiPGDRKV22, author = {Fabio Gritti and Fabio Pagani and Ilya Grishchenko and Lukas Dresel and Nilo Redini and Christopher Kruegel and Giovanni Vigna}, title = {{HEAPSTER:} Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {1082--1099}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833610}, doi = {10.1109/SP46214.2022.9833610}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/GrittiPGDRKV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ScharnowskiBSGM22, author = {Tobias Scharnowski and Nils Bars and Moritz Schloegel and Eric Gustafson and Marius Muench and Giovanni Vigna and Christopher Kruegel and Thorsten Holz and Ali Abbasi}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Fuzzware: Using Precise {MMIO} Modeling for Effective Firmware Fuzzing}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {1239--1256}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/scharnowski}, timestamp = {Thu, 16 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ScharnowskiBSGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BurkPKV22, author = {Kevin Burk and Fabio Pagani and Christopher Kruegel and Giovanni Vigna}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Decomperson: How Humans Decompile and What We Can Learn From It}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {2765--2782}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/burk}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BurkPKV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/McLaughlinPSKV22, author = {Robert McLaughlin and Fabio Pagani and Noah Spahn and Christopher Kruegel and Giovanni Vigna}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Regulator: Dynamic Analysis to Detect ReDoS}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {4219--4235}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/mclaughlin}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/McLaughlinPSKV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BotacinAOKVOGG21, author = {Marcus Botacin and Hojjat Aghakhani and Stefano Ortolani and Christopher Kruegel and Giovanni Vigna and Daniela Oliveira and Paulo L{\'{\i}}cio de Geus and Andr{\'{e}} Gr{\'{e}}gio}, title = {One Size Does Not Fit All: {A} Longitudinal Analysis of Brazilian Financial Malware}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {2}, pages = {11:1--11:31}, year = {2021}, url = {https://doi.org/10.1145/3429741}, doi = {10.1145/3429741}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BotacinAOKVOGG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/SpenskyMRUFBOKV21, author = {Chad Spensky and Aravind Machiry and Nilo Redini and Colin Unger and Graham Foster and Evan Blasband and Hamed Okhravi and Christopher Kruegel and Giovanni Vigna}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {Conware: Automated Modeling of Hardware Peripherals}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {95--109}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3437532}, doi = {10.1145/3433210.3437532}, timestamp = {Wed, 09 Jun 2021 15:14:39 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/SpenskyMRUFBOKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/MengGMABCKV21, author = {Dongyu Meng and Michele Guerriero and Aravind Machiry and Hojjat Aghakhani and Priyanka Bose and Andrea Continella and Christopher Kruegel and Giovanni Vigna}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {731--743}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3453115}, doi = {10.1145/3433210.3453115}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiaccs/MengGMABCKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/QuartaIMFGBLVK21, author = {Davide Quarta and Michele Ianni and Aravind Machiry and Yanick Fratantonio and Eric Gustafson and Davide Balzarotti and Martina Lindorfer and Giovanni Vigna and Christopher Kruegel}, editor = {Christophe Hauser and Yonghwi Kwon and Sebastian Banescu}, title = {Tarnhelm: Isolated, Transparent {\&} Confidential Execution of Arbitrary Code in ARM's TrustZone}, booktitle = {Checkmate@CCS 2021, Proceedings of the Research on offensive and defensive techniques in the Context of Man At The End {(MATE)} Attacks, Virtual Event, Republic of Korea, 19 November 2021}, pages = {43--57}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3465413.3488571}, doi = {10.1145/3465413.3488571}, timestamp = {Tue, 23 Nov 2021 15:54:42 +0100}, biburl = {https://dblp.org/rec/conf/ccs/QuartaIMFGBLVK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/SpenskyMBOHGJKV21, author = {Chad Spensky and Aravind Machiry and Nathan Burow and Hamed Okhravi and Rick Housley and Zhongshu Gu and Hani Jamjoom and Christopher Kruegel and Giovanni Vigna}, title = {Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {400--412}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN48987.2021.00051}, doi = {10.1109/DSN48987.2021.00051}, timestamp = {Mon, 09 Aug 2021 14:50:25 +0200}, biburl = {https://dblp.org/rec/conf/dsn/SpenskyMBOHGJKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/AghakhaniMWKV21, author = {Hojjat Aghakhani and Dongyu Meng and Yu{-}Xiang Wang and Christopher Kruegel and Giovanni Vigna}, title = {Bullseye Polytope: {A} Scalable Clean-Label Poisoning Attack with Improved Transferability}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {159--178}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSP51992.2021.00021}, doi = {10.1109/EUROSP51992.2021.00021}, timestamp = {Thu, 11 Nov 2021 09:11:58 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/AghakhaniMWKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RuaroZDPBCZKV21, author = {Nicola Ruaro and Kyle Zeng and Lukas Dresel and Mario Polino and Tiffany Bao and Andrea Continella and Stefano Zanero and Christopher Kruegel and Giovanni Vigna}, editor = {Leyla Bilge and Tudor Dumitras}, title = {SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {456--468}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471865}, doi = {10.1145/3471621.3471865}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/RuaroZDPBCZKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RediniCDPSMBKV21, author = {Nilo Redini and Andrea Continella and Dipanjan Das and Giulio De Pasquale and Noah Spahn and Aravind Machiry and Antonio Bianchi and Christopher Kruegel and Giovanni Vigna}, title = {Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {484--500}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00066}, doi = {10.1109/SP40001.2021.00066}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/RediniCDPSMBKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SallsJCKV21, author = {Christopher Salls and Chani Jindal and Jake Corina and Christopher Kruegel and Giovanni Vigna}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Token-Level Fuzzing}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2795--2809}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/salls}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/SallsJCKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GargMCKV21, author = {Chinmay Garg and Aravind Machiry and Andrea Continella and Christopher Kruegel and Giovanni Vigna}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Toward a secure crowdsourced location tracking system}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {311--322}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467821}, doi = {10.1145/3448300.3467821}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/GargMCKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-08638, author = {Priyanka Bose and Dipanjan Das and Yanju Chen and Yu Feng and Christopher Kruegel and Giovanni Vigna}, title = {{SAILFISH:} Vetting Smart Contract State-Inconsistency Bugs in Seconds}, journal = {CoRR}, volume = {abs/2104.08638}, year = {2021}, url = {https://arxiv.org/abs/2104.08638}, eprinttype = {arXiv}, eprint = {2104.08638}, timestamp = {Mon, 28 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-08638.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-00217, author = {Chinmay Garg and Aravind Machiry and Andrea Continella and Christopher Kruegel and Giovanni Vigna}, title = {Toward a Secure Crowdsourced Location Tracking System}, journal = {CoRR}, volume = {abs/2106.00217}, year = {2021}, url = {https://arxiv.org/abs/2106.00217}, eprinttype = {arXiv}, eprint = {2106.00217}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-00217.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-08893, author = {Dipanjan Das and Priyanka Bose and Nicola Ruaro and Christopher Kruegel and Giovanni Vigna}, title = {Understanding Security Issues in the {NFT} Ecosystem}, journal = {CoRR}, volume = {abs/2111.08893}, year = {2021}, url = {https://arxiv.org/abs/2111.08893}, eprinttype = {arXiv}, eprint = {2111.08893}, timestamp = {Mon, 22 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-08893.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GrittiFGPCKV20, author = {Fabio Gritti and Lorenzo Fontana and Eric Gustafson and Fabio Pagani and Andrea Continella and Christopher Kruegel and Giovanni Vigna}, title = {{SYMBION:} Interleaving Symbolic with Concrete Execution}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--10}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162164}, doi = {10.1109/CNS48642.2020.9162164}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GrittiFGPCKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SallsMDSKV20, author = {Christopher Salls and Aravind Machiry and Adam Doup{\'{e}} and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, title = {Exploring Abstraction Functions in Fuzzing}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162273}, doi = {10.1109/CNS48642.2020.9162273}, timestamp = {Fri, 14 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SallsMDSKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SpenskyMBLHKV20, author = {Chad Spensky and Aravind Machiry and Marcel Busch and Kevin Leach and Rick Housley and Christopher Kruegel and Giovanni Vigna}, title = {{TRUST.IO:} Protecting Physical Interfaces on Cyber-physical Systems}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162246}, doi = {10.1109/CNS48642.2020.9162246}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SpenskyMBLHKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/BotacinBGGKV20, author = {Marcus Botacin and Giovanni Bert{\~{a}}o and Paulo L. de Geus and Andr{\'{e}} Gr{\'{e}}gio and Christopher Kruegel and Giovanni Vigna}, editor = {Cl{\'{e}}mentine Maurice and Leyla Bilge and Gianluca Stringhini and Nuno Neves}, title = {On the Security of Application Installers and Online Software Repositories}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 17th International Conference, {DIMVA} 2020, Lisbon, Portugal, June 24-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12223}, pages = {192--214}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-52683-2\_10}, doi = {10.1007/978-3-030-52683-2\_10}, timestamp = {Sun, 25 Jul 2021 11:49:24 +0200}, biburl = {https://dblp.org/rec/conf/dimva/BotacinBGGKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AghakhaniGMLOBV20, author = {Hojjat Aghakhani and Fabio Gritti and Francesco Mecca and Martina Lindorfer and Stefano Ortolani and Davide Balzarotti and Giovanni Vigna and Christopher Kruegel}, title = {When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/when-malware-is-packin-heat-limits-of-machine-learning-classifiers-based-on-static-analysis-features/}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/AghakhaniGMLOBV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TakahashiKVYI20, author = {Takeshi Takahashi and Christopher Kruegel and Giovanni Vigna and Katsunari Yoshioka and Daisuke Inoue}, editor = {Manuel Egele and Leyla Bilge}, title = {Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {93--106}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/takahashi}, timestamp = {Mon, 30 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TakahashiKVYI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RediniM0SCSKV20, author = {Nilo Redini and Aravind Machiry and Ruoyu Wang and Chad Spensky and Andrea Continella and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, title = {Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {1544--1561}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00036}, doi = {10.1109/SP40000.2020.00036}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/RediniM0SCSKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MachiryRCKV20, author = {Aravind Machiry and Nilo Redini and Eric Camellini and Christopher Kruegel and Giovanni Vigna}, title = {{SPIDER:} Enabling Fast Patch Propagation In Related Software Repositories}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {1562--1579}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00038}, doi = {10.1109/SP40000.2020.00038}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/MachiryRCKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ClementsGSGFKVB20, author = {Abraham A. Clements and Eric Gustafson and Tobias Scharnowski and Paul Grosen and David Fritz and Christopher Kruegel and Giovanni Vigna and Saurabh Bagchi and Mathias Payer}, editor = {Srdjan Capkun and Franziska Roesner}, title = {HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {1201--1218}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/clements}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/ClementsGSGFKVB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/Sanchez-RolaBKV20, author = {Iskander S{\'{a}}nchez{-}Rola and Davide Balzarotti and Christopher Kruegel and Giovanni Vigna and Igor Santos}, editor = {Yennun Huang and Irwin King and Tie{-}Yan Liu and Maarten van Steen}, title = {Dirty Clicks: {A} Study of the Usability and Security Implications of Click-related Behaviors on the Web}, booktitle = {{WWW} '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020}, pages = {395--406}, publisher = {{ACM} / {IW3C2}}, year = {2020}, url = {https://doi.org/10.1145/3366423.3380124}, doi = {10.1145/3366423.3380124}, timestamp = {Fri, 25 Dec 2020 01:14:58 +0100}, biburl = {https://dblp.org/rec/conf/www/Sanchez-RolaBKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-00191, author = {Hojjat Aghakhani and Dongyu Meng and Yu{-}Xiang Wang and Christopher Kruegel and Giovanni Vigna}, title = {Bullseye Polytope: {A} Scalable Clean-Label Poisoning Attack with Improved Transferability}, journal = {CoRR}, volume = {abs/2005.00191}, year = {2020}, url = {https://arxiv.org/abs/2005.00191}, eprinttype = {arXiv}, eprint = {2005.00191}, timestamp = {Thu, 30 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-00191.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-10682, author = {Hojjat Aghakhani and Thorsten Eisenhofer and Lea Sch{\"{o}}nherr and Dorothea Kolossa and Thorsten Holz and Christopher Kruegel and Giovanni Vigna}, title = {{VENOMAVE:} Clean-Label Poisoning Against Speech Recognition}, journal = {CoRR}, volume = {abs/2010.10682}, year = {2020}, url = {https://arxiv.org/abs/2010.10682}, eprinttype = {arXiv}, eprint = {2010.10682}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-10682.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HauserMS0VK19, author = {Christophe Hauser and Jayakrishna Menon and Yan Shoshitaishvili and Ruoyu Wang and Giovanni Vigna and Christopher Kruegel}, editor = {David Balenson}, title = {Sleak: automating address space layout derandomization}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {190--202}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359820}, doi = {10.1145/3359789.3359820}, timestamp = {Tue, 26 Nov 2019 09:46:34 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HauserMS0VK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JindalSALKV19, author = {Chani Jindal and Christopher Salls and Hojjat Aghakhani and Keith Long and Christopher Kruegel and Giovanni Vigna}, editor = {David Balenson}, title = {Neurlux: dynamic malware analysis without feature engineering}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {444--455}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359835}, doi = {10.1145/3359789.3359835}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/JindalSALKV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ChevalierCHS0KV19, author = {Ronny Chevalier and Stefano Cristalli and Christophe Hauser and Yan Shoshitaishvili and Ruoyu Wang and Christopher Kruegel and Giovanni Vigna and Danilo Bruschi and Andrea Lanzi}, editor = {Gail{-}Joon Ahn and Bhavani Thuraisingham and Murat Kantarcioglu and Ram Krishnan}, title = {BootKeeper: Validating Software Integrity Properties on Boot Firmware Images}, booktitle = {Proceedings of the Ninth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27, 2019}, pages = {315--325}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3292006.3300026}, doi = {10.1145/3292006.3300026}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ChevalierCHS0KV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/Redini0MSVK19, author = {Nilo Redini and Ruoyu Wang and Aravind Machiry and Yan Shoshitaishvili and Giovanni Vigna and Christopher Kruegel}, editor = {Roberto Perdisci and Cl{\'{e}}mentine Maurice and Giorgio Giacinto and Magnus Almgren}, title = {BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11543}, pages = {482--501}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22038-9\_23}, doi = {10.1007/978-3-030-22038-9\_23}, timestamp = {Tue, 29 Dec 2020 18:36:17 +0100}, biburl = {https://dblp.org/rec/conf/dimva/Redini0MSVK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SongH0SNVVKSF19, author = {Dokyung Song and Felicitas Hetzelt and Dipanjan Das and Chad Spensky and Yeoul Na and Stijn Volckaert and Giovanni Vigna and Christopher Kruegel and Jean{-}Pierre Seifert and Michael Franz}, title = {PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/periscope-an-effective-probing-and-fuzzing-framework-for-the-hardware-os-boundary/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/SongH0SNVVKSF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GustafsonMSRMFB19, author = {Eric Gustafson and Marius Muench and Chad Spensky and Nilo Redini and Aravind Machiry and Yanick Fratantonio and Davide Balzarotti and Aur{\'{e}}lien Francillon and Yung Ryn Choe and Christopher Kruegel and Giovanni Vigna}, title = {Toward the Analysis of Embedded Firmware through Automated Re-hosting}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {135--150}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/gustafson}, timestamp = {Wed, 10 Feb 2021 22:02:04 +0100}, biburl = {https://dblp.org/rec/conf/raid/GustafsonMSRMFB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/NilizadehAGKV19a, author = {Shirin Nilizadeh and Hojjat Aghakhani and Eric Gustafson and Christopher Kruegel and Giovanni Vigna}, editor = {Sihem Amer{-}Yahia and Mohammad Mahdian and Ashish Goel and Geert{-}Jan Houben and Kristina Lerman and Julian J. McAuley and Ricardo Baeza{-}Yates and Leila Zia}, title = {Lightning Talk - Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis}, booktitle = {Companion of The 2019 World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA, May 13-17, 2019}, pages = {1288--1289}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3308560.3316477}, doi = {10.1145/3308560.3316477}, timestamp = {Sun, 22 Sep 2019 18:15:38 +0200}, biburl = {https://dblp.org/rec/conf/www/NilizadehAGKV19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/NilizadehAGKV19, author = {Shirin Nilizadeh and Hojjat Aghakhani and Eric Gustafson and Christopher Kruegel and Giovanni Vigna}, editor = {Ling Liu and Ryen W. White and Amin Mantrach and Fabrizio Silvestri and Julian J. McAuley and Ricardo Baeza{-}Yates and Leila Zia}, title = {Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis}, booktitle = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA, May 13-17, 2019}, pages = {3108--3115}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3308558.3313647}, doi = {10.1145/3308558.3313647}, timestamp = {Sun, 22 Sep 2019 18:12:47 +0200}, biburl = {https://dblp.org/rec/conf/www/NilizadehAGKV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-12505, author = {Ronny Chevalier and Stefano Cristalli and Christophe Hauser and Yan Shoshitaishvili and Ruoyu Wang and Christopher Kruegel and Giovanni Vigna and Danilo Bruschi and Andrea Lanzi}, title = {BootKeeper: Validating Software Integrity Properties on Boot Firmware Images}, journal = {CoRR}, volume = {abs/1903.12505}, year = {2019}, url = {http://arxiv.org/abs/1903.12505}, eprinttype = {arXiv}, eprint = {1903.12505}, timestamp = {Tue, 02 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-12505.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-11376, author = {Chani Jindal and Christopher Salls and Hojjat Aghakhani and Keith Long and Christopher Kruegel and Giovanni Vigna}, title = {Neurlux: Dynamic Malware Analysis Without Feature Engineering}, journal = {CoRR}, volume = {abs/1910.11376}, year = {2019}, url = {http://arxiv.org/abs/1910.11376}, eprinttype = {arXiv}, eprint = {1910.11376}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-11376.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MachiryRGFCKV18, author = {Aravind Machiry and Nilo Redini and Eric Gustafson and Yanick Fratantonio and Yung Ryn Choe and Christopher Kruegel and Giovanni Vigna}, title = {Using Loops For Malware Classification Resilient to Feature-unaware Perturbations}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {112--123}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274731}, doi = {10.1145/3274694.3274731}, timestamp = {Wed, 05 Dec 2018 09:44:25 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MachiryRGFCKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/anrw/BorgolteFHKV18, author = {Kevin Borgolte and Tobias Fiebig and Shuang Hao and Christopher Kruegel and Giovanni Vigna}, title = {Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates}, booktitle = {Proceedings of the Applied Networking Research Workshop, {ANRW} 2018, Montreal, QC, Canada, July 16-16, 2018}, pages = {4}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3232755.3232859}, doi = {10.1145/3232755.3232859}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/anrw/BorgolteFHKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KonothVMLKBV18, author = {Radhesh Krishnan Konoth and Emanuele Vineti and Veelasha Moonsamy and Martina Lindorfer and Christopher Kruegel and Herbert Bos and Giovanni Vigna}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1714--1730}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243858}, doi = {10.1145/3243734.3243858}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KonothVMLKBV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/VeenLFPVKBR18, author = {Victor van der Veen and Martina Lindorfer and Yanick Fratantonio and Harikrishnan Padmanabha Pillai and Giovanni Vigna and Christopher Kruegel and Herbert Bos and Kaveh Razavi}, editor = {Cristiano Giuffrida and S{\'{e}}bastien Bardin and Gregory Blanc}, title = {GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on {ARM}}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, {DIMVA} 2018, Saclay, France, June 28-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10885}, pages = {92--113}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93411-2\_5}, doi = {10.1007/978-3-319-93411-2\_5}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/VeenLFPVKBR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BianchiFMKVCL18, author = {Antonio Bianchi and Yanick Fratantonio and Aravind Machiry and Christopher Kruegel and Giovanni Vigna and Simon Pak Ho Chung and Wenke Lee}, title = {Broken Fingers: On the Usage of the Fingerprint {API} in Android}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_03B-1\_Bianchi\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/BianchiFMKVCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BorgolteFHKV18, author = {Kevin Borgolte and Tobias Fiebig and Shuang Hao and Christopher Kruegel and Giovanni Vigna}, title = {Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_06A-4\_Borgolte\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/BorgolteFHKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/FiebigBHKVF18, author = {Tobias Fiebig and Kevin Borgolte and Shuang Hao and Christopher Kruegel and Giovanni Vigna and Anja Feldmann}, editor = {Robert Beverly and Georgios Smaragdakis and Anja Feldmann}, title = {In rDNS We Trust: Revisiting a Common Data-Source's Reliability}, booktitle = {Passive and Active Measurement - 19th International Conference, {PAM} 2018, Berlin, Germany, March 26-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10771}, pages = {131--145}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76481-8\_10}, doi = {10.1007/978-3-319-76481-8\_10}, timestamp = {Sat, 30 Sep 2023 09:54:28 +0200}, biburl = {https://dblp.org/rec/conf/pam/FiebigBHKVF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ChandramouliBKV18, author = {Sai Prashanth Chandramouli and Pierre{-}Marie Bajan and Christopher Kruegel and Giovanni Vigna and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, editor = {Hisham M. Haddad and Roger L. Wainwright and Richard Chbeir}, title = {Measuring E-mail header injections on the world wide web}, booktitle = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing, {SAC} 2018, Pau, France, April 09-13, 2018}, pages = {1647--1656}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3167132.3167308}, doi = {10.1145/3167132.3167308}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/ChandramouliBKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AghakhaniMNKV18, author = {Hojjat Aghakhani and Aravind Machiry and Shirin Nilizadeh and Christopher Kruegel and Giovanni Vigna}, title = {Detecting Deceptive Reviews Using Generative Adversarial Networks}, booktitle = {2018 {IEEE} Security and Privacy Workshops, {SP} Workshops 2018, San Francisco, CA, USA, May 24, 2018}, pages = {89--95}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SPW.2018.00022}, doi = {10.1109/SPW.2018.00022}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/sp/AghakhaniMNKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/EckertB0SKV18, author = {Moritz Eckert and Antonio Bianchi and Ruoyu Wang and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, editor = {William Enck and Adrienne Porter Felt}, title = {HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {99--116}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/eckert}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/EckertB0SKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0001QHBVKL18, author = {Wei Meng and Chenxiong Qian and Shuang Hao and Kevin Borgolte and Giovanni Vigna and Christopher Kruegel and Wenke Lee}, editor = {William Enck and Adrienne Porter Felt}, title = {Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {393--410}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/meng}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/0001QHBVKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-10364, author = {Hojjat Aghakhani and Aravind Machiry and Shirin Nilizadeh and Christopher Kruegel and Giovanni Vigna}, title = {Detecting Deceptive Reviews using Generative Adversarial Networks}, journal = {CoRR}, volume = {abs/1805.10364}, year = {2018}, url = {http://arxiv.org/abs/1805.10364}, eprinttype = {arXiv}, eprint = {1805.10364}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-10364.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/ZandMTLKV17, author = {Ali Zand and Gaspar Modelo{-}Howard and Alok Tongaonkar and Sung{-}Ju Lee and Christopher Kruegel and Giovanni Vigna}, title = {Demystifying DDoS as a Service}, journal = {{IEEE} Commun. Mag.}, volume = {55}, number = {7}, pages = {14--21}, year = {2017}, url = {https://doi.org/10.1109/MCOM.2017.1600980}, doi = {10.1109/MCOM.2017.1600980}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/ZandMTLKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/MavroudisHFMKV17, author = {Vasilios Mavroudis and Shuang Hao and Yanick Fratantonio and Federico Maggi and Christopher Kruegel and Giovanni Vigna}, title = {On the Privacy and Security of the Ultrasound Ecosystem}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {2}, pages = {95--112}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0018}, doi = {10.1515/POPETS-2017-0018}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/MavroudisHFMKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/EgeleSKV17, author = {Manuel Egele and Gianluca Stringhini and Christopher Kruegel and Giovanni Vigna}, title = {Towards Detecting Compromised Accounts on Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {4}, pages = {447--460}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2479616}, doi = {10.1109/TDSC.2015.2479616}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/EgeleSKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BianchiGFKV17, author = {Antonio Bianchi and Eric Gustafson and Yanick Fratantonio and Christopher Kruegel and Giovanni Vigna}, title = {Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {16--27}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134615}, doi = {10.1145/3134600.3134615}, timestamp = {Tue, 06 Nov 2018 16:59:23 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BianchiGFKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SallsSSKV17, author = {Christopher Salls and Yan Shoshitaishvili and Nick Stephens and Christopher Kruegel and Giovanni Vigna}, title = {Piston: Uncooperative Remote Runtime Patching}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {141--153}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134611}, doi = {10.1145/3134600.3134611}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SallsSSKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Shoshitaishvili17, author = {Yan Shoshitaishvili and Michael Weissbacher and Lukas Dresel and Christopher Salls and Ruoyu Wang and Christopher Kruegel and Giovanni Vigna}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {347--362}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134105}, doi = {10.1145/3133956.3134105}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Shoshitaishvili17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuangHILFKV17, author = {Cheng Huang and Shuang Hao and Luca Invernizzi and Jiayong Liu and Yong Fang and Christopher Kruegel and Giovanni Vigna}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {494--505}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053017}, doi = {10.1145/3052973.3053017}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HuangHILFKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NilizadehLSZFKS17, author = {Shirin Nilizadeh and Francois Labreche and Alireza Sedighian and Ali Zand and Jos{\'{e}} M. Fernandez and Christopher Kruegel and Gianluca Stringhini and Giovanni Vigna}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POISED:} Spotting Twitter Spam Off the Beaten Paths}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1159--1174}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134055}, doi = {10.1145/3133956.3134055}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NilizadehLSZFKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CorinaMSSHKV17, author = {Jake Corina and Aravind Machiry and Christopher Salls and Yan Shoshitaishvili and Shuang Hao and Christopher Kruegel and Giovanni Vigna}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{DIFUZE:} Interface Aware Fuzzing for Kernel Drivers}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2123--2138}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134069}, doi = {10.1145/3133956.3134069}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CorinaMSSHKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BaoSWKVB17, author = {Tiffany Bao and Yan Shoshitaishvili and Ruoyu Wang and Christopher Kruegel and Giovanni Vigna and David Brumley}, title = {How Shall We Play a Game?: {A} Game-theoretical Model for Cyber-warfare Games}, booktitle = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa Barbara, CA, USA, August 21-25, 2017}, pages = {7--21}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSF.2017.34}, doi = {10.1109/CSF.2017.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BaoSWKVB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ContinellaFLPZK17, author = {Andrea Continella and Yanick Fratantonio and Martina Lindorfer and Alessandro Puccetti and Ali Zand and Christopher Kruegel and Giovanni Vigna}, title = {Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/obfuscation-resilient-privacy-leak-detection-mobile-apps-through-differential-analysis/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ContinellaFLPZK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MachiryGSSSWBCK17, author = {Aravind Machiry and Eric Gustafson and Chad Spensky and Christopher Salls and Nick Stephens and Ruoyu Wang and Antonio Bianchi and Yung Ryn Choe and Christopher Kruegel and Giovanni Vigna}, title = {{BOOMERANG:} Exploiting the Semantic Gap in Trusted Execution Environments}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/boomerang-exploiting-semantic-gap-trusted-execution-environments/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/MachiryGSSSWBCK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WangSBMGGKV17, author = {Ruoyu Wang and Yan Shoshitaishvili and Antonio Bianchi and Aravind Machiry and John Grosen and Paul Grosen and Christopher Kruegel and Giovanni Vigna}, title = {Ramblr: Making Reassembly Great Again}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/ramblr-making-reassembly-great-again/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WangSBMGGKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/FiebigBHKV17, author = {Tobias Fiebig and Kevin Borgolte and Shuang Hao and Christopher Kruegel and Giovanni Vigna}, editor = {Mohamed Ali K{\^{a}}afar and Steve Uhlig and Johanna Amann}, title = {Something from Nothing (There): Collecting Global IPv6 Datasets from {DNS}}, booktitle = {Passive and Active Measurement - 18th International Conference, {PAM} 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10176}, pages = {30--43}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-54328-4\_3}, doi = {10.1007/978-3-319-54328-4\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pam/FiebigBHKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RediniMDFBGSKV17, author = {Nilo Redini and Aravind Machiry and Dipanjan Das and Yanick Fratantonio and Antonio Bianchi and Eric Gustafson and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, editor = {Engin Kirda and Thomas Ristenpart}, title = {BootStomp: On the Security of Bootloaders in Mobile Devices}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {781--798}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/redini}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/RediniMDFBGSKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MachirySCSKV17, author = {Aravind Machiry and Chad Spensky and Jake Corina and Nick Stephens and Christopher Kruegel and Giovanni Vigna}, editor = {Engin Kirda and Thomas Ristenpart}, title = {{DR.} {CHECKER:} {A} Soundy Analysis for Linux Kernel Drivers}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {1007--1024}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/machiry}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MachirySCSKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-02749, author = {Yan Shoshitaishvili and Michael Weissbacher and Lukas Dresel and Christopher Salls and Ruoyu Wang and Christopher Kruegel and Giovanni Vigna}, title = {Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance}, journal = {CoRR}, volume = {abs/1708.02749}, year = {2017}, url = {http://arxiv.org/abs/1708.02749}, eprinttype = {arXiv}, eprint = {1708.02749}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-02749.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-09058, author = {Shirin Nilizadeh and Francois Labreche and Alireza Sedighian and Ali Zand and Jos{\'{e}} M. Fernandez and Christopher Kruegel and Gianluca Stringhini and Giovanni Vigna}, title = {{POISED:} Spotting Twitter Spam Off the Beaten Paths}, journal = {CoRR}, volume = {abs/1708.09058}, year = {2017}, url = {http://arxiv.org/abs/1708.09058}, eprinttype = {arXiv}, eprint = {1708.09058}, timestamp = {Thu, 21 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-09058.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AfonsoGBFKVDP16, author = {Vitor Monte Afonso and Paulo L. de Geus and Antonio Bianchi and Yanick Fratantonio and Christopher Kruegel and Giovanni Vigna and Adam Doup{\'{e}} and Mario Polino}, title = {Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/going-native-large-scale-analysis-android-apps-practical-native-code-sandboxing-policy.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/AfonsoGBFKVDP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/StephensGSDWCSK16, author = {Nick Stephens and John Grosen and Christopher Salls and Andrew Dutcher and Ruoyu Wang and Jacopo Corbetta and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, title = {Driller: Augmenting Fuzzing Through Selective Symbolic Execution}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/driller-augmenting-fuzzing-through-selective-symbolic-execution.pdf}, timestamp = {Tue, 19 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/StephensGSDWCSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MuenchPSKVB16, author = {Marius Muench and Fabio Pagani and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna and Davide Balzarotti}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {24--48}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_2}, doi = {10.1007/978-3-319-45719-2\_2}, timestamp = {Fri, 27 Dec 2019 21:24:31 +0100}, biburl = {https://dblp.org/rec/conf/raid/MuenchPSKVB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Shoshitaishvili16, author = {Yan Shoshitaishvili and Ruoyu Wang and Christopher Salls and Nick Stephens and Mario Polino and Andrew Dutcher and John Grosen and Siji Feng and Christophe Hauser and Christopher Kr{\"{u}}gel and Giovanni Vigna}, title = {{SOK:} (State of) The Art of War: Offensive Techniques in Binary Analysis}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {138--157}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.17}, doi = {10.1109/SP.2016.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Shoshitaishvili16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FratantonioBRKK16, author = {Yanick Fratantonio and Antonio Bianchi and William K. Robertson and Engin Kirda and Christopher Kruegel and Giovanni Vigna}, title = {TriggerScope: Towards Detecting Logic Bombs in Android Applications}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {377--396}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.30}, doi = {10.1109/SP.2016.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/FratantonioBRKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2016, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2976749}, isbn = {978-1-4503-4139-4}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/Shoshitaishvili15, author = {Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, title = {Portrait of a Privacy Invasion}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2015}, number = {1}, pages = {41--60}, year = {2015}, url = {https://doi.org/10.1515/popets-2015-0004}, doi = {10.1515/POPETS-2015-0004}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/Shoshitaishvili15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZandHVKK15, author = {Ali Zand and Amir Houmansadr and Giovanni Vigna and Richard A. Kemmerer and Christopher Kruegel}, title = {Know Your Achilles' Heel: Automatic Detection of Network Critical Services}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {41--50}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818012}, doi = {10.1145/2818000.2818012}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZandHVKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MuttiFBICKKV15, author = {Simone Mutti and Yanick Fratantonio and Antonio Bianchi and Luca Invernizzi and Jacopo Corbetta and Dhilung Kirat and Christopher Kruegel and Giovanni Vigna}, title = {BareDroid: Large-Scale Analysis of Android Apps on Real Devices}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {71--80}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818036}, doi = {10.1145/2818000.2818036}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MuttiFBICKKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FalsinaFZKVM15, author = {Luca Falsina and Yanick Fratantonio and Stefano Zanero and Christopher Kruegel and Giovanni Vigna and Federico Maggi}, title = {Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {201--210}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818042}, doi = {10.1145/2818000.2818042}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/FalsinaFZKVM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BianchiFKV15, author = {Antonio Bianchi and Yanick Fratantonio and Christopher Kruegel and Giovanni Vigna}, editor = {David Lie and Glenn Wurster}, title = {{NJAS:} Sandboxing Unmodified Applications in non-rooted Devices Running stock Android}, booktitle = {Proceedings of the 5th Annual {ACM} {CCS} Workshop on Security and Privacy in Smartphones and Mobile Devices, {SPSM} 2015, Denver, Colorado, USA, October 12, 2015}, pages = {27--38}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808117.2808122}, doi = {10.1145/2808117.2808122}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BianchiFKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/FratantonioBREK15, author = {Yanick Fratantonio and Antonio Bianchi and William K. Robertson and Manuel Egele and Christopher Kruegel and Engin Kirda and Giovanni Vigna}, editor = {Magnus Almgren and Vincenzo Gulisano and Federico Maggi}, title = {On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, {DIMVA} 2015, Milan, Italy, July 9-10, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9148}, pages = {282--303}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20550-2\_15}, doi = {10.1007/978-3-319-20550-2\_15}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/FratantonioBREK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/CaillatGKKV15, author = {Benjamin Caillat and Bob Gilbert and Richard A. Kemmerer and Christopher Kruegel and Giovanni Vigna}, title = {Prison: Tracking Process Interactions to Contain Malware}, booktitle = {17th {IEEE} International Conference on High Performance Computing and Communications, {HPCC} 2015, 7th {IEEE} International Symposium on Cyberspace Safety and Security, {CSS} 2015, and 12th {IEEE} International Conference on Embedded Software and Systems, {ICESS} 2015, New York, NY, USA, August 24-26, 2015}, pages = {1282--1291}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/HPCC-CSS-ICESS.2015.297}, doi = {10.1109/HPCC-CSS-ICESS.2015.297}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/CaillatGKKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/CaoFBEKVC15, author = {Yinzhi Cao and Yanick Fratantonio and Antonio Bianchi and Manuel Egele and Christopher Kruegel and Giovanni Vigna and Yan Chen}, title = {EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/edgeminer-automatically-detecting-implicit-control-flow-transitions-through-android-framework}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/CaoFBEKVC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Shoshitaishvili15, author = {Yan Shoshitaishvili and Ruoyu Wang and Christophe Hauser and Christopher Kruegel and Giovanni Vigna}, title = {Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/firmalice-automatic-detection-authentication-bypass-vulnerabilities-binary-firmware}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Shoshitaishvili15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/FratantonioMBKV15a, author = {Yanick Fratantonio and Aravind Machiry and Antonio Bianchi and Christopher Kruegel and Giovanni Vigna}, editor = {Aharon Abadi and Shah Rukh Humayoun and Henry Muccini}, title = {{CLAPP:} characterizing loops in Android applications (invited talk)}, booktitle = {Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile, DeMobile 2015, Bergamo, Italy, August 31 - September 4, 2015}, pages = {33--34}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2804345.2804355}, doi = {10.1145/2804345.2804355}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/FratantonioMBKV15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/FratantonioMBKV15, author = {Yanick Fratantonio and Aravind Machiry and Antonio Bianchi and Christopher Kruegel and Giovanni Vigna}, editor = {Elisabetta Di Nitto and Mark Harman and Patrick Heymans}, title = {{CLAPP:} characterizing loops in Android applications}, booktitle = {Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, {ESEC/FSE} 2015, Bergamo, Italy, August 30 - September 4, 2015}, pages = {687--697}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2786805.2786873}, doi = {10.1145/2786805.2786873}, timestamp = {Tue, 06 Nov 2018 16:59:22 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/FratantonioMBKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BianchiCIFKV15, author = {Antonio Bianchi and Jacopo Corbetta and Luca Invernizzi and Yanick Fratantonio and Christopher Kruegel and Giovanni Vigna}, title = {What the App is That? Deception and Countermeasures in the Android User Interface}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {931--948}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.62}, doi = {10.1109/SP.2015.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BianchiCIFKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/StringhiniMJEKV15, author = {Gianluca Stringhini and Pierre Mourlanne and Gr{\'{e}}goire Jacob and Manuel Egele and Christopher Kruegel and Giovanni Vigna}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {{EVILCOHORT:} Detecting Communities of Malicious Accounts on Online Services}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {563--578}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/stringhini}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/StringhiniMJEKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BorgolteKV15, author = {Kevin Borgolte and Christopher Kruegel and Giovanni Vigna}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Meerkat: Detecting Website Defacements through Image-based Object Recognition}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {595--610}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/borgolte}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/BorgolteKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FedericoCSKV15, author = {Alessandro Di Federico and Amat Cama and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {How the {ELF} Ruined Christmas}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {643--658}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/di-frederico}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/FedericoCSKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WeissbacherRKKV15, author = {Michael Weissbacher and William K. Robertson and Engin Kirda and Christopher Kruegel and Giovanni Vigna}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {737--752}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/weissbacher}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/WeissbacherRKKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/ThomasHWBGHKMSV15, author = {Kurt Thomas and Danny Yuxing Huang and David Y. Wang and Elie Bursztein and Chris Grier and Tom Holt and Christopher Kruegel and Damon McCoy and Stefan Savage and Giovanni Vigna}, title = {Framing Dependencies Introduced by Underground Commoditization}, booktitle = {14th Annual Workshop on the Economics of Information Security, {WEIS} 2015, Delft, The Netherlands, 22-23 June, 2015}, year = {2015}, url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS\_2015\_thomas.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/weis/ThomasHWBGHKMSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2015, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2810103}, isbn = {978-1-4503-3832-5}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/EgeleSKV15, author = {Manuel Egele and Gianluca Stringhini and Christopher Kruegel and Giovanni Vigna}, title = {Towards Detecting Compromised Accounts on Social Networks}, journal = {CoRR}, volume = {abs/1509.03531}, year = {2015}, url = {http://arxiv.org/abs/1509.03531}, eprinttype = {arXiv}, eprint = {1509.03531}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/EgeleSKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/NikiforakisKJKPV14, author = {Nick Nikiforakis and Alexandros Kapravelos and Wouter Joosen and Christopher Kruegel and Frank Piessens and Giovanni Vigna}, title = {On the Workings and Current Practices of Web-Based Device Fingerprinting}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {28--36}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.160}, doi = {10.1109/MSP.2013.160}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/NikiforakisKJKPV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BilgeSBKK14, author = {Leyla Bilge and Sevil Sen and Davide Balzarotti and Engin Kirda and Christopher Kruegel}, title = {Exposure: {A} Passive {DNS} Analysis Service to Detect and Report Malicious Domains}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {4}, pages = {14}, year = {2014}, url = {https://doi.org/10.1145/2584679}, doi = {10.1145/2584679}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BilgeSBKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/PuttaswamyWSAAKZ14, author = {Krishna P. N. Puttaswamy and Shiyuan Wang and Troy Steinbauer and Divyakant Agrawal and Amr El Abbadi and Christopher Kruegel and Ben Y. Zhao}, title = {Preserving Location Privacy in Geosocial Applications}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {13}, number = {1}, pages = {159--173}, year = {2014}, url = {https://doi.org/10.1109/TMC.2012.247}, doi = {10.1109/TMC.2012.247}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/PuttaswamyWSAAKZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Kruegel14, author = {Christopher Kruegel}, editor = {Shiho Moriai and Trent Jaeger and Kouichi Sakurai}, title = {Fighting malicious code: an eternal struggle}, booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014}, pages = {1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2590296.2590348}, doi = {10.1145/2590296.2590348}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Kruegel14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StringhiniHKV14, author = {Gianluca Stringhini and Oliver Hohlfeld and Christopher Kruegel and Giovanni Vigna}, editor = {Shiho Moriai and Trent Jaeger and Kouichi Sakurai}, title = {The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape}, booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014}, pages = {353--364}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2590296.2590302}, doi = {10.1145/2590296.2590302}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/StringhiniHKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/MaioKSKV14, author = {Giancarlo De Maio and Alexandros Kapravelos and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, editor = {Sven Dietrich}, title = {PExy: The Other Side of Exploit Kits}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {132--151}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_8}, doi = {10.1007/978-3-319-08509-8\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/MaioKSKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/ZarrasKSHKV14, author = {Apostolis Zarras and Alexandros Kapravelos and Gianluca Stringhini and Thorsten Holz and Christopher Kruegel and Giovanni Vigna}, editor = {Carey Williamson and Aditya Akella and Nina Taft}, title = {The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements}, booktitle = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014, Vancouver, BC, Canada, November 5-7, 2014}, pages = {373--380}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663716.2663719}, doi = {10.1145/2663716.2663719}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/ZarrasKSHKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZandVKK14, author = {Ali Zand and Giovanni Vigna and Richard A. Kemmerer and Christopher Kruegel}, title = {Rippler: Delay injection for service dependency detection}, booktitle = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014, Toronto, Canada, April 27 - May 2, 2014}, pages = {2157--2165}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFOCOM.2014.6848158}, doi = {10.1109/INFOCOM.2014.6848158}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ZandVKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/InvernizziMTKSVLM14, author = {Luca Invernizzi and Stanislav Miskovic and Ruben Torres and Christopher Kruegel and Sabyasachi Saha and Giovanni Vigna and Sung{-}Ju Lee and Marco Mellia}, title = {Nazca: Detecting Malware Distribution in Large-Scale Networks}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/nazca-detecting-malware-distribution-large-scale-networks}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/InvernizziMTKSVLM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/PoeplauFBKV14, author = {Sebastian Poeplau and Yanick Fratantonio and Antonio Bianchi and Christopher Kruegel and Giovanni Vigna}, title = {Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/execute-analyzing-unsafe-and-malicious-dynamic-code-loading-android-applications}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/PoeplauFBKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CorbettaIKV14, author = {Jacopo Corbetta and Luca Invernizzi and Christopher Kr{\"{u}}gel and Giovanni Vigna}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {130--149}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_7}, doi = {10.1007/978-3-319-11379-1\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/CorbettaIKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CaoSBKVC14, author = {Yinzhi Cao and Yan Shoshitaishvili and Kevin Borgolte and Christopher Kr{\"{u}}gel and Giovanni Vigna and Yan Chen}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {276--298}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_14}, doi = {10.1007/978-3-319-11379-1\_14}, timestamp = {Fri, 20 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CaoSBKVC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ZandVYK14, author = {Ali Zand and Giovanni Vigna and Xifeng Yan and Christopher Kruegel}, editor = {Yookun Cho and Sung Y. Shin and Sang{-}Wook Kim and Chih{-}Cheng Hung and Jiman Hong}, title = {Extracting probable command and control signatures for detecting botnets}, booktitle = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014}, pages = {1657--1662}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2554850.2554896}, doi = {10.1145/2554850.2554896}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/ZandVYK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/IedemskaSKKV14, author = {Jane Iedemska and Gianluca Stringhini and Richard A. Kemmerer and Christopher Kruegel and Giovanni Vigna}, title = {The Tricks of the Trade: What Makes Spam Campaigns Successful?}, booktitle = {35. {IEEE} Security and Privacy Workshops, {SPW} 2014, San Jose, CA, USA, May 17-18, 2014}, pages = {77--83}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SPW.2014.21}, doi = {10.1109/SPW.2014.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/IedemskaSKKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KiratVK14, author = {Dhilung Kirat and Giovanni Vigna and Christopher Kruegel}, editor = {Kevin Fu and Jaeyeon Jung}, title = {BareCloud: Bare-metal Analysis-based Evasive Malware Detection}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {287--301}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/kirat}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/KiratVK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KapravelosGCKVP14, author = {Alexandros Kapravelos and Chris Grier and Neha Chachra and Christopher Kruegel and Giovanni Vigna and Vern Paxson}, editor = {Kevin Fu and Jaeyeon Jung}, title = {Hulk: Eliciting Malicious Behavior in Browser Extensions}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {641--654}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/kapravelos}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KapravelosGCKVP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/NikiforakisMSRJKPVZ14, author = {Nick Nikiforakis and Federico Maggi and Gianluca Stringhini and M. Zubair Rafique and Wouter Joosen and Christopher Kruegel and Frank Piessens and Giovanni Vigna and Stefano Zanero}, editor = {Chin{-}Wan Chung and Andrei Z. Broder and Kyuseok Shim and Torsten Suel}, title = {Stranger danger: exploring the ecosystem of ad-based {URL} shortening services}, booktitle = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic of Korea, April 7-11, 2014}, pages = {51--62}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2566486.2567983}, doi = {10.1145/2566486.2567983}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/NikiforakisMSRJKPVZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/BorgolteKV14, author = {Kevin Borgolte and Christopher Kruegel and Giovanni Vigna}, editor = {Chin{-}Wan Chung and Andrei Z. Broder and Kyuseok Shim and Torsten Suel}, title = {Relevant change detection: a framework for the precise extraction of modified and novel web-based content as a filtering technique for analysis engines}, booktitle = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic of Korea, April 7-11, 2014, Companion Volume}, pages = {595--598}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2567948.2578039}, doi = {10.1145/2567948.2578039}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/BorgolteKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/InvernizziKV13, author = {Luca Invernizzi and Christopher Kruegel and Giovanni Vigna}, editor = {Charles N. Payne Jr.}, title = {Message in a bottle: sailing past censorship}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {39--48}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523654}, doi = {10.1145/2523649.2523654}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/InvernizziKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EgeleBFK13, author = {Manuel Egele and David Brumley and Yanick Fratantonio and Christopher Kruegel}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {An empirical study of cryptographic misuse in android applications}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {73--84}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516693}, doi = {10.1145/2508859.2516693}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/EgeleBFK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BorgolteKV13, author = {Kevin Borgolte and Christopher Kruegel and Giovanni Vigna}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Delta: automatic identification of unknown web-based infection campaigns}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {109--120}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516725}, doi = {10.1145/2508859.2516725}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BorgolteKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StringhiniKV13, author = {Gianluca Stringhini and Christopher Kruegel and Giovanni Vigna}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Shady paths: leveraging surfing crowds to detect malicious web pages}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {133--144}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516682}, doi = {10.1145/2508859.2516682}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/StringhiniKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DoupeCJPKV13, author = {Adam Doup{\'{e}} and Weidong Cui and Mariusz H. Jakubowski and Marcus Peinado and Christopher Kruegel and Giovanni Vigna}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {deDacota: toward preventing server-side {XSS} via automatic code and data separation}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1205--1216}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516708}, doi = {10.1145/2508859.2516708}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DoupeCJPKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/StringhiniWEKVZZ13, author = {Gianluca Stringhini and Gang Wang and Manuel Egele and Christopher Kruegel and Giovanni Vigna and Haitao Zheng and Ben Y. Zhao}, editor = {Konstantina Papagiannaki and P. Krishna Gummadi and Craig Partridge}, title = {Follow the green: growth and dynamics in twitter follower markets}, booktitle = {Proceedings of the 2013 Internet Measurement Conference, {IMC} 2013, Barcelona, Spain, October 23-25, 2013}, pages = {163--176}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2504730.2504731}, doi = {10.1145/2504730.2504731}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/StringhiniWEKVZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/EgeleSKV13, author = {Manuel Egele and Gianluca Stringhini and Christopher Kr{\"{u}}gel and Giovanni Vigna}, title = {{COMPA:} Detecting Compromised Accounts on Social Networks}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/compa-detecting-compromised-accounts-social-networks}, timestamp = {Mon, 01 Feb 2021 08:42:13 +0100}, biburl = {https://dblp.org/rec/conf/ndss/EgeleSKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LauingerSOWKK13, author = {Tobias Lauinger and Martin Szydlowski and Kaan Onarlioglu and Gilbert Wondracek and Engin Kirda and Christopher Kr{\"{u}}gel}, title = {Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/clickonomics-determining-effect-anti-piracy-measures-one-click-hosting}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LauingerSOWKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/EggerSKV13, author = {Christoph Egger and Johannes Schlumberger and Christopher Kruegel and Giovanni Vigna}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Practical Attacks against the {I2P} Network}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {432--451}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_22}, doi = {10.1007/978-3-642-41284-4\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/EggerSKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/PayetDKV13, author = {Pierre Payet and Adam Doup{\'{e}} and Christopher Kruegel and Giovanni Vigna}, editor = {Sung Y. Shin and Jos{\'{e}} Carlos Maldonado}, title = {EARs in the wild: large-scale analysis of execution after redirect vulnerabilities}, booktitle = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing, {SAC} '13, Coimbra, Portugal, March 18-22, 2013}, pages = {1792--1799}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2480362.2480699}, doi = {10.1145/2480362.2480699}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/PayetDKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/NikiforakisKJKPV13, author = {Nick Nikiforakis and Alexandros Kapravelos and Wouter Joosen and Christopher Kruegel and Frank Piessens and Giovanni Vigna}, title = {Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {541--555}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.43}, doi = {10.1109/SP.2013.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/NikiforakisKJKPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KapravelosSCKV13, author = {Alexandros Kapravelos and Yan Shoshitaishvili and Marco Cova and Christopher Kruegel and Giovanni Vigna}, editor = {Samuel T. King}, title = {Revolver: An Automated Approach to the Detection of Evasive Web-based Malware}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {637--652}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/kapravelos}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/KapravelosSCKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangSKV13, author = {Ruoyu Wang and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, editor = {Samuel T. King}, title = {Steal This Movie: Automatically Bypassing {DRM} Protection in Streaming Media Services}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {687--702}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/wang\_ruoyu}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/WangSKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/MaggiFZSSKV13, author = {Federico Maggi and Alessandro Frossi and Stefano Zanero and Gianluca Stringhini and Brett Stone{-}Gross and Christopher Kruegel and Giovanni Vigna}, editor = {Daniel Schwabe and Virg{\'{\i}}lio A. F. Almeida and Hartmut Glaser and Ricardo Baeza{-}Yates and Sue B. Moon}, title = {Two years of short URLs internet measurement: security threats and countermeasures}, booktitle = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro, Brazil, May 13-17, 2013}, pages = {861--872}, publisher = {International World Wide Web Conferences Steering Committee / {ACM}}, year = {2013}, url = {https://doi.org/10.1145/2488388.2488463}, doi = {10.1145/2488388.2488463}, timestamp = {Sun, 22 Sep 2019 18:15:38 +0200}, biburl = {https://dblp.org/rec/conf/www/MaggiFZSSKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/StringhiniEKV12, author = {Gianluca Stringhini and Manuel Egele and Christopher Kruegel and Giovanni Vigna}, title = {Poultry markets: on the underground economy of twitter followers}, journal = {Comput. Commun. Rev.}, volume = {42}, number = {4}, pages = {527--532}, year = {2012}, url = {https://doi.org/10.1145/2377677.2377781}, doi = {10.1145/2377677.2377781}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/StringhiniEKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/EgeleMKK12, author = {Manuel Egele and Andreas Moser and Christopher Kruegel and Engin Kirda}, title = {PoX: Protecting users from malicious Facebook applications}, journal = {Comput. Commun.}, volume = {35}, number = {12}, pages = {1507--1515}, year = {2012}, url = {https://doi.org/10.1016/j.comcom.2012.04.016}, doi = {10.1016/J.COMCOM.2012.04.016}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/EgeleMKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/EgeleSKK12, author = {Manuel Egele and Theodoor Scholte and Engin Kirda and Christopher Kruegel}, title = {A survey on automated dynamic malware-analysis techniques and tools}, journal = {{ACM} Comput. Surv.}, volume = {44}, number = {2}, pages = {6:1--6:42}, year = {2012}, url = {https://doi.org/10.1145/2089125.2089126}, doi = {10.1145/2089125.2089126}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/EgeleSKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BilgeBRKK12, author = {Leyla Bilge and Davide Balzarotti and William K. Robertson and Engin Kirda and Christopher Kruegel}, editor = {Robert H'obbes' Zakon}, title = {Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {129--138}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420969}, doi = {10.1145/2420950.2420969}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BilgeBRKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SchlumbergerKV12, author = {Johannes Schlumberger and Christopher Kruegel and Giovanni Vigna}, editor = {Robert H'obbes' Zakon}, title = {Jarhead analysis and detection of malicious Java applets}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {249--257}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420988}, doi = {10.1145/2420950.2420988}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SchlumbergerKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BianchiSKV12, author = {Antonio Bianchi and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Blacksheep: detecting compromised hosts in homogeneous crowds}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {341--352}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382234}, doi = {10.1145/2382196.2382234}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BianchiSKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuCGK12, author = {Zhaoyan Xu and Lingfeng Chen and Guofei Gu and Christopher Kruegel}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {PeerPress: utilizing enemies' {P2P} strength against them}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {581--592}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382257}, doi = {10.1145/2382196.2382257}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuCGK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NikiforakisIKAJKPV12, author = {Nick Nikiforakis and Luca Invernizzi and Alexandros Kapravelos and Steven {Van Acker} and Wouter Joosen and Christopher Kruegel and Frank Piessens and Giovanni Vigna}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {You are what you include: large-scale evaluation of remote javascript inclusions}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {736--747}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382274}, doi = {10.1145/2382196.2382274}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NikiforakisIKAJKPV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/TegelerFVK12, author = {Florian Tegeler and Xiaoming Fu and Giovanni Vigna and Christopher Kruegel}, editor = {Chadi Barakat and Renata Teixeira and K. K. Ramakrishnan and Patrick Thiran}, title = {BotFinder: finding bots in network traffic without deep packet inspection}, booktitle = {Conference on emerging Networking Experiments and Technologies, CoNEXT '12, Nice, France - December 10 - 13, 2012}, pages = {349--360}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2413176.2413217}, doi = {10.1145/2413176.2413217}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/TegelerFVK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/JacobCNKV12, author = {Gr{\'{e}}goire Jacob and Paolo Milani Comparetti and Matthias Neugschwandtner and Christopher Kruegel and Giovanni Vigna}, editor = {Ulrich Flegel and Evangelos P. Markatos and William K. Robertson}, title = {A Static, Packer-Agnostic Filter to Detect Similar Malware Samples}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, {DIMVA} 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7591}, pages = {102--122}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37300-8\_6}, doi = {10.1007/978-3-642-37300-8\_6}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/JacobCNKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/GregioGKV12, author = {Andr{\'{e}} Ricardo Abed Gr{\'{e}}gio and Paulo L{\'{\i}}cio de Geus and Christopher Kruegel and Giovanni Vigna}, editor = {Ulrich Flegel and Evangelos P. Markatos and William K. Robertson}, title = {Tracking Memory Writes for Malware Classification and Code Reuse Identification}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, {DIMVA} 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7591}, pages = {134--143}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37300-8\_8}, doi = {10.1007/978-3-642-37300-8\_8}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/GregioGKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/Kruegel12, author = {Christopher Kruegel}, editor = {Venkat N. Venkatakrishnan and Diganta Goswami}, title = {Fighting Malicious Software}, booktitle = {Information Systems Security, 8th International Conference, {ICISS} 2012, Guwahati, India, December 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {1--15}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35130-3\_1}, doi = {10.1007/978-3-642-35130-3\_1}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/iciss/Kruegel12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/AlkhalafCFBOK12, author = {Muath Alkhalaf and Shauvik Roy Choudhary and Mattia Fazzini and Tevfik Bultan and Alessandro Orso and Christopher Kruegel}, editor = {Mats Per Erik Heimdahl and Zhendong Su}, title = {ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies}, booktitle = {International Symposium on Software Testing and Analysis, {ISSTA} 2012, Minneapolis, MN, USA, July 15-20, 2012}, pages = {56--66}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2338965.2336760}, doi = {10.1145/2338965.2336760}, timestamp = {Thu, 02 Dec 2021 11:46:17 +0100}, biburl = {https://dblp.org/rec/conf/issta/AlkhalafCFBOK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/CanaliLBKCK12, author = {Davide Canali and Andrea Lanzi and Davide Balzarotti and Christopher Kruegel and Mihai Christodorescu and Engin Kirda}, editor = {Mats Per Erik Heimdahl and Zhendong Su}, title = {A quantitative study of accuracy in system call-based malware detection}, booktitle = {International Symposium on Software Testing and Analysis, {ISSTA} 2012, Minneapolis, MN, USA, July 15-20, 2012}, pages = {122--132}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2338965.2336768}, doi = {10.1145/2338965.2336768}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issta/CanaliLBKCK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/YangZZKZ12, author = {Lei Yang and Zengbin Zhang and Ben Y. Zhao and Christopher Kruegel and Haitao Zheng}, editor = {Asis Nasipuri and Yih{-}Chun Hu and Sanjay Shakkottai}, title = {Enforcing dynamic spectrum access with spectrum permits}, booktitle = {The Thirteenth {ACM} International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc '12, Hilton Head, SC, USA, June 11-14, 2012}, pages = {195--204}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2248371.2248400}, doi = {10.1145/2248371.2248400}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobihoc/YangZZKZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/YildizK12, author = {Hakan Yildiz and Christopher Kruegel}, title = {Detecting social cliques for automated privacy control in online social networks}, booktitle = {Tenth Annual {IEEE} International Conference on Pervasive Computing and Communications, PerCom 2012, March 19-23, 2012, Lugano, Switzerland, Workshop Proceedings}, pages = {353--359}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/PerComW.2012.6197509}, doi = {10.1109/PERCOMW.2012.6197509}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/YildizK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/OverveldtKV12, author = {Timon Van Overveldt and Christopher Kruegel and Giovanni Vigna}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {FlashDetect: ActionScript 3 Malware Detection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {274--293}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_14}, doi = {10.1007/978-3-642-33338-5\_14}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/OverveldtKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/InvernizziC12, author = {Luca Invernizzi and Paolo Milani Comparetti and Stefano Benvenuti and Christopher Kruegel and Marco Cova and Giovanni Vigna}, title = {EvilSeed: {A} Guided Approach to Finding Malicious Web Pages}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {428--442}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.33}, doi = {10.1109/SP.2012.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/InvernizziC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/StringhiniEZHKV12, author = {Gianluca Stringhini and Manuel Egele and Apostolis Zarras and Thorsten Holz and Christopher Kruegel and Giovanni Vigna}, editor = {Tadayoshi Kohno}, title = {B@bel: Leveraging Email Delivery for Spam Mitigation}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {16--32}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/stringhini}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/StringhiniEZHKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JacobKKV12, author = {Gr{\'{e}}goire Jacob and Engin Kirda and Christopher Kruegel and Giovanni Vigna}, editor = {Tadayoshi Kohno}, title = {{PUBCRAWL:} Protecting Users and Businesses from CRAWLers}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {507--522}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/jacob}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/JacobKKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DoupeCKV12, author = {Adam Doup{\'{e}} and Ludovico Cavedon and Christopher Kruegel and Giovanni Vigna}, editor = {Tadayoshi Kohno}, title = {Enemy of the State: {A} State-Aware Black-Box Web Vulnerability Scanner}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {523--538}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/doupe}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/DoupeCKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wosn/StringhiniEKV12, author = {Gianluca Stringhini and Manuel Egele and Christopher Kruegel and Giovanni Vigna}, editor = {Balachander Krishnamurthy and Stefan Saroiu and Ben Y. Zhao}, title = {Poultry markets: on the underground economy of twitter followers}, booktitle = {Proceedings of the 2012 {ACM} workshop on Workshop on Online Social Networks, {WOSN} 2012, Helsinki, Finland, August 17, 2012}, pages = {1--6}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2342549.2342551}, doi = {10.1145/2342549.2342551}, timestamp = {Mon, 26 Jun 2023 08:43:55 +0200}, biburl = {https://dblp.org/rec/conf/wosn/StringhiniEKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Kruegel11, author = {Christopher Kruegel}, title = {Making browser extensions secure: technical perspective}, journal = {Commun. {ACM}}, volume = {54}, number = {9}, pages = {90}, year = {2011}, url = {https://doi.org/10.1145/1995376.1995397}, doi = {10.1145/1995376.1995397}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Kruegel11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Stone-GrossCGKKV11, author = {Brett Stone{-}Gross and Marco Cova and Bob Gilbert and Richard A. Kemmerer and Christopher Kruegel and Giovanni Vigna}, title = {Analysis of a Botnet Takeover}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {1}, pages = {64--72}, year = {2011}, url = {https://doi.org/10.1109/MSP.2010.144}, doi = {10.1109/MSP.2010.144}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Stone-GrossCGKKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NeugschwandtnerCJK11, author = {Matthias Neugschwandtner and Paolo Milani Comparetti and Gr{\'{e}}goire Jacob and Christopher Kruegel}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {{FORECAST:} skimming off the malware cream}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {11--20}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076735}, doi = {10.1145/2076732.2076735}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NeugschwandtnerCJK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CiprianoZHKV11, author = {Casey Cipriano and Ali Zand and Amir Houmansadr and Christopher Kruegel and Giovanni Vigna}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Nexat: a history-based approach to predict attacker actions}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {383--392}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076787}, doi = {10.1145/2076732.2076787}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CiprianoZHKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KiratVK11, author = {Dhilung Kirat and Giovanni Vigna and Christopher Kruegel}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {BareBox: efficient malware analysis on bare-metal}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {403--412}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076790}, doi = {10.1145/2076732.2076790}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KiratVK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DoupeBKV11, author = {Adam Doup{\'{e}} and Bryce Boe and Christopher Kruegel and Giovanni Vigna}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Fear the {EAR:} discovering and mitigating execution after redirect vulnerabilities}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {251--262}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046736}, doi = {10.1145/2046707.2046736}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DoupeBKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KolbitschKK11, author = {Clemens Kolbitsch and Engin Kirda and Christopher Kruegel}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {The power of procrastination: detection and mitigation of execution-stalling malicious code}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {285--296}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046740}, doi = {10.1145/2046707.2046740}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KolbitschKK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloud/PuttaswamyKZ11, author = {Krishna P. N. Puttaswamy and Christopher Kruegel and Ben Y. Zhao}, editor = {Jeffrey S. Chase and Amr El Abbadi}, title = {Silverline: toward data confidentiality in storage-intensive cloud applications}, booktitle = {{ACM} Symposium on Cloud Computing in conjunction with {SOSP} 2011, {SOCC} '11, Cascais, Portugal, October 26-28, 2011}, pages = {10}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2038916.2038926}, doi = {10.1145/2038916.2038926}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloud/PuttaswamyKZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/KapravelosCKV11, author = {Alexandros Kapravelos and Marco Cova and Christopher Kruegel and Giovanni Vigna}, editor = {Thorsten Holz and Herbert Bos}, title = {Escape from Monkey Island: Evading High-Interaction Honeyclients}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6739}, pages = {124--143}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22424-9\_8}, doi = {10.1007/978-3-642-22424-9\_8}, timestamp = {Wed, 25 Sep 2019 18:15:55 +0200}, biburl = {https://dblp.org/rec/conf/dimva/KapravelosCKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/BanksFKKV11, author = {Greg Banks and Aristide Fattori and Richard A. Kemmerer and Christopher Kruegel and Giovanni Vigna}, editor = {Thorsten Holz and Herbert Bos}, title = {{MISHIMA:} Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper)}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6739}, pages = {184--193}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22424-9\_11}, doi = {10.1007/978-3-642-22424-9\_11}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/BanksFKKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/SzydlowskiZKK11, author = {Martin Szydlowski and Ben Y. Zhao and Engin Kirda and Christopher Kruegel}, editor = {Haohong Wang and Jin Li and George N. Rouskas and Xiaobo Zhou}, title = {BTLab: {A} System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients}, booktitle = {Proceedings of 20th International Conference on Computer Communications and Networks, {ICCCN} 2011, Maui, Hawaii, USA, July 31 - August 4, 2011}, pages = {1--6}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICCCN.2011.6005925}, doi = {10.1109/ICCCN.2011.6005925}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icccn/SzydlowskiZKK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-4/SzydlowskiEKV11, author = {Martin Szydlowski and Manuel Egele and Christopher Kruegel and Giovanni Vigna}, editor = {Jan Camenisch and Dogan Kesdogan}, title = {Challenges for Dynamic Analysis of iOS Applications}, booktitle = {Open Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7039}, pages = {65--77}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27585-2\_6}, doi = {10.1007/978-3-642-27585-2\_6}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-4/SzydlowskiEKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/Stone-GrossSZKKV11, author = {Brett Stone{-}Gross and Ryan Stevens and Apostolis Zarras and Richard A. Kemmerer and Christopher Kruegel and Giovanni Vigna}, editor = {Patrick Thiran and Walter Willinger}, title = {Understanding fraudulent activities in online ad exchanges}, booktitle = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} '11, Berlin, Germany, November 2-, 2011}, pages = {279--294}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2068816.2068843}, doi = {10.1145/2068816.2068843}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/Stone-GrossSZKKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Stone-GrossCKV11, author = {Brett Stone{-}Gross and Marco Cova and Christopher Kruegel and Giovanni Vigna}, title = {Peering through the iframe}, booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 10-15 April 2011, Shanghai, China}, pages = {411--415}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INFCOM.2011.5935193}, doi = {10.1109/INFCOM.2011.5935193}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/Stone-GrossCKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BilgeKKB11, author = {Leyla Bilge and Engin Kirda and Christopher Kruegel and Marco Balduzzi}, title = {{EXPOSURE:} Finding Malicious Domains Using Passive {DNS} Analysis}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2011, San Diego, California, USA, 6th February - 9th February 2011}, publisher = {The Internet Society}, year = {2011}, url = {https://www.ndss-symposium.org/ndss2011/exposure-finding-malicious-domains-using-passive-dns-analysis}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BilgeKKB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/EgeleKKV11, author = {Manuel Egele and Christopher Kruegel and Engin Kirda and Giovanni Vigna}, title = {PiOS: Detecting Privacy Leaks in iOS Applications}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2011, San Diego, California, USA, 6th February - 9th February 2011}, publisher = {The Internet Society}, year = {2011}, url = {https://www.ndss-symposium.org/ndss2011/pios-detecting-privacy-leaks-ios-applications-paper}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/EgeleKKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/EgeleMKK11, author = {Manuel Egele and Andreas Moser and Christopher Kruegel and Engin Kirda}, title = {PoX: Protecting users from malicious Facebook applications}, booktitle = {Ninth Annual {IEEE} International Conference on Pervasive Computing and Communications, PerCom 2011, 21-25 March 2011, Seattle, WA, USA, Workshop Proceedings}, pages = {288--294}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/PERCOMW.2011.5766885}, doi = {10.1109/PERCOMW.2011.5766885}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/EgeleMKK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GilbertKKV11, author = {Bob Gilbert and Richard A. Kemmerer and Christopher Kruegel and Giovanni Vigna}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Dymo: Tracking Dynamic Code Identity}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {21--40}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_2}, doi = {10.1007/978-3-642-23644-0\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/GilbertKKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/FratantonioKV11, author = {Yanick Fratantonio and Christopher Kruegel and Giovanni Vigna}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Shellzer: {A} Tool for the Dynamic Analysis of Malicious Shellcode}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {61--80}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_4}, doi = {10.1007/978-3-642-23644-0\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/FratantonioKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JacobHKH11, author = {Gr{\'{e}}goire Jacob and Ralf Hund and Christopher Kruegel and Thorsten Holz}, title = {{JACKSTRAWS:} Picking Command and Control Connections from Bot Traffic}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Jacob.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/JacobHKH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/StringhiniHSKV11, author = {Gianluca Stringhini and Thorsten Holz and Brett Stone{-}Gross and Christopher Kruegel and Giovanni Vigna}, title = {{BOTMAGNIFIER:} Locating Spambots on the Internet}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Stringhini.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/StringhiniHSKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/Stone-GrossAKKS11, author = {Brett Stone{-}Gross and Ryan Abman and Richard A. Kemmerer and Christopher Kruegel and Douglas G. Steigerwald}, title = {The Underground Economy of Fake Antivirus Software}, booktitle = {10th Annual Workshop on the Economics of Information Security, {WEIS} 2011, George Mason University, Fairfax, VA, USA, June 14-15, 2011}, year = {2011}, url = {http://weis2011.econinfosec.org/papers/The\%20Underground\%20Economy\%20of\%20Fake\%20Antivirus\%20Software.pdf}, timestamp = {Thu, 22 Jul 2021 16:15:44 +0200}, biburl = {https://dblp.org/rec/conf/weis/Stone-GrossAKKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/Stone-GrossAKKS11a, author = {Brett Stone{-}Gross and Ryan Abman and Richard A. Kemmerer and Christopher Kruegel and Douglas G. Steigerwald and Giovanni Vigna}, editor = {Bruce Schneier}, title = {The Underground Economy of Fake Antivirus Software}, booktitle = {Economics of Information Security and Privacy {III} [papers from the Tenth Workshop on Economics and Information Security, {WEIS} 2011]}, pages = {55--78}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-1981-5\_4}, doi = {10.1007/978-1-4614-1981-5\_4}, timestamp = {Fri, 16 Aug 2019 12:52:37 +0200}, biburl = {https://dblp.org/rec/conf/weis/Stone-GrossAKKS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/CanaliCVK11, author = {Davide Canali and Marco Cova and Giovanni Vigna and Christopher Kruegel}, editor = {Sadagopan Srinivasan and Krithi Ramamritham and Arun Kumar and M. P. Ravindra and Elisa Bertino and Ravi Kumar}, title = {Prophiler: a fast filter for the large-scale detection of malicious web pages}, booktitle = {Proceedings of the 20th International Conference on World Wide Web, {WWW} 2011, Hyderabad, India, March 28 - April 1, 2011}, pages = {197--206}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1963405.1963436}, doi = {10.1145/1963405.1963436}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/CanaliCVK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/leet/2011, editor = {Christopher Kruegel}, title = {4th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '11, Boston, MA, USA, March 29, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/leet11}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/leet/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/JovanovicKK10, author = {Nenad Jovanovic and Christopher Kruegel and Engin Kirda}, title = {Static analysis for detecting taint-style vulnerabilities in web applications}, journal = {J. Comput. Secur.}, volume = {18}, number = {5}, pages = {861--907}, year = {2010}, url = {https://doi.org/10.3233/JCS-2009-0385}, doi = {10.3233/JCS-2009-0385}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/JovanovicKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/StringhiniKV10, author = {Gianluca Stringhini and Christopher Kruegel and Giovanni Vigna}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Detecting spammers on social networks}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {1--9}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920263}, doi = {10.1145/1920261.1920263}, timestamp = {Wed, 28 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/StringhiniKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BalduzziEKBK10, author = {Marco Balduzzi and Manuel Egele and Engin Kirda and Davide Balzarotti and Christopher Kruegel}, editor = {Dengguo Feng and David A. Basin and Peng Liu}, title = {A solution for the automated detection of clickjacking attacks}, booktitle = {Proceedings of the 5th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16, 2010}, pages = {135--144}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1755688.1755706}, doi = {10.1145/1755688.1755706}, timestamp = {Fri, 03 Jun 2022 12:02:10 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BalduzziEKBK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LanziBKCK10, author = {Andrea Lanzi and Davide Balzarotti and Christopher Kruegel and Mihai Christodorescu and Engin Kirda}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {AccessMiner: using system-centric models for malware protection}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {399--412}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866353}, doi = {10.1145/1866307.1866353}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LanziBKCK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-4/CavedonKV10, author = {Ludovico Cavedon and Christopher Kruegel and Giovanni Vigna}, editor = {Jan Camenisch and Valentin S. Kisimov and Maria Dubovitskaya}, title = {Are {BGP} Routers Open to Attack? An Experiment}, booktitle = {Open Research Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6555}, pages = {88--103}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19228-9\_8}, doi = {10.1007/978-3-642-19228-9\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-4/CavedonKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BalzarottiCKKKV10, author = {Davide Balzarotti and Marco Cova and Christoph Karlberger and Engin Kirda and Christopher Kruegel and Giovanni Vigna}, title = {Efficient Detection of Split Personalities in Malware}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March 2010}, publisher = {The Internet Society}, year = {2010}, url = {https://www.ndss-symposium.org/ndss2010/efficient-detection-split-personalities-malware}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BalzarottiCKKKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/RobertsonMKV10, author = {William K. Robertson and Federico Maggi and Christopher Kruegel and Giovanni Vigna}, title = {Effective Anomaly Detection with Scarce Training Data}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March 2010}, publisher = {The Internet Society}, year = {2010}, url = {https://www.ndss-symposium.org/ndss2010/effective-anomaly-detection-scarce-training-data}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/RobertsonMKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BalduzziPHKBK10, author = {Marco Balduzzi and Christian Platzer and Thorsten Holz and Engin Kirda and Davide Balzarotti and Christopher Kruegel}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Abusing Social Networks for Automated User Profiling}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {422--441}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_22}, doi = {10.1007/978-3-642-15512-3\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/BalduzziPHKBK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/EgeleBKK10, author = {Manuel Egele and Leyla Bilge and Engin Kirda and Christopher Kruegel}, editor = {Sung Y. Shin and Sascha Ossowski and Michael Schumacher and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {{CAPTCHA} smuggling: hijacking web browsing sessions to create {CAPTCHA} farms}, booktitle = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010}, pages = {1865--1870}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1774088.1774483}, doi = {10.1145/1774088.1774483}, timestamp = {Sun, 02 Jun 2019 21:18:37 +0200}, biburl = {https://dblp.org/rec/conf/sac/EgeleBKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BayerKK10, author = {Ulrich Bayer and Engin Kirda and Christopher Kruegel}, editor = {Sung Y. Shin and Sascha Ossowski and Michael Schumacher and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {Improving the efficiency of dynamic malware analysis}, booktitle = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010}, pages = {1871--1878}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1774088.1774484}, doi = {10.1145/1774088.1774484}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/BayerKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KolbitschHKK10, author = {Clemens Kolbitsch and Thorsten Holz and Christopher Kruegel and Engin Kirda}, title = {Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {29--44}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.10}, doi = {10.1109/SP.2010.10}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/KolbitschHKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ComparettiSKKKZ10, author = {Paolo Milani Comparetti and Guido Salvaneschi and Engin Kirda and Clemens Kolbitsch and Christopher Kruegel and Stefano Zanero}, title = {Identifying Dormant Functionality in Malware Programs}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {61--76}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.12}, doi = {10.1109/SP.2010.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ComparettiSKKKZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WondracekHKK10, author = {Gilbert Wondracek and Thorsten Holz and Engin Kirda and Christopher Kruegel}, title = {A Practical Attack to De-anonymize Social Network Users}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {223--238}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.21}, doi = {10.1109/SP.2010.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/WondracekHKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FelmetsgerCKV10, author = {Viktoria Felmetsger and Ludovico Cavedon and Christopher Kruegel and Giovanni Vigna}, title = {Toward Automated Detection of Logic Vulnerabilities in Web Applications}, booktitle = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings}, pages = {143--160}, publisher = {{USENIX} Association}, year = {2010}, url = {http://www.usenix.org/events/sec10/tech/full\_papers/Felmetsger.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/FelmetsgerCKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/WondracekHPKK10, author = {Gilbert Wondracek and Thorsten Holz and Christian Platzer and Engin Kirda and Christopher Kruegel}, title = {Is the Internet for Porn? An Insight Into the Online Adult Industry}, booktitle = {9th Annual Workshop on the Economics of Information Security, {WEIS} 2010, Harvard University, Cambridge, MA, USA, June 7-8, 2010}, year = {2010}, url = {http://weis2010.econinfosec.org/papers/session2/weis2010\_wondracek.pdf}, timestamp = {Thu, 22 Jul 2021 16:15:46 +0200}, biburl = {https://dblp.org/rec/conf/weis/WondracekHPKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/CovaKV10, author = {Marco Cova and Christopher Kr{\"{u}}gel and Giovanni Vigna}, editor = {Michael Rappa and Paul Jones and Juliana Freire and Soumen Chakrabarti}, title = {Detection and analysis of drive-by-download attacks and malicious JavaScript code}, booktitle = {Proceedings of the 19th International Conference on World Wide Web, {WWW} 2010, Raleigh, North Carolina, USA, April 26-30, 2010}, pages = {281--290}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1772690.1772720}, doi = {10.1145/1772690.1772720}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/CovaKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KirdaJKV09, author = {Engin Kirda and Nenad Jovanovic and Christopher Kruegel and Giovanni Vigna}, title = {Client-side cross-site scripting protection}, journal = {Comput. Secur.}, volume = {28}, number = {7}, pages = {592--604}, year = {2009}, url = {https://doi.org/10.1016/j.cose.2009.04.008}, doi = {10.1016/J.COSE.2009.04.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KirdaJKV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MitterhoferKKP09, author = {Stefan Mitterhofer and Christopher Kr{\"{u}}gel and Engin Kirda and Christian Platzer}, title = {Server-Side Bot Detection in Massively Multiplayer Online Games}, journal = {{IEEE} Secur. Priv.}, volume = {7}, number = {3}, pages = {29--36}, year = {2009}, url = {https://doi.org/10.1109/MSP.2009.78}, doi = {10.1109/MSP.2009.78}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/MitterhoferKKP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ife/CarleDKKKL09, author = {Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K{\"{o}}nig and Christopher Kruegel and Pavel Laskov}, title = {Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008}, journal = {Comput. Sci. Res. Dev.}, volume = {23}, number = {1}, pages = {15--25}, year = {2009}, url = {https://doi.org/10.1007/s00450-009-0055-y}, doi = {10.1007/S00450-009-0055-Y}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ife/CarleDKKKL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/VignaVBRKK09, author = {Giovanni Vigna and Fredrik Valeur and Davide Balzarotti and William K. Robertson and Christopher Kruegel and Engin Kirda}, title = {Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and {SQL} queries}, journal = {J. Comput. Secur.}, volume = {17}, number = {3}, pages = {305--329}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0321}, doi = {10.3233/JCS-2009-0321}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/VignaVBRKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Stone-GrossKAMK09, author = {Brett Stone{-}Gross and Christopher Kruegel and Kevin C. Almeroth and Andreas Moser and Engin Kirda}, title = {{FIRE:} FInding Rogue nEtworks}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {231--240}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.29}, doi = {10.1109/ACSAC.2009.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Stone-GrossKAMK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FordCKV09, author = {Sean Ford and Marco Cova and Christopher Kruegel and Giovanni Vigna}, title = {Analyzing and Detecting Malicious Flash Advertisements}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {363--372}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.41}, doi = {10.1109/ACSAC.2009.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FordCKV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Stone-GrossCCGSKKV09, author = {Brett Stone{-}Gross and Marco Cova and Lorenzo Cavallaro and Bob Gilbert and Martin Szydlowski and Richard A. Kemmerer and Christopher Kruegel and Giovanni Vigna}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {Your botnet is my botnet: analysis of a botnet takeover}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {635--647}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653738}, doi = {10.1145/1653662.1653738}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Stone-GrossCCGSKKV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/EgeleWKK09, author = {Manuel Egele and Peter Wurzinger and Christopher Kruegel and Engin Kirda}, editor = {Ulrich Flegel and Danilo Bruschi}, title = {Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5587}, pages = {88--106}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02918-9\_6}, doi = {10.1007/978-3-642-02918-9\_6}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/EgeleWKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WurzingerBHGKK09, author = {Peter Wurzinger and Leyla Bilge and Thorsten Holz and Jan Goebel and Christopher Kruegel and Engin Kirda}, editor = {Michael Backes and Peng Ning}, title = {Automatically Generating Models for Botnet Detection}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {232--249}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_15}, doi = {10.1007/978-3-642-04444-1\_15}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WurzingerBHGKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/WurzingerPLKK09, author = {Peter W{\"{u}}rzinger and Christian Platzer and Christian Ludl and Engin Kirda and Christopher Kruegel}, title = {{SWAP:} Mitigating {XSS} attacks using a reverse proxy}, booktitle = {{ICSE} Workshop on Software Engineering for Secure Systems, {SESS} 2009, Vancouver, BC, Canada, May 19, 2009}, pages = {33--39}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IWSESS.2009.5068456}, doi = {10.1109/IWSESS.2009.5068456}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/WurzingerPLKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-4/EgeleKK09, author = {Manuel Egele and Engin Kirda and Christopher Kruegel}, editor = {Jan Camenisch and Dogan Kesdogan}, title = {Mitigating Drive-By Download Attacks: Challenges and Open Problems}, booktitle = {iNetSec 2009 - Open Research Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {309}, pages = {52--62}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05437-2\_5}, doi = {10.1007/978-3-642-05437-2\_5}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-4/EgeleKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/StammingerKVK09, author = {Andreas Stamminger and Christopher Kruegel and Giovanni Vigna and Engin Kirda}, editor = {Pierangela Samarati and Moti Yung and Fabio Martinelli and Claudio A. Ardagna}, title = {Automated Spyware Collection and Analysis}, booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa, Italy, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5735}, pages = {202--217}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04474-8\_17}, doi = {10.1007/978-3-642-04474-8\_17}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/isw/StammingerKVK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BayerCHKK09, author = {Ulrich Bayer and Paolo Milani Comparetti and Clemens Hlauschek and Christopher Kr{\"{u}}gel and Engin Kirda}, title = {Scalable, Behavior-Based Malware Clustering}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/scalable-behavior-based-malware-clustering/}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BayerCHKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MaggiRKV09, author = {Federico Maggi and William K. Robertson and Christopher Kr{\"{u}}gel and Giovanni Vigna}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Protecting a Moving Target: Addressing Web Application Concept Drift}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {21--40}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_2}, doi = {10.1007/978-3-642-04342-0\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/MaggiRKV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ComparettiWKK09, author = {Paolo Milani Comparetti and Gilbert Wondracek and Christopher Kr{\"{u}}gel and Engin Kirda}, title = {Prospex: Protocol Specification Extraction}, booktitle = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May 2009, Oakland, California, {USA}}, pages = {110--125}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SP.2009.14}, doi = {10.1109/SP.2009.14}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/ComparettiWKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KolbitschCKKZW09, author = {Clemens Kolbitsch and Paolo Milani Comparetti and Christopher Kruegel and Engin Kirda and Xiao{-}yong Zhou and XiaoFeng Wang}, editor = {Fabian Monrose}, title = {Effective and Efficient Malware Detection at the End Host}, booktitle = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14, 2009, Proceedings}, pages = {351--366}, publisher = {{USENIX} Association}, year = {2009}, url = {http://www.usenix.org/events/sec09/tech/full\_papers/kolbitsch.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KolbitschCKKZW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/IoannidisMK09, author = {Sotiris Ioannidis and Evangelos P. Markatos and Christopher Kruegel}, title = {On looking {FORWARD}}, journal = {{ERCIM} News}, volume = {2009}, number = {76}, year = {2009}, url = {http://ercim-news.ercim.eu/en76/rd/on-looking-forward}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/IoannidisMK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/Stone-GrossSCMAK08, author = {Brett Stone{-}Gross and David Sigal and Rob Cohn and John Morse and Kevin C. Almeroth and Christopher Kruegel}, editor = {Diego Zamboni}, title = {VeriKey: {A} Dynamic Certificate Verification System for Public Key Exchanges}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, {DIMVA} 2008, Paris, France, July 10-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5137}, pages = {44--63}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70542-0\_3}, doi = {10.1007/978-3-540-70542-0\_3}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/Stone-GrossSCMAK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/FoschiniTCKV08, author = {Luca Foschini and Ashish V. Thapliyal and Lorenzo Cavallaro and Christopher Kruegel and Giovanni Vigna}, editor = {R. Sekar and Arun K. Pujari}, title = {A Parallel Architecture for Stateful, High-Speed Intrusion Detection}, booktitle = {Information Systems Security, 4th International Conference, {ICISS} 2008, Hyderabad, India, December 16-20, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {203--220}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89862-7\_18}, doi = {10.1007/978-3-540-89862-7\_18}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/FoschiniTCKV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indiaSE/ChristodorescuJK08, author = {Mihai Christodorescu and Somesh Jha and Christopher Kruegel}, editor = {Gautam Shroff and Pankaj Jalote and Sriram K. Rajamani}, title = {Mining specifications of malicious behavior}, booktitle = {Proceeding of the 1st Annual India Software Engineering Conference, {ISEC} 2008, Hyderabad, India, February 19-22, 2008}, pages = {5--14}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1342211.1342215}, doi = {10.1145/1342211.1342215}, timestamp = {Thu, 10 Dec 2020 11:39:56 +0100}, biburl = {https://dblp.org/rec/conf/indiaSE/ChristodorescuJK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WondracekCKK08, author = {Gilbert Wondracek and Paolo Milani Comparetti and Christopher Kr{\"{u}}gel and Engin Kirda}, title = {Automatic Network Protocol Analysis}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2008, San Diego, California, USA, 10th February - 13th February 2008}, publisher = {The Internet Society}, year = {2008}, url = {https://www.ndss-symposium.org/ndss2008/automatic-network-protocol-analysis/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WondracekCKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/McAllisterKK08, author = {Sean McAllister and Engin Kirda and Christopher Kruegel}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Leveraging User Interactions for In-Depth Testing of Web Applications}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {191--210}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_11}, doi = {10.1007/978-3-540-87403-4\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/McAllisterKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/StarnbergerKK08, author = {Guenther Starnberger and Christopher Kruegel and Engin Kirda}, editor = {Albert Levi and Peng Liu and Refik Molva}, title = {Overbot: a botnet protocol based on Kademlia}, booktitle = {4th International {ICST} Conference on Security and Privacy in Communication Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008}, pages = {13}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1460877.1460894}, doi = {10.1145/1460877.1460894}, timestamp = {Tue, 06 Nov 2018 16:58:12 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/StarnbergerKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/MedvetKK08, author = {Eric Medvet and Engin Kirda and Christopher Kruegel}, editor = {Albert Levi and Peng Liu and Refik Molva}, title = {Visual-similarity-based phishing detection}, booktitle = {4th International {ICST} Conference on Security and Privacy in Communication Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008}, pages = {22}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1460877.1460905}, doi = {10.1145/1460877.1460905}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/MedvetKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BalzarottiCFJKKV08, author = {Davide Balzarotti and Marco Cova and Viktoria Felmetsger and Nenad Jovanovic and Engin Kirda and Christopher Kruegel and Giovanni Vigna}, title = {Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {387--401}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.22}, doi = {10.1109/SP.2008.22}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/BalzarottiCFJKKV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CovaKV08, author = {Marco Cova and Christopher Kruegel and Giovanni Vigna}, editor = {Dan Boneh and Tal Garfinkel and Dug Song}, title = {There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits}, booktitle = {2nd {USENIX} Workshop on Offensive Technologies, WOOT'08, San Jose, CA, USA, July 28, 2008, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/woot08/tech/full\_papers/cova/cova.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/CovaKV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2008P8102, editor = {Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K{\"{o}}nig and Christopher Kruegel}, title = {Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08102}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/portals/08102/}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/2008P8102.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BraunDHKKKLRS08, author = {Lothar Braun and Falko Dressler and Thorsten Holz and Engin Kirda and Jan Kohlrausch and Christopher Kruegel and Tobias Limmer and Konrad Rieck and James P. G. Sterbenz}, editor = {Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K{\"{o}}nig and Christopher Kruegel}, title = {08102 Working Group -- Requirements for Network Monitoring from an {IDS} Perspective}, booktitle = {Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08102}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1497}, timestamp = {Thu, 10 Jun 2021 13:02:08 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BraunDHKKKLRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/CarleDKKK08, author = {Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K{\"{o}}nig and Christopher Kruegel}, editor = {Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K{\"{o}}nig and Christopher Kruegel}, title = {08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense}, booktitle = {Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08102}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1492}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/CarleDKKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/CarleDKKKL08, author = {Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K{\"{o}}nig and Christopher Kruegel and Pavel Laskov}, editor = {Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K{\"{o}}nig and Christopher Kruegel}, title = {08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense}, booktitle = {Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08102}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1491}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/CarleDKKKL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/DacierDHKKKRS08, author = {Marc Dacier and Herv{\'{e}} Debar and Thorsten Holz and Engin Kirda and Jan Kohlrausch and Christopher Kruegel and Konrad Rieck and James P. G. Sterbenz}, editor = {Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K{\"{o}}nig and Christopher Kruegel}, title = {8102 Working Group -- Attack Taxonomy}, booktitle = {Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08102}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1495}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/DacierDHKKKRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KlinkoffKKV07, author = {Patrick Klinkoff and Engin Kirda and Christopher Kruegel and Giovanni Vigna}, title = {Extending .NET security to unmanaged code}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {6}, pages = {417--428}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0031-0}, doi = {10.1007/S10207-007-0031-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KlinkoffKKV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KruegelBRV07, author = {Christopher Kruegel and Davide Balzarotti and William K. Robertson and Giovanni Vigna}, title = {Improving Signature Testing through Dynamic Data Flow Analysis}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {53--63}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.40}, doi = {10.1109/ACSAC.2007.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KruegelBRV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SzydlowskiKK07, author = {Martin Szydlowski and Christopher Kruegel and Engin Kirda}, title = {Secure Input for Web Applications}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {375--384}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.28}, doi = {10.1109/ACSAC.2007.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SzydlowskiKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MoserKK07, author = {Andreas Moser and Christopher Kruegel and Engin Kirda}, title = {Limits of Static Analysis for Malware Detection}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {421--430}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.21}, doi = {10.1109/ACSAC.2007.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MoserKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YinSEKK07, author = {Heng Yin and Dawn Xiaodong Song and Manuel Egele and Christopher Kruegel and Engin Kirda}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Panorama: capturing system-wide information flow for malware detection and analysis}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {116--127}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315261}, doi = {10.1145/1315245.1315261}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YinSEKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/LudlMKK07, author = {Christian Ludl and Sean McAllister and Engin Kirda and Christopher Kruegel}, editor = {Bernhard M. H{\"{a}}mmerli and Robin Sommer}, title = {On the Effectiveness of Techniques to Detect Phishing Sites}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, {DIMVA} 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4579}, pages = {20--39}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73614-1\_2}, doi = {10.1007/978-3-540-73614-1\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/LudlMKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/RaffetsederKK07, author = {Thomas Raffetseder and Engin Kirda and Christopher Kruegel}, title = {Building Anti-Phishing Browser Plug-Ins: An Experience Report}, booktitle = {Third International Workshop on Software Engineering for Secure Systems, {SESS} 2007, Minneapolis, MN, USA, May 20-26, 2007}, pages = {6}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SESS.2007.6}, doi = {10.1109/SESS.2007.6}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/RaffetsederKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/RaffetsederKK07, author = {Thomas Raffetseder and Christopher Kr{\"{u}}gel and Engin Kirda}, editor = {Juan A. Garay and Arjen K. Lenstra and Masahiro Mambo and Ren{\'{e}} Peralta}, title = {Detecting System Emulators}, booktitle = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so, Chile, October 9-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4779}, pages = {1--18}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75496-1\_1}, doi = {10.1007/978-3-540-75496-1\_1}, timestamp = {Fri, 03 Feb 2023 21:39:19 +0100}, biburl = {https://dblp.org/rec/conf/isw/RaffetsederKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/VogtNJKKV07, author = {Philipp Vogt and Florian Nentwich and Nenad Jovanovic and Engin Kirda and Christopher Kr{\"{u}}gel and Giovanni Vigna}, title = {Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March 2007}, publisher = {The Internet Society}, year = {2007}, url = {https://www.ndss-symposium.org/ndss2007/cross-site-scripting-prevention-dynamic-data-tainting-and-static-analysis/}, timestamp = {Mon, 01 Feb 2021 08:42:16 +0100}, biburl = {https://dblp.org/rec/conf/ndss/VogtNJKKV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/RosielloKKF07, author = {Angelo P. E. Rosiello and Engin Kirda and Christopher Kruegel and Fabrizio Ferrandi}, title = {A layout-similarity-based approach for detecting phishing pages}, booktitle = {Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007}, pages = {454--463}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/SECCOM.2007.4550367}, doi = {10.1109/SECCOM.2007.4550367}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/RosielloKKF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/ChristodorescuJK07, author = {Mihai Christodorescu and Somesh Jha and Christopher Kruegel}, editor = {Ivica Crnkovic and Antonia Bertolino}, title = {Mining specifications of malicious behavior}, booktitle = {Proceedings of the 6th joint meeting of the European Software Engineering Conference and the {ACM} {SIGSOFT} International Symposium on Foundations of Software Engineering, 2007, Dubrovnik, Croatia, September 3-7, 2007}, pages = {5--14}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1287624.1287628}, doi = {10.1145/1287624.1287628}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/ChristodorescuJK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MoserKK07, author = {Andreas Moser and Christopher Kr{\"{u}}gel and Engin Kirda}, title = {Exploring Multiple Execution Paths for Malware Analysis}, booktitle = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23 May 2007, Oakland, California, {USA}}, pages = {231--245}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SP.2007.17}, doi = {10.1109/SP.2007.17}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/MoserKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/EgeleKKYS07, author = {Manuel Egele and Christopher Kruegel and Engin Kirda and Heng Yin and Dawn Xiaodong Song}, editor = {Jeff Chase and Srinivasan Seshan}, title = {Dynamic Spyware Analysis}, booktitle = {Proceedings of the 2007 {USENIX} Annual Technical Conference, Santa Clara, CA, USA, June 17-22, 2007}, pages = {233--246}, publisher = {{USENIX}}, year = {2007}, url = {http://www.usenix.org/events/usenix07/tech/egele.html}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/usenix/EgeleKKYS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/KarlbergerBKK07, author = {Christoph Karlberger and G{\"{u}}nther Bayler and Christopher Kruegel and Engin Kirda}, editor = {Dan Boneh and Tal Garfinkel and Dug Song}, title = {Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters}, booktitle = {First {USENIX} Workshop on Offensive Technologies, {WOOT} '07, Boston, MA, USA, August 6, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/woot-07/exploiting-redundancy-natural-language-penetrate-bayesian-spam-filters}, timestamp = {Mon, 01 Feb 2021 08:41:52 +0100}, biburl = {https://dblp.org/rec/conf/woot/KarlbergerBKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Kruegel07, author = {Christopher Kruegel}, editor = {Mihai Christodorescu and Somesh Jha and Douglas Maughan and Dawn Song and Cliff Wang}, title = {Behavioral and Structural Properties of Malicious Code}, booktitle = {Malware Detection}, series = {Advances in Information Security}, volume = {27}, pages = {63--83}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44599-1\_4}, doi = {10.1007/978-0-387-44599-1\_4}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/Kruegel07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2007, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0}, doi = {10.1007/978-3-540-74320-0}, isbn = {978-3-540-74319-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/KirdaK06, author = {Engin Kirda and Christopher Kr{\"{u}}gel}, title = {Protecting Users against Phishing Attacks}, journal = {Comput. J.}, volume = {49}, number = {5}, pages = {554--561}, year = {2006}, url = {https://doi.org/10.1093/comjnl/bxh169}, doi = {10.1093/COMJNL/BXH169}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/KirdaK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MutzVVK06, author = {Darren Mutz and Fredrik Valeur and Giovanni Vigna and Christopher Kr{\"{u}}gel}, title = {Anomalous system call detection}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {1}, pages = {61--93}, year = {2006}, url = {https://doi.org/10.1145/1127345.1127348}, doi = {10.1145/1127345.1127348}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MutzVVK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/BayerMKK06, author = {Ulrich Bayer and Andreas Moser and Christopher Kr{\"{u}}gel and Engin Kirda}, title = {Dynamic Analysis of Malicious Code}, journal = {J. Comput. Virol.}, volume = {2}, number = {1}, pages = {67--77}, year = {2006}, url = {https://doi.org/10.1007/s11416-006-0012-2}, doi = {10.1007/S11416-006-0012-2}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/BayerMKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/EgeleSKK06, author = {Manuel Egele and Martin Szydlowski and Engin Kirda and Christopher Kr{\"{u}}gel}, editor = {Roland B{\"{u}}schkes and Pavel Laskov}, title = {Using Static Program Analysis to Aid Intrusion Detection}, booktitle = {Detection of Intrusions and Malware {\&} Vulnerability Assessment, Third International Conference, {DIMVA} 2006, Berlin, Germany, July 13-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4064}, pages = {17--36}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11790754\_2}, doi = {10.1007/11790754\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/EgeleSKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KlinkoffKKV06, author = {Patrick Klinkoff and Christopher Kr{\"{u}}gel and Engin Kirda and Giovanni Vigna}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {Extending .NET Security to Unmanaged Code}, booktitle = {Information Security, 9th International Conference, {ISC} 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4176}, pages = {1--16}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11836810\_1}, doi = {10.1007/11836810\_1}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/KlinkoffKKV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/RobertsonVKK06, author = {William K. Robertson and Giovanni Vigna and Christopher Kr{\"{u}}gel and Richard A. Kemmerer}, title = {Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2006, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2006}, url = {https://www.ndss-symposium.org/ndss2006/using-generalization-and-characterization-techniques-anomaly-based-detection-web-attacks/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/RobertsonVKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/JovanovicKK06, author = {Nenad Jovanovic and Christopher Kruegel and Engin Kirda}, editor = {Vugranam C. Sreedhar and Steve Zdancewic}, title = {Precise alias analysis for static detection of web application vulnerabilities}, booktitle = {Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, {PLAS} 2006, Ottawa, Ontario, Canada, June 10, 2006}, pages = {27--36}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1134744.1134751}, doi = {10.1145/1134744.1134751}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/JovanovicKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/KirdaKVJ06, author = {Engin Kirda and Christopher Kr{\"{u}}gel and Giovanni Vigna and Nenad Jovanovic}, editor = {Hisham Haddad}, title = {Noxes: a client-side solution for mitigating cross-site scripting attacks}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006}, pages = {330--337}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1141277.1141357}, doi = {10.1145/1141277.1141357}, timestamp = {Tue, 06 Nov 2018 11:06:49 +0100}, biburl = {https://dblp.org/rec/conf/sac/KirdaKVJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ValeurVKK06, author = {Fredrik Valeur and Giovanni Vigna and Christopher Kr{\"{u}}gel and Engin Kirda}, editor = {Hisham Haddad}, title = {An anomaly-driven reverse proxy for web applications}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006}, pages = {361--368}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1141277.1141361}, doi = {10.1145/1141277.1141361}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/ValeurVKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/JovanovicKK06, author = {Nenad Jovanovic and Engin Kirda and Christopher Kruegel}, title = {Preventing Cross Site Request Forgery Attacks}, booktitle = {Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August 2, 2006 - September 1, 2006}, pages = {1--10}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/SECCOMW.2006.359531}, doi = {10.1109/SECCOMW.2006.359531}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/JovanovicKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/JovanovicKK06, author = {Nenad Jovanovic and Christopher Kr{\"{u}}gel and Engin Kirda}, title = {Pixy: {A} Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {258--263}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.29}, doi = {10.1109/SP.2006.29}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/JovanovicKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KirdaK06, author = {Engin Kirda and Christopher Kruegel}, editor = {Angelos D. Keromytis}, title = {Behavior-based Spyware Detection}, booktitle = {Proceedings of the 15th {USENIX} Security Symposium, Vancouver, BC, Canada, July 31 - August 4, 2006}, publisher = {{USENIX} Association}, year = {2006}, url = {https://www.usenix.org/conference/15th-usenix-security-symposium/behavior-based-spyware-detection}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/KirdaK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/KalsKKJ06, author = {Stefan Kals and Engin Kirda and Christopher Kr{\"{u}}gel and Nenad Jovanovic}, editor = {Les Carr and David De Roure and Arun Iyengar and Carole A. Goble and Michael Dahlin}, title = {SecuBat: a web vulnerability scanner}, booktitle = {Proceedings of the 15th international conference on World Wide Web, {WWW} 2006, Edinburgh, Scotland, UK, May 23-26, 2006}, pages = {247--256}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1135777.1135817}, doi = {10.1145/1135777.1135817}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/KalsKKJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2006, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214}, doi = {10.1007/11856214}, isbn = {3-540-39723-X}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/KruegelVV05, author = {Christopher Kruegel and Fredrik Valeur and Giovanni Vigna}, title = {Intrusion Detection and Correlation - Challenges and Solutions}, series = {Advances in Information Security}, volume = {14}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b101493}, doi = {10.1007/B101493}, isbn = {978-0-387-23398-7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/KruegelVV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KrugelVR05, author = {Christopher Kr{\"{u}}gel and Giovanni Vigna and William K. Robertson}, title = {A multi-model approach to the detection of web-based attacks}, journal = {Comput. Networks}, volume = {48}, number = {5}, pages = {717--738}, year = {2005}, url = {https://doi.org/10.1016/j.comnet.2005.01.009}, doi = {10.1016/J.COMNET.2005.01.009}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/KrugelVR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/KirdaK05, author = {Engin Kirda and Christopher Kr{\"{u}}gel}, title = {Protecting Users Against Phishing Attacks with AntiPhish}, booktitle = {29th Annual International Computer Software and Applications Conference, {COMPSAC} 2005, Edinburgh, Scotland, UK, July 25-28, 2005. Volume 1}, pages = {517--524}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/COMPSAC.2005.126}, doi = {10.1109/COMPSAC.2005.126}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/KirdaK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KrugelKMRV05, author = {Christopher Kr{\"{u}}gel and Engin Kirda and Darren Mutz and William K. Robertson and Giovanni Vigna}, editor = {Alfonso Valdes and Diego Zamboni}, title = {Polymorphic Worm Detection Using Structural Information of Executables}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {207--226}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_11}, doi = {10.1007/11663812\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/KrugelKMRV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KruegelKMRV05, author = {Christopher Kruegel and Engin Kirda and Darren Mutz and William K. Robertson and Giovanni Vigna}, editor = {Patrick D. McDaniel}, title = {Automating Mimicry Attacks Using Static Binary Analysis}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/automating-mimicry-attacks-using-static-binary-analysis}, timestamp = {Mon, 01 Feb 2021 08:42:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/KruegelKMRV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/crc/IIR2005/Kruegel05, author = {Christopher Kr{\"{u}}gel}, editor = {Richard Zurawski}, title = {Network Security and Secure Applications}, booktitle = {The Industrial Information Technology Handbook}, pages = {1--13}, publisher = {{CRC} Press}, year = {2005}, timestamp = {Fri, 22 Apr 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/crc/IIR2005/Kruegel05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dimva/2005, editor = {Klaus Julisch and Christopher Kr{\"{u}}gel}, title = {Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, {DIMVA} 2005, Vienna, Austria, July 7-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3548}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b137798}, doi = {10.1007/B137798}, isbn = {3-540-26613-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pik/KruegelRV04, author = {Christopher Kruegel and William K. Robertson and Giovanni Vigna}, title = {Using Alert Verification to Identify Successful Intrusion Attempts}, journal = {Prax. Inf.verarb. Kommun.}, volume = {27}, number = {4}, pages = {219--227}, year = {2004}, url = {https://doi.org/10.1515/PIKO.2004.219}, doi = {10.1515/PIKO.2004.219}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pik/KruegelRV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ValeurVKK04, author = {Fredrik Valeur and Giovanni Vigna and Christopher Kr{\"{u}}gel and Richard A. Kemmerer}, title = {A Comprehensive Approach to Intrusion Detection Alert Correlation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {1}, number = {3}, pages = {146--169}, year = {2004}, url = {https://doi.org/10.1109/TDSC.2004.21}, doi = {10.1109/TDSC.2004.21}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ValeurVKK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KrugelRV04, author = {Christopher Kr{\"{u}}gel and William K. Robertson and Giovanni Vigna}, title = {Detecting Kernel-Level Rootkits Through Binary Analysis}, booktitle = {20th Annual Computer Security Applications Conference {(ACSAC} 2004), 6-10 December 2004, Tucson, AZ, {USA}}, pages = {91--100}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CSAC.2004.19}, doi = {10.1109/CSAC.2004.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KrugelRV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/KruegelR04, author = {Christopher Kr{\"{u}}gel and William K. Robertson}, editor = {Ulrich Flegel and Michael Meier}, title = {Alert Verification Determining the Success of Intrusion Attempts}, booktitle = {Detection of Intrusions and Malware {\&} Vulnerability Assessment, {GI} {SIG} {SIDAR} Workshop, {DIMVA} 2004, Dortmund, Germany, July 6.7, 2004, Proceedings}, series = {{LNI}}, volume = {{P-46}}, pages = {25--38}, publisher = {{GI}}, year = {2004}, url = {https://dl.gi.de/handle/20.500.12116/29204}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/KruegelR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KruegelRVV04, author = {Christopher Kr{\"{u}}gel and William K. Robertson and Fredrik Valeur and Giovanni Vigna}, editor = {Matt Blaze}, title = {Static Disassembly of Obfuscated Binaries}, booktitle = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13, 2004, San Diego, CA, {USA}}, pages = {255--270}, publisher = {{USENIX}}, year = {2004}, url = {http://www.usenix.org/publications/library/proceedings/sec04/tech/kruegel.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KruegelRVV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KruegelMRV03, author = {Christopher Kr{\"{u}}gel and Darren Mutz and William K. Robertson and Fredrik Valeur}, title = {Bayesian Event Classification for Intrusion Detection}, booktitle = {19th Annual Computer Security Applications Conference {(ACSAC} 2003), 8-12 December 2003, Las Vegas, NV, {USA}}, pages = {14--23}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CSAC.2003.1254306}, doi = {10.1109/CSAC.2003.1254306}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KruegelMRV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KrugelV03, author = {Christopher Kr{\"{u}}gel and Giovanni Vigna}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Anomaly detection of web-based attacks}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {251--261}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948144}, doi = {10.1145/948109.948144}, timestamp = {Tue, 10 Nov 2020 20:00:42 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KrugelV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KruegelMVV03, author = {Christopher Kr{\"{u}}gel and Darren Mutz and Fredrik Valeur and Giovanni Vigna}, editor = {Einar Snekkenes and Dieter Gollmann}, title = {On the Detection of Anomalous System Call Arguments}, booktitle = {Computer Security - {ESORICS} 2003, 8th European Symposium on Research in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2808}, pages = {326--343}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39650-5\_19}, doi = {10.1007/978-3-540-39650-5\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KruegelMVV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euromicro/KirdaKKK03, author = {Engin Kirda and Clemens Kerer and Christopher Kr{\"{u}}gel and Roman Kurmanowytsch}, title = {Web Service Engineering with {DIWE}}, booktitle = {29th {EUROMICRO} Conference 2003, New Waves in System Architecture, 3-5 September 2003, Belek-Antalya, Turkey}, pages = {283--290}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/EURMIC.2003.1231603}, doi = {10.1109/EURMIC.2003.1231603}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euromicro/KirdaKKK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/RobertsonKMV03, author = {William K. Robertson and Christopher Kr{\"{u}}gel and Darren Mutz and Fredrik Valeur}, editor = {{\AE}leen Frisch}, title = {Run-time Detection of Heap-based Overflows}, booktitle = {Proceedings of the 17th Conference on Systems Administration {(LISA} 2003), San Diego, California, USA, October 26-31, 2003}, pages = {51--60}, publisher = {{USENIX}}, year = {2003}, url = {http://www.usenix.org/publications/library/proceedings/lisa03/tech/robertson.html}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lisa/RobertsonKMV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KruegelMRV03, author = {Christopher Kr{\"{u}}gel and Darren Mutz and William K. Robertson and Fredrik Valeur}, editor = {Giovanni Vigna and Erland Jonsson and Christopher Kr{\"{u}}gel}, title = {Topology-Based Detection of Anomalous {BGP} Messages}, booktitle = {Recent Advances in Intrusion Detection, 6th International Symposium, {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2820}, pages = {17--35}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45248-5\_2}, doi = {10.1007/978-3-540-45248-5\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/KruegelMRV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KruegelT03, author = {Christopher Kr{\"{u}}gel and Thomas Toth}, editor = {Giovanni Vigna and Erland Jonsson and Christopher Kr{\"{u}}gel}, title = {Using Decision Trees to Improve Signature-Based Intrusion Detection}, booktitle = {Recent Advances in Intrusion Detection, 6th International Symposium, {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2820}, pages = {173--191}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45248-5\_10}, doi = {10.1007/978-3-540-45248-5\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KruegelT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2003, editor = {Giovanni Vigna and Erland Jonsson and Christopher Kr{\"{u}}gel}, title = {Recent Advances in Intrusion Detection, 6th International Symposium, {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2820}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/b13476}, doi = {10.1007/B13476}, isbn = {3-540-40878-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TothK02, author = {Thomas Toth and Christopher Kr{\"{u}}gel}, title = {Evaluating the Impact of Automated Intrusion Response Mechanisms}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {301--310}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176302}, doi = {10.1109/CSAC.2002.1176302}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/TothK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infrasec/FenkamGJK02, author = {Pascal Fenkam and Harald C. Gall and Mehdi Jazayeri and Christopher Kr{\"{u}}gel}, editor = {George I. Davida and Yair Frankel and Owen Rees}, title = {{DPS} : An Architectural Style for Development of Secure Software}, booktitle = {Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2437}, pages = {180--198}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45831-X\_13}, doi = {10.1007/3-540-45831-X\_13}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/infrasec/FenkamGJK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/KruegelT02, author = {Christopher Kr{\"{u}}gel and Thomas Toth}, title = {Distributed Pattern Detection for Intrusion Detection}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2002, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2002}, url = {https://www.ndss-symposium.org/ndss2002/distributed-pattern-detection-intrusion-detection/}, timestamp = {Mon, 01 Feb 2021 08:42:25 +0100}, biburl = {https://dblp.org/rec/conf/ndss/KruegelT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/KererKK02, author = {Clemens Kerer and Engin Kirda and Christopher Kr{\"{u}}gel}, editor = {Enrico Gregori and Ludmila Cherkasova and Gianpaolo Cugola and Fabio Panzieri and Gian Pietro Picco}, title = {XGuide - {A} Practical Guide to XML-Based Web Engineering}, booktitle = {Web Engineering and Peer-to-Peer Computing, {NETWORKING} 2002 Workshops, Pisa, Italy, May 19-24, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2376}, pages = {104--117}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45745-3\_9}, doi = {10.1007/3-540-45745-3\_9}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/networking/KererKK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TothK02, author = {Thomas Toth and Christopher Kr{\"{u}}gel}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {Accurate Buffer Overflow Detection via Abstract Payload Execution}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {274--291}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_15}, doi = {10.1007/3-540-36084-0\_15}, timestamp = {Sat, 07 Sep 2019 11:59:24 +0200}, biburl = {https://dblp.org/rec/conf/raid/TothK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/KrugelTK02, author = {Christopher Kr{\"{u}}gel and Thomas Toth and Engin Kirda}, editor = {Gary B. Lamont and Hisham Haddad and George A. Papadopoulos and Brajendra Panda}, title = {Service specific anomaly detection for network intrusion detection}, booktitle = {Proceedings of the 2002 {ACM} Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain}, pages = {201--208}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/508791.508835}, doi = {10.1145/508791.508835}, timestamp = {Tue, 06 Nov 2018 11:06:47 +0100}, biburl = {https://dblp.org/rec/conf/sac/KrugelTK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KrugelVVK02, author = {Christopher Kr{\"{u}}gel and Fredrik Valeur and Giovanni Vigna and Richard A. Kemmerer}, title = {Stateful Intrusion Detection for High-Speed Networks}, booktitle = {2002 {IEEE} Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002}, pages = {285--293}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/SECPRI.2002.1004378}, doi = {10.1109/SECPRI.2002.1004378}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/KrugelVVK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KrugelTK01, author = {Christopher Kr{\"{u}}gel and Thomas Toth and Clemens Kerer}, editor = {Kwangjo Kim}, title = {Decentralized Event Correlation for Intrusion Detection}, booktitle = {Information Security and Cryptology - {ICISC} 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2288}, pages = {114--131}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45861-1\_10}, doi = {10.1007/3-540-45861-1\_10}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KrugelTK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsec/KrugelTK01, author = {Christopher Kr{\"{u}}gel and Thomas Toth and Engin Kirda}, editor = {Bart De Decker and Frank Piessens and Jan Smits and Els Van Herreweghen}, title = {SPARTA, a Mobile Agent Based Instrusion Detection System}, booktitle = {Advances in Network and Distributed Systems Security, {IFIP} {TC11} {WG11.4} First Annual Working Conference on Network Security, November 26-27, 2001, Leuven, Belgium}, series = {{IFIP} Conference Proceedings}, volume = {206}, pages = {187--198}, publisher = {Kluwer}, year = {2001}, url = {https://doi.org/10.1007/0-306-46958-8\_13}, doi = {10.1007/0-306-46958-8\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netsec/KrugelTK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/KirdaKJK01, author = {Engin Kirda and Clemens Kerer and Mehdi Jazayeri and Christopher Kr{\"{u}}gel}, title = {Supporting Multi-Device Enabled Web Services: Challenges and Open Problems}, booktitle = {10th {IEEE} International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises {(WETICE} 2001), 20-22 June 2001, Cambridge, MA, {USA}}, pages = {49--54}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ENABL.2001.953387}, doi = {10.1109/ENABL.2001.953387}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wetice/KirdaKJK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jit/KastnerKR99, author = {Wolfgang Kastner and Christopher Kr{\"{u}}gel and Heinrich Reiter}, editor = {Clemens H. Cap}, title = {Jini - ein guter Geist f{\"{u}}r die Geb{\"{a}}udesystemtechnik}, booktitle = {{JIT} '99, Java-Informations-Tage 1999, D{\"{u}}sseldorf 20./21. September 1999}, series = {Informatik Aktuell}, pages = {213--222}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-642-60247-4\_20}, doi = {10.1007/978-3-642-60247-4\_20}, timestamp = {Tue, 25 Jun 2019 12:38:54 +0200}, biburl = {https://dblp.org/rec/conf/jit/KastnerKR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.