


default search action
Engin Kirda
Person information
- affiliation: Northeastern University, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j27]Meng Luo
, Bo Feng
, Long Lu, Engin Kirda, Kui Ren
:
On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers. IEEE Trans. Dependable Secur. Comput. 21(1): 419-433 (2024) - [j26]Sevtap Duman
, Matthias Büchler
, Manuel Egele
, Engin Kirda
:
PellucidAttachment: Protecting Users From Attacks via E-Mail Attachments. IEEE Trans. Dependable Secur. Comput. 21(3): 1342-1354 (2024) - [j25]Bo Feng
, Meng Luo
, Changming Liu
, Long Lu, Engin Kirda:
AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis. IEEE Trans. Dependable Secur. Comput. 21(4): 3866-3882 (2024) - [c168]Narmeen Shafqat, Cem Topcuoglu, Engin Kirda, Aanjhan Ranganathan:
Assessing the Feasibility of the Virtual Smartphone Paradigm in Countering Zero-Click Attacks. HICSS 2024: 7427-7436 - [c167]Cem Topcuoglu, Kaan Onarlioglu, Bahruz Jabiyev, Engin Kirda:
Untangle: Multi-Layer Web Server Fingerprinting. NDSS 2024 - [c166]Bahruz Jabiyev
, Anthony Gavazzi
, Kaan Onarlioglu
, Engin Kirda
:
Gudifu: Guided Differential Fuzzing for HTTP Request Parsing Discrepancies. RAID 2024: 235-247 - [c165]Changming Liu, Alejandro Mera, Engin Kirda, Meng Xu, Long Lu:
CO3: Concolic Co-execution for Firmware. USENIX Security Symposium 2024 - [c164]Alejandro Mera, Changming Liu, Ruimin Sun, Engin Kirda, Long Lu:
SHiFT: Semi-hosted Fuzz Testing for Embedded Applications. USENIX Security Symposium 2024 - [e10]Bo Luo, Xiaojing Liao, Jun Xu, Engin Kirda, David Lie:
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024. ACM 2024, ISBN 979-8-4007-0636-3 [contents] - [i17]Michael Shaham, Risha Ranjan, Engin Kirda, Taskin Padir:
Design and Realization of a Benchmarking Testbed for Evaluating Autonomous Platooning Algorithms. CoRR abs/2402.09233 (2024) - 2023
- [c163]Tommaso Innocenti
, Matteo Golinelli
, Kaan Onarlioglu
, Seyed Ali Mirheidari
, Bruno Crispo
, Engin Kirda
:
OAuth 2.0 Redirect URI Validation Falls Short, Literally. ACSAC 2023: 256-267 - [c162]Michael H. Shaham, Risha Ranjan, Engin Kirda, Taskin Padir:
Design and Realization of a Benchmarking Testbed for Evaluating Autonomous Platooning Algorithms. ISER 2023: 582-594 - [c161]Anthony Gavazzi, Ryan Williams, Engin Kirda, Long Lu, Andre King, Andy Davis, Tim Leek:
A Study of Multi-Factor and Risk-Based Authentication Availability. USENIX Security Symposium 2023: 2043-2060 - [c160]Ryan Williams, Anthony Gavazzi, Engin Kirda:
Solder: Retrofitting Legacy Code with Cross-Language Patches. SANER 2023: 49-60 - [e9]Weizhi Meng, Christian Damsgaard Jensen, Cas Cremers, Engin Kirda:
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023. ACM 2023 [contents] - [i16]Bo Feng, Meng Luo, Changming Liu, Long Lu, Engin Kirda:
AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis. CoRR abs/2312.01195 (2023) - 2022
- [j24]Amit Kumar Sikder
, Leonardo Babun
, Z. Berkay Celik
, Hidayet Aksu
, Patrick D. McDaniel
, Engin Kirda
, A. Selcuk Uluagac
:
Who's Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment. ACM Trans. Internet Things 3(4): 27:1-27:39 (2022) - [j23]William Blair
, Andrea Mambretti
, Sajjad Arshad
, Michael Weissbacher
, William Robertson
, Engin Kirda
, Manuel Egele
:
HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. ACM Trans. Priv. Secur. 25(4): 33:1-33:35 (2022) - [c159]Afsah Anwar
, Yi Hui Chen
, Roy Hodgman
, Tom Sellers
, Engin Kirda
, Alina Oprea
:
A Recent Year On the Internet: Measuring and Understanding the Threats to Everyday Internet Devices. ACSAC 2022: 251-266 - [c158]Steven Sprecher, Christoph Kerschbaumer, Engin Kirda:
SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward. EuroS&P 2022: 206-222 - [c157]Alejandro Mera, Yi Hui Chen, Ruimin Sun, Engin Kirda, Long Lu:
D-Box: DMA-enabled Compartmentalization for Embedded Applications. NDSS 2022 - [c156]Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo:
Web Cache Deception Escalates! USENIX Security Symposium 2022: 179-196 - [c155]Bahruz Jabiyev, Steven Sprecher, Anthony Gavazzi, Tommaso Innocenti, Kaan Onarlioglu, Engin Kirda:
FRAMESHIFTER: Security Implications of HTTP/2-to-HTTP/1 Conversion Anomalies. USENIX Security Symposium 2022: 1061-1075 - [i15]Alejandro Mera, Yi Hui Chen, Ruimin Sun, Engin Kirda, Long Lu:
D-Box: DMA-enabled Compartmentalization for Embedded Applications. CoRR abs/2201.05199 (2022) - [i14]Narmeen Shafqat, Cem Topcuoglu, Engin Kirda, Aanjhan Ranganathan:
Experience Report on the Challenges and Opportunities in Securing Smartphones Against Zero-Click Attacks. CoRR abs/2211.03015 (2022) - 2021
- [c154]Bahruz Jabiyev, Sinan Pehlivanoglu, Kaan Onarlioglu, Engin Kirda:
FADE: Detecting Fake News Articles on the Web. ARES 2021: 15:1-15:10 - [c153]Bahruz Jabiyev, Steven Sprecher, Kaan Onarlioglu, Engin Kirda:
T-Reqs: HTTP Request Smuggling with Differential Fuzzing. CCS 2021: 1805-1820 - [c152]Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk:
In-Browser Cryptomining for Good: An Untold Story. DAPPS 2021: 20-29 - [c151]Tommaso Innocenti
, Seyed Ali Mirheidari, Amin Kharraz, Bruno Crispo, Engin Kirda:
You've Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures. DIMVA 2021: 1-20 - [c150]Omid Mirzaei, Roman Vasilenko, Engin Kirda, Long Lu, Amin Kharraz:
SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning. DIMVA 2021: 130-150 - [c149]Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk:
SoK: Cryptojacking Malware. EuroS&P 2021: 120-139 - [c148]Andrea Mambretti
, Alexandra Sandulescu, Alessandro Sorniotti, William Robertson, Engin Kirda, Anil Kurmus:
Bypassing memory safety mechanisms through speculative control flow hijacks. EuroS&P 2021: 633-649 - [c147]Seyed Ali Akhavani, Jordan Jueckstock, Junhua Su, Alexandros Kapravelos, Engin Kirda, Long Lu:
Browserprint: an Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy. ISC 2021: 161-176 - [c146]Bahruz Jabiyev, Omid Mirzaei, Amin Kharraz, Engin Kirda:
Preventing server-side request forgery attacks. SAC 2021: 1626-1635 - [c145]Alejandro Mera
, Bo Feng, Long Lu, Engin Kirda:
DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis. SP 2021: 1938-1954 - [c144]Bahruz Jabiyev, Jeremiah Onaolapo, Gianluca Stringhini, Engin Kirda:
e-Game of FAME: Automatic Detection of FAke MEmes. TTO 2021: 1-11 - [c143]Andrea Mambretti
, Pasquale Convertini, Alessandro Sorniotti, Alexandra Sandulescu, Engin Kirda, Anil Kurmus:
GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkers. SANER 2021: 307-317 - [i13]Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk:
SoK: Cryptojacking Malware. CoRR abs/2103.03851 (2021) - 2020
- [c142]William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson, Engin Kirda, Manuel Egele:
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. NDSS 2020 - [c141]Ahmet Salih Buyukkayhan, Can Gemicioglu, Tobias Lauinger, Alina Oprea, William Robertson, Engin Kirda:
What's in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation Techniques. RAID 2020: 107-120 - [c140]Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William Robertson:
Cached and Confused: Web Cache Deception in the Wild. USENIX Security Symposium 2020: 665-682 - [c139]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Kratos: multi-user multi-device-aware access control system for the smart home. WISEC 2020: 1-12 - [i12]William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William K. Robertson, Engin Kirda, Manuel Egele:
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. CoRR abs/2002.03416 (2020) - [i11]Andrea Mambretti, Alexandra Sandulescu, Alessandro Sorniotti, William K. Robertson, Engin Kirda, Anil Kurmus:
Bypassing memory safety mechanisms through speculative control flow hijacks. CoRR abs/2003.05503 (2020) - [i10]Alejandro Mera, Bo Feng, Long Lu, Engin Kirda, William K. Robertson:
DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis. CoRR abs/2007.01502 (2020)
2010 – 2019
- 2019
- [c138]Andrea Mambretti
, Matthias Neugschwandtner, Alessandro Sorniotti, Engin Kirda, William K. Robertson, Anil Kurmus:
Speculator: a tool to analyze speculative execution attacks and mitigations. ACSAC 2019: 747-761 - [c137]Florian Quinkert, Tobias Lauinger, William K. Robertson, Engin Kirda, Thorsten Holz:
It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains. CNS 2019: 259-267 - [c136]Muhammad Ahmad Bashir, Sajjad Arshad, Engin Kirda, William K. Robertson, Christo Wilson
:
A Longitudinal Analysis of the ads.txt Standard. Internet Measurement Conference 2019: 294-307 - [c135]Walter Rweyemamu, Tobias Lauinger, Christo Wilson, William K. Robertson, Engin Kirda:
Getting Under Alexa's Umbrella: Infiltration Attacks Against Internet Top Domain Lists. ISC 2019: 255-276 - [c134]Abbas Acar
, Long Lu, A. Selcuk Uluagac
, Engin Kirda:
An Analysis of Malware Trends in Enterprise Networks. ISC 2019: 360-380 - [c133]Walter Rweyemamu, Tobias Lauinger, Christo Wilson, William K. Robertson, Engin Kirda:
Clustering and the Weekend Effect: Recommendations for the Use of Top Domain Lists in Security Research. PAM 2019: 161-177 - [c132]Amin Kharraz, Brandon L. Daley, Graham Z. Baker, William Robertson, Engin Kirda:
USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks. RAID 2019: 89-103 - [e8]Steven D. Galbraith, Giovanni Russello, Willy Susilo, Dieter Gollmann, Engin Kirda, Zhenkai Liang:
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019. ACM 2019, ISBN 978-1-4503-6752-3 [contents] - [i9]Abbas Acar, Long Lu, A. Selcuk Uluagac, Engin Kirda:
An Analysis of Malware Trends in Enterprise Networks. CoRR abs/1910.00508 (2019) - [i8]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Multi-User Multi-Device-Aware Access Control System for Smart Home. CoRR abs/1911.10186 (2019) - [i7]Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William K. Robertson:
Cached and Confused: Web Cache Deception in the Wild. CoRR abs/1912.10190 (2019) - 2018
- [j22]Amin Kharraz
, William K. Robertson, Engin Kirda:
Protecting against Ransomware: A New Line of Research or Restating Classic Ideas? IEEE Secur. Priv. 16(3): 103-107 (2018) - [c131]Reza Mirzazade Farkhani, Saman Jafari, Sajjad Arshad, William K. Robertson, Engin Kirda, Hamed Okhravi:
On the Effectiveness of Type-based Control Flow Integrity. ACSAC 2018: 28-39 - [c130]Kaan Onarlioglu, William K. Robertson, Engin Kirda:
Eraser: Your Data Won't Be Back. EuroS&P 2018: 153-166 - [c129]Tobias Lauinger, Ahmet Salih Buyukkayhan, Abdelberi Chaabane, William K. Robertson, Engin Kirda:
From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop. Internet Measurement Conference 2018: 322-328 - [c128]Muhammad Ahmad Bashir, Sajjad Arshad, Engin Kirda, William K. Robertson, Christo Wilson:
How Tracking Companies Circumvented Ad Blockers Using WebSockets. Internet Measurement Conference 2018: 471-477 - [c127]Amin Kharraz, William K. Robertson, Engin Kirda:
Surveylance: Automatically Detecting Online Survey Scams. IEEE Symposium on Security and Privacy 2018: 70-86 - [c126]Sajjad Arshad, Seyed Ali Mirheidari, Tobias Lauinger, Bruno Crispo, Engin Kirda, William K. Robertson:
Large-Scale Analysis of Style Injection by Relative Path Overwrite. WWW 2018: 237-246 - [i6]Reza Mirzazade Farkhani, Saman Jafari, Sajjad Arshad, William K. Robertson, Engin Kirda, Hamed Okhravi:
On the Effectiveness of Type-based Control Flow Integrity. CoRR abs/1810.10649 (2018) - [i5]Sajjad Arshad, Seyed Ali Mirheidari, Tobias Lauinger, Bruno Crispo, Engin Kirda, William K. Robertson:
Large-Scale Analysis of Style Injection by Relative Path Overwrite. CoRR abs/1811.00917 (2018) - [i4]Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William K. Robertson, Christo Wilson, Engin Kirda:
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web. CoRR abs/1811.00918 (2018) - 2017
- [j21]Wojciech Mazurczyk
, Maciej Korczynski, Koji Nakao, Engin Kirda, Cristian Hesselman, Katsunari Yoshioka:
Traffic Measurements for Cyber Security. IEEE Commun. Mag. 55(7): 12-13 (2017) - [j20]Collin Mulliner, William K. Robertson, Engin Kirda:
On the misuse of graphical user interface elements to implement security controls. it Inf. Technol. 59(2): 59 (2017) - [c125]Michael Weissbacher, Enrico Mariconti
, Guillermo Suarez-Tangil
, Gianluca Stringhini, William K. Robertson, Engin Kirda:
Ex-Ray: Detection of History-Leaking Browser Extensions. ACSAC 2017: 590-602 - [c124]William Koch, Abdelberi Chaabane, Manuel Egele, William K. Robertson, Engin Kirda:
Semi-automated discovery of server-based information oversharing vulnerabilities in Android applications. ISSTA 2017: 147-157 - [c123]Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William Robertson, Christo Wilson, Engin Kirda:
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web. NDSS 2017 - [c122]Amin Kharraz, Engin Kirda:
Redemption: Real-Time Protection Against Ransomware at End-Hosts. RAID 2017: 98-119 - [c121]Engin Kirda:
UNVEIL: A large-scale, automated approach to detecting ransomware (keynote). SANER 2017: 1 - [e7]Engin Kirda, Thomas Ristenpart:
26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017. USENIX Association 2017 [contents] - 2016
- [c120]Sevtap Duman
, Kubra Kalkan-Cakmakci, Manuel Egele, William K. Robertson, Engin Kirda:
EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails. COMPSAC 2016: 408-416 - [c119]Kaan Onarlioglu, William Robertson, Engin Kirda:
Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems. DSN 2016: 443-454 - [c118]Patrick Carter, Collin Mulliner, Martina Lindorfer, William K. Robertson, Engin Kirda:
CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes. Financial Cryptography 2016: 231-249 - [c117]Tobias Lauinger, Kaan Onarlioglu, Abdelberi Chaabane, William Robertson, Engin Kirda:
WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration. Internet Measurement Conference 2016: 247-253 - [c116]Ahmet Salih Buyukkayhan, Kaan Onarlioglu, William K. Robertson, Engin Kirda:
CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities. NDSS 2016 - [c115]Andrea Mambretti
, Kaan Onarlioglu, Collin Mulliner, William Robertson, Engin Kirda, Federico Maggi, Stefano Zanero
:
Trellis: Privilege Separation for Multi-user Applications Made Easy. RAID 2016: 437-456 - [c114]Brendan Dolan-Gavitt, Patrick Hulin, Engin Kirda, Tim Leek, Andrea Mambretti
, William K. Robertson, Frederick Ulrich, Ryan Whelan:
LAVA: Large-Scale Automated Vulnerability Addition. IEEE Symposium on Security and Privacy 2016: 110-121 - [c113]Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
TriggerScope: Towards Detecting Logic Bombs in Android Applications. IEEE Symposium on Security and Privacy 2016: 377-396 - [c112]Matthias Neugschwandtner, Collin Mulliner, William K. Robertson, Engin Kirda:
Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices. TRUST 2016: 60-81 - [c111]Amin Kharraz, Sajjad Arshad, Collin Mulliner, William K. Robertson, Engin Kirda:
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware. USENIX Security Symposium 2016: 757-772 - 2015
- [j19]Kaan Onarlioglu, Ahmet Salih Buyukkayhan, William K. Robertson, Engin Kirda:
SENTINEL: Securing Legacy Firefox Extensions. Comput. Secur. 49: 147-161 (2015) - [j18]Aristide Fattori, Andrea Lanzi, Davide Balzarotti, Engin Kirda:
Hypervisor-based malware protection with AccessMiner. Comput. Secur. 52: 33-50 (2015) - [c110]Amin Kharraz, William K. Robertson, Davide Balzarotti, Leyla Bilge, Engin Kirda:
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. DIMVA 2015: 3-24 - [c109]Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna:
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users. DIMVA 2015: 282-303 - [c108]Ahmet Talha Ozcan, Can Gemicioglu, Kaan Onarlioglu, Michael Weissbacher, Collin Mulliner, William K. Robertson, Engin Kirda:
BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications. Financial Cryptography 2015: 355-369 - [c107]Michael Weissbacher, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities. USENIX Security Symposium 2015: 737-752 - 2014
- [j17]Leyla Bilge, Sevil Sen
, Davide Balzarotti, Engin Kirda, Christopher Kruegel:
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains. ACM Trans. Inf. Syst. Secur. 16(4): 14 (2014) - [c106]Sevtap Duman
, Kaan Onarlioglu, Ali Osman Ulusoy, William K. Robertson, Engin Kirda:
TrueClick: automatically distinguishing trick banners from genuine download links. ACSAC 2014: 456-465 - [c105]Collin Mulliner, William K. Robertson, Engin Kirda:
VirtualSwindle: an automated attack against in-app billing on android. AsiaCCS 2014: 459-470 - [c104]Amin Kharraz, Engin Kirda, William K. Robertson, Davide Balzarotti, Aurélien Francillon
:
Optical Delusions: A Study of Malicious QR Codes in the Wild. DSN 2014: 192-203 - [c103]Collin Mulliner, William K. Robertson, Engin Kirda:
Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces. IEEE Symposium on Security and Privacy 2014: 149-162 - [c102]Stevens Le Blond, Adina Uritesc, Cédric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda:
A Look at Targeted Attacks Through the Lense of an NGO. USENIX Security Symposium 2014: 543-558 - 2013
- [c101]Ting-Fang Yen, Alina Oprea, Kaan Onarlioglu, Todd Leetham, William K. Robertson, Ari Juels, Engin Kirda:
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks. ACSAC 2013: 199-208 - [c100]Collin Mulliner, Jon Oberheide, William K. Robertson, Engin Kirda:
PatchDroid: scalable third-party security patches for Android devices. ACSAC 2013: 259-268 - [c99]Kaan Onarlioglu, Mustafa Battal, William K. Robertson, Engin Kirda:
Securing Legacy Firefox Extensions with SENTINEL. DIMVA 2013: 122-138 - [c98]Aldo Cassola, William K. Robertson, Engin Kirda, Guevara Noubir:
A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication. NDSS 2013 - [c97]Tobias Lauinger, Martin Szydlowski, Kaan Onarlioglu, Gilbert Wondracek, Engin Kirda, Christopher Krügel:
Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting. NDSS 2013 - [c96]Tobias Lauinger, Kaan Onarlioglu, Chaabane Abdelberi, Engin Kirda, William K. Robertson, Mohamed Ali Kâafar
:
Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters. RAID 2013: 369-389 - [c95]Kaan Onarlioglu, Collin Mulliner, William K. Robertson, Engin Kirda:
PrivExec: Private Execution as an Operating System Service. IEEE Symposium on Security and Privacy 2013: 206-220 - [i3]Engin Kirda:
DarkDroid - Exposing the Dark Side of Malicious Mobile Applications. ERCIM News 2013(93) (2013) - 2012
- [j16]Tobias Lauinger, Nikolaos Laoutaris
, Pablo Rodriguez, Thorsten Strufe, Ernst W. Biersack, Engin Kirda:
Privacy risks in named data networking: what is the cost of performance? Comput. Commun. Rev. 42(5): 54-57 (2012) - [j15]Manuel Egele, Andreas Moser, Christopher Kruegel, Engin Kirda:
PoX: Protecting users from malicious Facebook applications. Comput. Commun. 35(12): 1507-1515 (2012) - [j14]Theodoor Scholte, Davide Balzarotti, Engin Kirda:
Have things changed now? An empirical study on input validation vulnerabilities in web applications. Comput. Secur. 31(3): 344-356 (2012) - [j13]Manuel Egele, Theodoor Scholte, Engin Kirda, Christopher Kruegel:
A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv. 44(2): 6:1-6:42 (2012) - [j12]Advait Abhay Dixit, Rik Farrow, Andrew D. Ferguson, Katrina LaCurts, Marcelo Martins, Karthik Nagaraj, Kevin Ngo, Will Scott, Manuel Egele, Engin Kirda:
NSDI '12 and LEET '12. login Usenix Mag. 37(4) (2012) - [c94]Leyla Bilge, Davide Balzarotti, William K. Robertson, Engin Kirda, Christopher Kruegel:
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis. ACSAC 2012: 129-138 - [c93]Theodoor Scholte, William K. Robertson, Davide Balzarotti, Engin Kirda:
Preventing Input Validation Vulnerabilities in Web Applications through Automated Type Analysis. COMPSAC 2012: 233-243 - [c92]Engin Kirda:
A security analysis of Amazon's Elastic Compute Cloud service. DSN Workshops 2012: 1 - [c91]Davide Canali, Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda:
A quantitative study of accuracy in system call-based malware detection. ISSTA 2012: 122-132 - [c90]Kaan Onarlioglu, Utku Ozan Yilmaz, Engin Kirda, Davide Balzarotti:
Insights into User Behavior in Dealing with Internet Attacks. NDSS 2012 - [c89]Tobias Lauinger, Engin Kirda, Pietro Michiardi:
Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes. RAID 2012: 169-189 - [c88]Theodoor Scholte, William K. Robertson, Davide Balzarotti, Engin Kirda:
An empirical analysis of input validation mechanisms in web applications and languages. SAC 2012: 1419-1426 - [c87]