


default search action
Christopher Krügel
Person information
- affiliation: University of California, Santa Barbara, Computer Science Department
- affiliation: Lastline, Inc., Redwood City, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c254]Sayak Saha Roy, Dipanjan Das, Priyanka Bose, Christopher Kruegel, Giovanni Vigna, Shirin Nilizadeh:
Unveiling the Risks of NFT Promotion Scams. ICWSM 2024: 1367-1380 - [c253]Nicola Ruaro, Fabio Gritti, Robert McLaughlin, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna:
Not your Type! Detecting Storage Collision Vulnerabilities in Ethereum Smart Contracts. NDSS 2024 - [c252]Xuandong Zhao, Kexun Zhang, Zihao Su, Saastha Vasan, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna, Yu-Xiang Wang, Lei Li:
Invisible Image Watermarks Are Provably Removable Using Generative AI. NeurIPS 2024 - [c251]Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim:
TrojanPuzzle: Covertly Poisoning Code-Suggestion Models. SP 2024: 1122-1140 - [c250]Wil Gibbs, Arvind S. Raj, Jayakrishna Menon Vadayath, Hui Jun Tay, Justin Miller, Akshay Ajayan, Zion Leonahenahe Basque, Audrey Dutcher, Fangzhou Dong, Xavier J. Maso, Giovanni Vigna, Christopher Kruegel, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang:
Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services. USENIX Security Symposium 2024 - [c249]Giulio De Pasquale, Ilya Grishchenko, Riccardo Iesari, Gabriel Pizarro, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna:
ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning. USENIX Security Symposium 2024 - [c248]Ravindu De Silva, Wenbo Guo, Nicola Ruaro, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna:
GuideEnricher: Protecting the Anonymity of Ethereum Mixing Service Users with Deep Reinforcement Learning. USENIX Security Symposium 2024 - [c247]Zihao Su, Kunlin Cai, Reuben Beeler, Lukas Dresel, Allan Garcia, Ilya Grishchenko, Yuan Tian, Christopher Kruegel, Giovanni Vigna:
Remote Keylogging Attacks in Multi-user VR Applications. USENIX Security Symposium 2024 - [i23]Zihao Su, Kunlin Cai, Reuben Beeler, Lukas Dresel, Allan Garcia, Ilya Grishchenko, Yuan Tian, Christopher Kruegel, Giovanni Vigna:
Remote Keylogging Attacks in Multi-user VR Applications. CoRR abs/2405.14036 (2024) - 2023
- [c246]Stijn Pletinckx
, Thanh-Dat Nguyen, Tobias Fiebig
, Christopher Kruegel, Giovanni Vigna:
Certifiably Vulnerable: Using Certificate Transparency Logs for Target Reconnaissance. EuroS&P 2023: 817-831 - [c245]Priyanka Bose, Dipanjan Das, Saastha Vasan, Sebastiano Mariani, Ilya Grishchenko
, Andrea Continella
, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
Columbus: Android App Testing Through Systematic Callback Exploration. ICSE 2023: 1381-1392 - [c244]Eric Gustafson
, Paul Grosen
, Nilo Redini
, Saagar Jha
, Andrea Continella
, Ruoyu Wang
, Kevin Fu
, Sara Rampazzi
, Christopher Kruegel
, Giovanni Vigna
:
Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images. RAID 2023: 32-45 - [c243]Noah Spahn
, Nils Hanke
, Thorsten Holz
, Christopher Kruegel
, Giovanni Vigna
:
Container Orchestration Honeypot: Observing Attacks in the Wild. RAID 2023: 381-396 - [c242]Hojjat Aghakhani, Lea Schönherr, Thorsten Eisenhofer, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna:
Venomave: Targeted Poisoning Against Speech Recognition. SaTML 2023: 404-417 - [c241]Marcel Busch
, Aravind Machiry, Chad Spensky, Giovanni Vigna, Christopher Kruegel, Mathias Payer:
TEEzz: Fuzzing Trusted Applications on COTS Android Devices. SP 2023: 1204-1219 - [c240]Erik Trickel, Fabio Pagani, Chang Zhu, Lukas Dresel, Giovanni Vigna, Christopher Kruegel, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé:
Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities. SP 2023: 2658-2675 - [c239]Fabio Gritti, Nicola Ruaro, Robert McLaughlin, Priyanka Bose, Dipanjan Das, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna:
Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart Contracts. USENIX Security Symposium 2023: 1793-1810 - [c238]Robert McLaughlin, Christopher Kruegel, Giovanni Vigna:
A Large Scale Study of the Ethereum Arbitrage Ecosystem. USENIX Security Symposium 2023: 3295-3312 - [c237]Marius Fleischer, Dipanjan Das, Priyanka Bose, Weiheng Bai, Kangjie Lu, Mathias Payer, Christopher Kruegel, Giovanni Vigna:
ACTOR: Action-Guided Kernel Fuzzing. USENIX Security Symposium 2023: 5003-5020 - [i22]Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim:
TrojanPuzzle: Covertly Poisoning Code-Suggestion Models. CoRR abs/2301.02344 (2023) - [i21]Sayak Saha Roy, Dipanjan Das, Priyanka Bose, Christopher Kruegel, Giovanni Vigna, Shirin Nilizadeh:
Demystifying NFT Promotion and Phishing Scams. CoRR abs/2301.09806 (2023) - [i20]Priyanka Bose, Dipanjan Das, Saastha Vasan, Sebastiano Mariani, Ilya Grishchenko
, Andrea Continella, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
Columbus: Android App Testing Through Systematic Callback Exploration. CoRR abs/2302.09116 (2023) - [i19]Christopher Salls, Chani Jindal, Jake Corina, Christopher Kruegel, Giovanni Vigna:
Token-Level Fuzzing. CoRR abs/2304.02103 (2023) - [i18]Priyanka Bose, Dipanjan Das, Fabio Gritti, Nicola Ruaro, Christopher Kruegel, Giovanni Vigna:
Exploiting Unfair Advantages: Investigating Opportunistic Trading in the NFT Market. CoRR abs/2310.06844 (2023) - [i17]Christophe Hauser, Shirin Nilizadeh, Yan Shoshitaishvili, Ni Trieu, Srivatsan Ravi
, Christopher Kruegel, Giovanni Vigna:
Street Rep: A Privacy-Preserving Reputation Aggregation System. IACR Cryptol. ePrint Arch. 2023: 1346 (2023) - 2022
- [c236]Rajat Gupta
, Lukas Patrick Dresel
, Noah Spahn
, Giovanni Vigna
, Christopher Kruegel
, Taesoo Kim
:
POPKORN: Popping Windows Kernel Drivers At Scale. ACSAC 2022: 854-868 - [c235]Dipanjan Das, Priyanka Bose, Nicola Ruaro, Christopher Kruegel, Giovanni Vigna:
Understanding Security Issues in the NFT Ecosystem. CCS 2022: 667-681 - [c234]Dipanjan Das
, Priyanka Bose, Aravind Machiry, Sebastiano Mariani, Yan Shoshitaishvili, Giovanni Vigna, Christopher Kruegel:
Hybrid Pruning: Towards Precise Pointer and Taint Analysis. DIMVA 2022: 1-22 - [c233]Christopher Kruegel:
Looking for Signals: A Systems Security Perspective. IH&MMSec 2022: 3 - [c232]Priyanka Bose, Dipanjan Das
, Yanju Chen, Yu Feng, Christopher Kruegel, Giovanni Vigna:
SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds. SP 2022: 161-178 - [c231]Thijs van Ede, Hojjat Aghakhani, Noah Spahn
, Riccardo Bortolameotti, Marco Cova, Andrea Continella
, Maarten van Steen, Andreas Peter, Christopher Kruegel, Giovanni Vigna:
DEEPCASE: Semi-Supervised Contextual Analysis of Security Events. SP 2022: 522-539 - [c230]Nicola Ruaro, Fabio Pagani, Stefano Ortolani, Christopher Kruegel, Giovanni Vigna:
SYMBEXCEL: Automated Analysis and Understanding of Malicious Excel 4.0 Macros. SP 2022: 1066-1081 - [c229]Fabio Gritti, Fabio Pagani, Ilya Grishchenko
, Lukas Dresel, Nilo Redini, Christopher Kruegel, Giovanni Vigna:
HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images. SP 2022: 1082-1099 - [c228]Tobias Scharnowski, Nils Bars, Moritz Schloegel, Eric Gustafson, Marius Muench, Giovanni Vigna, Christopher Kruegel, Thorsten Holz, Ali Abbasi:
Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing. USENIX Security Symposium 2022: 1239-1256 - [c227]Kevin Burk, Fabio Pagani, Christopher Kruegel, Giovanni Vigna:
Decomperson: How Humans Decompile and What We Can Learn From It. USENIX Security Symposium 2022: 2765-2782 - [c226]Robert McLaughlin, Fabio Pagani, Noah Spahn, Christopher Kruegel, Giovanni Vigna:
Regulator: Dynamic Analysis to Detect ReDoS. USENIX Security Symposium 2022: 4219-4235 - [d1]Dipanjan Das
, Priyanka Bose
, Nicola Ruaro
, Christopher Kruegel
, Giovanni Vigna
:
Understanding Security Issues in the NFT Ecosystem. Zenodo, 2022 - 2021
- [j25]Marcus Botacin, Hojjat Aghakhani, Stefano Ortolani, Christopher Kruegel, Giovanni Vigna, Daniela Oliveira, Paulo Lício de Geus
, André Grégio:
One Size Does Not Fit All: A Longitudinal Analysis of Brazilian Financial Malware. ACM Trans. Priv. Secur. 24(2): 11:1-11:31 (2021) - [c225]Chad Spensky, Aravind Machiry, Nilo Redini, Colin Unger, Graham Foster, Evan Blasband, Hamed Okhravi, Christopher Kruegel, Giovanni Vigna:
Conware: Automated Modeling of Hardware Peripherals. AsiaCCS 2021: 95-109 - [c224]Dongyu Meng, Michele Guerriero, Aravind Machiry, Hojjat Aghakhani, Priyanka Bose, Andrea Continella
, Christopher Kruegel, Giovanni Vigna:
Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms. AsiaCCS 2021: 731-743 - [c223]Davide Quarta, Michele Ianni, Aravind Machiry, Yanick Fratantonio, Eric Gustafson, Davide Balzarotti, Martina Lindorfer, Giovanni Vigna, Christopher Kruegel:
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone. Checkmate@CCS 2021: 43-57 - [c222]Chad Spensky, Aravind Machiry, Nathan Burow, Hamed Okhravi, Rick Housley, Zhongshu Gu, Hani Jamjoom, Christopher Kruegel, Giovanni Vigna:
Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses. DSN 2021: 400-412 - [c221]Hojjat Aghakhani, Dongyu Meng, Yu-Xiang Wang, Christopher Kruegel, Giovanni Vigna:
Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability. EuroS&P 2021: 159-178 - [c220]Nicola Ruaro, Kyle Zeng, Lukas Dresel, Mario Polino, Tiffany Bao, Andrea Continella
, Stefano Zanero, Christopher Kruegel, Giovanni Vigna:
SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning. RAID 2021: 456-468 - [c219]Nilo Redini, Andrea Continella, Dipanjan Das
, Giulio De Pasquale, Noah Spahn
, Aravind Machiry, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices. SP 2021: 484-500 - [c218]Christopher Salls, Chani Jindal, Jake Corina, Christopher Kruegel, Giovanni Vigna:
Token-Level Fuzzing. USENIX Security Symposium 2021: 2795-2809 - [c217]Chinmay Garg, Aravind Machiry, Andrea Continella
, Christopher Kruegel, Giovanni Vigna:
Toward a secure crowdsourced location tracking system. WISEC 2021: 311-322 - [i16]Priyanka Bose, Dipanjan Das, Yanju Chen, Yu Feng, Christopher Kruegel, Giovanni Vigna:
SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds. CoRR abs/2104.08638 (2021) - [i15]Chinmay Garg, Aravind Machiry, Andrea Continella, Christopher Kruegel, Giovanni Vigna:
Toward a Secure Crowdsourced Location Tracking System. CoRR abs/2106.00217 (2021) - [i14]Dipanjan Das, Priyanka Bose, Nicola Ruaro, Christopher Kruegel, Giovanni Vigna:
Understanding Security Issues in the NFT Ecosystem. CoRR abs/2111.08893 (2021) - 2020
- [c216]Fabio Gritti, Lorenzo Fontana, Eric Gustafson, Fabio Pagani, Andrea Continella
, Christopher Kruegel, Giovanni Vigna:
SYMBION: Interleaving Symbolic with Concrete Execution. CNS 2020: 1-10 - [c215]Christopher Salls, Aravind Machiry, Adam Doupé, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
Exploring Abstraction Functions in Fuzzing. CNS 2020: 1-9 - [c214]Chad Spensky, Aravind Machiry, Marcel Busch
, Kevin Leach, Rick Housley, Christopher Kruegel, Giovanni Vigna:
TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems. CNS 2020: 1-9 - [c213]Marcus Botacin, Giovanni Bertão, Paulo L. de Geus, André Grégio, Christopher Kruegel, Giovanni Vigna:
On the Security of Application Installers and Online Software Repositories. DIMVA 2020: 192-214 - [c212]Hojjat Aghakhani, Fabio Gritti, Francesco Mecca, Martina Lindorfer, Stefano Ortolani, Davide Balzarotti, Giovanni Vigna, Christopher Kruegel:
When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features. NDSS 2020 - [c211]Takeshi Takahashi, Christopher Kruegel, Giovanni Vigna, Katsunari Yoshioka, Daisuke Inoue:
Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs? RAID 2020: 93-106 - [c210]Nilo Redini, Aravind Machiry, Ruoyu Wang, Chad Spensky, Andrea Continella
, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware. SP 2020: 1544-1561 - [c209]Aravind Machiry, Nilo Redini, Eric Camellini, Christopher Kruegel, Giovanni Vigna:
SPIDER: Enabling Fast Patch Propagation In Related Software Repositories. SP 2020: 1562-1579 - [c208]Abraham A. Clements, Eric Gustafson, Tobias Scharnowski, Paul Grosen, David Fritz, Christopher Kruegel, Giovanni Vigna, Saurabh Bagchi, Mathias Payer:
HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation. USENIX Security Symposium 2020: 1201-1218 - [c207]Iskander Sánchez-Rola, Davide Balzarotti, Christopher Kruegel, Giovanni Vigna, Igor Santos:
Dirty Clicks: A Study of the Usability and Security Implications of Click-related Behaviors on the Web. WWW 2020: 395-406 - [i13]Hojjat Aghakhani, Dongyu Meng, Yu-Xiang Wang, Christopher Kruegel, Giovanni Vigna:
Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability. CoRR abs/2005.00191 (2020) - [i12]Hojjat Aghakhani, Thorsten Eisenhofer, Lea Schönherr, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna:
VENOMAVE: Clean-Label Poisoning Against Speech Recognition. CoRR abs/2010.10682 (2020)
2010 – 2019
- 2019
- [c206]Christophe Hauser, Jayakrishna Menon, Yan Shoshitaishvili, Ruoyu Wang, Giovanni Vigna, Christopher Kruegel:
Sleak: automating address space layout derandomization. ACSAC 2019: 190-202 - [c205]Chani Jindal, Christopher Salls, Hojjat Aghakhani, Keith Long, Christopher Kruegel, Giovanni Vigna:
Neurlux: dynamic malware analysis without feature engineering. ACSAC 2019: 444-455 - [c204]Ronny Chevalier
, Stefano Cristalli
, Christophe Hauser, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, Danilo Bruschi, Andrea Lanzi:
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images. CODASPY 2019: 315-325 - [c203]Nilo Redini, Ruoyu Wang, Aravind Machiry, Yan Shoshitaishvili, Giovanni Vigna, Christopher Kruegel:
BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation. DIMVA 2019: 482-501 - [c202]Dokyung Song, Felicitas Hetzelt, Dipanjan Das, Chad Spensky, Yeoul Na, Stijn Volckaert, Giovanni Vigna, Christopher Kruegel, Jean-Pierre Seifert, Michael Franz:
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary. NDSS 2019 - [c201]Eric Gustafson, Marius Muench, Chad Spensky, Nilo Redini, Aravind Machiry, Yanick Fratantonio, Davide Balzarotti, Aurélien Francillon, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna:
Toward the Analysis of Embedded Firmware through Automated Re-hosting. RAID 2019: 135-150 - [c200]Shirin Nilizadeh, Hojjat Aghakhani, Eric Gustafson, Christopher Kruegel, Giovanni Vigna:
Lightning Talk - Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis. WWW (Companion Volume) 2019: 1288-1289 - [c199]Shirin Nilizadeh, Hojjat Aghakhani, Eric Gustafson, Christopher Kruegel, Giovanni Vigna:
Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis. WWW 2019: 3108-3115 - [i11]Ronny Chevalier, Stefano Cristalli, Christophe Hauser, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, Danilo Bruschi, Andrea Lanzi:
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images. CoRR abs/1903.12505 (2019) - [i10]Chani Jindal, Christopher Salls, Hojjat Aghakhani, Keith Long, Christopher Kruegel, Giovanni Vigna:
Neurlux: Dynamic Malware Analysis Without Feature Engineering. CoRR abs/1910.11376 (2019) - 2018
- [c198]Aravind Machiry, Nilo Redini, Eric Gustafson, Yanick Fratantonio, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna:
Using Loops For Malware Classification Resilient to Feature-unaware Perturbations. ACSAC 2018: 112-123 - [c197]Kevin Borgolte, Tobias Fiebig, Shuang Hao, Christopher Kruegel, Giovanni Vigna:
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates. ANRW 2018: 4 - [c196]Radhesh Krishnan Konoth, Emanuele Vineti, Veelasha Moonsamy, Martina Lindorfer, Christopher Kruegel, Herbert Bos
, Giovanni Vigna:
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense. CCS 2018: 1714-1730 - [c195]Victor van der Veen, Martina Lindorfer, Yanick Fratantonio, Harikrishnan Padmanabha Pillai, Giovanni Vigna, Christopher Kruegel, Herbert Bos, Kaveh Razavi:
GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM. DIMVA 2018: 92-113 - [c194]Antonio Bianchi, Yanick Fratantonio, Aravind Machiry, Christopher Kruegel, Giovanni Vigna, Simon Pak Ho Chung, Wenke Lee:
Broken Fingers: On the Usage of the Fingerprint API in Android. NDSS 2018 - [c193]Kevin Borgolte, Tobias Fiebig, Shuang Hao, Christopher Kruegel, Giovanni Vigna:
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates. NDSS 2018 - [c192]Tobias Fiebig
, Kevin Borgolte, Shuang Hao, Christopher Kruegel, Giovanni Vigna, Anja Feldmann:
In rDNS We Trust: Revisiting a Common Data-Source's Reliability. PAM 2018: 131-145 - [c191]Sai Prashanth Chandramouli, Pierre-Marie Bajan, Christopher Kruegel, Giovanni Vigna, Ziming Zhao, Adam Doupé, Gail-Joon Ahn
:
Measuring E-mail header injections on the world wide web. SAC 2018: 1647-1656 - [c190]Hojjat Aghakhani, Aravind Machiry, Shirin Nilizadeh, Christopher Kruegel, Giovanni Vigna:
Detecting Deceptive Reviews Using Generative Adversarial Networks. IEEE Symposium on Security and Privacy Workshops 2018: 89-95 - [c189]Moritz Eckert, Antonio Bianchi, Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security. USENIX Security Symposium 2018: 99-116 - [c188]Wei Meng, Chenxiong Qian, Shuang Hao, Kevin Borgolte, Giovanni Vigna, Christopher Kruegel, Wenke Lee:
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks. USENIX Security Symposium 2018: 393-410 - [i9]Hojjat Aghakhani, Aravind Machiry, Shirin Nilizadeh, Christopher Kruegel, Giovanni Vigna:
Detecting Deceptive Reviews using Generative Adversarial Networks. CoRR abs/1805.10364 (2018) - 2017
- [j24]Ali Zand, Gaspar Modelo-Howard, Alok Tongaonkar, Sung-Ju Lee, Christopher Kruegel, Giovanni Vigna:
Demystifying DDoS as a Service. IEEE Commun. Mag. 55(7): 14-21 (2017) - [j23]Vasilios Mavroudis, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, Giovanni Vigna:
On the Privacy and Security of the Ultrasound Ecosystem. Proc. Priv. Enhancing Technol. 2017(2): 95-112 (2017) - [j22]Manuel Egele, Gianluca Stringhini
, Christopher Kruegel, Giovanni Vigna:
Towards Detecting Compromised Accounts on Social Networks. IEEE Trans. Dependable Secur. Comput. 14(4): 447-460 (2017) - [c187]Antonio Bianchi, Eric Gustafson, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:
Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information. ACSAC 2017: 16-27 - [c186]Christopher Salls, Yan Shoshitaishvili, Nick Stephens, Christopher Kruegel, Giovanni Vigna:
Piston: Uncooperative Remote Runtime Patching. ACSAC 2017: 141-153 - [c185]Yan Shoshitaishvili, Michael Weissbacher, Lukas Dresel, Christopher Salls, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna:
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance. CCS 2017: 347-362 - [c184]Cheng Huang, Shuang Hao, Luca Invernizzi, Jiayong Liu, Yong Fang
, Christopher Kruegel, Giovanni Vigna:
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions. AsiaCCS 2017: 494-505 - [c183]Shirin Nilizadeh, Francois Labreche, Alireza Sedighian, Ali Zand, José M. Fernandez
, Christopher Kruegel, Gianluca Stringhini, Giovanni Vigna:
POISED: Spotting Twitter Spam Off the Beaten Paths. CCS 2017: 1159-1174 - [c182]Jake Corina, Aravind Machiry, Christopher Salls, Yan Shoshitaishvili, Shuang Hao, Christopher Kruegel, Giovanni Vigna:
DIFUZE: Interface Aware Fuzzing for Kernel Drivers. CCS 2017: 2123-2138 - [c181]Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, David Brumley:
How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games. CSF 2017: 7-21 - [c180]Andrea Continella, Yanick Fratantonio, Martina Lindorfer, Alessandro Puccetti, Ali Zand, Christopher Kruegel, Giovanni Vigna:
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis. NDSS 2017 - [c179]Aravind Machiry, Eric Gustafson, Chad Spensky, Christopher Salls, Nick Stephens, Ruoyu Wang, Antonio Bianchi, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna:
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments. NDSS 2017 - [c178]Ruoyu Wang, Yan Shoshitaishvili, Antonio Bianchi, Aravind Machiry, John Grosen, Paul Grosen, Christopher Kruegel, Giovanni Vigna:
Ramblr: Making Reassembly Great Again. NDSS 2017 - [c177]Tobias Fiebig
, Kevin Borgolte, Shuang Hao, Christopher Kruegel, Giovanni Vigna:
Something from Nothing (There): Collecting Global IPv6 Datasets from DNS. PAM 2017: 30-43 - [c176]Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
BootStomp: On the Security of Bootloaders in Mobile Devices. USENIX Security Symposium 2017: 781-798 - [c175]Aravind Machiry, Chad Spensky, Jake Corina, Nick Stephens, Christopher Kruegel, Giovanni Vigna:
DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers. USENIX Security Symposium 2017: 1007-1024 - [i8]Yan Shoshitaishvili, Michael Weissbacher, Lukas Dresel, Christopher Salls, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna:
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance. CoRR abs/1708.02749 (2017) - [i7]Shirin Nilizadeh, Francois Labreche, Alireza Sedighian, Ali Zand, José M. Fernandez, Christopher Kruegel, Gianluca Stringhini, Giovanni Vigna:
POISED: Spotting Twitter Spam Off the Beaten Paths. CoRR abs/1708.09058 (2017) - 2016
- [c174]Vitor Monte Afonso, Paulo L. de Geus, Antonio Bianchi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna, Adam Doupé, Mario Polino:
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy. NDSS 2016 - [c173]Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
Driller: Augmenting Fuzzing Through Selective Symbolic Execution. NDSS 2016 - [c172]Marius Muench, Fabio Pagani, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna, Davide Balzarotti:
Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory. RAID 2016: 24-48 - [c171]Yan Shoshitaishvili, Ruoyu Wang, Christopher Salls, Nick Stephens, Mario Polino, Andrew Dutcher, John Grosen, Siji Feng, Christophe Hauser, Christopher Krügel, Giovanni Vigna:
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis. IEEE Symposium on Security and Privacy 2016: 138-157 - [c170]Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
TriggerScope: Towards Detecting Logic Bombs in Android Applications. IEEE Symposium on Security and Privacy 2016: 377-396 - [e8]Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, Shai Halevi:
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016. ACM 2016, ISBN 978-1-4503-4139-4 [contents] - 2015
- [j21]Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
Portrait of a Privacy Invasion. Proc. Priv. Enhancing Technol. 2015(1): 41-60 (2015) - [c169]Ali Zand, Amir Houmansadr, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel:
Know Your Achilles' Heel: Automatic Detection of Network Critical Services. ACSAC 2015: 41-50 - [c168]Simone Mutti, Yanick Fratantonio, Antonio Bianchi, Luca Invernizzi, Jacopo Corbetta, Dhilung Kirat, Christopher Kruegel, Giovanni Vigna:
BareDroid: Large-Scale Analysis of Android Apps on Real Devices. ACSAC 2015: 71-80 - [c167]Luca Falsina, Yanick Fratantonio, Stefano Zanero
, Christopher Kruegel, Giovanni Vigna, Federico Maggi:
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications. ACSAC 2015: 201-210 - [c166]Antonio Bianchi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:
NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android. SPSM@CCS 2015: 27-38 - [c165]Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna:
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users. DIMVA 2015: 282-303 - [c164]Benjamin Caillat, Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Prison: Tracking Process Interactions to Contain Malware. HPCC/CSS/ICESS 2015: 1282-1291 - [c163]Yinzhi Cao, Yanick Fratantonio, Antonio Bianchi, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Yan Chen:
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework. NDSS 2015 - [c162]Yan Shoshitaishvili, Ruoyu Wang, Christophe Hauser, Christopher Kruegel, Giovanni Vigna:
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. NDSS 2015 - [c161]Yanick Fratantonio, Aravind Machiry, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
CLAPP: characterizing loops in Android applications (invited talk). DeMobile@SIGSOFT FSE 2015: 33-34 - [c160]Yanick Fratantonio, Aravind Machiry, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
CLAPP: characterizing loops in Android applications. ESEC/SIGSOFT FSE 2015: 687-697 - [c159]Antonio Bianchi, Jacopo Corbetta, Luca Invernizzi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:
What the App is That? Deception and Countermeasures in the Android User Interface. IEEE Symposium on Security and Privacy 2015: 931-948 - [c158]Gianluca Stringhini, Pierre Mourlanne, Grégoire Jacob, Manuel Egele, Christopher Kruegel, Giovanni Vigna:
EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services. USENIX Security Symposium 2015: 563-578 - [c157]Kevin Borgolte, Christopher Kruegel, Giovanni Vigna:
Meerkat: Detecting Website Defacements through Image-based Object Recognition. USENIX Security Symposium 2015: 595-610 - [c156]Alessandro Di Federico, Amat Cama, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
How the ELF Ruined Christmas. USENIX Security Symposium 2015: 643-658 - [c155]Michael Weissbacher, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities. USENIX Security Symposium 2015: 737-752 - [c154]Kurt Thomas, Danny Yuxing Huang, David Y. Wang, Elie Bursztein, Chris Grier, Tom Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, Giovanni Vigna:
Framing Dependencies Introduced by Underground Commoditization. WEIS 2015 - [e7]Indrajit Ray, Ninghui Li, Christopher Kruegel:
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015. ACM 2015, ISBN 978-1-4503-3832-5 [contents] - [i6]Manuel Egele, Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna:
Towards Detecting Compromised Accounts on Social Networks. CoRR abs/1509.03531 (2015) - 2014
- [j20]Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
On the Workings and Current Practices of Web-Based Device Fingerprinting. IEEE Secur. Priv. 12(3): 28-36 (2014) - [j19]Leyla Bilge, Sevil Sen
, Davide Balzarotti, Engin Kirda, Christopher Kruegel:
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains. ACM Trans. Inf. Syst. Secur. 16(4): 14 (2014) - [j18]Krishna P. N. Puttaswamy, Shiyuan Wang, Troy Steinbauer, Divyakant Agrawal, Amr El Abbadi, Christopher Kruegel, Ben Y. Zhao:
Preserving Location Privacy in Geosocial Applications. IEEE Trans. Mob. Comput. 13(1): 159-173 (2014) - [c153]Christopher Kruegel:
Fighting malicious code: an eternal struggle. AsiaCCS 2014: 1 - [c152]Gianluca Stringhini, Oliver Hohlfeld, Christopher Kruegel, Giovanni Vigna:
The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape. AsiaCCS 2014: 353-364 - [c151]Giancarlo De Maio, Alexandros Kapravelos, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
PExy: The Other Side of Exploit Kits. DIMVA 2014: 132-151 - [c150]Apostolis Zarras
, Alexandros Kapravelos, Gianluca Stringhini, Thorsten Holz
, Christopher Kruegel, Giovanni Vigna:
The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements. Internet Measurement Conference 2014: 373-380 - [c149]Ali Zand, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel:
Rippler: Delay injection for service dependency detection. INFOCOM 2014: 2157-2165 - [c148]Luca Invernizzi, Stanislav Miskovic, Ruben Torres, Christopher Kruegel, Sabyasachi Saha, Giovanni Vigna, Sung-Ju Lee, Marco Mellia:
Nazca: Detecting Malware Distribution in Large-Scale Networks. NDSS 2014 - [c147]Sebastian Poeplau, Yanick Fratantonio, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications. NDSS 2014 - [c146]Jacopo Corbetta, Luca Invernizzi, Christopher Krügel, Giovanni Vigna:
Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection. RAID 2014: 130-149 - [c145]Yinzhi Cao, Yan Shoshitaishvili, Kevin Borgolte, Christopher Krügel, Giovanni Vigna, Yan Chen:
Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel. RAID 2014: 276-298 - [c144]Ali Zand, Giovanni Vigna, Xifeng Yan, Christopher Kruegel:
Extracting probable command and control signatures for detecting botnets. SAC 2014: 1657-1662 - [c143]Jane Iedemska, Gianluca Stringhini, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
The Tricks of the Trade: What Makes Spam Campaigns Successful? IEEE Symposium on Security and Privacy Workshops 2014: 77-83 - [c142]Dhilung Kirat, Giovanni Vigna, Christopher Kruegel:
BareCloud: Bare-metal Analysis-based Evasive Malware Detection. USENIX Security Symposium 2014: 287-301 - [c141]Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson:
Hulk: Eliciting Malicious Behavior in Browser Extensions. USENIX Security Symposium 2014: 641-654 - [c140]Nick Nikiforakis, Federico Maggi
, Gianluca Stringhini, M. Zubair Rafique, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna, Stefano Zanero
:
Stranger danger: exploring the ecosystem of ad-based URL shortening services. WWW 2014: 51-62 - [c139]Kevin Borgolte, Christopher Kruegel, Giovanni Vigna:
Relevant change detection: a framework for the precise extraction of modified and novel web-based content as a filtering technique for analysis engines. WWW (Companion Volume) 2014: 595-598 - 2013
- [c138]Luca Invernizzi, Christopher Kruegel, Giovanni Vigna:
Message in a bottle: sailing past censorship. ACSAC 2013: 39-48 - [c137]Manuel Egele, David Brumley, Yanick Fratantonio, Christopher Kruegel:
An empirical study of cryptographic misuse in android applications. CCS 2013: 73-84 - [c136]Kevin Borgolte, Christopher Kruegel, Giovanni Vigna:
Delta: automatic identification of unknown web-based infection campaigns. CCS 2013: 109-120 - [c135]Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna:
Shady paths: leveraging surfing crowds to detect malicious web pages. CCS 2013: 133-144 - [c134]Adam Doupé, Weidong Cui, Mariusz H. Jakubowski, Marcus Peinado, Christopher Kruegel, Giovanni Vigna:
deDacota: toward preventing server-side XSS via automatic code and data separation. CCS 2013: 1205-1216 - [c133]Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, Ben Y. Zhao:
Follow the green: growth and dynamics in twitter follower markets. Internet Measurement Conference 2013: 163-176 - [c132]Manuel Egele, Gianluca Stringhini, Christopher Krügel, Giovanni Vigna:
COMPA: Detecting Compromised Accounts on Social Networks. NDSS 2013 - [c131]Tobias Lauinger, Martin Szydlowski, Kaan Onarlioglu, Gilbert Wondracek, Engin Kirda, Christopher Krügel:
Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting. NDSS 2013 - [c130]Christoph Egger, Johannes Schlumberger, Christopher Kruegel, Giovanni Vigna:
Practical Attacks against the I2P Network. RAID 2013: 432-451 - [c129]Pierre Payet, Adam Doupé, Christopher Kruegel, Giovanni Vigna:
EARs in the wild: large-scale analysis of execution after redirect vulnerabilities. SAC 2013: 1792-1799 - [c128]Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting. IEEE Symposium on Security and Privacy 2013: 541-555 - [c127]Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna:
Revolver: An Automated Approach to the Detection of Evasive Web-based Malware. USENIX Security Symposium 2013: 637-652 - [c126]Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services. USENIX Security Symposium 2013: 687-702 - [c125]Federico Maggi, Alessandro Frossi, Stefano Zanero, Gianluca Stringhini, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna:
Two years of short URLs internet measurement: security threats and countermeasures. WWW 2013: 861-872 - 2012
- [j17]Gianluca Stringhini, Manuel Egele, Christopher Kruegel, Giovanni Vigna:
Poultry markets: on the underground economy of twitter followers. Comput. Commun. Rev. 42(4): 527-532 (2012) - [j16]Manuel Egele, Andreas Moser, Christopher Kruegel, Engin Kirda:
PoX: Protecting users from malicious Facebook applications. Comput. Commun. 35(12): 1507-1515 (2012) - [j15]Manuel Egele, Theodoor Scholte, Engin Kirda, Christopher Kruegel:
A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv. 44(2): 6:1-6:42 (2012) - [c124]Leyla Bilge, Davide Balzarotti, William K. Robertson, Engin Kirda, Christopher Kruegel:
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis. ACSAC 2012: 129-138 - [c123]Johannes Schlumberger, Christopher Kruegel, Giovanni Vigna:
Jarhead analysis and detection of malicious Java applets. ACSAC 2012: 249-257 - [c122]Antonio Bianchi, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
Blacksheep: detecting compromised hosts in homogeneous crowds. CCS 2012: 341-352 - [c121]Zhaoyan Xu, Lingfeng Chen, Guofei Gu, Christopher Kruegel:
PeerPress: utilizing enemies' P2P strength against them. CCS 2012: 581-592 - [c120]Nick Nikiforakis, Luca Invernizzi, Alexandros Kapravelos, Steven Van Acker, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
You are what you include: large-scale evaluation of remote javascript inclusions. CCS 2012: 736-747 - [c119]Florian Tegeler, Xiaoming Fu
, Giovanni Vigna, Christopher Kruegel:
BotFinder: finding bots in network traffic without deep packet inspection. CoNEXT 2012: 349-360 - [c118]Grégoire Jacob, Paolo Milani Comparetti, Matthias Neugschwandtner, Christopher Kruegel, Giovanni Vigna:
A Static, Packer-Agnostic Filter to Detect Similar Malware Samples. DIMVA 2012: 102-122 - [c117]André Ricardo Abed Grégio, Paulo Lício de Geus, Christopher Kruegel, Giovanni Vigna:
Tracking Memory Writes for Malware Classification and Code Reuse Identification. DIMVA 2012: 134-143 - [c116]Christopher Kruegel:
Fighting Malicious Software. ICISS 2012: 1-15 - [c115]Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazzini, Tevfik Bultan, Alessandro Orso, Christopher Kruegel:
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies. ISSTA 2012: 56-66 - [c114]Davide Canali, Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda:
A quantitative study of accuracy in system call-based malware detection. ISSTA 2012: 122-132 - [c113]Lei Yang, Zengbin Zhang, Ben Y. Zhao, Christopher Kruegel, Haitao Zheng:
Enforcing dynamic spectrum access with spectrum permits. MobiHoc 2012: 195-204 - [c112]Hakan Yildiz
, Christopher Kruegel:
Detecting social cliques for automated privacy control in online social networks. PerCom Workshops 2012: 353-359 - [c111]Timon Van Overveldt, Christopher Kruegel, Giovanni Vigna:
FlashDetect: ActionScript 3 Malware Detection. RAID 2012: 274-293 - [c110]Luca Invernizzi, Paolo Milani Comparetti, Stefano Benvenuti, Christopher Kruegel, Marco Cova, Giovanni Vigna:
EvilSeed: A Guided Approach to Finding Malicious Web Pages. IEEE Symposium on Security and Privacy 2012: 428-442 - [c109]Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna:
B@bel: Leveraging Email Delivery for Spam Mitigation. USENIX Security Symposium 2012: 16-32 - [c108]Grégoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
PUBCRAWL: Protecting Users and Businesses from CRAWLers. USENIX Security Symposium 2012: 507-522 - [c107]Adam Doupé, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna:
Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner. USENIX Security Symposium 2012: 523-538 - [c106]Gianluca Stringhini, Manuel Egele, Christopher Kruegel, Giovanni Vigna:
Poultry markets: on the underground economy of twitter followers. WOSN 2012: 1-6 - 2011
- [j14]Christopher Kruegel:
Making browser extensions secure: technical perspective. Commun. ACM 54(9): 90 (2011) - [j13]Brett Stone-Gross, Marco Cova, Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Analysis of a Botnet Takeover. IEEE Secur. Priv. 9(1): 64-72 (2011) - [c105]Matthias Neugschwandtner, Paolo Milani Comparetti, Grégoire Jacob, Christopher Kruegel:
FORECAST: skimming off the malware cream. ACSAC 2011: 11-20 - [c104]Casey Cipriano, Ali Zand, Amir Houmansadr, Christopher Kruegel, Giovanni Vigna:
Nexat: a history-based approach to predict attacker actions. ACSAC 2011: 383-392 - [c103]Dhilung Kirat, Giovanni Vigna, Christopher Kruegel:
BareBox: efficient malware analysis on bare-metal. ACSAC 2011: 403-412 - [c102]Adam Doupé, Bryce Boe, Christopher Kruegel, Giovanni Vigna:
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities. CCS 2011: 251-262 - [c101]Clemens Kolbitsch, Engin Kirda, Christopher Kruegel:
The power of procrastination: detection and mitigation of execution-stalling malicious code. CCS 2011: 285-296 - [c100]Krishna P. N. Puttaswamy, Christopher Kruegel, Ben Y. Zhao:
Silverline: toward data confidentiality in storage-intensive cloud applications. SoCC 2011: 10 - [c99]Alexandros Kapravelos, Marco Cova, Christopher Kruegel, Giovanni Vigna:
Escape from Monkey Island: Evading High-Interaction Honeyclients. DIMVA 2011: 124-143 - [c98]Greg Banks, Aristide Fattori, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper). DIMVA 2011: 184-193 - [c97]Martin Szydlowski, Ben Y. Zhao, Engin Kirda, Christopher Kruegel:
BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients. ICCCN 2011: 1-6 - [c96]Martin Szydlowski, Manuel Egele, Christopher Kruegel, Giovanni Vigna:
Challenges for Dynamic Analysis of iOS Applications. iNetSeC 2011: 65-77 - [c95]Brett Stone-Gross, Ryan Stevens, Apostolis Zarras
, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Understanding fraudulent activities in online ad exchanges. Internet Measurement Conference 2011: 279-294 - [c94]Brett Stone-Gross, Marco Cova, Christopher Kruegel, Giovanni Vigna:
Peering through the iframe. INFOCOM 2011: 411-415 - [c93]Leyla Bilge, Engin Kirda, Christopher Kruegel, Marco Balduzzi:
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. NDSS 2011 - [c92]Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna:
PiOS: Detecting Privacy Leaks in iOS Applications. NDSS 2011 - [c91]Manuel Egele, Andreas Moser, Christopher Kruegel, Engin Kirda:
PoX: Protecting users from malicious Facebook applications. PerCom Workshops 2011: 288-294 - [c90]Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Dymo: Tracking Dynamic Code Identity. RAID 2011: 21-40 - [c89]Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:
Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode. RAID 2011: 61-80 - [c88]Grégoire Jacob, Ralf Hund, Christopher Kruegel, Thorsten Holz:
JACKSTRAWS: Picking Command and Control Connections from Bot Traffic. USENIX Security Symposium 2011 - [c87]Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna:
BOTMAGNIFIER: Locating Spambots on the Internet. USENIX Security Symposium 2011 - [c86]Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald:
The Underground Economy of Fake Antivirus Software. WEIS 2011 - [c85]Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald, Giovanni Vigna:
The Underground Economy of Fake Antivirus Software. WEIS (Springer Volume) 2011: 55-78 - [c84]Davide Canali, Marco Cova, Giovanni Vigna, Christopher Kruegel:
Prophiler: a fast filter for the large-scale detection of malicious web pages. WWW 2011: 197-206 - [e6]Christopher Kruegel:
4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '11, Boston, MA, USA, March 29, 2011. USENIX Association 2011 [contents] - 2010
- [j12]Nenad Jovanovic, Christopher Kruegel, Engin Kirda:
Static analysis for detecting taint-style vulnerabilities in web applications. J. Comput. Secur. 18(5): 861-907 (2010) - [c83]Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna:
Detecting spammers on social networks. ACSAC 2010: 1-9 - [c82]Marco Balduzzi, Manuel Egele, Engin Kirda, Davide Balzarotti, Christopher Kruegel:
A solution for the automated detection of clickjacking attacks. AsiaCCS 2010: 135-144 - [c81]Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda:
AccessMiner: using system-centric models for malware protection. CCS 2010: 399-412 - [c80]Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna:
Are BGP Routers Open to Attack? An Experiment. iNetSec 2010: 88-103 - [c79]Davide Balzarotti, Marco Cova, Christoph Karlberger, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
Efficient Detection of Split Personalities in Malware. NDSS 2010 - [c78]William K. Robertson, Federico Maggi, Christopher Kruegel, Giovanni Vigna:
Effective Anomaly Detection with Scarce Training Data. NDSS 2010 - [c77]Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, Christopher Kruegel:
Abusing Social Networks for Automated User Profiling. RAID 2010: 422-441 - [c76]Manuel Egele, Leyla Bilge, Engin Kirda, Christopher Kruegel:
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms. SAC 2010: 1865-1870 - [c75]Ulrich Bayer, Engin Kirda, Christopher Kruegel:
Improving the efficiency of dynamic malware analysis. SAC 2010: 1871-1878 - [c74]Clemens Kolbitsch, Thorsten Holz
, Christopher Kruegel, Engin Kirda:
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries. IEEE Symposium on Security and Privacy 2010: 29-44 - [c73]Paolo Milani Comparetti, Guido Salvaneschi, Engin Kirda, Clemens Kolbitsch, Christopher Kruegel, Stefano Zanero
:
Identifying Dormant Functionality in Malware Programs. IEEE Symposium on Security and Privacy 2010: 61-76 - [c72]Gilbert Wondracek, Thorsten Holz
, Engin Kirda, Christopher Kruegel:
A Practical Attack to De-anonymize Social Network Users. IEEE Symposium on Security and Privacy 2010: 223-238 - [c71]Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna:
Toward Automated Detection of Logic Vulnerabilities in Web Applications. USENIX Security Symposium 2010: 143-160 - [c70]Gilbert Wondracek, Thorsten Holz, Christian Platzer, Engin Kirda, Christopher Kruegel:
Is the Internet for Porn? An Insight Into the Online Adult Industry. WEIS 2010 - [c69]Marco Cova, Christopher Krügel, Giovanni Vigna:
Detection and analysis of drive-by-download attacks and malicious JavaScript code. WWW 2010: 281-290
2000 – 2009
- 2009
- [j11]Engin Kirda, Nenad Jovanovic, Christopher Kruegel, Giovanni Vigna:
Client-side cross-site scripting protection. Comput. Secur. 28(7): 592-604 (2009) - [j10]Stefan Mitterhofer, Christopher Krügel, Engin Kirda, Christian Platzer:
Server-Side Bot Detection in Massively Multiplayer Online Games. IEEE Secur. Priv. 7(3): 29-36 (2009) - [j9]Georg Carle, Falko Dressler
, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov:
Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008. Comput. Sci. Res. Dev. 23(1): 15-25 (2009) - [j8]Giovanni Vigna, Fredrik Valeur, Davide Balzarotti, William K. Robertson, Christopher Kruegel, Engin Kirda:
Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries. J. Comput. Secur. 17(3): 305-329 (2009) - [c68]Brett Stone-Gross, Christopher Kruegel, Kevin C. Almeroth, Andreas Moser, Engin Kirda:
FIRE: FInding Rogue nEtworks. ACSAC 2009: 231-240 - [c67]Sean Ford, Marco Cova, Christopher Kruegel, Giovanni Vigna:
Analyzing and Detecting Malicious Flash Advertisements. ACSAC 2009: 363-372 - [c66]Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro
, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Your botnet is my botnet: analysis of a botnet takeover. CCS 2009: 635-647 - [c65]Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda:
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. DIMVA 2009: 88-106 - [c64]Peter Wurzinger, Leyla Bilge, Thorsten Holz
, Jan Goebel, Christopher Kruegel, Engin Kirda:
Automatically Generating Models for Botnet Detection. ESORICS 2009: 232-249 - [c63]Peter Würzinger, Christian Platzer, Christian Ludl, Engin Kirda, Christopher Kruegel:
SWAP: Mitigating XSS attacks using a reverse proxy. SESS@ICSE 2009: 33-39 - [c62]Manuel Egele, Engin Kirda, Christopher Kruegel:
Mitigating Drive-By Download Attacks: Challenges and Open Problems. iNetSeC 2009: 52-62 - [c61]Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda:
Automated Spyware Collection and Analysis. ISC 2009: 202-217 - [c60]Ulrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Krügel, Engin Kirda:
Scalable, Behavior-Based Malware Clustering. NDSS 2009 - [c59]Federico Maggi
, William K. Robertson, Christopher Krügel, Giovanni Vigna:
Protecting a Moving Target: Addressing Web Application Concept Drift. RAID 2009: 21-40 - [c58]Paolo Milani Comparetti, Gilbert Wondracek, Christopher Krügel, Engin Kirda:
Prospex: Protocol Specification Extraction. SP 2009: 110-125 - [c57]Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Xiao-yong Zhou, XiaoFeng Wang:
Effective and Efficient Malware Detection at the End Host. USENIX Security Symposium 2009: 351-366 - [i5]Sotiris Ioannidis, Evangelos P. Markatos, Christopher Kruegel:
On looking FORWARD. ERCIM News 2009(76) (2009) - 2008
- [c56]Brett Stone-Gross, David Sigal, Rob Cohn, John Morse, Kevin C. Almeroth, Christopher Kruegel:
VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges. DIMVA 2008: 44-63 - [c55]Luca Foschini, Ashish V. Thapliyal
, Lorenzo Cavallaro
, Christopher Kruegel, Giovanni Vigna:
A Parallel Architecture for Stateful, High-Speed Intrusion Detection. ICISS 2008: 203-220 - [c54]Mihai Christodorescu, Somesh Jha, Christopher Kruegel:
Mining specifications of malicious behavior. ISEC 2008: 5-14 - [c53]Gilbert Wondracek, Paolo Milani Comparetti, Christopher Krügel, Engin Kirda:
Automatic Network Protocol Analysis. NDSS 2008 - [c52]Sean McAllister, Engin Kirda, Christopher Kruegel:
Leveraging User Interactions for In-Depth Testing of Web Applications. RAID 2008: 191-210 - [c51]Guenther Starnberger, Christopher Kruegel, Engin Kirda:
Overbot: a botnet protocol based on Kademlia. SecureComm 2008: 13 - [c50]Eric Medvet
, Engin Kirda, Christopher Kruegel:
Visual-similarity-based phishing detection. SecureComm 2008: 22 - [c49]Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. SP 2008: 387-401 - [c48]Marco Cova, Christopher Kruegel, Giovanni Vigna:
There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. WOOT 2008 - [e5]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel:
Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008. Dagstuhl Seminar Proceedings 08102, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 [contents] - [i4]Lothar Braun, Falko Dressler, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Tobias Limmer, Konrad Rieck, James P. G. Sterbenz:
08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective. Network Attack Detection and Defense 2008 - [i3]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel:
08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008 - [i2]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov:
08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008 - [i1]Marc Dacier, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, James P. G. Sterbenz:
8102 Working Group -- Attack Taxonomy. Network Attack Detection and Defense 2008 - 2007
- [j7]Patrick Klinkoff, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
Extending .NET security to unmanaged code. Int. J. Inf. Sec. 6(6): 417-428 (2007) - [c47]Christopher Kruegel, Davide Balzarotti, William K. Robertson, Giovanni Vigna:
Improving Signature Testing through Dynamic Data Flow Analysis. ACSAC 2007: 53-63 - [c46]Martin Szydlowski, Christopher Kruegel, Engin Kirda:
Secure Input for Web Applications. ACSAC 2007: 375-384 - [c45]Andreas Moser, Christopher Kruegel, Engin Kirda:
Limits of Static Analysis for Malware Detection. ACSAC 2007: 421-430 - [c44]Heng Yin
, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda:
Panorama: capturing system-wide information flow for malware detection and analysis. CCS 2007: 116-127 - [c43]Christian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel:
On the Effectiveness of Techniques to Detect Phishing Sites. DIMVA 2007: 20-39 - [c42]Thomas Raffetseder, Engin Kirda, Christopher Kruegel:
Building Anti-Phishing Browser Plug-Ins: An Experience Report. SESS@ICSE 2007: 6 - [c41]Thomas Raffetseder, Christopher Krügel, Engin Kirda:
Detecting System Emulators. ISC 2007: 1-18 - [c40]Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Krügel, Giovanni Vigna:
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. NDSS 2007 - [c39]Angelo P. E. Rosiello, Engin Kirda, Christopher Kruegel, Fabrizio Ferrandi
:
A layout-similarity-based approach for detecting phishing pages. SecureComm 2007: 454-463 - [c38]Mihai Christodorescu, Somesh Jha, Christopher Kruegel:
Mining specifications of malicious behavior. ESEC/SIGSOFT FSE 2007: 5-14 - [c37]Andreas Moser, Christopher Krügel, Engin Kirda:
Exploring Multiple Execution Paths for Malware Analysis. S&P 2007: 231-245 - [c36]Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, Dawn Xiaodong Song:
Dynamic Spyware Analysis. USENIX ATC 2007: 233-246 - [c35]Christoph Karlberger, Günther Bayler, Christopher Kruegel, Engin Kirda:
Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters. WOOT 2007 - [p2]Christopher Kruegel:
Behavioral and Structural Properties of Malicious Code. Malware Detection 2007: 63-83 - [e4]Christopher Krügel, Richard Lippmann, Andrew J. Clark:
Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings. Lecture Notes in Computer Science 4637, Springer 2007, ISBN 978-3-540-74319-4 [contents] - 2006
- [j6]Engin Kirda, Christopher Krügel:
Protecting Users against Phishing Attacks. Comput. J. 49(5): 554-561 (2006) - [j5]Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel:
Anomalous system call detection. ACM Trans. Inf. Syst. Secur. 9(1): 61-93 (2006) - [j4]Ulrich Bayer, Andreas Moser, Christopher Krügel, Engin Kirda:
Dynamic Analysis of Malicious Code. J. Comput. Virol. 2(1): 67-77 (2006) - [c34]Manuel Egele, Martin Szydlowski, Engin Kirda, Christopher Krügel:
Using Static Program Analysis to Aid Intrusion Detection. DIMVA 2006: 17-36 - [c33]Patrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna:
Extending .NET Security to Unmanaged Code. ISC 2006: 1-16 - [c32]William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer:
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. NDSS 2006 - [c31]Nenad Jovanovic, Christopher Kruegel, Engin Kirda:
Precise alias analysis for static detection of web application vulnerabilities. PLAS 2006: 27-36 - [c30]Engin Kirda, Christopher Krügel, Giovanni Vigna, Nenad Jovanovic:
Noxes: a client-side solution for mitigating cross-site scripting attacks. SAC 2006: 330-337 - [c29]Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Engin Kirda:
An anomaly-driven reverse proxy for web applications. SAC 2006: 361-368 - [c28]Nenad Jovanovic, Engin Kirda, Christopher Kruegel:
Preventing Cross Site Request Forgery Attacks. SecureComm 2006: 1-10 - [c27]Nenad Jovanovic, Christopher Krügel, Engin Kirda:
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). S&P 2006: 258-263 - [c26]Engin Kirda, Christopher Kruegel:
Behavior-based Spyware Detection. USENIX Security Symposium 2006 - [c25]Stefan Kals, Engin Kirda, Christopher Krügel, Nenad Jovanovic:
SecuBat: a web vulnerability scanner. WWW 2006: 247-256 - [e3]Diego Zamboni, Christopher Krügel:
Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings. Lecture Notes in Computer Science 4219, Springer 2006, ISBN 3-540-39723-X [contents] - 2005
- [b1]Christopher Kruegel, Fredrik Valeur, Giovanni Vigna:
Intrusion Detection and Correlation - Challenges and Solutions. Advances in Information Security 14, Springer 2005, ISBN 978-0-387-23398-7, pp. 1-118 - [j3]Christopher Krügel, Giovanni Vigna, William K. Robertson:
A multi-model approach to the detection of web-based attacks. Comput. Networks 48(5): 717-738 (2005) - [c24]Engin Kirda, Christopher Krügel:
Protecting Users Against Phishing Attacks with AntiPhish. COMPSAC (1) 2005: 517-524 - [c23]Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna:
Polymorphic Worm Detection Using Structural Information of Executables. RAID 2005: 207-226 - [c22]Christopher Kruegel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna:
Automating Mimicry Attacks Using Static Binary Analysis. USENIX Security Symposium 2005 - [p1]Christopher Krügel:
Network Security and Secure Applications. The Industrial Information Technology Handbook 2005: 1-13 - [e2]Klaus Julisch, Christopher Krügel:
Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings. Lecture Notes in Computer Science 3548, Springer 2005, ISBN 3-540-26613-5 [contents] - 2004
- [j2]Christopher Kruegel, William K. Robertson, Giovanni Vigna:
Using Alert Verification to Identify Successful Intrusion Attempts. Prax. Inf.verarb. Kommun. 27(4): 219-227 (2004) - [j1]Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer:
A Comprehensive Approach to Intrusion Detection Alert Correlation. IEEE Trans. Dependable Secur. Comput. 1(3): 146-169 (2004) - [c21]Christopher Krügel, William K. Robertson, Giovanni Vigna:
Detecting Kernel-Level Rootkits Through Binary Analysis. ACSAC 2004: 91-100 - [c20]Christopher Krügel, William K. Robertson:
Alert Verification Determining the Success of Intrusion Attempts. DIMVA 2004: 25-38 - [c19]Christopher Krügel, William K. Robertson, Fredrik Valeur, Giovanni Vigna:
Static Disassembly of Obfuscated Binaries. USENIX Security Symposium 2004: 255-270 - 2003
- [c18]Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur:
Bayesian Event Classification for Intrusion Detection. ACSAC 2003: 14-23 - [c17]Christopher Krügel, Giovanni Vigna:
Anomaly detection of web-based attacks. CCS 2003: 251-261 - [c16]Christopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna:
On the Detection of Anomalous System Call Arguments. ESORICS 2003: 326-343 - [c15]Engin Kirda, Clemens Kerer, Christopher Krügel, Roman Kurmanowytsch:
Web Service Engineering with DIWE. EUROMICRO 2003: 283-290 - [c14]William K. Robertson, Christopher Krügel, Darren Mutz, Fredrik Valeur:
Run-time Detection of Heap-based Overflows. LISA 2003: 51-60 - [c13]Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur:
Topology-Based Detection of Anomalous BGP Messages. RAID 2003: 17-35 - [c12]Christopher Krügel, Thomas Toth:
Using Decision Trees to Improve Signature-Based Intrusion Detection. RAID 2003: 173-191 - [e1]Giovanni Vigna, Erland Jonsson, Christopher Krügel:
Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings. Lecture Notes in Computer Science 2820, Springer 2003, ISBN 3-540-40878-9 [contents] - 2002
- [c11]Thomas Toth, Christopher Krügel:
Evaluating the Impact of Automated Intrusion Response Mechanisms. ACSAC 2002: 301-310 - [c10]Pascal Fenkam, Harald C. Gall, Mehdi Jazayeri, Christopher Krügel:
DPS : An Architectural Style for Development of Secure Software. InfraSec 2002: 180-198 - [c9]Christopher Krügel, Thomas Toth:
Distributed Pattern Detection for Intrusion Detection. NDSS 2002 - [c8]Clemens Kerer, Engin Kirda, Christopher Krügel:
XGuide - A Practical Guide to XML-Based Web Engineering. NETWORKING Workshops 2002: 104-117 - [c7]Thomas Toth, Christopher Krügel:
Accurate Buffer Overflow Detection via Abstract Payload Execution. RAID 2002: 274-291 - [c6]Christopher Krügel, Thomas Toth, Engin Kirda:
Service specific anomaly detection for network intrusion detection. SAC 2002: 201-208 - [c5]Christopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer:
Stateful Intrusion Detection for High-Speed Networks. S&P 2002: 285-293 - 2001
- [c4]Christopher Krügel, Thomas Toth, Clemens Kerer:
Decentralized Event Correlation for Intrusion Detection. ICISC 2001: 114-131 - [c3]Christopher Krügel, Thomas Toth, Engin Kirda:
SPARTA, a Mobile Agent Based Instrusion Detection System. Network Security 2001: 187-198 - [c2]Engin Kirda, Clemens Kerer, Mehdi Jazayeri, Christopher Krügel:
Supporting Multi-Device Enabled Web Services: Challenges and Open Problems. WETICE 2001: 49-54
1990 – 1999
- 1999
- [c1]Wolfgang Kastner, Christopher Krügel, Heinrich Reiter:
Jini - ein guter Geist für die Gebäudesystemtechnik. Java-Informations-Tage 1999: 213-222
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-15 01:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint