Christopher Kruegel - Publications

Affiliations: 
Computer Science University of California, Santa Barbara, Santa Barbara, CA, United States 

141 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2015 Falsina L, Fratantonio Y, Zanero S, Kruegel C, Vigna G, Maggi F. Grab 'n run: Secure and practical dynamic code loading for android applications Acm International Conference Proceeding Series. 7: 201-210. DOI: 10.1145/2818000.2818042  1
2015 Mutti S, Fratantonio Y, Bianchi A, Invernizzi L, Corbetta J, Kirat D, Kruegel C, Vigna G. Baredroid: Large-Scale analysis of android apps on real devices Acm International Conference Proceeding Series. 7: 71-80. DOI: 10.1145/2818000.2818036  1
2015 Zand A, Houmansadr A, Vigna G, Kemmerer R, Kruegel C. Know your achilles' heel: Automatic detection of network critical services Acm International Conference Proceeding Series. 7: 41-50. DOI: 10.1145/2818000.2818012  1
2015 Li N, Kruegel C. CCS 2015 Program Chairs' Welcome Proceedings of the Acm Conference On Computer and Communications Security. 2015: iv. DOI: 10.1145/2810103.2823356  1
2015 Bianchi A, Fratantonio Y, Kruegel C, Vigna G. NJAS: Sandboxing unmodified applications in non-rooted devices running stock android Spsm 2015 - Proceedings of the 5th Annual Acm Ccs Workshop On Security and Privacy in Smartphones and Mobile Devices, Co-Located With: Ccs 2015. 27-38. DOI: 10.1145/2808117.2808122  1
2015 Fratantonio Y, Machiry A, Bianchi A, Kruegel C, Vigna G. CLAPP: Characterizing loops in Android applications (invited talk) 3rd International Workshop On Software Development Lifecycle For Mobile, Demobile 2015 - Proceedings. 33-34. DOI: 10.1145/2804345.2804355  1
2015 Bianchi A, Corbetta J, Invernizzi L, Fratantonio Y, Kruegel C, Vigna G. What the app is that? Deception and countermeasures in the android user interface Proceedings - Ieee Symposium On Security and Privacy. 2015: 931-948. DOI: 10.1109/SP.2015.62  1
2015 Caillat B, Gilbert B, Kemmerer R, Kruegel C, Vigna G. Prison: Tracking process interactions to contain malware Proceedings - 2015 Ieee 17th International Conference On High Performance Computing and Communications, 2015 Ieee 7th International Symposium On Cyberspace Safety and Security and 2015 Ieee 12th International Conference On Embedded Software and Systems, Hpcc-Css-Icess 2015. 1282-1291. DOI: 10.1109/HPCC-CSS-ICESS.2015.297  1
2015 Fratantonio Y, Bianchi A, Robertson W, Egele M, Kruegel C, Kirda E, Vigna G. On the security and engineering implications of finer-grained access controls for android developers and users Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9148: 282-303. DOI: 10.1007/978-3-319-20550-2_15  1
2014 Zarras A, Kapravelos A, Stringhini G, Holz T, Kruegel C, Vigna G. The dark alleys of madison avenue: Understanding malicious advertisements Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 373-379. DOI: 10.1145/2663716.2663719  1
2014 Bilge L, Sen S, Balzarotti D, Kirda E, Kruegel C. EXPOSURE: A passive DNS analysis service to detect and report malicious domains Acm Transactions On Information and System Security. 16. DOI: 10.1145/2584679  1
2014 Nikiforakis N, Maggi F, Stringhini G, Rafique MZ, Joosen W, Kruegel C, Piessens F, Vigna G, Zanero S. Stranger danger: Exploring the ecosystem of ad-based URL shortening services Www 2014 - Proceedings of the 23rd International Conference On World Wide Web. 51-61. DOI: 10.1145/2566486.2567983  1
2014 Zand A, Vigna G, Yan X, Kruegel C. Extracting probable command and control signatures for detecting botnets Proceedings of the Acm Symposium On Applied Computing. 1657-1662. DOI: 10.1145/2554850.2554896  1
2014 Puttaswamy KPN, Wang S, Steinbauer T, Agrawal D, El Abbadi A, Kruegel C, Zhao BY. Preserving location privacy in geosocial applications Ieee Transactions On Mobile Computing. 13: 159-173. DOI: 10.1109/TMC.2012.247  1
2014 Iedemska J, Stringhini G, Kemmerer R, Kruegel C, Vigna G. The tricks of the trade: What makes spam campaigns successful? Proceedings - Ieee Symposium On Security and Privacy. 2014: 77-83. DOI: 10.1109/SPW.2014.21  1
2014 Nikiforakis N, Kapravelos A, Joosen W, Kruegel C, Piessens F, Vigna G. On the workings and current practices of web-based device fingerprinting Ieee Security and Privacy. 12: 28-36. DOI: 10.1109/MSP.2013.160  1
2014 Zand A, Vigna G, Kemmerer R, Kruegel C. Rippler: Delay injection for service dependency detection Proceedings - Ieee Infocom. 2157-2165. DOI: 10.1109/INFOCOM.2014.6848158  1
2014 Corbetta J, Invernizzi L, Kruegel C, Vigna G. Eyes of a human, eyes of a program: Leveraging different views of the web for analysis and detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8688: 130-149. DOI: 10.1007/978-3-319-11379-1_7  1
2014 Cao Y, Shoshitaishvili Y, Borgolte K, Kruegel C, Vigna G, Chen Y. Protecting web-based single sign-on protocols against relying party impersonation attacks through a dedicated bi-directional authenticated secure channel Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8688: 276-298. DOI: 10.1007/978-3-319-11379-1_14  1
2014 De Maio G, Kapravelos A, Shoshitaishvili Y, Kruegel C, Vigna G. PExy: The other side of exploit kits Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8550: 132-151. DOI: 10.1007/978-3-319-08509-8_8  1
2013 Invernizzi L, Kruegel C, Vigna G. Message in a bottle: Sailing past censorship Acm International Conference Proceeding Series. 39-48. DOI: 10.1145/2523649.2523654  1
2013 Borgolte K, Kruegel C, Vigna G. Delta: Automatic identification of unknown web-based infection campaigns Proceedings of the Acm Conference On Computer and Communications Security. 109-120. DOI: 10.1145/2508859.2516725  1
2013 Doupé A, Cui W, Jakubowski MH, Peinado M, Kruegel C, Vigna G. DeDacota: Toward preventing server-side XSS via automatic code and data separation Proceedings of the Acm Conference On Computer and Communications Security. 1205-1216. DOI: 10.1145/2508859.2516708  1
2013 Egele M, Brumley D, Fratantonio Y, Kruegel C. An empirical study of cryptographic misuse in Android applications Proceedings of the Acm Conference On Computer and Communications Security. 73-83. DOI: 10.1145/2508859.2516693  1
2013 Stringhini G, Kruegel C, Vigna G. Shady paths: Leveraging surfing crowds to detect malicious web pages Proceedings of the Acm Conference On Computer and Communications Security. 133-144. DOI: 10.1145/2508859.2516682  1
2013 Stringhini G, Wang G, Egele M, Kruegel C, Vigna G, Zheng H, Zhao BY. Follow the green: Growth and dynamics in Twitter follower markets Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 163-176. DOI: 10.1145/2504730.2504731  1
2013 Payet P, Doupé A, Kruegel C, Vigna G. EARs in the wild: Large-scale analysis of Execution After Redirect Vulnerabilities Proceedings of the Acm Symposium On Applied Computing. 1792-1799. DOI: 10.1145/2480362.2480699  1
2013 Nikiforakis N, Kapravelos A, Joosen W, Kruegel C, Piessens F, Vigna G. Cookieless monster: Exploring the ecosystem of web-based device fingerprinting Proceedings - Ieee Symposium On Security and Privacy. 541-555. DOI: 10.1109/SP.2013.43  1
2013 Egger C, Schlumberger J, Kruegel C, Vigna G. Practical attacks against the I2P network Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8145: 432-451. DOI: 10.1007/978-3-642-41284-4_22  1
2013 Grégio ARA, De Geus PL, Kruegel C, Vigna G. Tracking memory writes for malware classification and code reuse identification Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7591: 134-143. DOI: 10.1007/978-3-642-37300-8-8  1
2013 Jacob G, Comparetti PM, Neugschwandtner M, Kruegel C, Vigna G. A static, packer-agnostic filter to detect similar malware samples Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7591: 102-122. DOI: 10.1007/978-3-642-37300-8-6  1
2013 Maggi F, Frossi A, Zanero S, Stringhini G, Stone-Gross B, Kruegel C, Vigna G. Two years of short URLs internet measurement: Security threats and countermeasures Www 2013 - Proceedings of the 22nd International Conference On World Wide Web. 861-871.  1
2012 Schlumberger J, Kruegel C, Vigna G. Jarhead: Analysis and detection of malicious Java applets Acm International Conference Proceeding Series. 249-258. DOI: 10.1145/2420950.2420988  1
2012 Bilge L, Balzarotti D, Robertson W, Kirda E, Kruegel C. Disclosure: Detecting botnet command and control servers through large-scale NetFlow analysis Acm International Conference Proceeding Series. 129-138. DOI: 10.1145/2420950.2420969  1
2012 Tegeler F, Fu X, Vigna G, Kruegel C. BotFinder: Finding bots in network traffic without deep packet inspection Conext 2012 - Proceedings of the 2012 Acm Conference On Emerging Networking Experiments and Technologies. 349-360. DOI: 10.1145/2413176.2413217  1
2012 Nikiforakis N, Invernizzi L, Kapravelos A, Van Acker S, Joosen W, Kruegel C, Piessens F, Vigna G. You are what you include: Large-scale evaluation of remote JavaScript inclusions Proceedings of the Acm Conference On Computer and Communications Security. 736-747. DOI: 10.1145/2382196.2382274  1
2012 Xu Z, Chen L, Gu G, Kruegel C. PeerPress: Utilizing enemies' P2P strength against them Proceedings of the Acm Conference On Computer and Communications Security. 581-592. DOI: 10.1145/2382196.2382257  1
2012 Bianchi A, Shoshitaishvili Y, Kruegel C, Vigna G. Blacksheep: Detecting compromised hosts in homogeneous crowds Proceedings of the Acm Conference On Computer and Communications Security. 341-352. DOI: 10.1145/2382196.2382234  1
2012 Stringhini G, Egele M, Kruegel C, Vigna G. Poultry markets: On the underground economy of twitter followers Wosn'12 - Proceedings of the Acm Workshop On Online Social Networks. 1-6. DOI: 10.1145/2342549.2342551  1
2012 Yang L, Zhang Z, Zhao BY, Kruegel C, Zheng H. Enforcing dynamic spectrum access with spectrum permits Proceedings of the International Symposium On Mobile Ad Hoc Networking and Computing (Mobihoc). 195-204. DOI: 10.1145/2248371.2248400  1
2012 Egele M, Scholte T, Kirda E, Kruegel C. A survey on automated dynamic malware-analysis techniques and tools Acm Computing Surveys. 44. DOI: 10.1145/2089125.2089126  1
2012 Canali D, Lanzi A, Balzarotti D, Kruegel C, Christodorescu M, Kirda E. A quantitative study of accuracy in system call-based malware detection 2012 International Symposium On Software Testing and Analysis, Issta 2012 - Proceedings. 122-132. DOI: 10.1145/04000800.2336768  1
2012 Alkhalaf M, Choudhary SR, Fazzini M, Bultan T, Orso A, Kruegel C. ViewPoints: Differential string analysis for discovering client- and server-side input validation inconsistencies 2012 International Symposium On Software Testing and Analysis, Issta 2012 - Proceedings. 56-66. DOI: 10.1145/04000800.2336760  1
2012 Invernizzi L, Comparetti PM, Benvenuti S, Kruegel C, Cova M, Vigna G. EvilSeed: A guided approach to finding malicious web pages Proceedings - Ieee Symposium On Security and Privacy. 428-442. DOI: 10.1109/SP.2012.33  1
2012 Yildiz H, Kruegel C. Detecting social cliques for automated privacy control in online social networks 2012 Ieee International Conference On Pervasive Computing and Communications Workshops, Percom Workshops 2012. 353-359. DOI: 10.1109/PerComW.2012.6197509  1
2012 Egele M, Moser A, Kruegel C, Kirda E. PoX: Protecting users from malicious Facebook applications Computer Communications. 35: 1507-1515. DOI: 10.1016/j.comcom.2012.04.016  1
2012 Kruegel C. Fighting malicious software Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7671: 1-15. DOI: 10.1007/978-3-642-35130-3_1  1
2012 Van Overveldt T, Kruegel C, Vigna G. FlashDetect: ActionScript 3 malware detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7462: 274-293. DOI: 10.1007/978-3-642-33338-5_14  1
2012 Szydlowski M, Egele M, Kruegel C, Vigna G. Challenges for dynamic analysis of iOS applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7039: 65-77. DOI: 10.1007/978-3-642-27585-2_6  1
2011 Kirat D, Vigna G, Kruegel C. BareBox: Efficient malware analysis on bare-metal Acm International Conference Proceeding Series. 403-412. DOI: 10.1145/2076732.2076790  1
2011 Cipriano C, Zand A, Houmansadr A, Kruegel C, Vigna G. Nexat: A history-based approach to predict attacker actions Acm International Conference Proceeding Series. 383-392. DOI: 10.1145/2076732.2076787  1
2011 Neugschwandtner M, Comparetti PM, Jacob G, Kruegel C. FORECAST - Skimming off the malware cream Acm International Conference Proceeding Series. 11-20. DOI: 10.1145/2076732.2076735  1
2011 Stone-Gross B, Stevens R, Zarras A, Kemmerer R, Kruegel C, Vigna G. Understanding fraudulent activities in online ad exchanges Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 279-294. DOI: 10.1145/2068816.2068843  1
2011 Kolbitsch C, Kirda E, Kruegel C. The power of procrastination: Detection and mitigation of execution-stalling malicious code Proceedings of the Acm Conference On Computer and Communications Security. 285-296. DOI: 10.1145/2046707.2046740  1
2011 Doupé A, Boe B, Kruegel C, Vigna G. Fear the EAR: Discovering and mitigating execution after redirect vulnerabilities Proceedings of the Acm Conference On Computer and Communications Security. 251-261. DOI: 10.1145/2046707.2046736  1
2011 Puttaswamy KPN, Kruegel C, Zhao BY. Silverline: Toward data confidentiality in storage-intensive cloud applications Proceedings of the 2nd Acm Symposium On Cloud Computing, Socc 2011. DOI: 10.1145/2038916.2038926  1
2011 Kruegel C. Making browser extensions secure Communications of the Acm. 54: 90. DOI: 10.1145/1995376.1995397  1
2011 Canali D, Cova M, Vigna G, Kruegel C. Prophiler: A fast filter for the large-scale detection of malicious web pages Proceedings of the 20th International Conference On World Wide Web, Www 2011. 197-206. DOI: 10.1145/1963405.1963436  1
2011 Stone-Gross B, Cova M, Gilbert B, Kemmerer R, Kruegel C, Vigna G. Analysis of a botnet takeover Ieee Security and Privacy. 9: 64-72. DOI: 10.1109/MSP.2010.144  1
2011 Stone-Gross B, Cova M, Kruegel C, Vigna G. Peering through the iframe Proceedings - Ieee Infocom. 411-415. DOI: 10.1109/INFCOM.2011.5935193  1
2011 Szydlowski M, Zhao BY, Kirda E, Kruegel C. BTLab: A system-centric, data-driven analysis and measurement platform for BitTorrent clients Proceedings - International Conference On Computer Communications and Networks, Icccn. DOI: 10.1109/ICCCN.2011.6005925  1
2011 Fratantonio Y, Kruegel C, Vigna G. Shellzer: A tool for the dynamic analysis of malicious shellcode Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6961: 61-80. DOI: 10.1007/978-3-642-23644-0_4  1
2011 Gilbert B, Kemmerer R, Kruegel C, Vigna G. DYMO: Tracking dynamic code identity Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6961: 21-40. DOI: 10.1007/978-3-642-23644-0_2  1
2011 Kapravelos A, Cova M, Kruegel C, Vigna G. Escape from monkey island: Evading high-interaction honeyclients Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6739: 124-143. DOI: 10.1007/978-3-642-22424-9_8  1
2011 Banks G, Fattori A, Kemmerer R, Kruegel C, Vigna G. MISHIMA: Multilateration of internet hosts hidden using malicious fast-flux agents (short paper) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6739: 184-193. DOI: 10.1007/978-3-642-22424-9_11  1
2011 Cavedon L, Kruegel C, Vigna G. Are BGP routers open to attack? An experiment Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6555: 88-103. DOI: 10.1007/978-3-642-19228-9_8  1
2010 Jovanovic N, Kruegel C, Kirda E. Static analysis for detecting taint-style vulnerabilities in web applications Journal of Computer Security. 18: 861-907. DOI: 10.3233/JCS-2009-0385  1
2010 Stringhini G, Kruegel C, Vigna G. Detecting spammers on social networks Proceedings - Annual Computer Security Applications Conference, Acsac. 1-9. DOI: 10.1145/1920261.1920263  1
2010 Lanzi A, Balzarotti D, Kruegel C, Christodorescu M, Kirda E. AccessMiner: Using system-centric models for malware protection Proceedings of the Acm Conference On Computer and Communications Security. 399-412. DOI: 10.1145/1866307.1866353  1
2010 Bayer U, Kirda E, Kruegel C. Improving the efficiency of dynamic malware analysis Proceedings of the Acm Symposium On Applied Computing. 1871-1878. DOI: 10.1145/1774088.1774484  1
2010 Egele M, Bilge L, Kirda E, Kruegel C. CAPTCHA smuggling: Hijacking web browsing sessions to create CAPTCHA farms Proceedings of the Acm Symposium On Applied Computing. 1865-1870. DOI: 10.1145/1774088.1774483  1
2010 Cova M, Kruegel C, Vigna G. Detection and analysis of drive-by-download attacks and malicious JavaScript code Proceedings of the 19th International Conference On World Wide Web, Www '10. 281-290. DOI: 10.1145/1772690.1772720  1
2010 Balduzzi M, Egele M, Kirda E, Balzarotti D, Kruegel C. A solution for the automated detection of clickjacking attacks Proceedings of the 5th International Symposium On Information, Computer and Communications Security, Asiaccs 2010. 135-144. DOI: 10.1145/1755688.1755706  1
2010 Wondracek G, Holz T, Kirda E, Kruegel C. A practical attack to de-anonymize social network users Proceedings - Ieee Symposium On Security and Privacy. 223-238. DOI: 10.1109/SP.2010.21  1
2010 Comparetti PM, Salvaneschit G, Kirdai E, Kolbitsch C, Kruegel C, Zanero S. Identifying dormant functionality in malware programs Proceedings - Ieee Symposium On Security and Privacy. 61-76. DOI: 10.1109/SP.2010.12  1
2010 Kolbitsch C, Holz T, Kruegel C, Kirda E. Inspector gadget: Automated extraction of proprietary gadgets from malware binaries Proceedings - Ieee Symposium On Security and Privacy. 29-44. DOI: 10.1109/SP.2010.10  1
2010 Balduzzi M, Platzer C, Holz T, Kirda E, Balzarotti D, Kruegel C. Abusing social networks for automated user profiling Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6307: 422-441. DOI: 10.1007/978-3-642-15512-3_22  1
2009 Vigna G, Valeur F, Balzarotti D, Robertson W, Kruegel C, Kirda E. Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries Journal of Computer Security. 17: 305-329. DOI: 10.3233/JCS-2009-0321  1
2009 Stone-Gross B, Cova M, Cavallaro L, Gilbert B, Szydlowski M, Kemmerer R, Kruegel C, Vigna G. Your botnet is my botnet: Analysis of a botnet takeover Proceedings of the Acm Conference On Computer and Communications Security. 635-647. DOI: 10.1145/1653662.1653738  1
2009 Comparetti PM, Wondracek G, Kruegel C, Kirda E. Prospex: Protocol specification extraction Proceedings - Ieee Symposium On Security and Privacy. 110-125. DOI: 10.1109/SP.2009.14  1
2009 Mitterhofer S, Kruegel C, Kirda E, Platzer C. Server-side bot detection in massively multiplayer online games Ieee Security and Privacy. 7: 29-36. DOI: 10.1109/MSP.2009.78  1
2009 Wurzinger P, Platzer C, Ludl C, Kirda E, Kruegel C. SWAP: Mitigating XSS attacks using a reverse proxy Proceedings of the 2009 Icse Workshop On Software Engineering For Secure Systems, Sess 2009. 33-39. DOI: 10.1109/IWSESS.2009.5068456  1
2009 Ford S, Cova M, Kruegel C, Vigna G. Analyzing and detecting malicious flash advertisements Proceedings - Annual Computer Security Applications Conference, Acsac. 363-372. DOI: 10.1109/ACSAC.2009.41  1
2009 Stone-Gross B, Kruegel C, Almeroth K, Moser A, Kirda E. FIRE: FInding Rogue nEtworks Proceedings - Annual Computer Security Applications Conference, Acsac. 231-240. DOI: 10.1109/ACSAC.2009.29  1
2009 Kirda E, Jovanovic N, Kruegel C, Vigna G. Client-side cross-site scripting protection Computers and Security. 28: 592-604. DOI: 10.1016/j.cose.2009.04.008  1
2009 Carle G, Dressler F, Kemmerer RA, Koenig H, Kruegel C, Laskov P. Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008 Computer Science - Research and Development. 23: 15-25. DOI: 10.1007/s00450-009-0055-y  1
2009 Bos H, Ioannidis S, Jonsson E, Kirda E, Kruegel C. Future threats to future trust Future of Trust in Computing: Proceedings of the First International Conference Future of Trust in Computing 2008: With 58 Illustrations. 49-54. DOI: 10.1007/978-3-8348-9324-6_5  1
2009 Egele M, Kirda E, Kruegel C. Mitigating drive-by download attacks: Challenges and open problems Ifip Advances in Information and Communication Technology. 309: 52-62. DOI: 10.1007/978-3-642-05437-2_5  1
2009 Stamminger A, Kruegel C, Vigna G, Kirda E. Automated spyware collection and analysis Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5735: 202-217. DOI: 10.1007/978-3-642-04474-8_17  1
2009 Wurzinger P, Bilge L, Holz T, Goebel J, Kruegel C, Kirda E. Automatically generating models for botnet detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5789: 232-249. DOI: 10.1007/978-3-642-04444-1_15  1
2009 Maggi F, Robertson W, Kruegel C, Vigna G. Protecting a moving target: Addressing web application concept drift Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5758: 21-40. DOI: 10.1007/978-3-642-04342-0_2  1
2009 Egele M, Wurzinger P, Kruegel C, Kirda E. Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5587: 88-106. DOI: 10.1007/978-3-642-02918-9_6  1
2008 Medvet E, Kirda E, Kruegel C. Visual-similarity-based phishing detection Proceedings of the 4th International Conference On Security and Privacy in Communication Networks, Securecomm'08. DOI: 10.1145/1460877.1460905  1
2008 Starnberger G, Kruegel C, Kirda E. Overbot-a botnet protocol based on kademlia Proceedings of the 4th International Conference On Security and Privacy in Communication Networks, Securecomm'08. DOI: 10.1145/1460877.1460894  1
2008 Christodorescu M, Jha S, Kruegel C. Mining specifications of malicious behavior Proceedings of the 2008 1st India Software Engineering Conference, Isec'08. 5-14. DOI: 10.1145/1342211.1342215  1
2008 Balzarotti D, Cova M, Felmetsger V, Jovanovic N, Kirda E, Kruegel C, Vigna G. Saner: Composing static and dynamic analysis to validate sanitization in web applications Proceedings - Ieee Symposium On Security and Privacy. 387-401. DOI: 10.1109/SP.2008.22  1
2008 Foschini L, Thapliyal AV, Cavallaro L, Kruegel C, Vigna G. A parallel architecture for stateful, high-speed intrusion detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5352: 203-220. DOI: 10.1007/978-3-540-89862-7_18  1
2008 McAllister S, Kirda E, Kruegel C. Leveraging user interactions for in-depth testing of web applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5230: 191-210. DOI: 10.1007/978-3-540-87403-4_11  1
2008 Stone-Gross B, Sigal D, Cohn R, Morse J, Almeroth K, Kruegel C. VeriKey: A dynamic certificate verification system for public key exchanges Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5137: 44-63. DOI: 10.1007/978-3-540-70542-0_3  1
2007 Yin H, Song D, Egele M, Kruegel C, Kirda E. Panorama: Capturing system-wide information flow for malware detection and analysis Proceedings of the Acm Conference On Computer and Communications Security. 116-127. DOI: 10.1145/1315245.1315261  1
2007 Moser A, Kruegel C, Kirda E. Exploring multiple execution paths for malware analysis Proceedings - Ieee Symposium On Security and Privacy. 231-245. DOI: 10.1109/SP.2007.17  1
2007 Raffetseder T, Kirda E, Kruegel C. Building anti-phishing browser plug-ins: An experience report Proceedings - Icse 2007 Workshops: Third International Workshop On Software Engineering For Secure Systems, Sess'07. DOI: 10.1109/SESS.2007.6  1
2007 Rosiello APE, Kirda E, Kruegel C, Ferrandi F. A layout-similarity-based approach for detecting phishing pages Proceedings of the 3rd International Conference On Security and Privacy in Communication Networks, Securecomm. 454-463. DOI: 10.1109/SECCOM.2007.4550367  1
2007 Kruegel C, Balzarotti D, Robertson W, Vigna G. Improving signature testing through dynamic data flow analysis Proceedings - Annual Computer Security Applications Conference, Acsac. 53-63. DOI: 10.1109/ACSAC.2007.40  1
2007 Szydlowski M, Kruegel C, Kirda E. Secure input for web applications Proceedings - Annual Computer Security Applications Conference, Acsac. 375-384. DOI: 10.1109/ACSAC.2007.28  1
2007 Moser A, Kruegel C, Kirda E. Limits of static analysis for malware detection Proceedings - Annual Computer Security Applications Conference, Acsac. 421-430. DOI: 10.1109/ACSAC.2007.21  1
2007 Klinkoff P, Kirda E, Kruegel C, Vigna G. Extending .NET security to unmanaged code International Journal of Information Security. 6: 417-428. DOI: 10.1007/s10207-007-0031-0  1
2007 Raffetseder T, Kruegel C, Kirda E. Detecting system emulators Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4779: 1-18.  1
2007 Kruegel C. Behavioral and Structural Properties of Malicious Code Advances in Information Security. 27: 63-83.  1
2007 Kruegel C, Lippmann R, Clark A. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics: Preface Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4637: v.  1
2007 Ludl C, McAllister S, Kirda E, Kruegel C. On the effectiveness of techniques to detect phishing sites Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4579: 20-39.  1
2006 Kals S, Kirda E, Kruegel C, Jovanovic N. SecuBat: A web vulnerability scanner Proceedings of the 15th International Conference On World Wide Web. 247-256. DOI: 10.1145/1135777.1135817  1
2006 Jovanovic N, Kruegel C, Kirda E. Pixy: A static analysis tool for detecting web application vulnerabilities (Short paper) Proceedings - Ieee Symposium On Security and Privacy. 2006: 258-263. DOI: 10.1109/SP.2006.29  1
2006 Jovanovic N, Kirda E, Kruegel C. Preventing cross site request forgery attacks 2006 Securecomm and Workshops. DOI: 10.1109/SECCOMW.2006.359531  1
2006 Kirda E, Kruegel C. Protecting users against phishing attacks Computer Journal. 49: 554-561. DOI: 10.1093/comjnl/bxh169  1
2006 Bayer U, Moser A, Kruegel C, Kirda E. Dynamic analysis of malicious code Journal in Computer Virology. 2: 67-77. DOI: 10.1007/s11416-006-0012-2  1
2006 Kruegel C, Kirda E, Mutz D, Robertson W, Vigna G. Polymorphic worm detection using structural information of executables Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3858: 207-226. DOI: 10.1007/11663812_11  1
2006 Kirda E, Kruegel C, Vigna G, Jovanovic N. Noxes: A client-side solution for mitigating cross-site scripting attacks Proceedings of the Acm Symposium On Applied Computing. 1: 330-337.  1
2006 Valeur F, Vigna G, Kruegel C, Kirda E. An anomaly-driven reverse proxy for web applications Proceedings of the Acm Symposium On Applied Computing. 1: 361-368.  1
2006 Jovanovic N, Kruegel C, Kirda E. Precise alias analysis for static detection of web application vulnerabilities Plas 2006 - Proceedings of the 2006 Programming Languages and Analysis For Security Workshop. 2006: 27-36.  1
2006 Mutz D, Valeur F, Vigna G, Kruegel C. Anomalous system call detection Acm Transactions On Information and System Security. 9: 61-93.  1
2006 Egele M, Szydlowski M, Kirda E, Kruegel C. Using static program analysis to aid intrusion detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4064: 17-36.  1
2006 Zamboni D, Kruegel C. Preface: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intellingence and Lecture Notes in Bioinformatics) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4219: v.  1
2005 Kirda E, Kruegel C. Protecting users against phishing attacks with AntiPhish Proceedings - International Computer Software and Applications Conference. 1: 517-524. DOI: 10.1109/COMPSAC.2005.126  1
2005 Kruegel C, Vigna G, Robertson W. A multi-model approach to the detection of web-based attacks Computer Networks. 48: 717-738. DOI: 10.1016/j.comnet.2005.01.009  1
2005 Kruegel C, Valeur F, Vigna G. Intrusion detection and correlation: Challenges and solutions Advances in Information Security. 14: 1-115.  1
2005 Julisch K, Kruegel C. Lecture Notes in Computer Science: Preface Lecture Notes in Computer Science. 3548: V.  1
2004 Valeur F, Vigna G, Kruegel C, Kemmerer RA. A comprehensive approach to intrusion detection alert correlation Ieee Transactions On Dependable and Secure Computing. 1: 146-168. DOI: 10.1109/TDSC.2004.21  1
2004 Kruegel C, Robertson W, Vigna G. Detecting kernel-level rootkits through binary analysis Proceedings - Annual Computer Security Applications Conference, Acsac. 91-100.  1
2003 Kirda E, Kerer C, Kruegel C, Kurmanowytsch R. Web service engineering with DIWE Conference Proceedings of the Euromicro. 283-290. DOI: 10.1109/EURMIC.2003.1231603  1
2003 Kruegel C, Mutz D, Robertson W, Valeur F. Bayesian event classification for intrusion detection Proceedings - Annual Computer Security Applications Conference, Acsac. 2003: 14-23. DOI: 10.1109/CSAC.2003.1254306  1
2003 Kruegel C, Vigna G. Anomaly detection of Web-based attacks Proceedings of the Acm Conference On Computer and Communications Security. 251-261.  1
2003 Kruegel C, Mutz D, Robertson W, Valeur F. Topology-based detection of anomalous-BGP messages Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2820: 17-35.  1
2003 Kruegel C, Toth T. Using decision trees to improve signature-based intrusion detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2820: 173-191.  1
2003 Kruegel C, Mutz D, Valeur F, Vigna G. On the detection of anomalous system call arguments Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2808: 326-343.  1
2002 Kruegel C, Valeur F, Vigna G, Kemmerer R. Stateful intrusion detection for high-speed network's Proceedings - Ieee Symposium On Security and Privacy. 2002: 285-293. DOI: 10.1109/SECPRI.2002.1004378  1
2002 Toth T, Kruegel C. Evaluating the impact of automated intrusion response mechanisms Proceedings - Annual Computer Security Applications Conference, Acsac. 2002: 301-310. DOI: 10.1109/CSAC.2002.1176302  1
2002 Toth T, Kruegel C. Accurate buffer overflow detection via abstract payload execution Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2516: 274-291. DOI: 10.1007/3-540-36084-0_15  1
2002 Fenkam P, Gall H, Jazayeri M, Kruegel C. DPS: An architectural style for development of secure software Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2437: 180-198.  1
2002 Kruegel C, Valeur F, Vigna G, Kemmerer R. Stateful intrusion detection for high-speed networks Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 285-293.  1
2001 Kirda E, Kerer C, Jazayeri M, Kruegel C. Supporting multi-device enabled Web services: Challenges and open problems Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2001: 49-54. DOI: 10.1109/ENABL.2001.953387  1
Show low-probability matches.