Christopher Kruegel
Christopher Kruegel
Dirección de correo verificada de - Página principal
Citado por
Citado por
A CBP integrator complex mediates transcriptional activation and AP-1 inhibition by nuclear receptors
Y Kamei, L Xu, T Heinzel, J Torchia, R Kurokawa, B Gloss, SC Lin, ...
Cell 85 (3), 403-414, 1996
Ligand-independent repression by the thyroid hormone receptor mediated by a nuclear receptor co-repressor
AJ Hörlein, AM Näär, T Heinzel, J Torchia, B Gloss, R Kurokawa, A Ryan, ...
Nature 377 (6548), 397-404, 1995
A survey on automated dynamic malware-analysis techniques and tools
M Egele, T Scholte, E Kirda, C Kruegel
ACM computing surveys (CSUR) 44 (2), 1-42, 2008
Limits of static analysis for malware detection
A Moser, C Kruegel, E Kirda
Twenty-third annual computer security applications conference (ACSAC 2007 …, 2007
Panorama: capturing system-wide information flow for malware detection and analysis
H Yin, D Song, M Egele, C Kruegel, E Kirda
Proceedings of the 14th ACM conference on Computer and communications …, 2007
Detecting spammers on social networks
G Stringhini, C Kruegel, G Vigna
Proceedings of the 26th annual computer security applications conference, 1-9, 2010
Anomaly detection of web-based attacks
C Kruegel, G Vigna
Proceedings of the 10th ACM conference on Computer and communications …, 2003
Sok:(state of) the art of war: Offensive techniques in binary analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
2016 IEEE Symposium on Security and Privacy (SP), 138-157, 2016
Scalable, behavior-based malware clustering.
U Bayer, PM Comparetti, C Hlauschek, C Kruegel, E Kirda
NDSS 9, 8-11, 2009
Pixy: A static analysis tool for detecting web application vulnerabilities
N Jovanovic, C Kruegel, E Kirda
2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-263, 2006
Your botnet is my botnet: analysis of a botnet takeover
B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, ...
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Driller: Augmenting fuzzing through selective symbolic execution.
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
NDSS 16 (2016), 1-16, 2016
Detection and analysis of drive-by-download attacks and malicious JavaScript code
M Cova, C Kruegel, G Vigna
Proceedings of the 19th international conference on World wide web, 281-290, 2010
Exposure: Finding malicious domains using passive DNS analysis.
L Bilge, E Kirda, C Kruegel, M Balduzzi
Ndss, 1-17, 2011
Exploring multiple execution paths for malware analysis
A Moser, C Kruegel, E Kirda
2007 IEEE Symposium on Security and Privacy (SP'07), 231-245, 2007
Comprehensive approach to intrusion detection alert correlation
F Valeur, G Vigna, C Kruegel, RA Kemmerer
IEEE Transactions on dependable and secure computing 1 (3), 146-169, 2004
PiOS: Detecting Privacy Leaks in iOS Applications.
M Egele, C Kruegel, E Kirda, G Vigna
NDSS, 177-183, 2011
Cross site scripting prevention with dynamic data tainting and static analysis.
P Vogt, F Nentwich, N Jovanovic, E Kirda, C Kruegel, G Vigna
NDSS 2007, 12, 2007
Effective and efficient malware detection at the end host.
C Kolbitsch, PM Comparetti, C Kruegel, E Kirda, X Zhou, XF Wang
USENIX security symposium 4 (1), 351-366, 2009
Mining specifications of malicious behavior
M Christodorescu, S Jha, C Kruegel
Proceedings of the the 6th joint meeting of the European software …, 2007
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20