Christopher Kruegel
Christopher Kruegel
Dirección de correo verificada de cs.ucsb.edu - Página principal
Título
Citado por
Citado por
Año
An architecture for privacy-sensitive ubiquitous computing
JI Hong, JA Landay
Proceedings of the 2nd international conference on Mobile systems …, 2004
1171*2004
Panorama: capturing system-wide information flow for malware detection and analysis
H Yin, D Song, M Egele, C Kruegel, E Kirda
Proceedings of the 14th ACM conference on Computer and communications …, 2007
10262007
A survey on automated dynamic malware-analysis techniques and tools
M Egele, T Scholte, E Kirda, C Kruegel
ACM computing surveys (CSUR) 44 (2), 1-42, 2008
10032008
Limits of static analysis for malware detection
A Moser, C Kruegel, E Kirda
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
9962007
Detecting spammers on social networks
G Stringhini, C Kruegel, G Vigna
Proceedings of the 26th annual computer security applications conference, 1-9, 2010
9352010
Anomaly detection of web-based attacks
C Kruegel, G Vigna
Proceedings of the 10th ACM conference on Computer and communications …, 2003
9092003
Your botnet is my botnet: analysis of a botnet takeover
B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, ...
Proceedings of the 16th ACM conference on Computer and communications …, 2009
8652009
Scalable, behavior-based malware clustering.
U Bayer, PM Comparetti, C Hlauschek, C Kruegel, E Kirda
NDSS 9, 8-11, 2009
8582009
Pixy: A static analysis tool for detecting web application vulnerabilities
N Jovanovic, C Kruegel, E Kirda
2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-263, 2006
8552006
Detection and analysis of drive-by-download attacks and malicious JavaScript code
M Cova, C Kruegel, G Vigna
Proceedings of the 19th international conference on World wide web, 281-290, 2010
8092010
Exploring multiple execution paths for malware analysis
A Moser, C Kruegel, E Kirda
2007 IEEE Symposium on Security and Privacy (SP'07), 231-245, 2007
7322007
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.
L Bilge, E Kirda, C Kruegel, M Balduzzi
Ndss, 1-17, 2011
7162011
Comprehensive approach to intrusion detection alert correlation
F Valeur, G Vigna, C Kruegel, RA Kemmerer
IEEE Transactions on dependable and secure computing 1 (3), 146-169, 2004
6932004
Sok:(state of) the art of war: Offensive techniques in binary analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
2016 IEEE Symposium on Security and Privacy (SP), 138-157, 2016
6852016
PiOS: Detecting Privacy Leaks in iOS Applications.
M Egele, C Kruegel, E Kirda, G Vigna
NDSS, 177-183, 2011
6812011
Driller: Augmenting fuzzing through selective symbolic execution.
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
NDSS 16 (2016), 1-16, 2016
6632016
Cross site scripting prevention with dynamic data tainting and static analysis.
P Vogt, F Nentwich, N Jovanovic, E Kirda, C Kruegel, G Vigna
NDSS 2007, 12, 2007
6472007
Static disassembly of obfuscated binaries
C Kruegel, W Robertson, F Valeur, G Vigna
USENIX security Symposium 13, 18-18, 2004
636*2004
Effective and efficient malware detection at the end host.
C Kolbitsch, PM Comparetti, C Kruegel, E Kirda, X Zhou, XF Wang
USENIX security symposium 4 (1), 351-366, 2009
6352009
Mining specifications of malicious behavior
M Christodorescu, S Jha, C Kruegel
Proceedings of the the 6th joint meeting of the European software …, 2007
5842007
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20