What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Engin Kirda
Google Scholar
81
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
"Only as Strong as the Weakest Link": On the Security of Brokered Single Sign-On on the Web.
Tommaso Innocenti
Louis Jannett
Christian Mainka
Vladislav Mladenov
Engin Kirda
2025
conf/ndss
Secure IP Address Allocation at Cloud Scale.
Eric Pauley
Kyle Domico
Blaine Hoak
Ryan Sheatsley
Quinn Burke
Yohan Beugin
Engin Kirda
Patrick D. McDaniel
2024
conf/uss
CO3: Concolic Co-execution for Firmware.
Changming Liu
Alejandro Mera
Engin Kirda
Meng Xu
Long Lu
2024
conf/uss
SHiFT: Semi-hosted Fuzz Testing for Embedded Applications.
Alejandro Mera
Changming Liu
Ruimin Sun
Engin Kirda
Long Lu
2024
conf/ndss
Untangle: Multi-Layer Web Server Fingerprinting.
Cem Topcuoglu
Kaan Onarlioglu
Bahruz Jabiyev
Engin Kirda
2023
conf/uss
A Study of Multi-Factor and Risk-Based Authentication Availability.
Anthony Gavazzi
Ryan Williams
Engin Kirda
Long Lu
Andre King
Andy Davis
Tim Leek
2023
conf/acsac
OAuth 2.0 Redirect URI Validation Falls Short, Literally.
Tommaso Innocenti
Matteo Golinelli
Kaan Onarlioglu
Seyed Ali Mirheidari
Bruno Crispo
Engin Kirda
2022
conf/uss
Web Cache Deception Escalates!
Seyed Ali Mirheidari
Matteo Golinelli
Kaan Onarlioglu
Engin Kirda
Bruno Crispo
2022
conf/uss
FRAMESHIFTER: Security Implications of HTTP/2-to-HTTP/1 Conversion Anomalies.
Bahruz Jabiyev
Steven Sprecher
Anthony Gavazzi
Tommaso Innocenti
Kaan Onarlioglu
Engin Kirda
2022
conf/eurosp
SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward.
Steven Sprecher
Christoph Kerschbaumer
Engin Kirda
2022
conf/ndss
D-Box: DMA-enabled Compartmentalization for Embedded Applications.
Alejandro Mera
Yi Hui Chen
Ruimin Sun
Engin Kirda
Long Lu
2022
conf/acsac
A Recent Year On the Internet: Measuring and Understanding the Threats to Everyday Internet Devices.
Afsah Anwar
Yi Hui Chen
Roy Hodgman
Tom Sellers
Engin Kirda
Alina Oprea
2021
conf/ccs
T-Reqs: HTTP Request Smuggling with Differential Fuzzing.
Bahruz Jabiyev
Steven Sprecher
Kaan Onarlioglu
Engin Kirda
2021
conf/sp
DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis.
Alejandro Mera
Bo Feng
Long Lu
Engin Kirda
2021
conf/eurosp
SoK: Cryptojacking Malware.
Ege Tekiner
Abbas Acar
A. Selcuk Uluagac
Engin Kirda
Ali Aydin Selçuk
2021
conf/eurosp
Bypassing memory safety mechanisms through speculative control flow hijacks.
Andrea Mambretti
Alexandra Sandulescu
Alessandro Sorniotti
William Robertson
Engin Kirda
Anil Kurmus
2020
conf/uss
Cached and Confused: Web Cache Deception in the Wild.
Seyed Ali Mirheidari
Sajjad Arshad
Kaan Onarlioglu
Bruno Crispo
Engin Kirda
William Robertson
2020
conf/ndss
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing.
William Blair
Andrea Mambretti
Sajjad Arshad
Michael Weissbacher
William Robertson
Engin Kirda
Manuel Egele
2020
conf/wisec
Kratos: multi-user multi-device-aware access control system for the smart home.
Amit Kumar Sikder
Leonardo Babun
Z. Berkay Celik
Abbas Acar
Hidayet Aksu
Patrick D. McDaniel
Engin Kirda
A. Selcuk Uluagac
2019
conf/cns
It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains.
Florian Quinkert
Tobias Lauinger
William K. Robertson
Engin Kirda
Thorsten Holz
2019
conf/acsac
Speculator: a tool to analyze speculative execution attacks and mitigations.
Andrea Mambretti
Matthias Neugschwandtner
Alessandro Sorniotti
Engin Kirda
William K. Robertson
Anil Kurmus
2018
conf/sp
Surveylance: Automatically Detecting Online Survey Scams.
Amin Kharraz
William K. Robertson
Engin Kirda
2018
conf/eurosp
Eraser: Your Data Won't Be Back.
Kaan Onarlioglu
William K. Robertson
Engin Kirda
2018
conf/acsac
On the Effectiveness of Type-based Control Flow Integrity.
Reza Mirzazade Farkhani
Saman Jafari
Sajjad Arshad
William K. Robertson
Engin Kirda
Hamed Okhravi
2017
conf/ndss
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web.
Tobias Lauinger
Abdelberi Chaabane
Sajjad Arshad
William Robertson
Christo Wilson
Engin Kirda
2017
conf/acsac
Ex-Ray: Detection of History-Leaking Browser Extensions.
Michael Weissbacher
Enrico Mariconti
Guillermo Suarez-Tangil
Gianluca Stringhini
William K. Robertson
Engin Kirda
2016
conf/uss
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware.
Amin Kharraz
Sajjad Arshad
Collin Mulliner
William K. Robertson
Engin Kirda
2016
conf/fc
CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes.
Patrick Carter
Collin Mulliner
Martina Lindorfer
William K. Robertson
Engin Kirda
2016
conf/sp
TriggerScope: Towards Detecting Logic Bombs in Android Applications.
Yanick Fratantonio
Antonio Bianchi
William K. Robertson
Engin Kirda
Christopher Kruegel
Giovanni Vigna
2016
conf/sp
LAVA: Large-Scale Automated Vulnerability Addition.
Brendan Dolan-Gavitt
Patrick Hulin
Engin Kirda
Tim Leek
Andrea Mambretti
William K. Robertson
Frederick Ulrich
Ryan Whelan
2016
conf/ndss
CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities.
Ahmet Salih Buyukkayhan
Kaan Onarlioglu
William K. Robertson
Engin Kirda
2016
conf/dsn
Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems.
Kaan Onarlioglu
William Robertson
Engin Kirda
2015
journals/compsec
Hypervisor-based malware protection with AccessMiner.
Aristide Fattori
Andrea Lanzi
Davide Balzarotti
Engin Kirda
2015
journals/compsec
SENTINEL: Securing Legacy Firefox Extensions.
Kaan Onarlioglu
Ahmet Salih Buyukkayhan
William K. Robertson
Engin Kirda
2015
conf/uss
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities.
Michael Weissbacher
William K. Robertson
Engin Kirda
Christopher Kruegel
Giovanni Vigna
2015
conf/fc
BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications.
Ahmet Talha Ozcan
Can Gemicioglu
Kaan Onarlioglu
Michael Weissbacher
Collin Mulliner
William K. Robertson
Engin Kirda
2014
conf/ccs
VirtualSwindle: an automated attack against in-app billing on android.
Collin Mulliner
William K. Robertson
Engin Kirda
2014
conf/uss
A Look at Targeted Attacks Through the Lense of an NGO.
Stevens Le Blond
Adina Uritesc
Cédric Gilbert
Zheng Leong Chua
Prateek Saxena
Engin Kirda
2014
conf/sp
Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces.
Collin Mulliner
William K. Robertson
Engin Kirda
2014
conf/dsn
Optical Delusions: A Study of Malicious QR Codes in the Wild.
Amin Kharraz
Engin Kirda
William K. Robertson
Davide Balzarotti
Aurélien Francillon
2014
conf/acsac
TrueClick: automatically distinguishing trick banners from genuine download links.
Sevtap Duman
Kaan Onarlioglu
Ali Osman Ulusoy
William K. Robertson
Engin Kirda
2013
conf/sp
PrivExec: Private Execution as an Operating System Service.
Kaan Onarlioglu
Collin Mulliner
William K. Robertson
Engin Kirda
2013
conf/ndss
A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication.
Aldo Cassola
William K. Robertson
Engin Kirda
Guevara Noubir
2013
conf/ndss
Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting.
Tobias Lauinger
Martin Szydlowski
Kaan Onarlioglu
Gilbert Wondracek
Engin Kirda
Christopher Krügel
2013
conf/acsac
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks.
Ting-Fang Yen
Alina Oprea
Kaan Onarlioglu
Todd Leetham
William K. Robertson
Ari Juels
Engin Kirda
2013
conf/acsac
PatchDroid: scalable third-party security patches for Android devices.
Collin Mulliner
Jon Oberheide
William K. Robertson
Engin Kirda
2012
journals/compsec
Have things changed now? An empirical study on input validation vulnerabilities in web applications.
Theodoor Scholte
Davide Balzarotti
Engin Kirda
2012
conf/uss
PUBCRAWL: Protecting Users and Businesses from CRAWLers.
Grégoire Jacob
Engin Kirda
Christopher Kruegel
Giovanni Vigna
2012
conf/ndss
Insights into User Behavior in Dealing with Internet Attacks.
Kaan Onarlioglu
Utku Ozan Yilmaz
Engin Kirda
Davide Balzarotti
2012
conf/dsn
A security analysis of Amazon's Elastic Compute Cloud service.
Engin Kirda
2012
conf/acsac
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis.
Leyla Bilge
Davide Balzarotti
William K. Robertson
Engin Kirda
Christopher Kruegel
2011
conf/ccs
The power of procrastination: detection and mitigation of execution-stalling malicious code.
Clemens Kolbitsch
Engin Kirda
Christopher Kruegel
2011
conf/fc
Quo Vadis? A Study of the Evolution of Input Validation Vulnerabilities in Web Applications.
Theodoor Scholte
Davide Balzarotti
Engin Kirda
2011
conf/ndss
PiOS: Detecting Privacy Leaks in iOS Applications.
Manuel Egele
Christopher Kruegel
Engin Kirda
Giovanni Vigna
2011
conf/ndss
Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications.
Marco Balduzzi
Carmen Torrano Gimenez
Davide Balzarotti
Engin Kirda
2011
conf/ndss
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.
Leyla Bilge
Engin Kirda
Christopher Kruegel
Marco Balduzzi
2010
conf/ccs
AccessMiner: using system-centric models for malware protection.
Andrea Lanzi
Davide Balzarotti
Christopher Kruegel
Mihai Christodorescu
Engin Kirda
2010
conf/ccs
A solution for the automated detection of clickjacking attacks.
Marco Balduzzi
Manuel Egele
Engin Kirda
Davide Balzarotti
Christopher Kruegel
2010
conf/sp
A Practical Attack to De-anonymize Social Network Users.
Gilbert Wondracek
Thorsten Holz
Engin Kirda
Christopher Kruegel
2010
conf/sp
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries.
Clemens Kolbitsch
Thorsten Holz
Christopher Kruegel
Engin Kirda
2010
conf/sp
Identifying Dormant Functionality in Malware Programs.
Paolo Milani Comparetti
Guido Salvaneschi
Engin Kirda
Clemens Kolbitsch
Christopher Kruegel
Stefano Zanero
2010
conf/ndss
Efficient Detection of Split Personalities in Malware.
Davide Balzarotti
Marco Cova
Christoph Karlberger
Engin Kirda
Christopher Kruegel
Giovanni Vigna
2010
conf/dsn
Exploiting diverse observation perspectives to get insights on the malware landscape.
Corrado Leita
Ulrich Bayer
Engin Kirda
2010
conf/acsac
G-Free: defeating return-oriented programming through gadget-less binaries.
Kaan Onarlioglu
Leyla Bilge
Andrea Lanzi
Davide Balzarotti
Engin Kirda
2009
journals/compsec
Client-side cross-site scripting protection.
Engin Kirda
Nenad Jovanovic
Christopher Kruegel
Giovanni Vigna
2009
conf/uss
Effective and Efficient Malware Detection at the End Host.
Clemens Kolbitsch
Paolo Milani Comparetti
Christopher Kruegel
Engin Kirda
Xiao-yong Zhou
XiaoFeng Wang
2009
conf/sp
Prospex: Protocol Specification Extraction.
Paolo Milani Comparetti
Gilbert Wondracek
Christopher Krügel
Engin Kirda
2009
conf/esorics
Achieving Life-Cycle Compliance of Service-Oriented Architectures: Open Issues and Challenges.
Theodoor Scholte
Engin Kirda
2009
conf/esorics
Automatically Generating Models for Botnet Detection.
Peter Wurzinger
Leyla Bilge
Thorsten Holz
Jan Goebel
Christopher Kruegel
Engin Kirda
2009
conf/ndss
Scalable, Behavior-Based Malware Clustering.
Ulrich Bayer
Paolo Milani Comparetti
Clemens Hlauschek
Christopher Krügel
Engin Kirda
2009
conf/acsac
FIRE: FInding Rogue nEtworks.
Brett Stone-Gross
Christopher Kruegel
Kevin C. Almeroth
Andreas Moser
Engin Kirda
2008
conf/sp
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications.
Davide Balzarotti
Marco Cova
Viktoria Felmetsger
Nenad Jovanovic
Engin Kirda
Christopher Kruegel
Giovanni Vigna
2008
conf/ndss
Automatic Network Protocol Analysis.
Gilbert Wondracek
Paolo Milani Comparetti
Christopher Krügel
Engin Kirda
2007
conf/ccs
Panorama: capturing system-wide information flow for malware detection and analysis.
Heng Yin
Dawn Xiaodong Song
Manuel Egele
Christopher Kruegel
Engin Kirda
2007
conf/sp
Exploring Multiple Execution Paths for Malware Analysis.
Andreas Moser
Christopher Krügel
Engin Kirda
2007
conf/ndss
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis.
Philipp Vogt
Florian Nentwich
Nenad Jovanovic
Engin Kirda
Christopher Krügel
Giovanni Vigna
2007
conf/acsac
Secure Input for Web Applications.
Martin Szydlowski
Christopher Kruegel
Engin Kirda
2007
conf/acsac
Limits of Static Analysis for Malware Detection.
Andreas Moser
Christopher Kruegel
Engin Kirda
2006
conf/uss
Behavior-based Spyware Detection.
Engin Kirda
Christopher Kruegel
2006
conf/sp
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper).
Nenad Jovanovic
Christopher Krügel
Engin Kirda
2005
conf/uss
Automating Mimicry Attacks Using Static Binary Analysis.
Christopher Kruegel
Engin Kirda
Darren Mutz
William K. Robertson
Giovanni Vigna
Coauthors
A. Selcuk Uluagac
(2)
Abbas Acar
(2)
Abdelberi Chaabane
(1)
Adina Uritesc
(1)
Afsah Anwar
(1)
Ahmet Salih Buyukkayhan
(2)
Ahmet Talha Ozcan
(1)
Aldo Cassola
(1)
Alejandro Mera
(4)
Alessandro Sorniotti
(2)
Alexandra Sandulescu
(1)
Ali Aydin Selçuk
(1)
Ali Osman Ulusoy
(1)
Alina Oprea
(2)
Amin Kharraz
(3)
Amit Kumar Sikder
(1)
Andre King
(1)
Andrea Lanzi
(3)
Andrea Mambretti
(4)
Andreas Moser
(3)
Andy Davis
(1)
Anil Kurmus
(2)
Anthony Gavazzi
(2)
Antonio Bianchi
(1)
Ari Juels
(1)
Aristide Fattori
(1)
Aurélien Francillon
(1)
Bahruz Jabiyev
(3)
Blaine Hoak
(1)
Bo Feng
(1)
Brendan Dolan-Gavitt
(1)
Brett Stone-Gross
(1)
Bruno Crispo
(3)
Can Gemicioglu
(1)
Carmen Torrano Gimenez
(1)
Cédric Gilbert
(1)
Cem Topcuoglu
(1)
Changming Liu
(2)
Christian Mainka
(1)
Christo Wilson
(1)
Christoph Karlberger
(1)
Christoph Kerschbaumer
(1)
Christopher Kruegel
(23)
Christopher Krügel
(7)
Clemens Hlauschek
(1)
Clemens Kolbitsch
(4)
Collin Mulliner
(7)
Corrado Leita
(1)
Darren Mutz
(1)
Davide Balzarotti
(12)
Dawn Xiaodong Song
(1)
Ege Tekiner
(1)
Engin Kirda
(81)
Enrico Mariconti
(1)
Eric Pauley
(1)
Florian Nentwich
(1)
Florian Quinkert
(1)
Frederick Ulrich
(1)
Gianluca Stringhini
(1)
Gilbert Wondracek
(4)
Giovanni Vigna
(9)
Grégoire Jacob
(1)
Guevara Noubir
(1)
Guido Salvaneschi
(1)
Guillermo Suarez-Tangil
(1)
Hamed Okhravi
(1)
Heng Yin
(1)
Hidayet Aksu
(1)
Jan Goebel
(1)
Jon Oberheide
(1)
Kaan Onarlioglu
(17)
Kevin C. Almeroth
(1)
Kyle Domico
(1)
Leonardo Babun
(1)
Leyla Bilge
(4)
Long Lu
(5)
Louis Jannett
(1)
Manuel Egele
(4)
Marco Balduzzi
(3)
Marco Cova
(2)
Martin Szydlowski
(2)
Martina Lindorfer
(1)
Matteo Golinelli
(2)
Matthias Neugschwandtner
(1)
Meng Xu
(1)
Michael Weissbacher
(4)
Mihai Christodorescu
(1)
Nenad Jovanovic
(4)
Paolo Milani Comparetti
(5)
Patrick Carter
(1)
Patrick D. McDaniel
(2)
Patrick Hulin
(1)
Peter Wurzinger
(1)
Philipp Vogt
(1)
Prateek Saxena
(1)
Quinn Burke
(1)
Reza Mirzazade Farkhani
(1)
Roy Hodgman
(1)
Ruimin Sun
(2)
Ryan Sheatsley
(1)
Ryan Whelan
(1)
Ryan Williams
(1)
Sajjad Arshad
(5)
Saman Jafari
(1)
Sevtap Duman
(1)
Seyed Ali Mirheidari
(3)
Stefano Zanero
(1)
Steven Sprecher
(3)
Stevens Le Blond
(1)
Theodoor Scholte
(3)
Thorsten Holz
(4)
Tim Leek
(2)
Ting-Fang Yen
(1)
Tobias Lauinger
(3)
Todd Leetham
(1)
Tom Sellers
(1)
Tommaso Innocenti
(3)
Ulrich Bayer
(2)
Utku Ozan Yilmaz
(1)
Viktoria Felmetsger
(1)
Vladislav Mladenov
(1)
William Blair
(1)
William K. Robertson
(24)
William Robertson
(5)
Xiao-yong Zhou
(1)
XiaoFeng Wang
(1)
Yanick Fratantonio
(1)
Yi Hui Chen
(2)
Yohan Beugin
(1)
Z. Berkay Celik
(1)
Zheng Leong Chua
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to