What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Christopher Kruegel
Google Scholar
138
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
A Large-Scale Measurement Study of the PROXY Protocol and its Security Implications.
Stijn Pletinckx
Christopher Kruegel
Giovanni Vigna
2025
conf/ndss
MALintent: Coverage Guided Intent Fuzzing Framework for Android.
Ammar Askar
Fabian Fleischer
Christopher Kruegel
Giovanni Vigna
Taesoo Kim
2025
conf/eurosp
Beneath the Surface: An Analysis of OEM Customizations on the Android TLS Protocol Stack.
Vinuri Bandara
Stijn Pletinckx
Ilya Grishchenko
Christopher Kruegel
Giovanni Vigna
Juan Tapiador
Narseo Vallina-Rodriguez
2025
conf/uss
Approve Once, Regret Forever: On the Exploitation of Ethereum's Approve-TransferFrom Ecosystem.
Nicola Ruaro
Fabio Gritti
Dongyu Meng
Robert McLaughlin
Ilya Grishchenko
Christopher Kruegel
Giovanni Vigna
2024
conf/uss
GuideEnricher: Protecting the Anonymity of Ethereum Mixing Service Users with Deep Reinforcement Learning.
Ravindu De Silva
Wenbo Guo
Nicola Ruaro
Ilya Grishchenko
Christopher Kruegel
Giovanni Vigna
2024
conf/uss
Remote Keylogging Attacks in Multi-user VR Applications.
Zihao Su
Kunlin Cai
Reuben Beeler
Lukas Dresel
Allan Garcia
Ilya Grishchenko
Yuan Tian
Christopher Kruegel
Giovanni Vigna
2024
conf/uss
Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services.
Wil Gibbs
Arvind S. Raj
Jayakrishna Menon Vadayath
Hui Jun Tay
Justin Miller
Akshay Ajayan
Zion Leonahenahe Basque
Audrey Dutcher
Fangzhou Dong
Xavier J. Maso
Giovanni Vigna
Christopher Kruegel
Adam Doupé
Yan Shoshitaishvili
Ruoyu Wang
2024
conf/uss
ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning.
Giulio De Pasquale
Ilya Grishchenko
Riccardo Iesari
Gabriel Pizarro
Lorenzo Cavallaro
Christopher Kruegel
Giovanni Vigna
2024
conf/fc
The Power of Default: Measuring the Effect of Slippage Tolerance in Decentralized Exchanges.
Nir Chemaya
Dingyue Liu
Robert McLaughlin
Nicola Ruaro
Christopher Kruegel
Giovanni Vigna
2024
conf/sp
TrojanPuzzle: Covertly Poisoning Code-Suggestion Models.
Hojjat Aghakhani
Wei Dai
Andre Manoel
Xavier Fernandes
Anant Kharkar
Christopher Kruegel
Giovanni Vigna
David Evans
Ben Zorn
Robert Sim
2024
conf/ndss
Not your Type! Detecting Storage Collision Vulnerabilities in Ethereum Smart Contracts.
Nicola Ruaro
Fabio Gritti
Robert McLaughlin
Ilya Grishchenko
Christopher Kruegel
Giovanni Vigna
2024
conf/acsac
DEEPCAPA: Identifying Malicious Capabilities in Windows Malware.
Saastha Vasan
Hojjat Aghakhani
Stefano Ortolani
Roman Vasilenko
Ilya Grishchenko
Christopher Kruegel
Giovanni Vigna
2023
conf/uss
Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart Contracts.
Fabio Gritti
Nicola Ruaro
Robert McLaughlin
Priyanka Bose
Dipanjan Das
Ilya Grishchenko
Christopher Kruegel
Giovanni Vigna
2023
conf/uss
A Large Scale Study of the Ethereum Arbitrage Ecosystem.
Robert McLaughlin
Christopher Kruegel
Giovanni Vigna
2023
conf/uss
ACTOR: Action-Guided Kernel Fuzzing.
Marius Fleischer
Dipanjan Das
Priyanka Bose
Weiheng Bai
Kangjie Lu
Mathias Payer
Christopher Kruegel
Giovanni Vigna
2023
conf/sp
Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities.
Erik Trickel
Fabio Pagani
Chang Zhu
Lukas Dresel
Giovanni Vigna
Christopher Kruegel
Ruoyu Wang
Tiffany Bao
Yan Shoshitaishvili
Adam Doupé
2023
conf/sp
TEEzz: Fuzzing Trusted Applications on COTS Android Devices.
Marcel Busch
Aravind Machiry
Chad Spensky
Giovanni Vigna
Christopher Kruegel
Mathias Payer
2023
conf/eurosp
Certifiably Vulnerable: Using Certificate Transparency Logs for Target Reconnaissance.
Stijn Pletinckx
Thanh-Dat Nguyen
Tobias Fiebig
Christopher Kruegel
Giovanni Vigna
2022
conf/ccs
Understanding Security Issues in the NFT Ecosystem.
Dipanjan Das
Priyanka Bose
Nicola Ruaro
Christopher Kruegel
Giovanni Vigna
2022
conf/uss
Regulator: Dynamic Analysis to Detect ReDoS.
Robert McLaughlin
Fabio Pagani
Noah Spahn
Christopher Kruegel
Giovanni Vigna
2022
conf/uss
Decomperson: How Humans Decompile and What We Can Learn From It.
Kevin Burk
Fabio Pagani
Christopher Kruegel
Giovanni Vigna
2022
conf/uss
Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing.
Tobias Scharnowski
Nils Bars
Moritz Schloegel
Eric Gustafson
Marius Muench
Giovanni Vigna
Christopher Kruegel
Thorsten Holz
Ali Abbasi
2022
conf/sp
HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images.
Fabio Gritti
Fabio Pagani
Ilya Grishchenko
Lukas Dresel
Nilo Redini
Christopher Kruegel
Giovanni Vigna
2022
conf/sp
DEEPCASE: Semi-Supervised Contextual Analysis of Security Events.
Thijs van Ede
Hojjat Aghakhani
Noah Spahn
Riccardo Bortolameotti
Marco Cova
Andrea Continella
Maarten van Steen
Andreas Peter
Christopher Kruegel
Giovanni Vigna
2022
conf/sp
SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds.
Priyanka Bose
Dipanjan Das
Yanju Chen
Yu Feng
Christopher Kruegel
Giovanni Vigna
2022
conf/sp
SYMBEXCEL: Automated Analysis and Understanding of Malicious Excel 4.0 Macros.
Nicola Ruaro
Fabio Pagani
Stefano Ortolani
Christopher Kruegel
Giovanni Vigna
2022
conf/ih
Looking for Signals: A Systems Security Perspective.
Christopher Kruegel
2022
conf/acsac
POPKORN: Popping Windows Kernel Drivers At Scale.
Rajat Gupta
Lukas Patrick Dresel
Noah Spahn
Giovanni Vigna
Christopher Kruegel
Taesoo Kim
2021
conf/ccs
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone.
Davide Quarta
Michele Ianni
Aravind Machiry
Yanick Fratantonio
Eric Gustafson
Davide Balzarotti
Martina Lindorfer
Giovanni Vigna
Christopher Kruegel
2021
conf/uss
Token-Level Fuzzing.
Christopher Salls
Chani Jindal
Jake Corina
Christopher Kruegel
Giovanni Vigna
2021
conf/sp
Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices.
Nilo Redini
Andrea Continella
Dipanjan Das
Giulio De Pasquale
Noah Spahn
Aravind Machiry
Antonio Bianchi
Christopher Kruegel
Giovanni Vigna
2021
conf/eurosp
Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability.
Hojjat Aghakhani
Dongyu Meng
Yu-Xiang Wang
Christopher Kruegel
Giovanni Vigna
2021
conf/asiaccs
Conware: Automated Modeling of Hardware Peripherals.
Chad Spensky
Aravind Machiry
Nilo Redini
Colin Unger
Graham Foster
Evan Blasband
Hamed Okhravi
Christopher Kruegel
Giovanni Vigna
2021
conf/asiaccs
Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms.
Dongyu Meng
Michele Guerriero
Aravind Machiry
Hojjat Aghakhani
Priyanka Bose
Andrea Continella
Christopher Kruegel
Giovanni Vigna
2021
conf/dsn
Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses.
Chad Spensky
Aravind Machiry
Nathan Burow
Hamed Okhravi
Rick Housley
Zhongshu Gu
Hani Jamjoom
Christopher Kruegel
Giovanni Vigna
2021
conf/wisec
Toward a secure crowdsourced location tracking system.
Chinmay Garg
Aravind Machiry
Andrea Continella
Christopher Kruegel
Giovanni Vigna
2020
conf/uss
HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation.
Abraham A. Clements
Eric Gustafson
Tobias Scharnowski
Paul Grosen
David Fritz
Christopher Kruegel
Giovanni Vigna
Saurabh Bagchi
Mathias Payer
2020
conf/sp
SPIDER: Enabling Fast Patch Propagation In Related Software Repositories.
Aravind Machiry
Nilo Redini
Eric Camellini
Christopher Kruegel
Giovanni Vigna
2020
conf/sp
Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware.
Nilo Redini
Aravind Machiry
Ruoyu Wang
Chad Spensky
Andrea Continella
Yan Shoshitaishvili
Christopher Kruegel
Giovanni Vigna
2020
conf/cns
TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems.
Chad Spensky
Aravind Machiry
Marcel Busch
Kevin Leach
Rick Housley
Christopher Kruegel
Giovanni Vigna
2020
conf/cns
SYMBION: Interleaving Symbolic with Concrete Execution.
Fabio Gritti
Lorenzo Fontana
Eric Gustafson
Fabio Pagani
Andrea Continella
Christopher Kruegel
Giovanni Vigna
2020
conf/cns
Exploring Abstraction Functions in Fuzzing.
Christopher Salls
Aravind Machiry
Adam Doupé
Yan Shoshitaishvili
Christopher Kruegel
Giovanni Vigna
2020
conf/ndss
When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features.
Hojjat Aghakhani
Fabio Gritti
Francesco Mecca
Martina Lindorfer
Stefano Ortolani
Davide Balzarotti
Giovanni Vigna
Christopher Kruegel
2019
conf/ndss
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary.
Dokyung Song
Felicitas Hetzelt
Dipanjan Das
Chad Spensky
Yeoul Na
Stijn Volckaert
Giovanni Vigna
Christopher Kruegel
Jean-Pierre Seifert
Michael Franz
2019
conf/acsac
Neurlux: dynamic malware analysis without feature engineering.
Chani Jindal
Christopher Salls
Hojjat Aghakhani
Keith Long
Christopher Kruegel
Giovanni Vigna
2019
conf/acsac
Sleak: automating address space layout derandomization.
Christophe Hauser
Jayakrishna Menon
Yan Shoshitaishvili
Ruoyu Wang
Giovanni Vigna
Christopher Kruegel
2018
conf/ccs
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense.
Radhesh Krishnan Konoth
Emanuele Vineti
Veelasha Moonsamy
Martina Lindorfer
Christopher Kruegel
Herbert Bos
Giovanni Vigna
2018
conf/uss
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.
Wei Meng
Chenxiong Qian
Shuang Hao
Kevin Borgolte
Giovanni Vigna
Christopher Kruegel
Wenke Lee
2018
conf/uss
HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security.
Moritz Eckert
Antonio Bianchi
Ruoyu Wang
Yan Shoshitaishvili
Christopher Kruegel
Giovanni Vigna
2018
conf/sp
Detecting Deceptive Reviews Using Generative Adversarial Networks.
Hojjat Aghakhani
Aravind Machiry
Shirin Nilizadeh
Christopher Kruegel
Giovanni Vigna
2018
conf/ndss
Broken Fingers: On the Usage of the Fingerprint API in Android.
Antonio Bianchi
Yanick Fratantonio
Aravind Machiry
Christopher Kruegel
Giovanni Vigna
Simon Pak Ho Chung
Wenke Lee
2018
conf/ndss
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates.
Kevin Borgolte
Tobias Fiebig
Shuang Hao
Christopher Kruegel
Giovanni Vigna
2018
conf/acsac
Using Loops For Malware Classification Resilient to Feature-unaware Perturbations.
Aravind Machiry
Nilo Redini
Eric Gustafson
Yanick Fratantonio
Yung Ryn Choe
Christopher Kruegel
Giovanni Vigna
2017
journals/popets
On the Privacy and Security of the Ultrasound Ecosystem.
Vasilios Mavroudis
Shuang Hao
Yanick Fratantonio
Federico Maggi
Christopher Kruegel
Giovanni Vigna
2017
conf/ccs
POISED: Spotting Twitter Spam Off the Beaten Paths.
Shirin Nilizadeh
Francois Labreche
Alireza Sedighian
Ali Zand
José M. Fernandez
Christopher Kruegel
Gianluca Stringhini
Giovanni Vigna
2017
conf/ccs
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions.
Cheng Huang
Shuang Hao
Luca Invernizzi
Jiayong Liu
Yong Fang
Christopher Kruegel
Giovanni Vigna
2017
conf/ccs
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance.
Yan Shoshitaishvili
Michael Weissbacher
Lukas Dresel
Christopher Salls
Ruoyu Wang
Christopher Kruegel
Giovanni Vigna
2017
conf/ccs
DIFUZE: Interface Aware Fuzzing for Kernel Drivers.
Jake Corina
Aravind Machiry
Christopher Salls
Yan Shoshitaishvili
Shuang Hao
Christopher Kruegel
Giovanni Vigna
2017
conf/uss
BootStomp: On the Security of Bootloaders in Mobile Devices.
Nilo Redini
Aravind Machiry
Dipanjan Das
Yanick Fratantonio
Antonio Bianchi
Eric Gustafson
Yan Shoshitaishvili
Christopher Kruegel
Giovanni Vigna
2017
conf/uss
DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers.
Aravind Machiry
Chad Spensky
Jake Corina
Nick Stephens
Christopher Kruegel
Giovanni Vigna
2017
conf/ndss
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.
Andrea Continella
Yanick Fratantonio
Martina Lindorfer
Alessandro Puccetti
Ali Zand
Christopher Kruegel
Giovanni Vigna
2017
conf/ndss
Ramblr: Making Reassembly Great Again.
Ruoyu Wang
Yan Shoshitaishvili
Antonio Bianchi
Aravind Machiry
John Grosen
Paul Grosen
Christopher Kruegel
Giovanni Vigna
2017
conf/ndss
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
Aravind Machiry
Eric Gustafson
Chad Spensky
Christopher Salls
Nick Stephens
Ruoyu Wang
Antonio Bianchi
Yung Ryn Choe
Christopher Kruegel
Giovanni Vigna
2017
conf/acsac
Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information.
Antonio Bianchi
Eric Gustafson
Yanick Fratantonio
Christopher Kruegel
Giovanni Vigna
2017
conf/acsac
Piston: Uncooperative Remote Runtime Patching.
Christopher Salls
Yan Shoshitaishvili
Nick Stephens
Christopher Kruegel
Giovanni Vigna
2016
conf/sp
TriggerScope: Towards Detecting Logic Bombs in Android Applications.
Yanick Fratantonio
Antonio Bianchi
William K. Robertson
Engin Kirda
Christopher Kruegel
Giovanni Vigna
2016
conf/ndss
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.
Vitor Monte Afonso
Paulo L. de Geus
Antonio Bianchi
Yanick Fratantonio
Christopher Kruegel
Giovanni Vigna
Adam Doupé
Mario Polino
2016
conf/ndss
Driller: Augmenting Fuzzing Through Selective Symbolic Execution.
Nick Stephens
John Grosen
Christopher Salls
Andrew Dutcher
Ruoyu Wang
Jacopo Corbetta
Yan Shoshitaishvili
Christopher Kruegel
Giovanni Vigna
2015
journals/popets
Portrait of a Privacy Invasion.
Yan Shoshitaishvili
Christopher Kruegel
Giovanni Vigna
2015
conf/ccs
NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android.
Antonio Bianchi
Yanick Fratantonio
Christopher Kruegel
Giovanni Vigna
2015
conf/uss
Meerkat: Detecting Website Defacements through Image-based Object Recognition.
Kevin Borgolte
Christopher Kruegel
Giovanni Vigna
2015
conf/uss
How the ELF Ruined Christmas.
Alessandro Di Federico
Amat Cama
Yan Shoshitaishvili
Christopher Kruegel
Giovanni Vigna
2015
conf/uss
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities.
Michael Weissbacher
William K. Robertson
Engin Kirda
Christopher Kruegel
Giovanni Vigna
2015
conf/uss
EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services.
Gianluca Stringhini
Pierre Mourlanne
Grégoire Jacob
Manuel Egele
Christopher Kruegel
Giovanni Vigna
2015
conf/sp
What the App is That? Deception and Countermeasures in the Android User Interface.
Antonio Bianchi
Jacopo Corbetta
Luca Invernizzi
Yanick Fratantonio
Christopher Kruegel
Giovanni Vigna
2015
conf/ndss
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Yinzhi Cao
Yanick Fratantonio
Antonio Bianchi
Manuel Egele
Christopher Kruegel
Giovanni Vigna
Yan Chen
2015
conf/ndss
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.
Yan Shoshitaishvili
Ruoyu Wang
Christophe Hauser
Christopher Kruegel
Giovanni Vigna
2015
conf/acsac
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications.
Luca Falsina
Yanick Fratantonio
Stefano Zanero
Christopher Kruegel
Giovanni Vigna
Federico Maggi
2015
conf/acsac
BareDroid: Large-Scale Analysis of Android Apps on Real Devices.
Simone Mutti
Yanick Fratantonio
Antonio Bianchi
Luca Invernizzi
Jacopo Corbetta
Dhilung Kirat
Christopher Kruegel
Giovanni Vigna
2015
conf/acsac
Know Your Achilles' Heel: Automatic Detection of Network Critical Services.
Ali Zand
Amir Houmansadr
Giovanni Vigna
Richard A. Kemmerer
Christopher Kruegel
2014
conf/ccs
The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape.
Gianluca Stringhini
Oliver Hohlfeld
Christopher Kruegel
Giovanni Vigna
2014
conf/ccs
Fighting malicious code: an eternal struggle.
Christopher Kruegel
2014
conf/uss
Hulk: Eliciting Malicious Behavior in Browser Extensions.
Alexandros Kapravelos
Chris Grier
Neha Chachra
Christopher Kruegel
Giovanni Vigna
Vern Paxson
2014
conf/uss
BareCloud: Bare-metal Analysis-based Evasive Malware Detection.
Dhilung Kirat
Giovanni Vigna
Christopher Kruegel
2014
conf/sp
The Tricks of the Trade: What Makes Spam Campaigns Successful?
Jane Iedemska
Gianluca Stringhini
Richard A. Kemmerer
Christopher Kruegel
Giovanni Vigna
2014
conf/ndss
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications.
Sebastian Poeplau
Yanick Fratantonio
Antonio Bianchi
Christopher Kruegel
Giovanni Vigna
2014
conf/ndss
Nazca: Detecting Malware Distribution in Large-Scale Networks.
Luca Invernizzi
Stanislav Miskovic
Ruben Torres
Christopher Kruegel
Sabyasachi Saha
Giovanni Vigna
Sung-Ju Lee
Marco Mellia
2013
conf/ccs
Delta: automatic identification of unknown web-based infection campaigns.
Kevin Borgolte
Christopher Kruegel
Giovanni Vigna
2013
conf/ccs
Shady paths: leveraging surfing crowds to detect malicious web pages.
Gianluca Stringhini
Christopher Kruegel
Giovanni Vigna
2013
conf/ccs
An empirical study of cryptographic misuse in android applications.
Manuel Egele
David Brumley
Yanick Fratantonio
Christopher Kruegel
2013
conf/ccs
deDacota: toward preventing server-side XSS via automatic code and data separation.
Adam Doupé
Weidong Cui
Mariusz H. Jakubowski
Marcus Peinado
Christopher Kruegel
Giovanni Vigna
2013
conf/uss
Revolver: An Automated Approach to the Detection of Evasive Web-based Malware.
Alexandros Kapravelos
Yan Shoshitaishvili
Marco Cova
Christopher Kruegel
Giovanni Vigna
2013
conf/uss
Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services.
Ruoyu Wang
Yan Shoshitaishvili
Christopher Kruegel
Giovanni Vigna
2013
conf/sp
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting.
Nick Nikiforakis
Alexandros Kapravelos
Wouter Joosen
Christopher Kruegel
Frank Piessens
Giovanni Vigna
2013
conf/acsac
Message in a bottle: sailing past censorship.
Luca Invernizzi
Christopher Kruegel
Giovanni Vigna
2012
conf/ccs
Blacksheep: detecting compromised hosts in homogeneous crowds.
Antonio Bianchi
Yan Shoshitaishvili
Christopher Kruegel
Giovanni Vigna
2012
conf/ccs
You are what you include: large-scale evaluation of remote javascript inclusions.
Nick Nikiforakis
Luca Invernizzi
Alexandros Kapravelos
Steven Van Acker
Wouter Joosen
Christopher Kruegel
Frank Piessens
Giovanni Vigna
2012
conf/ccs
PeerPress: utilizing enemies' P2P strength against them.
Zhaoyan Xu
Lingfeng Chen
Guofei Gu
Christopher Kruegel
2012
conf/uss
B@bel: Leveraging Email Delivery for Spam Mitigation.
Gianluca Stringhini
Manuel Egele
Apostolis Zarras
Thorsten Holz
Christopher Kruegel
Giovanni Vigna
2012
conf/uss
Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner.
Adam Doupé
Ludovico Cavedon
Christopher Kruegel
Giovanni Vigna
2012
conf/uss
PUBCRAWL: Protecting Users and Businesses from CRAWLers.
Grégoire Jacob
Engin Kirda
Christopher Kruegel
Giovanni Vigna
2012
conf/sp
EvilSeed: A Guided Approach to Finding Malicious Web Pages.
Luca Invernizzi
Paolo Milani Comparetti
Stefano Benvenuti
Christopher Kruegel
Marco Cova
Giovanni Vigna
2012
conf/iciss
Fighting Malicious Software.
Christopher Kruegel
2012
conf/acsac
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis.
Leyla Bilge
Davide Balzarotti
William K. Robertson
Engin Kirda
Christopher Kruegel
2012
conf/acsac
Jarhead analysis and detection of malicious Java applets.
Johannes Schlumberger
Christopher Kruegel
Giovanni Vigna
2011
conf/ccs
The power of procrastination: detection and mitigation of execution-stalling malicious code.
Clemens Kolbitsch
Engin Kirda
Christopher Kruegel
2011
conf/ccs
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities.
Adam Doupé
Bryce Boe
Christopher Kruegel
Giovanni Vigna
2011
conf/uss
BOTMAGNIFIER: Locating Spambots on the Internet.
Gianluca Stringhini
Thorsten Holz
Brett Stone-Gross
Christopher Kruegel
Giovanni Vigna
2011
conf/uss
JACKSTRAWS: Picking Command and Control Connections from Bot Traffic.
Grégoire Jacob
Ralf Hund
Christopher Kruegel
Thorsten Holz
2011
conf/ndss
PiOS: Detecting Privacy Leaks in iOS Applications.
Manuel Egele
Christopher Kruegel
Engin Kirda
Giovanni Vigna
2011
conf/ndss
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.
Leyla Bilge
Engin Kirda
Christopher Kruegel
Marco Balduzzi
2011
conf/acsac
FORECAST: skimming off the malware cream.
Matthias Neugschwandtner
Paolo Milani Comparetti
Grégoire Jacob
Christopher Kruegel
2011
conf/acsac
BareBox: efficient malware analysis on bare-metal.
Dhilung Kirat
Giovanni Vigna
Christopher Kruegel
2011
conf/acsac
Nexat: a history-based approach to predict attacker actions.
Casey Cipriano
Ali Zand
Amir Houmansadr
Christopher Kruegel
Giovanni Vigna
2010
conf/ccs
AccessMiner: using system-centric models for malware protection.
Andrea Lanzi
Davide Balzarotti
Christopher Kruegel
Mihai Christodorescu
Engin Kirda
2010
conf/ccs
A solution for the automated detection of clickjacking attacks.
Marco Balduzzi
Manuel Egele
Engin Kirda
Davide Balzarotti
Christopher Kruegel
2010
conf/uss
Toward Automated Detection of Logic Vulnerabilities in Web Applications.
Viktoria Felmetsger
Ludovico Cavedon
Christopher Kruegel
Giovanni Vigna
2010
conf/sp
A Practical Attack to De-anonymize Social Network Users.
Gilbert Wondracek
Thorsten Holz
Engin Kirda
Christopher Kruegel
2010
conf/sp
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries.
Clemens Kolbitsch
Thorsten Holz
Christopher Kruegel
Engin Kirda
2010
conf/sp
Identifying Dormant Functionality in Malware Programs.
Paolo Milani Comparetti
Guido Salvaneschi
Engin Kirda
Clemens Kolbitsch
Christopher Kruegel
Stefano Zanero
2010
conf/ndss
Efficient Detection of Split Personalities in Malware.
Davide Balzarotti
Marco Cova
Christoph Karlberger
Engin Kirda
Christopher Kruegel
Giovanni Vigna
2010
conf/ndss
Effective Anomaly Detection with Scarce Training Data.
William K. Robertson
Federico Maggi
Christopher Kruegel
Giovanni Vigna
2010
conf/acsac
Detecting spammers on social networks.
Gianluca Stringhini
Christopher Kruegel
Giovanni Vigna
2009
journals/compsec
Client-side cross-site scripting protection.
Engin Kirda
Nenad Jovanovic
Christopher Kruegel
Giovanni Vigna
2009
conf/ccs
Your botnet is my botnet: analysis of a botnet takeover.
Brett Stone-Gross
Marco Cova
Lorenzo Cavallaro
Bob Gilbert
Martin Szydlowski
Richard A. Kemmerer
Christopher Kruegel
Giovanni Vigna
2009
conf/uss
Effective and Efficient Malware Detection at the End Host.
Clemens Kolbitsch
Paolo Milani Comparetti
Christopher Kruegel
Engin Kirda
Xiao-yong Zhou
XiaoFeng Wang
2009
conf/esorics
Automatically Generating Models for Botnet Detection.
Peter Wurzinger
Leyla Bilge
Thorsten Holz
Jan Goebel
Christopher Kruegel
Engin Kirda
2009
conf/acsac
Analyzing and Detecting Malicious Flash Advertisements.
Sean Ford
Marco Cova
Christopher Kruegel
Giovanni Vigna
2009
conf/acsac
FIRE: FInding Rogue nEtworks.
Brett Stone-Gross
Christopher Kruegel
Kevin C. Almeroth
Andreas Moser
Engin Kirda
2008
conf/uss
There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits.
Marco Cova
Christopher Kruegel
Giovanni Vigna
2008
conf/sp
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications.
Davide Balzarotti
Marco Cova
Viktoria Felmetsger
Nenad Jovanovic
Engin Kirda
Christopher Kruegel
Giovanni Vigna
2008
conf/iciss
A Parallel Architecture for Stateful, High-Speed Intrusion Detection.
Luca Foschini
Ashish V. Thapliyal
Lorenzo Cavallaro
Christopher Kruegel
Giovanni Vigna
2007
conf/ccs
Panorama: capturing system-wide information flow for malware detection and analysis.
Heng Yin
Dawn Xiaodong Song
Manuel Egele
Christopher Kruegel
Engin Kirda
2007
conf/acsac
Secure Input for Web Applications.
Martin Szydlowski
Christopher Kruegel
Engin Kirda
2007
conf/acsac
Limits of Static Analysis for Malware Detection.
Andreas Moser
Christopher Kruegel
Engin Kirda
2007
conf/acsac
Improving Signature Testing through Dynamic Data Flow Analysis.
Christopher Kruegel
Davide Balzarotti
William K. Robertson
Giovanni Vigna
2006
conf/uss
Behavior-based Spyware Detection.
Engin Kirda
Christopher Kruegel
2005
conf/uss
Automating Mimicry Attacks Using Static Binary Analysis.
Christopher Kruegel
Engin Kirda
Darren Mutz
William K. Robertson
Giovanni Vigna
Coauthors
Abraham A. Clements
(1)
Adam Doupé
(7)
Akshay Ajayan
(1)
Alessandro Di Federico
(1)
Alessandro Puccetti
(1)
Alexandros Kapravelos
(4)
Ali Abbasi
(1)
Ali Zand
(4)
Alireza Sedighian
(1)
Allan Garcia
(1)
Amat Cama
(1)
Amir Houmansadr
(2)
Ammar Askar
(1)
Anant Kharkar
(1)
Andre Manoel
(1)
Andrea Continella
(7)
Andrea Lanzi
(1)
Andreas Moser
(2)
Andreas Peter
(1)
Andrew Dutcher
(1)
Antonio Bianchi
(15)
Apostolis Zarras
(1)
Aravind Machiry
(19)
Arvind S. Raj
(1)
Ashish V. Thapliyal
(1)
Audrey Dutcher
(1)
Ben Zorn
(1)
Bob Gilbert
(1)
Brett Stone-Gross
(3)
Bryce Boe
(1)
Casey Cipriano
(1)
Chad Spensky
(8)
Chang Zhu
(1)
Chani Jindal
(2)
Cheng Huang
(1)
Chenxiong Qian
(1)
Chinmay Garg
(1)
Chris Grier
(1)
Christoph Karlberger
(1)
Christophe Hauser
(2)
Christopher Kruegel
(138)
Christopher Salls
(8)
Clemens Kolbitsch
(4)
Colin Unger
(1)
Darren Mutz
(1)
David Brumley
(1)
David Evans
(1)
David Fritz
(1)
Davide Balzarotti
(8)
Davide Quarta
(1)
Dawn Xiaodong Song
(1)
Dhilung Kirat
(3)
Dingyue Liu
(1)
Dipanjan Das
(7)
Dokyung Song
(1)
Dongyu Meng
(3)
Emanuele Vineti
(1)
Engin Kirda
(23)
Eric Camellini
(1)
Eric Gustafson
(8)
Erik Trickel
(1)
Evan Blasband
(1)
Fabian Fleischer
(1)
Fabio Gritti
(6)
Fabio Pagani
(6)
Fangzhou Dong
(1)
Federico Maggi
(3)
Felicitas Hetzelt
(1)
Francesco Mecca
(1)
Francois Labreche
(1)
Frank Piessens
(2)
Gabriel Pizarro
(1)
Gianluca Stringhini
(8)
Gilbert Wondracek
(1)
Giovanni Vigna
(116)
Giulio De Pasquale
(2)
Graham Foster
(1)
Grégoire Jacob
(4)
Guido Salvaneschi
(1)
Guofei Gu
(1)
Hamed Okhravi
(2)
Hani Jamjoom
(1)
Heng Yin
(1)
Herbert Bos
(1)
Hojjat Aghakhani
(8)
Hui Jun Tay
(1)
Ilya Grishchenko
(9)
Jacopo Corbetta
(3)
Jake Corina
(3)
Jan Goebel
(1)
Jane Iedemska
(1)
Jayakrishna Menon
(1)
Jayakrishna Menon Vadayath
(1)
Jean-Pierre Seifert
(1)
Jiayong Liu
(1)
Johannes Schlumberger
(1)
John Grosen
(2)
José M. Fernandez
(1)
Juan Tapiador
(1)
Justin Miller
(1)
Kangjie Lu
(1)
Keith Long
(1)
Kevin Borgolte
(4)
Kevin Burk
(1)
Kevin C. Almeroth
(1)
Kevin Leach
(1)
Kunlin Cai
(1)
Leyla Bilge
(3)
Lingfeng Chen
(1)
Lorenzo Cavallaro
(3)
Lorenzo Fontana
(1)
Luca Falsina
(1)
Luca Foschini
(1)
Luca Invernizzi
(7)
Ludovico Cavedon
(2)
Lukas Dresel
(4)
Lukas Patrick Dresel
(1)
Maarten van Steen
(1)
Manuel Egele
(7)
Marcel Busch
(2)
Marco Balduzzi
(2)
Marco Cova
(8)
Marco Mellia
(1)
Marcus Peinado
(1)
Mario Polino
(1)
Marius Fleischer
(1)
Marius Muench
(1)
Mariusz H. Jakubowski
(1)
Martin Szydlowski
(2)
Martina Lindorfer
(4)
Mathias Payer
(3)
Matthias Neugschwandtner
(1)
Michael Franz
(1)
Michael Weissbacher
(2)
Michele Guerriero
(1)
Michele Ianni
(1)
Mihai Christodorescu
(1)
Moritz Eckert
(1)
Moritz Schloegel
(1)
Narseo Vallina-Rodriguez
(1)
Nathan Burow
(1)
Neha Chachra
(1)
Nenad Jovanovic
(2)
Nick Nikiforakis
(2)
Nick Stephens
(4)
Nicola Ruaro
(7)
Nilo Redini
(7)
Nils Bars
(1)
Nir Chemaya
(1)
Noah Spahn
(4)
Oliver Hohlfeld
(1)
Paolo Milani Comparetti
(4)
Paul Grosen
(2)
Paulo L. de Geus
(1)
Peter Wurzinger
(1)
Pierre Mourlanne
(1)
Priyanka Bose
(5)
Radhesh Krishnan Konoth
(1)
Rajat Gupta
(1)
Ralf Hund
(1)
Ravindu De Silva
(1)
Reuben Beeler
(1)
Riccardo Bortolameotti
(1)
Riccardo Iesari
(1)
Richard A. Kemmerer
(3)
Rick Housley
(2)
Robert McLaughlin
(6)
Robert Sim
(1)
Roman Vasilenko
(1)
Ruben Torres
(1)
Ruoyu Wang
(11)
Saastha Vasan
(1)
Sabyasachi Saha
(1)
Saurabh Bagchi
(1)
Sean Ford
(1)
Sebastian Poeplau
(1)
Shirin Nilizadeh
(2)
Shuang Hao
(5)
Simon Pak Ho Chung
(1)
Simone Mutti
(1)
Stanislav Miskovic
(1)
Stefano Benvenuti
(1)
Stefano Ortolani
(3)
Stefano Zanero
(2)
Steven Van Acker
(1)
Stijn Pletinckx
(3)
Stijn Volckaert
(1)
Sung-Ju Lee
(1)
Taesoo Kim
(2)
Thanh-Dat Nguyen
(1)
Thijs van Ede
(1)
Thorsten Holz
(7)
Tiffany Bao
(1)
Tobias Fiebig
(2)
Tobias Scharnowski
(2)
Vasilios Mavroudis
(1)
Veelasha Moonsamy
(1)
Vern Paxson
(1)
Viktoria Felmetsger
(2)
Vinuri Bandara
(1)
Vitor Monte Afonso
(1)
Wei Dai
(1)
Wei Meng
(1)
Weidong Cui
(1)
Weiheng Bai
(1)
Wenbo Guo
(1)
Wenke Lee
(2)
Wil Gibbs
(1)
William K. Robertson
(6)
Wouter Joosen
(2)
Xavier Fernandes
(1)
Xavier J. Maso
(1)
Xiao-yong Zhou
(1)
XiaoFeng Wang
(1)
Yan Chen
(1)
Yan Shoshitaishvili
(18)
Yanick Fratantonio
(16)
Yanju Chen
(1)
Yeoul Na
(1)
Yinzhi Cao
(1)
Yong Fang
(1)
Yu Feng
(1)
Yu-Xiang Wang
(1)
Yuan Tian
(1)
Yung Ryn Choe
(2)
Zhaoyan Xu
(1)
Zhongshu Gu
(1)
Zihao Su
(1)
Zion Leonahenahe Basque
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to