What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Manuel Egele
Google Scholar
41
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/uss
Argus: All your (PHP) Injection-sinks are belong to us.
Rasoul Jahanshahi
Manuel Egele
2024
conf/uss
Pandawan: Quantifying Progress in Linux-based Firmware Rehosting.
Ioannis Angelakopoulos
Gianluca Stringhini
Manuel Egele
2024
conf/uss
HYPERPILL: Fuzzing for Hypervisor-bugs by leveraging the Hardware Virtualization Interface.
Alexander Bulekov
Qiang Liu
Manuel Egele
Mathias Payer
2023
conf/uss
FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modules.
Ioannis Angelakopoulos
Gianluca Stringhini
Manuel Egele
2023
conf/uss
Minimalist: Semi-automated Debloating of PHP Web Applications through Static Analysis.
Rasoul Jahanshahi
Babak Amin Azad
Nick Nikiforakis
Manuel Egele
2023
conf/uss
AnimateDead: Debloating Web Applications Using Concolic Execution.
Babak Amin Azad
Rasoul Jahanshahi
Chris Tsoukaladelis
Manuel Egele
Nick Nikiforakis
2023
conf/host
ProcessorFuzz: Processor Fuzzing with Control and Status Registers Guidance.
Sadullah Canakci
Chathura Rajapaksha
Leila Delshadtehrani
Anoop Mysore Nataraja
Michael Bedford Taylor
Manuel Egele
Ajay Joshi
2023
conf/asiaccs
ThreadLock: Native Principal Isolation Through Memory Protection Keys.
William Blair
William K. Robertson
Manuel Egele
2023
conf/ndss
No Grammar, No Problem: Towards Fuzzing the Linux Kernel without System-Call Descriptions.
Alexander Bulekov
Bandan Das
Stefan Hajnoczi
Manuel Egele
2022
conf/ccs
Evocatio: Conjuring Bug Capabilities from a Single PoC.
Zhiyuan Jiang
Shuitao Gan
Adrian Herrera
Flavio Toffalini
Lucio Romerio
Chaojing Tang
Manuel Egele
Chao Zhang
Mathias Payer
2022
conf/uss
Morphuzz: Bending (Input) Space to Fuzz Virtual Devices.
Alexander Bulekov
Bandan Das
Stefan Hajnoczi
Manuel Egele
2022
conf/asiaccs
TargetFuzz: Using DARTs to Guide Directed Greybox Fuzzers.
Sadullah Canakci
Nikolay Matyunin
Kalman Graffi
Ajay Joshi
Manuel Egele
2021
conf/uss
Saphire: Sandboxing PHP Applications with Tailored System Call Allowlists.
Alexander Bulekov
Rasoul Jahanshahi
Manuel Egele
2021
conf/eurosp
AppJitsu: Investigating the Resiliency of Android Applications.
Onur Zungur
Antonio Bianchi
Gianluca Stringhini
Manuel Egele
2021
conf/asiaccs
SoK: Enabling Security Analyses of Embedded Systems via Rehosting.
Andrew Fasano
Tiemoko Ballo
Marius Muench
Tim Leek
Alexander Bulekov
Brendan Dolan-Gavitt
Manuel Egele
Aurélien Francillon
Long Lu
Nick Gregory
Davide Balzarotti
William Robertson
2021
conf/asiaccs
Oversharing Is Not Caring: How CNAME Cloaking Can Expose Your Session Cookies.
Assel Aliyeva
Manuel Egele
2021
conf/ndss
To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media.
Beliz Kaleli
Brian Kondracki
Manuel Egele
Nick Nikiforakis
Gianluca Stringhini
2021
conf/acsac
FlexFilt: Towards Flexible Instruction Filtering for Security.
Leila Delshadtehrani
Sadullah Canakci
William Blair
Manuel Egele
Ajay Joshi
2020
conf/ccs
You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications.
Rasoul Jahanshahi
Adam Doupé
Manuel Egele
2020
conf/uss
PHMon: A Programmable Hardware Monitor and Its Security Use Cases.
Leila Delshadtehrani
Sadullah Canakci
Boyou Zhou
Schuyler Eldridge
Ajay Joshi
Manuel Egele
2020
conf/sp
Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers.
Brian Kondracki
Assel Aliyeva
Manuel Egele
Jason Polakis
Nick Nikiforakis
2020
conf/ndss
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing.
William Blair
Andrea Mambretti
Sajjad Arshad
Michael Weissbacher
William Robertson
Engin Kirda
Manuel Egele
2020
conf/dsn
Libspector : Context-Aware Large-Scale Network Traffic Analysis of Android Applications.
Onur Zungur
Gianluca Stringhini
Manuel Egele
2019
conf/dsn
BorderPatrol: Securing BYOD using Fine-Grained Contextual Information.
Onur Zungur
Guillermo Suarez-Tangil
Gianluca Stringhini
Manuel Egele
2018
conf/ccs
Hardware Performance Counters Can Detect Malware: Myth or Fact?
Boyou Zhou
Anmol Gupta
Rasoul Jahanshahi
Manuel Egele
Ajay Joshi
2017
conf/ccs
PayBreak: Defense Against Cryptographic Ransomware.
Eugene Kolodenker
William Koch
Gianluca Stringhini
Manuel Egele
2016
conf/ccs
CRiOS: Toward Large-Scale iOS Application Analysis.
Damilola Orikogbo
Matthias Büchler
Manuel Egele
2016
conf/ndss
Towards Automated Dynamic Analysis for Linux-based Embedded Firmware.
Daming D. Chen
Maverick Woo
David Brumley
Manuel Egele
2015
conf/ccs
Drops for Stuff: An Analysis of Reshipping Mule Scams.
Shuang Hao
Kevin Borgolte
Nick Nikiforakis
Gianluca Stringhini
Manuel Egele
Michael Eubanks
Brian Krebs
Giovanni Vigna
2015
conf/uss
EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services.
Gianluca Stringhini
Pierre Mourlanne
Grégoire Jacob
Manuel Egele
Christopher Kruegel
Giovanni Vigna
2015
conf/ndss
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Yinzhi Cao
Yanick Fratantonio
Antonio Bianchi
Manuel Egele
Christopher Kruegel
Giovanni Vigna
Yan Chen
2014
conf/uss
Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components.
Manuel Egele
Maverick Woo
Peter Chapman
David Brumley
2013
conf/ccs
An empirical study of cryptographic misuse in android applications.
Manuel Egele
David Brumley
Yanick Fratantonio
Christopher Kruegel
2013
conf/ndss
COMPA: Detecting Compromised Accounts on Social Networks.
Manuel Egele
Gianluca Stringhini
Christopher Krügel
Giovanni Vigna
2012
conf/uss
B@bel: Leveraging Email Delivery for Spam Mitigation.
Gianluca Stringhini
Manuel Egele
Apostolis Zarras
Thorsten Holz
Christopher Kruegel
Giovanni Vigna
2012
conf/ndss
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
Lucas Davi
Alexandra Dmitrienko
Manuel Egele
Thomas Fischer
Thorsten Holz
Ralf Hund
Stefan Nürnberger
Ahmad-Reza Sadeghi
2011
conf/ccs
Poster: control-flow integrity for smartphones.
Lucas Davi
Alexandra Dmitrienko
Manuel Egele
Thomas Fischer
Thorsten Holz
Ralf Hund
Stefan Nürnberger
Ahmad-Reza Sadeghi
2011
conf/ndss
PiOS: Detecting Privacy Leaks in iOS Applications.
Manuel Egele
Christopher Kruegel
Engin Kirda
Giovanni Vigna
2011
conf/acsac
Hit 'em where it hurts: a live security exercise on cyber situational awareness.
Adam Doupé
Manuel Egele
Benjamin Caillat
Gianluca Stringhini
Gorkem Yakin
Ali Zand
Ludovico Cavedon
Giovanni Vigna
2010
conf/ccs
A solution for the automated detection of clickjacking attacks.
Marco Balduzzi
Manuel Egele
Engin Kirda
Davide Balzarotti
Christopher Kruegel
2007
conf/ccs
Panorama: capturing system-wide information flow for malware detection and analysis.
Heng Yin
Dawn Xiaodong Song
Manuel Egele
Christopher Kruegel
Engin Kirda
Coauthors
Adam Doupé
(2)
Adrian Herrera
(1)
Ahmad-Reza Sadeghi
(2)
Ajay Joshi
(5)
Alexander Bulekov
(5)
Alexandra Dmitrienko
(2)
Ali Zand
(1)
Andrea Mambretti
(1)
Andrew Fasano
(1)
Anmol Gupta
(1)
Anoop Mysore Nataraja
(1)
Antonio Bianchi
(2)
Apostolis Zarras
(1)
Assel Aliyeva
(2)
Aurélien Francillon
(1)
Babak Amin Azad
(2)
Bandan Das
(2)
Beliz Kaleli
(1)
Benjamin Caillat
(1)
Boyou Zhou
(2)
Brendan Dolan-Gavitt
(1)
Brian Kondracki
(2)
Brian Krebs
(1)
Chao Zhang
(1)
Chaojing Tang
(1)
Chathura Rajapaksha
(1)
Chris Tsoukaladelis
(1)
Christopher Kruegel
(7)
Christopher Krügel
(1)
Damilola Orikogbo
(1)
Daming D. Chen
(1)
David Brumley
(3)
Davide Balzarotti
(2)
Dawn Xiaodong Song
(1)
Engin Kirda
(4)
Eugene Kolodenker
(1)
Flavio Toffalini
(1)
Gianluca Stringhini
(12)
Giovanni Vigna
(7)
Gorkem Yakin
(1)
Grégoire Jacob
(1)
Guillermo Suarez-Tangil
(1)
Heng Yin
(1)
Ioannis Angelakopoulos
(2)
Jason Polakis
(1)
Kalman Graffi
(1)
Kevin Borgolte
(1)
Leila Delshadtehrani
(3)
Long Lu
(1)
Lucas Davi
(2)
Lucio Romerio
(1)
Ludovico Cavedon
(1)
Manuel Egele
(41)
Marco Balduzzi
(1)
Marius Muench
(1)
Mathias Payer
(2)
Matthias Büchler
(1)
Maverick Woo
(2)
Michael Bedford Taylor
(1)
Michael Eubanks
(1)
Michael Weissbacher
(1)
Nick Gregory
(1)
Nick Nikiforakis
(5)
Nikolay Matyunin
(1)
Onur Zungur
(3)
Peter Chapman
(1)
Pierre Mourlanne
(1)
Qiang Liu
(1)
Ralf Hund
(2)
Rasoul Jahanshahi
(6)
Sadullah Canakci
(4)
Sajjad Arshad
(1)
Schuyler Eldridge
(1)
Shuang Hao
(1)
Shuitao Gan
(1)
Stefan Hajnoczi
(2)
Stefan Nürnberger
(2)
Thomas Fischer
(2)
Thorsten Holz
(3)
Tiemoko Ballo
(1)
Tim Leek
(1)
William Blair
(3)
William K. Robertson
(1)
William Koch
(1)
William Robertson
(2)
Yan Chen
(1)
Yanick Fratantonio
(2)
Yinzhi Cao
(1)
Zhiyuan Jiang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to