Christopher Krügel

Orcid: 0000-0001-5140-3414

Affiliations:
  • University of California, Santa Barbara, Computer Science Department
  • Lastline, Inc., Redwood City, USA


According to our database1, Christopher Krügel authored at least 278 papers between 1999 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Street Rep: A Privacy-Preserving Reputation Aggregation System.
IACR Cryptol. ePrint Arch., 2023

Exploiting Unfair Advantages: Investigating Opportunistic Trading in the NFT Market.
CoRR, 2023

Demystifying NFT Promotion and Phishing Scams.
CoRR, 2023

TrojanPuzzle: Covertly Poisoning Code-Suggestion Models.
CoRR, 2023

A Large Scale Study of the Ethereum Arbitrage Ecosystem.
Proceedings of the 32nd USENIX Security Symposium, 2023

Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart Contracts.
Proceedings of the 32nd USENIX Security Symposium, 2023

ACTOR: Action-Guided Kernel Fuzzing.
Proceedings of the 32nd USENIX Security Symposium, 2023

Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

TEEzz: Fuzzing Trusted Applications on COTS Android Devices.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Container Orchestration Honeypot: Observing Attacks in the Wild.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Columbus: Android App Testing Through Systematic Callback Exploration.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Certifiably Vulnerable: Using Certificate Transparency Logs for Target Reconnaissance.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing.
Proceedings of the 31st USENIX Security Symposium, 2022

Regulator: Dynamic Analysis to Detect ReDoS.
Proceedings of the 31st USENIX Security Symposium, 2022

Decomperson: How Humans Decompile and What We Can Learn From It.
Proceedings of the 31st USENIX Security Symposium, 2022

SYMBEXCEL: Automated Analysis and Understanding of Malicious Excel 4.0 Macros.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

DEEPCASE: Semi-Supervised Contextual Analysis of Security Events.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Looking for Signals: A Systems Security Perspective.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022

Hybrid Pruning: Towards Precise Pointer and Taint Analysis.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022

Understanding Security Issues in the NFT Ecosystem.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

POPKORN: Popping Windows Kernel Drivers At Scale.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
One Size Does Not Fit All: A Longitudinal Analysis of Brazilian Financial Malware.
ACM Trans. Priv. Secur., 2021

Toward a secure crowdsourced location tracking system.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Token-Level Fuzzing.
Proceedings of the 30th USENIX Security Symposium, 2021

Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone.
Proceedings of the Checkmate@CCS 2021, 2021

Conware: Automated Modeling of Hardware Peripherals.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
VENOMAVE: Clean-Label Poisoning Against Speech Recognition.
CoRR, 2020

Dirty Clicks: A Study of the Usability and Security Implications of Click-related Behaviors on the Web.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation.
Proceedings of the 29th USENIX Security Symposium, 2020

Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

SPIDER: Enabling Fast Patch Propagation In Related Software Repositories.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

On the Security of Application Installers and Online Software Repositories.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Exploring Abstraction Functions in Fuzzing.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

SYMBION: Interleaving Symbolic with Concrete Execution.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Lightning Talk - Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis.
Proceedings of the World Wide Web Conference, 2019

Toward the Analysis of Embedded Firmware through Automated Re-hosting.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

BootKeeper: Validating Software Integrity Properties on Boot Firmware Images.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Neurlux: dynamic malware analysis without feature engineering.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

Sleak: automating address space layout derandomization.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security.
Proceedings of the 27th USENIX Security Symposium, 2018

Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.
Proceedings of the 27th USENIX Security Symposium, 2018

Detecting Deceptive Reviews Using Generative Adversarial Networks.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Measuring E-mail header injections on the world wide web.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

In rDNS We Trust: Revisiting a Common Data-Source's Reliability.
Proceedings of the Passive and Active Measurement - 19th International Conference, 2018

Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Broken Fingers: On the Usage of the Fingerprint API in Android.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Using Loops For Malware Classification Resilient to Feature-unaware Perturbations.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Towards Detecting Compromised Accounts on Social Networks.
IEEE Trans. Dependable Secur. Comput., 2017

On the Privacy and Security of the Ultrasound Ecosystem.
Proc. Priv. Enhancing Technol., 2017

Demystifying DDoS as a Service.
IEEE Commun. Mag., 2017

BootStomp: On the Security of Bootloaders in Mobile Devices.
Proceedings of the 26th USENIX Security Symposium, 2017

DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers.
Proceedings of the 26th USENIX Security Symposium, 2017

Something from Nothing (There): Collecting Global IPv6 Datasets from DNS.
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017

Ramblr: Making Reassembly Great Again.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

POISED: Spotting Twitter Spam Off the Beaten Paths.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

DIFUZE: Interface Aware Fuzzing for Kernel Drivers.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Piston: Uncooperative Remote Runtime Patching.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

TriggerScope: Towards Detecting Logic Bombs in Android Applications.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Driller: Augmenting Fuzzing Through Selective Symbolic Execution.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Portrait of a Privacy Invasion.
Proc. Priv. Enhancing Technol., 2015

Framing Dependencies Introduced by Underground Commoditization.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities.
Proceedings of the 24th USENIX Security Symposium, 2015

EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services.
Proceedings of the 24th USENIX Security Symposium, 2015

How the ELF Ruined Christmas.
Proceedings of the 24th USENIX Security Symposium, 2015

Meerkat: Detecting Website Defacements through Image-based Object Recognition.
Proceedings of the 24th USENIX Security Symposium, 2015

What the App is That? Deception and Countermeasures in the Android User Interface.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

CLAPP: characterizing loops in Android applications (invited talk).
Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile, 2015

CLAPP: characterizing loops in Android applications.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Prison: Tracking Process Interactions to Contain Malware.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android.
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015

Know Your Achilles' Heel: Automatic Detection of Network Critical Services.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

BareDroid: Large-Scale Analysis of Android Apps on Real Devices.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Preserving Location Privacy in Geosocial Applications.
IEEE Trans. Mob. Comput., 2014

Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains.
ACM Trans. Inf. Syst. Secur., 2014

On the Workings and Current Practices of Web-Based Device Fingerprinting.
IEEE Secur. Priv., 2014

Stranger danger: exploring the ecosystem of ad-based URL shortening services.
Proceedings of the 23rd International World Wide Web Conference, 2014

Relevant change detection: a framework for the precise extraction of modified and novel web-based content as a filtering technique for analysis engines.
Proceedings of the 23rd International World Wide Web Conference, 2014

BareCloud: Bare-metal Analysis-based Evasive Malware Detection.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Hulk: Eliciting Malicious Behavior in Browser Extensions.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

The Tricks of the Trade: What Makes Spam Campaigns Successful?
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Extracting probable command and control signatures for detecting botnets.
Proceedings of the Symposium on Applied Computing, 2014

Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Nazca: Detecting Malware Distribution in Large-Scale Networks.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Rippler: Delay injection for service dependency detection.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements.
Proceedings of the 2014 Internet Measurement Conference, 2014

PExy: The Other Side of Exploit Kits.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Fighting malicious code: an eternal struggle.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Two years of short URLs internet measurement: security threats and countermeasures.
Proceedings of the 22nd International World Wide Web Conference, 2013

Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Revolver: An Automated Approach to the Detection of Evasive Web-based Malware.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

EARs in the wild: large-scale analysis of execution after redirect vulnerabilities.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Practical Attacks against the I2P Network.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

COMPA: Detecting Compromised Accounts on Social Networks.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Follow the green: growth and dynamics in twitter follower markets.
Proceedings of the 2013 Internet Measurement Conference, 2013

Shady paths: leveraging surfing crowds to detect malicious web pages.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

An empirical study of cryptographic misuse in android applications.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

deDacota: toward preventing server-side XSS via automatic code and data separation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Delta: automatic identification of unknown web-based infection campaigns.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Message in a bottle: sailing past censorship.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
A survey on automated dynamic malware-analysis techniques and tools.
ACM Comput. Surv., 2012

PoX: Protecting users from malicious Facebook applications.
Comput. Commun., 2012

Poultry markets: on the underground economy of twitter followers.
Comput. Commun. Rev., 2012

B@bel: Leveraging Email Delivery for Spam Mitigation.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

PUBCRAWL: Protecting Users and Businesses from CRAWLers.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

EvilSeed: A Guided Approach to Finding Malicious Web Pages.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

FlashDetect: ActionScript 3 Malware Detection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Detecting social cliques for automated privacy control in online social networks.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Enforcing dynamic spectrum access with spectrum permits.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

A quantitative study of accuracy in system call-based malware detection.
Proceedings of the International Symposium on Software Testing and Analysis, 2012

ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies.
Proceedings of the International Symposium on Software Testing and Analysis, 2012

Fighting Malicious Software.
Proceedings of the Information Systems Security, 8th International Conference, 2012

A Static, Packer-Agnostic Filter to Detect Similar Malware Samples.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

Tracking Memory Writes for Malware Classification and Code Reuse Identification.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

BotFinder: finding bots in network traffic without deep packet inspection.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2012

PeerPress: utilizing enemies' P2P strength against them.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

You are what you include: large-scale evaluation of remote javascript inclusions.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Blacksheep: detecting compromised hosts in homogeneous crowds.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Jarhead analysis and detection of malicious Java applets.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Analysis of a Botnet Takeover.
IEEE Secur. Priv., 2011

Making browser extensions secure: technical perspective.
Commun. ACM, 2011

Prophiler: a fast filter for the large-scale detection of malicious web pages.
Proceedings of the 20th International Conference on World Wide Web, 2011

The Underground Economy of Fake Antivirus Software.
Proceedings of the Economics of Information Security and Privacy III [papers from the Tenth Workshop on Economics and Information Security, 2011

The Underground Economy of Fake Antivirus Software.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011

BOTMAGNIFIER: Locating Spambots on the Internet.
Proceedings of the 20th USENIX Security Symposium, 2011

JACKSTRAWS: Picking Command and Control Connections from Bot Traffic.
Proceedings of the 20th USENIX Security Symposium, 2011

Dymo: Tracking Dynamic Code Identity.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

PiOS: Detecting Privacy Leaks in iOS Applications.
Proceedings of the Network and Distributed System Security Symposium, 2011

EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.
Proceedings of the Network and Distributed System Security Symposium, 2011

Peering through the iframe.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Understanding fraudulent activities in online ad exchanges.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

Challenges for Dynamic Analysis of iOS Applications.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011

BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Escape from Monkey Island: Evading High-Interaction Honeyclients.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011

MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper).
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011

Silverline: toward data confidentiality in storage-intensive cloud applications.
Proceedings of the ACM Symposium on Cloud Computing in conjunction with SOSP 2011, 2011

The power of procrastination: detection and mitigation of execution-stalling malicious code.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Fear the EAR: discovering and mitigating execution after redirect vulnerabilities.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

FORECAST: skimming off the malware cream.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

BareBox: efficient malware analysis on bare-metal.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

Nexat: a history-based approach to predict attacker actions.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Static analysis for detecting taint-style vulnerabilities in web applications.
J. Comput. Secur., 2010

Detection and analysis of drive-by-download attacks and malicious JavaScript code.
Proceedings of the 19th International Conference on World Wide Web, 2010

Is the Internet for Porn? An Insight Into the Online Adult Industry.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

Toward Automated Detection of Logic Vulnerabilities in Web Applications.
Proceedings of the 19th USENIX Security Symposium, 2010

A Practical Attack to De-anonymize Social Network Users.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Identifying Dormant Functionality in Malware Programs.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Improving the efficiency of dynamic malware analysis.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Abusing Social Networks for Automated User Profiling.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Effective Anomaly Detection with Scarce Training Data.
Proceedings of the Network and Distributed System Security Symposium, 2010

Efficient Detection of Split Personalities in Malware.
Proceedings of the Network and Distributed System Security Symposium, 2010

Are BGP Routers Open to Attack? An Experiment.
Proceedings of the Open Research Problems in Network Security, 2010

AccessMiner: using system-centric models for malware protection.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

A solution for the automated detection of clickjacking attacks.
Proceedings of the 5th ACM Symposium on Information, 2010

Detecting spammers on social networks.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries.
J. Comput. Secur., 2009

Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008.
Comput. Sci. Res. Dev., 2009

Server-Side Bot Detection in Massively Multiplayer Online Games.
IEEE Secur. Priv., 2009

On looking FORWARD.
ERCIM News, 2009

Client-side cross-site scripting protection.
Comput. Secur., 2009

Effective and Efficient Malware Detection at the End Host.
Proceedings of the 18th USENIX Security Symposium, 2009

Prospex: Protocol Specification Extraction.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

Protecting a Moving Target: Addressing Web Application Concept Drift.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Scalable, Behavior-Based Malware Clustering.
Proceedings of the Network and Distributed System Security Symposium, 2009

Automated Spyware Collection and Analysis.
Proceedings of the Information Security, 12th International Conference, 2009

Mitigating Drive-By Download Attacks: Challenges and Open Problems.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

SWAP: Mitigating XSS attacks using a reverse proxy.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009

Automatically Generating Models for Botnet Detection.
Proceedings of the Computer Security, 2009

Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks.
Proceedings of the Detection of Intrusions and Malware, 2009

Your botnet is my botnet: analysis of a botnet takeover.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

FIRE: FInding Rogue nEtworks.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

Analyzing and Detecting Malicious Flash Advertisements.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits.
Proceedings of the 2nd USENIX Workshop on Offensive Technologies, 2008

Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

Overbot: a botnet protocol based on Kademlia.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Visual-similarity-based phishing detection.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Leveraging User Interactions for In-Depth Testing of Web Applications.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Automatic Network Protocol Analysis.
Proceedings of the Network and Distributed System Security Symposium, 2008

Mining specifications of malicious behavior.
Proceedings of the Proceeding of the 1st Annual India Software Engineering Conference, 2008

A Parallel Architecture for Stateful, High-Speed Intrusion Detection.
Proceedings of the Information Systems Security, 4th International Conference, 2008

VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges.
Proceedings of the Detection of Intrusions and Malware, 2008

8102 Working Group -- Attack Taxonomy.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

2007
Behavioral and Structural Properties of Malicious Code.
Proceedings of the Malware Detection, 2007

Extending .NET security to unmanaged code.
Int. J. Inf. Sec., 2007

Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters.
Proceedings of the First USENIX Workshop on Offensive Technologies, 2007

Dynamic Spyware Analysis.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

Exploring Multiple Execution Paths for Malware Analysis.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

A layout-similarity-based approach for detecting phishing pages.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis.
Proceedings of the Network and Distributed System Security Symposium, 2007

Detecting System Emulators.
Proceedings of the Information Security, 10th International Conference, 2007

Building Anti-Phishing Browser Plug-Ins: An Experience Report.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007

On the Effectiveness of Techniques to Detect Phishing Sites.
Proceedings of the Detection of Intrusions and Malware, 2007

Panorama: capturing system-wide information flow for malware detection and analysis.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Secure Input for Web Applications.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

Limits of Static Analysis for Malware Detection.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

Improving Signature Testing through Dynamic Data Flow Analysis.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Dynamic Analysis of Malicious Code.
J. Comput. Virol., 2006

Anomalous system call detection.
ACM Trans. Inf. Syst. Secur., 2006

Protecting Users against Phishing Attacks.
Comput. J., 2006

SecuBat: a web vulnerability scanner.
Proceedings of the 15th international conference on World Wide Web, 2006

Behavior-based Spyware Detection.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Preventing Cross Site Request Forgery Attacks.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

An anomaly-driven reverse proxy for web applications.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Noxes: a client-side solution for mitigating cross-site scripting attacks.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Precise alias analysis for static detection of web application vulnerabilities.
Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, 2006

Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks.
Proceedings of the Network and Distributed System Security Symposium, 2006

Using Static Program Analysis to Aid Intrusion Detection.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006

2005
A multi-model approach to the detection of web-based attacks.
Comput. Networks, 2005

Automating Mimicry Attacks Using Static Binary Analysis.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

Polymorphic Worm Detection Using Structural Information of Executables.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

Protecting Users Against Phishing Attacks with AntiPhish.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

Intrusion Detection and Correlation - Challenges and Solutions
Advances in Information Security 14, Springer, ISBN: 978-0-387-23398-7, 2005

Network Security and Secure Applications.
Proceedings of the Industrial Information Technology Handbook, 2005

2004
A Comprehensive Approach to Intrusion Detection Alert Correlation.
IEEE Trans. Dependable Secur. Comput., 2004

Using Alert Verification to Identify Successful Intrusion Attempts.
Prax. Inf.verarb. Kommun., 2004

Static Disassembly of Obfuscated Binaries.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Alert Verification Determining the Success of Intrusion Attempts.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2004

Detecting Kernel-Level Rootkits Through Binary Analysis.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Using Decision Trees to Improve Signature-Based Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 6th International Symposium, 2003

Topology-Based Detection of Anomalous BGP Messages.
Proceedings of the Recent Advances in Intrusion Detection, 6th International Symposium, 2003

Run-time Detection of Heap-based Overflows.
Proceedings of the 17th Conference on Systems Administration (LISA 2003), 2003

Web Service Engineering with DIWE.
Proceedings of the 29th EUROMICRO Conference 2003, 2003

On the Detection of Anomalous System Call Arguments.
Proceedings of the Computer Security, 2003

Anomaly detection of web-based attacks.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

Bayesian Event Classification for Intrusion Detection.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
Stateful Intrusion Detection for High-Speed Networks.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

Service specific anomaly detection for network intrusion detection.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

Accurate Buffer Overflow Detection via Abstract Payload Execution.
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002

XGuide - A Practical Guide to XML-Based Web Engineering.
Proceedings of the Web Engineering and Peer-to-Peer Computing, 2002

Distributed Pattern Detection for Intrusion Detection.
Proceedings of the Network and Distributed System Security Symposium, 2002

DPS : An Architectural Style for Development of Secure Software.
Proceedings of the Infrastructure Security, International Conference, 2002

Evaluating the Impact of Automated Intrusion Response Mechanisms.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
Supporting Multi-Device Enabled Web Services: Challenges and Open Problems.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

SPARTA, a Mobile Agent Based Instrusion Detection System.
Proceedings of the Advances in Network and Distributed Systems Security, 2001

Decentralized Event Correlation for Intrusion Detection.
Proceedings of the Information Security and Cryptology, 2001

1999
Jini - ein guter Geist für die Gebäudesystemtechnik.
Proceedings of the JIT '99, 1999


  Loading...