Manuel Egele

Orcid: 0000-0001-5038-2682

According to our database1, Manuel Egele authored at least 84 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Runtime Performance Anomaly Diagnosis in Production HPC Systems Using Active Learning.
IEEE Trans. Parallel Distributed Syst., April, 2024

2023
Minimalist: Semi-automated Debloating of PHP Web Applications through Static Analysis.
Proceedings of the 32nd USENIX Security Symposium, 2023

AnimateDead: Debloating Web Applications Using Concolic Execution.
Proceedings of the 32nd USENIX Security Symposium, 2023

FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modules.
Proceedings of the 32nd USENIX Security Symposium, 2023

Prodigy: Towards Unsupervised Anomaly Detection in Production HPC Systems.
Proceedings of the International Conference for High Performance Computing, 2023

No Grammar, No Problem: Towards Fuzzing the Linux Kernel without System-Call Descriptions.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

ProcessorFuzz: Processor Fuzzing with Control and Status Registers Guidance.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023

SIGFuzz: A Framework for Discovering Microarchitectural Timing Side Channels.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

ThreadLock: Native Principal Isolation Through Memory Protection Keys.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing.
ACM Trans. Priv. Secur., 2022

ProcessorFuzz: Guiding Processor Fuzzing using Control and Status Registers.
CoRR, 2022

Polytope: Practical Memory Access Control for C++ Applications.
CoRR, 2022

Morphuzz: Bending (Input) Space to Fuzz Virtual Devices.
Proceedings of the 31st USENIX Security Symposium, 2022

MPKAlloc: Efficient Heap Meta-data Integrity Through Hardware Memory Protection Keys.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022

Evocatio: Conjuring Bug Capabilities from a Single PoC.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

TargetFuzz: Using DARTs to Guide Directed Greybox Fuzzers.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
The Art, Science, and Engineering of Fuzzing: A Survey.
IEEE Trans. Software Eng., 2021

A Cautionary Tale About Detecting Malware Using Hardware Performance Counters and Machine Learning.
IEEE Des. Test, 2021

Saphire: Sandboxing PHP Applications with Tailored System Call Allowlists.
Proceedings of the 30th USENIX Security Symposium, 2021

Proctor: A Semi-Supervised Performance Anomaly Diagnosis Framework for Production HPC Systems.
Proceedings of the High Performance Computing - 36th International Conference, 2021

To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Using Monitoring Data to Improve HPC Performance via Network-Data-Driven Allocation.
Proceedings of the 2021 IEEE High Performance Extreme Computing Conference, 2021

AppJitsu: Investigating the Resiliency of Android Applications.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

E2EWatch: An End-to-End Anomaly Diagnosis Framework for Production HPC Systems.
Proceedings of the Euro-Par 2021: Parallel Processing, 2021

SealPK: Sealable Protection Keys for RISC-V.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

DirectFuzz: Automated Test Generation for RTL Designs using Directed Graybox Fuzzing.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

SoK: Enabling Security Analyses of Embedded Systems via Rehosting.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Oversharing Is Not Caring: How CNAME Cloaking Can Expose Your Session Cookies.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

FlexFilt: Towards Flexible Instruction Filtering for Security.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Efficient Sealable Protection Keys for RISC-V.
CoRR, 2020

PHMon: A Programmable Hardware Monitor and Its Security Use Cases.
Proceedings of the 29th USENIX Security Symposium, 2020

Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Libspector : Context-Aware Large-Scale Network Traffic Analysis of Android Applications.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Efficient Context-Sensitive CFI Enforcement Through a Hardware Monitor.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Online Diagnosis of Performance Variation in HPC Systems Using Machine Learning.
IEEE Trans. Parallel Distributed Syst., 2019

RANDR: Record and Replay for Android Applications via Targeted Runtime Instrumentation.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

HPAS: An HPC Performance Anomaly Suite for Reproducing Performance Variations.
Proceedings of the 48th International Conference on Parallel Processing, 2019

BorderPatrol: Securing BYOD using Fine-Grained Contextual Information.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

On the Perils of Leaking Referrers in Online Collaboration Services.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

Towards Practical Record and Replay for Mobile Applications.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

2018
Fuzzing: Art, Science, and Engineering.
CoRR, 2018

Nile: A Programmable Monitoring Coprocessor.
IEEE Comput. Archit. Lett., 2018

Proteus: Detecting Android Emulators from Instruction-Level Profiles.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Taxonomist: Application Detection Through Rich Monitoring Data.
Proceedings of the Euro-Par 2018: Parallel Processing, 2018

Hardware Performance Counters Can Detect Malware: Myth or Fact?
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Towards Detecting Compromised Accounts on Social Networks.
IEEE Trans. Dependable Secur. Comput., 2017

What's in a Name?: Understanding Profile Name Reuse on Twitter.
Proceedings of the 26th International Conference on World Wide Web, 2017

Diagnosing Performance Variations in HPC Applications Using Machine Learning.
Proceedings of the High Performance Computing - 32nd International Conference, 2017

Semi-automated discovery of server-based information oversharing vulnerabilities in Android applications.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

High-performance low-energy implementation of cryptographic algorithms on a programmable SoC for IoT devices.
Proceedings of the 2017 IEEE High Performance Extreme Computing Conference, 2017

PayBreak: Defense Against Cryptographic Ransomware.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Towards Automated Dynamic Analysis for Linux-based Embedded Firmware.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Why allowing profile name reuse is a bad idea.
Proceedings of the 9th European Workshop on System Security, 2016

EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

CRiOS: Toward Large-Scale iOS Application Analysis.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

2015
EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services.
Proceedings of the 24th USENIX Security Symposium, 2015

EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

Drops for Stuff: An Analysis of Reshipping Mule Scams.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2013
COMPA: Detecting Compromised Accounts on Social Networks.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Follow the green: growth and dynamics in twitter follower markets.
Proceedings of the 2013 Internet Measurement Conference, 2013

An empirical study of cryptographic misuse in android applications.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
NSDI '12 and LEET '12.
login Usenix Mag., 2012

A survey on automated dynamic malware-analysis techniques and tools.
ACM Comput. Surv., 2012

PoX: Protecting users from malicious Facebook applications.
Comput. Commun., 2012

Poultry markets: on the underground economy of twitter followers.
Comput. Commun. Rev., 2012

B@bel: Leveraging Email Delivery for Spam Mitigation.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
Removing web spam links from search engine results.
J. Comput. Virol., 2011

PiOS: Detecting Privacy Leaks in iOS Applications.
Proceedings of the Network and Distributed System Security Symposium, 2011

Challenges for Dynamic Analysis of iOS Applications.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011

Poster: control-flow integrity for smartphones.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Hit 'em where it hurts: a live security exercise on cyber situational awareness.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Organizing Large Scale Hacking Competitions.
Proceedings of the Detection of Intrusions and Malware, 2010

A solution for the automated detection of clickjacking attacks.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Mitigating Drive-By Download Attacks: Challenges and Open Problems.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks.
Proceedings of the Detection of Intrusions and Malware, 2009

2007
Dynamic Spyware Analysis.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

Panorama: capturing system-wide information flow for malware detection and analysis.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Using Static Program Analysis to Aid Intrusion Detection.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006


  Loading...