Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 2399187 results
Sort by: relevance publication year

Limits of Static Analysis for Malware Detection

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Andreas Moser | Christopher Kruegel | Engin Kirda

Limits of Static Analysis for Malware Detection

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Andreas Moser | Christopher Kruegel | Engin Kirda

Exploring Multiple Execution Paths for Malware Analysis

PROCEEDINGS ARTICLE published May 2007 in 2007 IEEE Symposium on Security and Privacy (SP '07)

Authors: Andreas Moser | Christopher Kruegel | Engin Kirda

Panorama

PROCEEDINGS ARTICLE published 28 October 2007 in Proceedings of the 14th ACM conference on Computer and communications security

Authors: Heng Yin | Dawn Song | Manuel Egele | Christopher Kruegel | Engin Kirda

FIRE: FInding Rogue nEtworks

PROCEEDINGS ARTICLE published December 2009 in 2009 Annual Computer Security Applications Conference

Authors: Brett Stone-Gross | Christopher Kruegel | Kevin Almeroth | Andreas Moser | Engin Kirda

Secure Input for Web Applications

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Martin Szydlowski | Christopher Kruegel | Engin Kirda

Secure Input for Web Applications

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Martin Szydlowski | Christopher Kruegel | Engin Kirda

Using Static Program Analysis to Aid Intrusion Detection

BOOK CHAPTER published 2006 in Lecture Notes in Computer Science

Authors: Manuel Egele | Martin Szydlowski | Engin Kirda | Christopher Kruegel

Static analysis for detecting taint-style vulnerabilities in web applications

JOURNAL ARTICLE published 16 August 2010 in Journal of Computer Security

Authors: Nenad Jovanovic | Christopher Kruegel | Engin Kirda

AccessMiner

PROCEEDINGS ARTICLE published 4 October 2010 in Proceedings of the 17th ACM conference on Computer and communications security

Authors: Andrea Lanzi | Davide Balzarotti | Christopher Kruegel | Mihai Christodorescu | Engin Kirda

Precise alias analysis for static detection of web application vulnerabilities

PROCEEDINGS ARTICLE published 10 June 2006 in Proceedings of the 2006 workshop on Programming languages and analysis for security

Authors: Nenad Jovanovic | Christopher Kruegel | Engin Kirda

BareBox

PROCEEDINGS ARTICLE published 5 December 2011 in Proceedings of the 27th Annual Computer Security Applications Conference

Research funded by Army Research Office (W911NF-09-1-0553) | Office of Naval Research (N000140911042) | Division of Computer and Network Systems (CNS-0845559CNS-0905537)

Authors: Dhilung Kirat | Giovanni Vigna | Christopher Kruegel

PoX: Protecting users from malicious Facebook applications

JOURNAL ARTICLE published July 2012 in Computer Communications

Authors: Manuel Egele | Andreas Moser | Christopher Kruegel | Engin Kirda

Disclosure

PROCEEDINGS ARTICLE published 3 December 2012 in Proceedings of the 28th Annual Computer Security Applications Conference

Research funded by Seventh Framework Programme (257007) | Division of Computer and Network Systems (CNS-1116777)

Authors: Leyla Bilge | Davide Balzarotti | William Robertson | Engin Kirda | Christopher Kruegel

On the Effectiveness of Techniques to Detect Phishing Sites

BOOK CHAPTER published 2007 in Detection of Intrusions and Malware, and Vulnerability Assessment

Authors: Christian Ludl | Sean McAllister | Engin Kirda | Christopher Kruegel

The power of procrastination

PROCEEDINGS ARTICLE published 17 October 2011 in Proceedings of the 18th ACM conference on Computer and communications security

Authors: Clemens Kolbitsch | Engin Kirda | Christopher Kruegel

PoX: Protecting users from malicious Facebook applications

PROCEEDINGS ARTICLE published March 2011 in 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)

Authors: Manuel Egele | Andreas Moser | Christopher Kruegel | Engin Kirda

Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries

PROCEEDINGS ARTICLE published 2010 in 2010 IEEE Symposium on Security and Privacy

Authors: Clemens Kolbitsch | Thorsten Holz | Christopher Kruegel | Engin Kirda

Pixy: a static analysis tool for detecting Web application vulnerabilities

PROCEEDINGS ARTICLE published 2006 in 2006 IEEE Symposium on Security and Privacy (S&P'06)

Authors: N. Jovanovic | C. Kruegel | E. Kirda

Neurlux

PROCEEDINGS ARTICLE published 9 December 2019 in Proceedings of the 35th Annual Computer Security Applications Conference

Research funded by Defense Advanced Research Projects Agency (FA8750-19-C-0003) | National Science Foundation (CNS-1704253)

Authors: Chani Jindal | Christopher Salls | Hojjat Aghakhani | Keith Long | Christopher Kruegel | Giovanni Vigna