Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 2 of 2405325 results
Sort by: relevance publication year

Neurlux

PROCEEDINGS ARTICLE published 9 December 2019 in Proceedings of the 35th Annual Computer Security Applications Conference

Research funded by Defense Advanced Research Projects Agency (FA8750-19-C-0003) | National Science Foundation (CNS-1704253)

Authors: Chani Jindal | Christopher Salls | Hojjat Aghakhani | Keith Long | Christopher Kruegel | Giovanni Vigna

Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries

PROCEEDINGS ARTICLE published 2010 in 2010 IEEE Symposium on Security and Privacy

Authors: Clemens Kolbitsch | Thorsten Holz | Christopher Kruegel | Engin Kirda

Improving the efficiency of dynamic malware analysis

PROCEEDINGS ARTICLE published 22 March 2010 in Proceedings of the 2010 ACM Symposium on Applied Computing

Research funded by Austrian Science Fund (P18764) | Seventh Framework Programme (FP7-ICT-216026-WOMBATFP7-ICT-216331-FORWARD)

Authors: Ulrich Bayer | Engin Kirda | Christopher Kruegel

Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications

PROCEEDINGS ARTICLE published May 2008 in 2008 IEEE Symposium on Security and Privacy (sp 2008)

Authors: Davide Balzarotti | Marco Cova | Vika Felmetsger | Nenad Jovanovic | Engin Kirda | Christopher Kruegel | Giovanni Vigna

Visual-similarity-based phishing detection

PROCEEDINGS ARTICLE published 22 September 2008 in Proceedings of the 4th international conference on Security and privacy in communication netowrks

Research funded by Austrian Science Fund (P-18764)

Authors: Eric Medvet | Engin Kirda | Christopher Kruegel

Dynamic Analysis of Malicious Code

JOURNAL ARTICLE published August 2006 in Journal in Computer Virology

Authors: Ulrich Bayer | Andreas Moser | Christopher Kruegel | Engin Kirda

FORECAST

PROCEEDINGS ARTICLE published 5 December 2011 in Proceedings of the 27th Annual Computer Security Applications Conference

Research funded by Seventh Framework Programme (257007 (SysSec)) | Österreichische Forschungsförderungsgesellschaft (820854 (TRUDIE))

Authors: Matthias Neugschwandtner | Paolo Milani Comparetti | Gregoire Jacob | Christopher Kruegel

Jarhead analysis and detection of malicious Java applets

PROCEEDINGS ARTICLE published 3 December 2012 in Proceedings of the 28th Annual Computer Security Applications Conference

Research funded by Division of Computer and Network Systems (CNS-0845559CNS-0905537) | Office of Naval Research (N000140911042)

Authors: Johannes Schlumberger | Christopher Kruegel | Giovanni Vigna

Improving Signature Testing through Dynamic Data Flow Analysis

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Christopher Kruegel | Davide Balzarotti | William Robertson | Giovanni Vigna

A quantitative study of accuracy in system call-based malware detection

PROCEEDINGS ARTICLE published 15 July 2012 in Proceedings of the 2012 International Symposium on Software Testing and Analysis

Authors: Davide Canali | Andrea Lanzi | Davide Balzarotti | Christopher Kruegel | Mihai Christodorescu | Engin Kirda

When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features

PROCEEDINGS ARTICLE published 2020 in Proceedings 2020 Network and Distributed System Security Symposium

Authors: Hojjat Aghakhani | Fabio Gritti | Francesco Mecca | Martina Lindorfer | Stefano Ortolani | Davide Balzarotti | Giovanni Vigna | Christopher Kruegel

Improving Signature Testing through Dynamic Data Flow Analysis

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Christopher Kruegel | Davide Balzarotti | William Robertson | Giovanni Vigna

A solution for the automated detection of clickjacking attacks

PROCEEDINGS ARTICLE published 13 April 2010 in Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security

Research funded by Austrian Science Fund (P18764) | Seventh Framework Programme (FP7-ICT-216026-WOMBATFP7-ICT-216331-FORWARD)

Authors: Marco Balduzzi | Manuel Egele | Engin Kirda | Davide Balzarotti | Christopher Kruegel

Detecting Kernel-Level Rootkits Through Binary Analysis

PROCEEDINGS ARTICLE published in 20th Annual Computer Security Applications Conference

Authors: C. Kruegel | W. Robertson | G. Vigna

Bayesian event classification for intrusion detection

PROCEEDINGS ARTICLE published in 19th Annual Computer Security Applications Conference, 2003. Proceedings.

Authors: C. Kruegel | D. Mutz | W. Robertson | F. Valeur

Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks

BOOK CHAPTER published 2009 in Detection of Intrusions and Malware, and Vulnerability Assessment

Authors: Manuel Egele | Peter Wurzinger | Christopher Kruegel | Engin Kirda

Detecting System Emulators

BOOK CHAPTER published in Lecture Notes in Computer Science

Authors: Thomas Raffetseder | Christopher Kruegel | Engin Kirda

Behavioral and Structural Properties of Malicious Code

BOOK CHAPTER published in Advances in Information Security

Authors: Christopher Kruegel

A layout-similarity-based approach for detecting phishing pages

PROCEEDINGS ARTICLE published 2007 in 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007

Authors: Angelo P. E. Rosiello | Engin Kirda | Christopher Kruegel | Fabrizio Ferrandi

ANASTASIA: ANdroid mAlware detection using STatic analySIs of Applications

PROCEEDINGS ARTICLE published November 2016 in 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS)

Authors: Hossein Fereidooni | Mauro Conti | Danfeng Yao | Alessandro Sperduti