Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 852715 results
Sort by: relevance publication year

Limits of Static Analysis for Malware Detection

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Andreas Moser | Christopher Kruegel | Engin Kirda

Limits of Static Analysis for Malware Detection

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Andreas Moser | Christopher Kruegel | Engin Kirda

Panorama

PROCEEDINGS ARTICLE published 28 October 2007 in Proceedings of the 14th ACM conference on Computer and communications security

Authors: Heng Yin | Dawn Song | Manuel Egele | Christopher Kruegel | Engin Kirda

FIRE: FInding Rogue nEtworks

PROCEEDINGS ARTICLE published December 2009 in 2009 Annual Computer Security Applications Conference

Authors: Brett Stone-Gross | Christopher Kruegel | Kevin Almeroth | Andreas Moser | Engin Kirda

Secure Input for Web Applications

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Martin Szydlowski | Christopher Kruegel | Engin Kirda

Secure Input for Web Applications

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Martin Szydlowski | Christopher Kruegel | Engin Kirda

Static analysis for detecting taint-style vulnerabilities in web applications

JOURNAL ARTICLE published 16 August 2010 in Journal of Computer Security

Authors: Nenad Jovanovic | Christopher Kruegel | Engin Kirda

Using Static Program Analysis to Aid Intrusion Detection

BOOK CHAPTER published 2006 in Lecture Notes in Computer Science

Authors: Manuel Egele | Martin Szydlowski | Engin Kirda | Christopher Kruegel

PoX: Protecting users from malicious Facebook applications

JOURNAL ARTICLE published July 2012 in Computer Communications

Authors: Manuel Egele | Andreas Moser | Christopher Kruegel | Engin Kirda

AccessMiner

PROCEEDINGS ARTICLE published 4 October 2010 in Proceedings of the 17th ACM conference on Computer and communications security

Authors: Andrea Lanzi | Davide Balzarotti | Christopher Kruegel | Mihai Christodorescu | Engin Kirda

BareBox

PROCEEDINGS ARTICLE published 5 December 2011 in Proceedings of the 27th Annual Computer Security Applications Conference

Research funded by Army Research Office (W911NF-09-1-0553) | Office of Naval Research (N000140911042) | Division of Computer and Network Systems (CNS-0845559CNS-0905537)

Authors: Dhilung Kirat | Giovanni Vigna | Christopher Kruegel

Disclosure

PROCEEDINGS ARTICLE published 3 December 2012 in Proceedings of the 28th Annual Computer Security Applications Conference

Research funded by Seventh Framework Programme (257007) | Division of Computer and Network Systems (CNS-1116777)

Authors: Leyla Bilge | Davide Balzarotti | William Robertson | Engin Kirda | Christopher Kruegel

On the Effectiveness of Techniques to Detect Phishing Sites

BOOK CHAPTER published 2007 in Detection of Intrusions and Malware, and Vulnerability Assessment

Authors: Christian Ludl | Sean McAllister | Engin Kirda | Christopher Kruegel

The power of procrastination

PROCEEDINGS ARTICLE published 17 October 2011 in Proceedings of the 18th ACM conference on Computer and communications security

Authors: Clemens Kolbitsch | Engin Kirda | Christopher Kruegel

Dynamic Analysis of Malicious Code

JOURNAL ARTICLE published August 2006 in Journal in Computer Virology

Authors: Ulrich Bayer | Andreas Moser | Christopher Kruegel | Engin Kirda

Neurlux

PROCEEDINGS ARTICLE published 9 December 2019 in Proceedings of the 35th Annual Computer Security Applications Conference

Research funded by Defense Advanced Research Projects Agency (FA8750-19-C-0003) | National Science Foundation (CNS-1704253)

Authors: Chani Jindal | Christopher Salls | Hojjat Aghakhani | Keith Long | Christopher Kruegel | Giovanni Vigna

Protecting Users Against Phishing Attacks with AntiPhish

PROCEEDINGS ARTICLE published in 29th Annual International Computer Software and Applications Conference (COMPSAC'05)

Authors: E. Kirda | C. Kruegel

FORECAST

PROCEEDINGS ARTICLE published 5 December 2011 in Proceedings of the 27th Annual Computer Security Applications Conference

Research funded by Seventh Framework Programme (257007 (SysSec)) | Österreichische Forschungsförderungsgesellschaft (820854 (TRUDIE))

Authors: Matthias Neugschwandtner | Paolo Milani Comparetti | Gregoire Jacob | Christopher Kruegel

Jarhead analysis and detection of malicious Java applets

PROCEEDINGS ARTICLE published 3 December 2012 in Proceedings of the 28th Annual Computer Security Applications Conference

Research funded by Division of Computer and Network Systems (CNS-0845559CNS-0905537) | Office of Naval Research (N000140911042)

Authors: Johannes Schlumberger | Christopher Kruegel | Giovanni Vigna

Improving Signature Testing through Dynamic Data Flow Analysis

PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)

Authors: Christopher Kruegel | Davide Balzarotti | William Robertson | Giovanni Vigna