Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 10211 results
Sort by: relevance publication year

Using Static Program Analysis to Aid Intrusion Detection

BOOK CHAPTER published 2006 in Lecture Notes in Computer Science

Authors: Manuel Egele | Martin Szydlowski | Engin Kirda | Christopher Kruegel

On the Effectiveness of Techniques to Detect Phishing Sites

BOOK CHAPTER published 2007 in Detection of Intrusions and Malware, and Vulnerability Assessment

Authors: Christian Ludl | Sean McAllister | Engin Kirda | Christopher Kruegel

Behavioral and Structural Properties of Malicious Code

BOOK CHAPTER published in Advances in Information Security

Authors: Christopher Kruegel

Static Disassembly and Code Analysis

BOOK CHAPTER published in Advances in Information Security

Authors: Giovanni Vigna

Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks

BOOK CHAPTER published 2009 in Detection of Intrusions and Malware, and Vulnerability Assessment

Authors: Manuel Egele | Peter Wurzinger | Christopher Kruegel | Engin Kirda

Leveraging User Interactions for In-Depth Testing of Web Applications

BOOK CHAPTER published in Lecture Notes in Computer Science

Authors: Sean McAllister | Engin Kirda | Christopher Kruegel

On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users

BOOK CHAPTER published 2015 in Detection of Intrusions and Malware, and Vulnerability Assessment

Authors: Yanick Fratantonio | Antonio Bianchi | William Robertson | Manuel Egele | Christopher Kruegel | Engin Kirda | Giovanni Vigna

A Static, Packer-Agnostic Filter to Detect Similar Malware Samples

BOOK CHAPTER published 2013 in Detection of Intrusions and Malware, and Vulnerability Assessment

Authors: Grégoire Jacob | Paolo Milani Comparetti | Matthias Neugschwandtner | Christopher Kruegel | Giovanni Vigna

Polymorphic Worm Detection Using Structural Information of Executables

BOOK CHAPTER published 2006 in Lecture Notes in Computer Science

Authors: Christopher Kruegel | Engin Kirda | Darren Mutz | William Robertson | Giovanni Vigna

Static Analysis

BOOK CHAPTER published 2020 in Malware Analysis and Detection Engineering

Authors: Abhijit Mohanta | Anoop Saldanha

Static Malware Detection

BOOK CHAPTER published 30 November 2022 in Intelligent Mobile Malware Detection

Authors: Tony Thomas | Roopak Surendran | Teenu S. John | Mamoun Alazab

Abusing Social Networks for Automated User Profiling

BOOK CHAPTER published 2010 in Lecture Notes in Computer Science

Authors: Marco Balduzzi | Christian Platzer | Thorsten Holz | Engin Kirda | Davide Balzarotti | Christopher Kruegel

BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation

BOOK CHAPTER published 2019 in Detection of Intrusions and Malware, and Vulnerability Assessment

Authors: Nilo Redini | Ruoyu Wang | Aravind Machiry | Yan Shoshitaishvili | Giovanni Vigna | Christopher Kruegel

You’ve Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures

BOOK CHAPTER published 2021 in Detection of Intrusions and Malware, and Vulnerability Assessment

Authors: Tommaso Innocenti | Seyed Ali Mirheidari | Amin Kharraz | Bruno Crispo | Engin Kirda

Malware Evolution: A Snapshot of Threats and Countermeasures in 2005

BOOK CHAPTER published 2007 in Advances in Information Security

Authors: Brian Witten | Carey Nachenberg

Stream Mining for Security Applications

BOOK CHAPTER published 7 December 2011 in Data Mining Tools for Malware Detection

Data Mining for Security Applications

BOOK CHAPTER published 7 December 2011 in Data Mining Tools for Malware Detection

Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks

BOOK CHAPTER published 2007 in Detection of Intrusions and Malware, and Vulnerability Assessment

Authors: Danilo Bruschi | Lorenzo Cavallaro | Andrea Lanzi

Collaborative Malware Detection Networks

BOOK CHAPTER published 19 November 2013 in Intrusion Detection Networks

Principles of Secure Information Flow Analysis

BOOK CHAPTER published in Advances in Information Security

Authors: Geoffrey Smith