Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 318223 results
Sort by: relevance publication year

Using Static Program Analysis to Aid Intrusion Detection

BOOK CHAPTER published 2006 in Lecture Notes in Computer Science

Authors: Manuel Egele | Martin Szydlowski | Engin Kirda | Christopher Kruegel

On the Effectiveness of Techniques to Detect Phishing Sites

BOOK CHAPTER published 2007 in Detection of Intrusions and Malware, and Vulnerability Assessment

Authors: Christian Ludl | Sean McAllister | Engin Kirda | Christopher Kruegel

Detecting System Emulators

BOOK CHAPTER published in Lecture Notes in Computer Science

Authors: Thomas Raffetseder | Christopher Kruegel | Engin Kirda

Extending .NET Security to Unmanaged Code

BOOK CHAPTER published 2006 in Lecture Notes in Computer Science

Authors: Patrick Klinkoff | Christopher Kruegel | Engin Kirda | Giovanni Vigna

Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks

BOOK CHAPTER published 2009 in Detection of Intrusions and Malware, and Vulnerability Assessment

Authors: Manuel Egele | Peter Wurzinger | Christopher Kruegel | Engin Kirda

Leveraging User Interactions for In-Depth Testing of Web Applications

BOOK CHAPTER published in Lecture Notes in Computer Science

Authors: Sean McAllister | Engin Kirda | Christopher Kruegel

Automated Spyware Collection and Analysis

BOOK CHAPTER published 2009 in Lecture Notes in Computer Science

Authors: Andreas Stamminger | Christopher Kruegel | Giovanni Vigna | Engin Kirda

On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users

BOOK CHAPTER published 2015 in Detection of Intrusions and Malware, and Vulnerability Assessment

Authors: Yanick Fratantonio | Antonio Bianchi | William Robertson | Manuel Egele | Christopher Kruegel | Engin Kirda | Giovanni Vigna

Automatically Generating Models for Botnet Detection

BOOK CHAPTER published 2009 in Computer Security – ESORICS 2009

Authors: Peter Wurzinger | Leyla Bilge | Thorsten Holz | Jan Goebel | Christopher Kruegel | Engin Kirda

A Static, Packer-Agnostic Filter to Detect Similar Malware Samples

BOOK CHAPTER published 2013 in Detection of Intrusions and Malware, and Vulnerability Assessment

Authors: Grégoire Jacob | Paolo Milani Comparetti | Matthias Neugschwandtner | Christopher Kruegel | Giovanni Vigna

Detection of Intrusions and Malware, and Vulnerability Assessment

BOOK published 2005 in Lecture Notes in Computer Science

Editors: Klaus Julisch | Christopher Kruegel

Polymorphic Worm Detection Using Structural Information of Executables

BOOK CHAPTER published 2006 in Lecture Notes in Computer Science

Authors: Christopher Kruegel | Engin Kirda | Darren Mutz | William Robertson | Giovanni Vigna

An Analysis of Malware Trends in Enterprise Networks

BOOK CHAPTER published 2019 in Lecture Notes in Computer Science

Authors: Abbas Acar | Long Lu | A. Selcuk Uluagac | Engin Kirda

Abusing Social Networks for Automated User Profiling

BOOK CHAPTER published 2010 in Lecture Notes in Computer Science

Authors: Marco Balduzzi | Christian Platzer | Thorsten Holz | Engin Kirda | Davide Balzarotti | Christopher Kruegel

BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation

BOOK CHAPTER published 2019 in Detection of Intrusions and Malware, and Vulnerability Assessment

Authors: Nilo Redini | Ruoyu Wang | Aravind Machiry | Yan Shoshitaishvili | Giovanni Vigna | Christopher Kruegel

You’ve Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures

BOOK CHAPTER published 2021 in Detection of Intrusions and Malware, and Vulnerability Assessment

Authors: Tommaso Innocenti | Seyed Ali Mirheidari | Amin Kharraz | Bruno Crispo | Engin Kirda

Malware Detection Based on Static and Dynamic Features Analysis

BOOK CHAPTER published 2020 in Machine Learning for Cyber Security

Authors: Budong Xu | Yongqin Li | Xiaomei Yu

Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks

BOOK CHAPTER published 2007 in Detection of Intrusions and Malware, and Vulnerability Assessment

Authors: Danilo Bruschi | Lorenzo Cavallaro | Andrea Lanzi

Efficient and Stealthy Instruction Tracing and Its Applications in Automated Malware Analysis: Open Problems and Challenges

BOOK CHAPTER published 2012 in Open Problems in Network Security

Authors: Endre Bangerter | Stefan Bühlmann | Engin Kirda

On the Security of Application Installers and Online Software Repositories

BOOK CHAPTER published 2020 in Detection of Intrusions and Malware, and Vulnerability Assessment

Authors: Marcus Botacin | Giovanni Bertão | Paulo de Geus | André Grégio | Christopher Kruegel | Giovanni Vigna