Biblio

Export 27 results:
Filters: Author is Christopher Kruegel  [Clear All Filters]
2017
Redini N, Machiry A, Das D, Fratantonio Y, Bianchi A, Gustafson E, Shoshitaishvili Y, Kruegel C, Vigna G.  2017.  BootStomp: On the Security of Bootloaders in Mobile Devices. 26th {USENIX} Security Symposium ({USENIX} Security 17). :781--798.
Machiry A, Spensky C, Corina J, Stephens N, Kruegel C, Vigna G.  2017.  DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers. 26th {USENIX} Security Symposium ({USENIX} Security 17). :1007--1024.
2015
Stringhini G, Mourlanne P, Jacob G, Egele M, Kruegel C, Vigna G.  2015.  EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services. 24th {USENIX} Security Symposium ({USENIX} Security 15). :563--578.
Di Federico A, Cama A, Shoshitaishvili Y, Kruegel C, Vigna G.  2015.  How the ELF Ruined Christmas. 24th {USENIX} Security Symposium ({USENIX} Security 15). :643--658.
Borgolte K, Kruegel C, Vigna G.  2015.  Meerkat: Detecting Website Defacements through Image-based Object Recognition. 24th {USENIX} Security Symposium ({USENIX} Security 15). :595--610.
Weissbacher M, Robertson W, Kirda E, Kruegel C, Vigna G.  2015.  ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities. 24th {USENIX} Security Symposium ({USENIX} Security 15). :737--752.
2014
Kirat D, Vigna G, Kruegel C.  2014.  BareCloud: Bare-metal Analysis-based Evasive Malware Detection. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :287--301.
Kapravelos A, Grier C, Chachra N, Kruegel C, Vigna G, Paxson V.  2014.  Hulk: Eliciting Malicious Behavior in Browser Extensions. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :641--654.
2012
Doupé A, Cavedon L, Kruegel C, Vigna G.  2012.  Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner. 21st {USENIX} Security Symposium ({USENIX} Security 12). :523--538.
Jacob G, Kirda E, Kruegel C, Vigna G.  2012.  PUBCRAWL: Protecting Users and Businesses from CRAWLers. 21st {USENIX} Security Symposium ({USENIX} Security 12). :507--522.
2011
Stringhini G, Holz T, Stone-Gross B, Kruegel C, Vigna G.  2011.  BOTMAGNIFIER: Locating Spambots on the Internet. 20th {USENIX} Security Symposium ({USENIX} Security 11).
Kruegel C.  2011.  Opening Remarks. 4th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 11).
2010
Puttaswamy KPN, Kruegel C.  2010.  Silverline: Toward Confidentiality in Third-Party Clouds. 7th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 10).
Felmetsger V, Cavedon L, Kruegel C, Vigna G.  2010.  Toward Automated Detection of Logic Vulnerabilities in Web Applications. 19th {USENIX} Security Symposium ({USENIX} Security 10).
2008
Cova M, Kruegel C, Vigna G.  2008.  There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. 2nd {USENIX} Workshop on Offensive Technologies ({WOOT} 08).
2007
Egele M, Kruegel C, Kirda E, Yin H, Song D.  2007.  Dynamic Spyware Analysis. 2007 {USENIX} Annual Technical Conference ({USENIX} {ATC} 07).
Karlberger C, Bayler G, Kruegel C, Kirda E.  2007.  Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters. First {USENIX} Workshop on Offensive Technologies ({WOOT} 07).
2006
Kirda E, Kruegel C.  2006.  Behavior-based Spyware Detection. 15th {USENIX} Security Symposium ({USENIX} Security 06).
2005
Kruegel C, Kirda E, Mutz D, Robertson W, Vigna G.  2005.  Automating Mimicry Attacks Using Static Binary Analysis. 14th {USENIX} Security Symposium ({USENIX} Security 05).

Pages