Biblio

Export 32 results:
Filters: Author is Christopher Kruegel  [Clear All Filters]
2022
Burk K, Pagani F, Kruegel C, Vigna G.  2022.  Decomperson: How Humans Decompile and What We Can Learn From It. 31st USENIX Security Symposium (USENIX Security 22). :2765--2782.
Scharnowski T, Bars N, Schloegel M, Gustafson E, Muench M, Vigna G, Kruegel C, Holz T, Abbasi A.  2022.  Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing. 31st USENIX Security Symposium (USENIX Security 22). :1239--1256.
McLaughlin R, Pagani F, Spahn N, Kruegel C, Vigna G.  2022.  Regulator: Dynamic Analysis to Detect ReDoS. 31st USENIX Security Symposium (USENIX Security 22). :4219--4235.
2021
Salls C, Jindal C, Corina J, Kruegel C, Vigna G.  2021.  Token-Level Fuzzing. 30th USENIX Security Symposium (USENIX Security 21). :2795--2809.
2014
Kirat D, Vigna G, Kruegel C.  2014.  BareCloud: Bare-metal Analysis-based Evasive Malware Detection. 23rd USENIX Security Symposium (USENIX Security 14). :287--301.
Kapravelos A, Grier C, Chachra N, Kruegel C, Vigna G, Paxson V.  2014.  Hulk: Eliciting Malicious Behavior in Browser Extensions. 23rd USENIX Security Symposium (USENIX Security 14). :641--654.
2012
Doupé A, Cavedon L, Kruegel C, Vigna G.  2012.  Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner. 21st USENIX Security Symposium (USENIX Security 12). :523--538.
Jacob G, Kirda E, Kruegel C, Vigna G.  2012.  PUBCRAWL: Protecting Users and Businesses from CRAWLers. 21st USENIX Security Symposium (USENIX Security 12). :507--522.
2011
Stringhini G, Holz T, Stone-Gross B, Kruegel C, Vigna G.  2011.  BOTMAGNIFIER: Locating Spambots on the Internet. 20th USENIX Security Symposium (USENIX Security 11).
Jacob G, Hund R, Kruegel C, Holz T.  2011.  JACKSTRAWS: Picking Command and Control Connections from Bot Traffic. 20th USENIX Security Symposium (USENIX Security 11).
Kruegel C.  2011.  Opening Remarks. 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11).
2010
Puttaswamy KPN, Kruegel C.  2010.  Silverline: Toward Confidentiality in Third-Party Clouds. 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI 10).
Felmetsger V, Cavedon L, Kruegel C, Vigna G.  2010.  Toward Automated Detection of Logic Vulnerabilities in Web Applications. 19th USENIX Security Symposium (USENIX Security 10).

Pages