Biblio

Export 35 results:
Filters: Author is Christopher Kruegel  [Clear All Filters]
2023
Fleischer M, Das D, Bose P, Bai W, Lu K, Payer M, Kruegel C, Vigna G.  2023.  ACTOR: Action-Guided Kernel Fuzzing. 32nd USENIX Security Symposium (USENIX Security 23). :5003--5020.
Gritti F, Ruaro N, McLaughlin R, Bose P, Das D, Grishchenko I, Kruegel C, Vigna G.  2023.  Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart Contracts. 32nd USENIX Security Symposium (USENIX Security 23). :1793--1810.
McLaughlin R, Kruegel C, Vigna G.  2023.  A Large Scale Study of the Ethereum Arbitrage Ecosystem. 32nd USENIX Security Symposium (USENIX Security 23). :3295--3312.
2022
Burk K, Pagani F, Kruegel C, Vigna G.  2022.  Decomperson: How Humans Decompile and What We Can Learn From It. 31st USENIX Security Symposium (USENIX Security 22). :2765--2782.
Scharnowski T, Bars N, Schloegel M, Gustafson E, Muench M, Vigna G, Kruegel C, Holz T, Abbasi A.  2022.  Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing. 31st USENIX Security Symposium (USENIX Security 22). :1239--1256.
McLaughlin R, Pagani F, Spahn N, Kruegel C, Vigna G.  2022.  Regulator: Dynamic Analysis to Detect ReDoS. 31st USENIX Security Symposium (USENIX Security 22). :4219--4235.
2021
Salls C, Jindal C, Corina J, Kruegel C, Vigna G.  2021.  Token-Level Fuzzing. 30th USENIX Security Symposium (USENIX Security 21). :2795--2809.
2014
Kirat D, Vigna G, Kruegel C.  2014.  BareCloud: Bare-metal Analysis-based Evasive Malware Detection. 23rd USENIX Security Symposium (USENIX Security 14). :287--301.
Kapravelos A, Grier C, Chachra N, Kruegel C, Vigna G, Paxson V.  2014.  Hulk: Eliciting Malicious Behavior in Browser Extensions. 23rd USENIX Security Symposium (USENIX Security 14). :641--654.
2012
Doupé A, Cavedon L, Kruegel C, Vigna G.  2012.  Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner. 21st USENIX Security Symposium (USENIX Security 12). :523--538.
Jacob G, Kirda E, Kruegel C, Vigna G.  2012.  PUBCRAWL: Protecting Users and Businesses from CRAWLers. 21st USENIX Security Symposium (USENIX Security 12). :507--522.
2011
Stringhini G, Holz T, Stone-Gross B, Kruegel C, Vigna G.  2011.  BOTMAGNIFIER: Locating Spambots on the Internet. 20th USENIX Security Symposium (USENIX Security 11).
Jacob G, Hund R, Kruegel C, Holz T.  2011.  JACKSTRAWS: Picking Command and Control Connections from Bot Traffic. 20th USENIX Security Symposium (USENIX Security 11).

Pages