USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 35 results:
Filters: Author is Christopher Kruegel [Clear All Filters]
ACTOR: Action-Guided Kernel Fuzzing. 32nd USENIX Security Symposium (USENIX Security 23). :5003--5020.
.
2023. Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart Contracts. 32nd USENIX Security Symposium (USENIX Security 23). :1793--1810.
.
2023. A Large Scale Study of the Ethereum Arbitrage Ecosystem. 32nd USENIX Security Symposium (USENIX Security 23). :3295--3312.
.
2023. Decomperson: How Humans Decompile and What We Can Learn From It. 31st USENIX Security Symposium (USENIX Security 22). :2765--2782.
.
2022. Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing. 31st USENIX Security Symposium (USENIX Security 22). :1239--1256.
.
2022. Regulator: Dynamic Analysis to Detect ReDoS. 31st USENIX Security Symposium (USENIX Security 22). :4219--4235.
.
2022. Token-Level Fuzzing. 30th USENIX Security Symposium (USENIX Security 21). :2795--2809.
.
2021. HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation. 29th USENIX Security Symposium (USENIX Security 20). :1201--1218.
.
2020. Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs? 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). :93--106.
.
2020. HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security. 27th USENIX Security Symposium (USENIX Security 18). :99--116.
.
2018. Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks. 27th USENIX Security Symposium (USENIX Security 18). :393--410.
.
2018. BootStomp: On the Security of Bootloaders in Mobile Devices. 26th USENIX Security Symposium (USENIX Security 17). :781--798.
.
2017. DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers. 26th USENIX Security Symposium (USENIX Security 17). :1007--1024.
.
2017. EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services. 24th USENIX Security Symposium (USENIX Security 15). :563--578.
.
2015. How the ELF Ruined Christmas. 24th USENIX Security Symposium (USENIX Security 15). :643--658.
.
2015. Meerkat: Detecting Website Defacements through Image-based Object Recognition. 24th USENIX Security Symposium (USENIX Security 15). :595--610.
.
2015. ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities. 24th USENIX Security Symposium (USENIX Security 15). :737--752.
.
2015. BareCloud: Bare-metal Analysis-based Evasive Malware Detection. 23rd USENIX Security Symposium (USENIX Security 14). :287--301.
.
2014. Hulk: Eliciting Malicious Behavior in Browser Extensions. 23rd USENIX Security Symposium (USENIX Security 14). :641--654.
.
2014. Revolver: An Automated Approach to the Detection of Evasive Web-based Malware. 22nd USENIX Security Symposium (USENIX Security 13). :637--652.
.
2013. Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services. 22nd USENIX Security Symposium (USENIX Security 13). :687--702.
.
2013. Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner. 21st USENIX Security Symposium (USENIX Security 12). :523--538.
.
2012. PUBCRAWL: Protecting Users and Businesses from CRAWLers. 21st USENIX Security Symposium (USENIX Security 12). :507--522.
.
2012. BOTMAGNIFIER: Locating Spambots on the Internet. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. JACKSTRAWS: Picking Command and Control Connections from Bot Traffic. 20th USENIX Security Symposium (USENIX Security 11).
.
2011.