Biblio

Export 10 results:
Filters: Author is William Robertson  [Clear All Filters]
2020
Mirheidari SAli, Arshad S, Onarlioglu K, Crispo B, Kirda E, Robertson W.  2020.  Cached and Confused: Web Cache Deception in the Wild. 29th USENIX Security Symposium (USENIX Security 20). :665--682.
Buyukkayhan ASalih, Gemicioglu C, Lauinger T, Oprea A, Robertson W, Kirda E.  2020.  What's in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation Techniques 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). :107--120.
2019
Kharraz A, Daley BL, Baker GZ, Robertson W, Kirda E.  2019.  USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks. 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :89--103.
2016
Bashir MAhmad, Arshad S, Robertson W, Wilson C.  2016.  Tracing Information Flows Between Ad Exchanges Using Retargeted Ads. 25th USENIX Security Symposium (USENIX Security 16). :481--496.
Kharaz A, Arshad S, Mulliner C, Robertson W, Kirda E.  2016.  UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware. 25th USENIX Security Symposium (USENIX Security 16). :757--772.
2005
Kruegel C, Kirda E, Mutz D, Robertson W, Vigna G.  2005.  Automating Mimicry Attacks Using Static Binary Analysis. 14th USENIX Security Symposium (USENIX Security 05).
2004
Kruegel C, Robertson W, Valeur F, Vigna G.  2004.  Static Disassembly of Obfuscated Binaries. 13th USENIX Security Symposium (USENIX Security 04).
2003
Robertson W, Kruegel C, Mutz D, Valeur F.  2003.  Run-time Detection of Heap-based Overflows. 17th Large Installation Systems Administration Conference (LISA 03).