Biblio

Export 35 results:
Filters: Author is Christopher Kruegel  [Clear All Filters]
2011
Kruegel C.  2011.  Opening Remarks. 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11).
2010
Puttaswamy KPN, Kruegel C.  2010.  Silverline: Toward Confidentiality in Third-Party Clouds. 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI 10).
Felmetsger V, Cavedon L, Kruegel C, Vigna G.  2010.  Toward Automated Detection of Logic Vulnerabilities in Web Applications. 19th USENIX Security Symposium (USENIX Security 10).
2008
Cova M, Kruegel C, Vigna G.  2008.  There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. 2nd USENIX Workshop on Offensive Technologies (WOOT 08).
2007
Egele M, Kruegel C, Kirda E, Yin H, Song D.  2007.  Dynamic Spyware Analysis. 2007 USENIX Annual Technical Conference (USENIX ATC 07).
Karlberger C, Bayler G, Kruegel C, Kirda E.  2007.  Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters. First USENIX Workshop on Offensive Technologies (WOOT 07).
2006
Kirda E, Kruegel C.  2006.  Behavior-based Spyware Detection. 15th USENIX Security Symposium (USENIX Security 06).
2005
Kruegel C, Kirda E, Mutz D, Robertson W, Vigna G.  2005.  Automating Mimicry Attacks Using Static Binary Analysis. 14th USENIX Security Symposium (USENIX Security 05).
2004
Kruegel C, Robertson W, Valeur F, Vigna G.  2004.  Static Disassembly of Obfuscated Binaries. 13th USENIX Security Symposium (USENIX Security 04).
2003
Robertson W, Kruegel C, Mutz D, Valeur F.  2003.  Run-time Detection of Heap-based Overflows. 17th Large Installation Systems Administration Conference (LISA 03).

Pages