Biblio

Export 43 results:
Filters: Author is Giovanni Vigna  [Clear All Filters]
2014
Kapravelos A, Grier C, Chachra N, Kruegel C, Vigna G, Paxson V.  2014.  Hulk: Eliciting Malicious Behavior in Browser Extensions. 23rd USENIX Security Symposium (USENIX Security 14). :641--654.
Vigna G, Borgolte K, Corbetta J, Doupé A, Fratantonio Y, Invernizzi L, Kirat D, Shoshitaishvili Y.  2014.  Ten Years of iCTF: The Good, The Bad, and The Ugly. 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14).
2012
Stringhini G, Egele M, Zarras A, Holz T, Kruegel C, Vigna G.  2012.  B@bel: Leveraging Email Delivery for Spam Mitigation. 21st USENIX Security Symposium (USENIX Security 12). :16--32.
Doupé A, Cavedon L, Kruegel C, Vigna G.  2012.  Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner. 21st USENIX Security Symposium (USENIX Security 12). :523--538.
Jacob G, Kirda E, Kruegel C, Vigna G.  2012.  PUBCRAWL: Protecting Users and Businesses from CRAWLers. 21st USENIX Security Symposium (USENIX Security 12). :507--522.
2008
Vigna G, Massey D, Reiher P, Kang B.  2008.  Panel on Security Education. Workshop on Cyber Security Experimentation and Test (CSET 08).
Cova M, Kruegel C, Vigna G.  2008.  There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. 2nd USENIX Workshop on Offensive Technologies (WOOT 08).
2007
Van Gundy M, Balzarotti D, Vigna G.  2007.  Catch Me, If You Can: Evading Network Signatures with Web-based Polymorphic Worms. First USENIX Workshop on Offensive Technologies (WOOT 07).
Blaze M, Halderman A, Vigna G, Wallach D.  2007.  Panel: E-Voting. 16th USENIX Security Symposium (USENIX Security 07).
2005
Kruegel C, Kirda E, Mutz D, Robertson W, Vigna G.  2005.  Automating Mimicry Attacks Using Static Binary Analysis. 14th USENIX Security Symposium (USENIX Security 05).
2004
Kruegel C, Robertson W, Valeur F, Vigna G.  2004.  Static Disassembly of Obfuscated Binaries. 13th USENIX Security Symposium (USENIX Security 04).
2003
Soman S, Krintz C, Vigna G.  2003.  Detecting Malicious Java Code Using Virtual Machine Auditing. 12th USENIX Security Symposium (USENIX Security 03).

Pages