Biblio

Export 39 results:
Filters: Author is Giovanni Vigna  [Clear All Filters]
2012
Stringhini G, Egele M, Zarras A, Holz T, Kruegel C, Vigna G.  2012.  B@bel: Leveraging Email Delivery for Spam Mitigation. 21st USENIX Security Symposium (USENIX Security 12). :16--32.
Doupé A, Cavedon L, Kruegel C, Vigna G.  2012.  Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner. 21st USENIX Security Symposium (USENIX Security 12). :523--538.
Jacob G, Kirda E, Kruegel C, Vigna G.  2012.  PUBCRAWL: Protecting Users and Businesses from CRAWLers. 21st USENIX Security Symposium (USENIX Security 12). :507--522.
2008
Vigna G, Massey D, Reiher P, Kang B.  2008.  Panel on Security Education. Workshop on Cyber Security Experimentation and Test (CSET 08).
Cova M, Kruegel C, Vigna G.  2008.  There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. 2nd USENIX Workshop on Offensive Technologies (WOOT 08).
2007
Van Gundy M, Balzarotti D, Vigna G.  2007.  Catch Me, If You Can: Evading Network Signatures with Web-based Polymorphic Worms. First USENIX Workshop on Offensive Technologies (WOOT 07).
Blaze M, Halderman A, Vigna G, Wallach D.  2007.  Panel: E-Voting. 16th USENIX Security Symposium (USENIX Security 07).
2005
Kruegel C, Kirda E, Mutz D, Robertson W, Vigna G.  2005.  Automating Mimicry Attacks Using Static Binary Analysis. 14th USENIX Security Symposium (USENIX Security 05).
2004
Kruegel C, Robertson W, Valeur F, Vigna G.  2004.  Static Disassembly of Obfuscated Binaries. 13th USENIX Security Symposium (USENIX Security 04).
2003
Soman S, Krintz C, Vigna G.  2003.  Detecting Malicious Java Code Using Virtual Machine Auditing. 12th USENIX Security Symposium (USENIX Security 03).

Pages