USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 18 results:
Filters: Author is Engin Kirda [Clear All Filters]
CO3: Concolic Co-execution for Firmware. 33rd USENIX Security Symposium (USENIX Security 24). :5591--5608.
.
2024. SHiFT: Semi-hosted Fuzz Testing for Embedded Applications. 33rd USENIX Security Symposium (USENIX Security 24). :5323--5340.
.
2024. A Study of Multi-Factor and Risk-Based Authentication Availability. 32nd USENIX Security Symposium (USENIX Security 23). :2043--2060.
.
2023. FRAMESHIFTER: Security Implications of HTTP/2-to-HTTP/1 Conversion Anomalies. 31st USENIX Security Symposium (USENIX Security 22). :1061--1075.
.
2022. Web Cache Deception Escalates!. 31st USENIX Security Symposium (USENIX Security 22). :179--196.
.
2022. Cached and Confused: Web Cache Deception in the Wild. 29th USENIX Security Symposium (USENIX Security 20). :665--682.
.
2020. What's in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation Techniques 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). :107--120.
.
2020. USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks. 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :89--103.
.
2019. UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware. 25th USENIX Security Symposium (USENIX Security 16). :757--772.
.
2016. ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities. 24th USENIX Security Symposium (USENIX Security 15). :737--752.
.
2015. A Look at Targeted Attacks Through the Lense of an NGO. 23rd USENIX Security Symposium (USENIX Security 14). :543--558.
.
2014. PUBCRAWL: Protecting Users and Businesses from CRAWLers. 21st USENIX Security Symposium (USENIX Security 12). :507--522.
.
2012. Honeybot, Your Man in the Middle for Automated Social Engineering. 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 10).
.
2010. A View on Current Malware Behaviors. 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 09).
.
2009. Dynamic Spyware Analysis. 2007 USENIX Annual Technical Conference (USENIX ATC 07).
.
2007. Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters. First USENIX Workshop on Offensive Technologies (WOOT 07).
.
2007. Behavior-based Spyware Detection. 15th USENIX Security Symposium (USENIX Security 06).
.
2006. Automating Mimicry Attacks Using Static Binary Analysis. 14th USENIX Security Symposium (USENIX Security 05).
.
2005.