Christopher Kruegel
Christopher Kruegel
Verified email at - Homepage
Cited by
Cited by
A survey on automated dynamic malware-analysis techniques and tools
M Egele, T Scholte, E Kirda, C Kruegel
ACM computing surveys (CSUR) 44 (2), 1-42, 2008
Sok:(state of) the art of war: Offensive techniques in binary analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
2016 IEEE symposium on security and privacy (SP), 138-157, 2016
Limits of static analysis for malware detection
A Moser, C Kruegel, E Kirda
Twenty-third annual computer security applications conference (ACSAC 2007 …, 2007
Driller: Augmenting fuzzing through selective symbolic execution.
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
NDSS 16 (2016), 1-16, 2016
Panorama: capturing system-wide information flow for malware detection and analysis
H Yin, D Song, M Egele, C Kruegel, E Kirda
Proceedings of the 14th ACM conference on Computer and communications …, 2007
Detecting spammers on social networks
G Stringhini, C Kruegel, G Vigna
Proceedings of the 26th annual computer security applications conference, 1-9, 2010
Pixy: A static analysis tool for detecting web application vulnerabilities
N Jovanovic, C Kruegel, E Kirda
2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-263, 2006
Anomaly detection of web-based attacks
C Kruegel, G Vigna
Proceedings of the 10th ACM conference on Computer and communications …, 2003
Your botnet is my botnet: analysis of a botnet takeover
B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, ...
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Scalable, behavior-based malware clustering.
U Bayer, PM Comparetti, C Hlauschek, C Kruegel, E Kirda
NDSS 9, 8-11, 2009
Detection and analysis of drive-by-download attacks and malicious JavaScript code
M Cova, C Kruegel, G Vigna
Proceedings of the 19th international conference on World wide web, 281-290, 2010
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.
L Bilge, E Kirda, C Kruegel, M Balduzzi
Ndss, 1-17, 2011
Exploring multiple execution paths for malware analysis
A Moser, C Kruegel, E Kirda
2007 IEEE Symposium on Security and Privacy (SP'07), 231-245, 2007
Cross site scripting prevention with dynamic data tainting and static analysis.
P Vogt, F Nentwich, N Jovanovic, E Kirda, C Kruegel, G Vigna
NDSS 2007, 12, 2007
Pios: Detecting privacy leaks in ios applications.
M Egele, C Kruegel, E Kirda, G Vigna
NDSS 2011, 18th, 2011
Comprehensive approach to intrusion detection alert correlation
F Valeur, G Vigna, C Kruegel, RA Kemmerer
IEEE Transactions on dependable and secure computing 1 (3), 146-169, 2004
Effective and efficient malware detection at the end host.
C Kolbitsch, PM Comparetti, C Kruegel, E Kirda, X Zhou, XF Wang
USENIX security symposium 4 (1), 351-366, 2009
Cookieless monster: Exploring the ecosystem of web-based device fingerprinting
N Nikiforakis, A Kapravelos, W Joosen, C Kruegel, F Piessens, G Vigna
2013 IEEE Symposium on Security and Privacy, 541-555, 2013
Mining specifications of malicious behavior
M Christodorescu, S Jha, C Kruegel
Proceedings of the the 6th joint meeting of the European software …, 2007
An empirical study of cryptographic misuse in android applications
M Egele, D Brumley, Y Fratantonio, C Kruegel
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20