Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Giovanni Vigna
@inproceedings{DBLP:conf/eurosp/PletinckxNFKV23, author = {Stijn Pletinckx and Thanh{-}Dat Nguyen and Tobias Fiebig and Christopher Kruegel and Giovanni Vigna}, title = {Certifiably Vulnerable: Using Certificate Transparency Logs for Target Reconnaissance}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {817--831}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00053}, doi = {10.1109/EUROSP57164.2023.00053}, timestamp = {Mon, 07 Aug 2023 15:56:23 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/PletinckxNFKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/BoseDVMGCBKV23, author = {Priyanka Bose and Dipanjan Das and Saastha Vasan and Sebastiano Mariani and Ilya Grishchenko and Andrea Continella and Antonio Bianchi and Christopher Kruegel and Giovanni Vigna}, title = {Columbus: Android App Testing Through Systematic Callback Exploration}, booktitle = {45th {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2023, Melbourne, Australia, May 14-20, 2023}, pages = {1381--1392}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICSE48619.2023.00121}, doi = {10.1109/ICSE48619.2023.00121}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/BoseDVMGCBKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GustafsonGRJC0F23, author = {Eric Gustafson and Paul Grosen and Nilo Redini and Saagar Jha and Andrea Continella and Ruoyu Wang and Kevin Fu and Sara Rampazzi and Christopher Kruegel and Giovanni Vigna}, title = {Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {32--45}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607217}, doi = {10.1145/3607199.3607217}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GustafsonGRJC0F23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SpahnHHKV23, author = {Noah Spahn and Nils Hanke and Thorsten Holz and Christopher Kruegel and Giovanni Vigna}, title = {Container Orchestration Honeypot: Observing Attacks in the Wild}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {381--396}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607205}, doi = {10.1145/3607199.3607205}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SpahnHHKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BuschMSVKP23, author = {Marcel Busch and Aravind Machiry and Chad Spensky and Giovanni Vigna and Christopher Kruegel and Mathias Payer}, title = {TEEzz: Fuzzing Trusted Applications on {COTS} Android Devices}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {1204--1219}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179302}, doi = {10.1109/SP46215.2023.10179302}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/BuschMSVKP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/TrickelPZDVKWBSD23, author = {Erik Trickel and Fabio Pagani and Chang Zhu and Lukas Dresel and Giovanni Vigna and Christopher Kruegel and Ruoyu Wang and Tiffany Bao and Yan Shoshitaishvili and Adam Doup{\'{e}}}, title = {Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect {SQL} and Command Injection Vulnerabilities}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {2658--2675}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179317}, doi = {10.1109/SP46215.2023.10179317}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/TrickelPZDVKWBSD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GrittiRMB0GKV23, author = {Fabio Gritti and Nicola Ruaro and Robert McLaughlin and Priyanka Bose and Dipanjan Das and Ilya Grishchenko and Christopher Kruegel and Giovanni Vigna}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart Contracts}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {1793--1810}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/gritti}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/GrittiRMB0GKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/McLaughlinKV23, author = {Robert McLaughlin and Christopher Kruegel and Giovanni Vigna}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {A Large Scale Study of the Ethereum Arbitrage Ecosystem}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {3295--3312}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/mclaughlin}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/McLaughlinKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Fleischer0BBLPK23, author = {Marius Fleischer and Dipanjan Das and Priyanka Bose and Weiheng Bai and Kangjie Lu and Mathias Payer and Christopher Kruegel and Giovanni Vigna}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {{ACTOR:} Action-Guided Kernel Fuzzing}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5003--5020}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/fleischer}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Fleischer0BBLPK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-02344, author = {Hojjat Aghakhani and Wei Dai and Andre Manoel and Xavier Fernandes and Anant Kharkar and Christopher Kruegel and Giovanni Vigna and David Evans and Ben Zorn and Robert Sim}, title = {TrojanPuzzle: Covertly Poisoning Code-Suggestion Models}, journal = {CoRR}, volume = {abs/2301.02344}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.02344}, doi = {10.48550/ARXIV.2301.02344}, eprinttype = {arXiv}, eprint = {2301.02344}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-02344.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-09806, author = {Sayak Saha Roy and Dipanjan Das and Priyanka Bose and Christopher Kruegel and Giovanni Vigna and Shirin Nilizadeh}, title = {Demystifying {NFT} Promotion and Phishing Scams}, journal = {CoRR}, volume = {abs/2301.09806}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.09806}, doi = {10.48550/ARXIV.2301.09806}, eprinttype = {arXiv}, eprint = {2301.09806}, timestamp = {Thu, 26 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-09806.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-09116, author = {Priyanka Bose and Dipanjan Das and Saastha Vasan and Sebastiano Mariani and Ilya Grishchenko and Andrea Continella and Antonio Bianchi and Christopher Kruegel and Giovanni Vigna}, title = {Columbus: Android App Testing Through Systematic Callback Exploration}, journal = {CoRR}, volume = {abs/2302.09116}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.09116}, doi = {10.48550/ARXIV.2302.09116}, eprinttype = {arXiv}, eprint = {2302.09116}, timestamp = {Thu, 23 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-09116.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-02103, author = {Christopher Salls and Chani Jindal and Jake Corina and Christopher Kruegel and Giovanni Vigna}, title = {Token-Level Fuzzing}, journal = {CoRR}, volume = {abs/2304.02103}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.02103}, doi = {10.48550/ARXIV.2304.02103}, eprinttype = {arXiv}, eprint = {2304.02103}, timestamp = {Mon, 17 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-02103.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-06844, author = {Priyanka Bose and Dipanjan Das and Fabio Gritti and Nicola Ruaro and Christopher Kruegel and Giovanni Vigna}, title = {Exploiting Unfair Advantages: Investigating Opportunistic Trading in the {NFT} Market}, journal = {CoRR}, volume = {abs/2310.06844}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.06844}, doi = {10.48550/ARXIV.2310.06844}, eprinttype = {arXiv}, eprint = {2310.06844}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-06844.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HauserNSTRKV23, author = {Christophe Hauser and Shirin Nilizadeh and Yan Shoshitaishvili and Ni Trieu and Srivatsan Ravi and Christopher Kruegel and Giovanni Vigna}, title = {Street Rep: {A} Privacy-Preserving Reputation Aggregation System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1346}, year = {2023}, url = {https://eprint.iacr.org/2023/1346}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HauserNSTRKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GuptaDSVKK22, author = {Rajat Gupta and Lukas Patrick Dresel and Noah Spahn and Giovanni Vigna and Christopher Kruegel and Taesoo Kim}, title = {{POPKORN:} Popping Windows Kernel Drivers At Scale}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {854--868}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564631}, doi = {10.1145/3564625.3564631}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GuptaDSVKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0002BRKV22, author = {Dipanjan Das and Priyanka Bose and Nicola Ruaro and Christopher Kruegel and Giovanni Vigna}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Understanding Security Issues in the {NFT} Ecosystem}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {667--681}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3559342}, doi = {10.1145/3548606.3559342}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0002BRKV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/DasBMMSVK22, author = {Dipanjan Das and Priyanka Bose and Aravind Machiry and Sebastiano Mariani and Yan Shoshitaishvili and Giovanni Vigna and Christopher Kruegel}, editor = {Lorenzo Cavallaro and Daniel Gruss and Giancarlo Pellegrino and Giorgio Giacinto}, title = {Hybrid Pruning: Towards Precise Pointer and Taint Analysis}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 19th International Conference, {DIMVA} 2022, Cagliari, Italy, June 29 - July 1, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13358}, pages = {1--22}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09484-2\_1}, doi = {10.1007/978-3-031-09484-2\_1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/DasBMMSVK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Bose0C0KV22, author = {Priyanka Bose and Dipanjan Das and Yanju Chen and Yu Feng and Christopher Kruegel and Giovanni Vigna}, title = {{SAILFISH:} Vetting Smart Contract State-Inconsistency Bugs in Seconds}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {161--178}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833721}, doi = {10.1109/SP46214.2022.9833721}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Bose0C0KV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/EdeASBCCSPKV22, author = {Thijs van Ede and Hojjat Aghakhani and Noah Spahn and Riccardo Bortolameotti and Marco Cova and Andrea Continella and Maarten van Steen and Andreas Peter and Christopher Kruegel and Giovanni Vigna}, title = {{DEEPCASE:} Semi-Supervised Contextual Analysis of Security Events}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {522--539}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833671}, doi = {10.1109/SP46214.2022.9833671}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/EdeASBCCSPKV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RuaroPOKV22, author = {Nicola Ruaro and Fabio Pagani and Stefano Ortolani and Christopher Kruegel and Giovanni Vigna}, title = {{SYMBEXCEL:} Automated Analysis and Understanding of Malicious Excel 4.0 Macros}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {1066--1081}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833765}, doi = {10.1109/SP46214.2022.9833765}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/RuaroPOKV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GrittiPGDRKV22, author = {Fabio Gritti and Fabio Pagani and Ilya Grishchenko and Lukas Dresel and Nilo Redini and Christopher Kruegel and Giovanni Vigna}, title = {{HEAPSTER:} Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {1082--1099}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833610}, doi = {10.1109/SP46214.2022.9833610}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/GrittiPGDRKV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ScharnowskiBSGM22, author = {Tobias Scharnowski and Nils Bars and Moritz Schloegel and Eric Gustafson and Marius Muench and Giovanni Vigna and Christopher Kruegel and Thorsten Holz and Ali Abbasi}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Fuzzware: Using Precise {MMIO} Modeling for Effective Firmware Fuzzing}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {1239--1256}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/scharnowski}, timestamp = {Thu, 16 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ScharnowskiBSGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BurkPKV22, author = {Kevin Burk and Fabio Pagani and Christopher Kruegel and Giovanni Vigna}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Decomperson: How Humans Decompile and What We Can Learn From It}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {2765--2782}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/burk}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BurkPKV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/McLaughlinPSKV22, author = {Robert McLaughlin and Fabio Pagani and Noah Spahn and Christopher Kruegel and Giovanni Vigna}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Regulator: Dynamic Analysis to Detect ReDoS}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {4219--4235}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/mclaughlin}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/McLaughlinPSKV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BotacinAOKVOGG21, author = {Marcus Botacin and Hojjat Aghakhani and Stefano Ortolani and Christopher Kruegel and Giovanni Vigna and Daniela Oliveira and Paulo L{\'{\i}}cio de Geus and Andr{\'{e}} Gr{\'{e}}gio}, title = {One Size Does Not Fit All: {A} Longitudinal Analysis of Brazilian Financial Malware}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {2}, pages = {11:1--11:31}, year = {2021}, url = {https://doi.org/10.1145/3429741}, doi = {10.1145/3429741}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BotacinAOKVOGG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/SpenskyMRUFBOKV21, author = {Chad Spensky and Aravind Machiry and Nilo Redini and Colin Unger and Graham Foster and Evan Blasband and Hamed Okhravi and Christopher Kruegel and Giovanni Vigna}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {Conware: Automated Modeling of Hardware Peripherals}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {95--109}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3437532}, doi = {10.1145/3433210.3437532}, timestamp = {Wed, 09 Jun 2021 15:14:39 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/SpenskyMRUFBOKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/MengGMABCKV21, author = {Dongyu Meng and Michele Guerriero and Aravind Machiry and Hojjat Aghakhani and Priyanka Bose and Andrea Continella and Christopher Kruegel and Giovanni Vigna}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {731--743}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3453115}, doi = {10.1145/3433210.3453115}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiaccs/MengGMABCKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/QuartaIMFGBLVK21, author = {Davide Quarta and Michele Ianni and Aravind Machiry and Yanick Fratantonio and Eric Gustafson and Davide Balzarotti and Martina Lindorfer and Giovanni Vigna and Christopher Kruegel}, editor = {Christophe Hauser and Yonghwi Kwon and Sebastian Banescu}, title = {Tarnhelm: Isolated, Transparent {\&} Confidential Execution of Arbitrary Code in ARM's TrustZone}, booktitle = {Checkmate@CCS 2021, Proceedings of the Research on offensive and defensive techniques in the Context of Man At The End {(MATE)} Attacks, Virtual Event, Republic of Korea, 19 November 2021}, pages = {43--57}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3465413.3488571}, doi = {10.1145/3465413.3488571}, timestamp = {Tue, 23 Nov 2021 15:54:42 +0100}, biburl = {https://dblp.org/rec/conf/ccs/QuartaIMFGBLVK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/SpenskyMBOHGJKV21, author = {Chad Spensky and Aravind Machiry and Nathan Burow and Hamed Okhravi and Rick Housley and Zhongshu Gu and Hani Jamjoom and Christopher Kruegel and Giovanni Vigna}, title = {Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {400--412}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN48987.2021.00051}, doi = {10.1109/DSN48987.2021.00051}, timestamp = {Mon, 09 Aug 2021 14:50:25 +0200}, biburl = {https://dblp.org/rec/conf/dsn/SpenskyMBOHGJKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/AghakhaniMWKV21, author = {Hojjat Aghakhani and Dongyu Meng and Yu{-}Xiang Wang and Christopher Kruegel and Giovanni Vigna}, title = {Bullseye Polytope: {A} Scalable Clean-Label Poisoning Attack with Improved Transferability}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {159--178}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSP51992.2021.00021}, doi = {10.1109/EUROSP51992.2021.00021}, timestamp = {Thu, 11 Nov 2021 09:11:58 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/AghakhaniMWKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RuaroZDPBCZKV21, author = {Nicola Ruaro and Kyle Zeng and Lukas Dresel and Mario Polino and Tiffany Bao and Andrea Continella and Stefano Zanero and Christopher Kruegel and Giovanni Vigna}, editor = {Leyla Bilge and Tudor Dumitras}, title = {SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {456--468}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471865}, doi = {10.1145/3471621.3471865}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/RuaroZDPBCZKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RediniCDPSMBKV21, author = {Nilo Redini and Andrea Continella and Dipanjan Das and Giulio De Pasquale and Noah Spahn and Aravind Machiry and Antonio Bianchi and Christopher Kruegel and Giovanni Vigna}, title = {Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {484--500}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00066}, doi = {10.1109/SP40001.2021.00066}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/RediniCDPSMBKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SallsJCKV21, author = {Christopher Salls and Chani Jindal and Jake Corina and Christopher Kruegel and Giovanni Vigna}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Token-Level Fuzzing}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2795--2809}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/salls}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/SallsJCKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GargMCKV21, author = {Chinmay Garg and Aravind Machiry and Andrea Continella and Christopher Kruegel and Giovanni Vigna}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Toward a secure crowdsourced location tracking system}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {311--322}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467821}, doi = {10.1145/3448300.3467821}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/GargMCKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2021, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120}, doi = {10.1145/3460120}, isbn = {978-1-4503-8454-4}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-08638, author = {Priyanka Bose and Dipanjan Das and Yanju Chen and Yu Feng and Christopher Kruegel and Giovanni Vigna}, title = {{SAILFISH:} Vetting Smart Contract State-Inconsistency Bugs in Seconds}, journal = {CoRR}, volume = {abs/2104.08638}, year = {2021}, url = {https://arxiv.org/abs/2104.08638}, eprinttype = {arXiv}, eprint = {2104.08638}, timestamp = {Mon, 28 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-08638.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-00217, author = {Chinmay Garg and Aravind Machiry and Andrea Continella and Christopher Kruegel and Giovanni Vigna}, title = {Toward a Secure Crowdsourced Location Tracking System}, journal = {CoRR}, volume = {abs/2106.00217}, year = {2021}, url = {https://arxiv.org/abs/2106.00217}, eprinttype = {arXiv}, eprint = {2106.00217}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-00217.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-08893, author = {Dipanjan Das and Priyanka Bose and Nicola Ruaro and Christopher Kruegel and Giovanni Vigna}, title = {Understanding Security Issues in the {NFT} Ecosystem}, journal = {CoRR}, volume = {abs/2111.08893}, year = {2021}, url = {https://arxiv.org/abs/2111.08893}, eprinttype = {arXiv}, eprint = {2111.08893}, timestamp = {Mon, 22 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-08893.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GrittiFGPCKV20, author = {Fabio Gritti and Lorenzo Fontana and Eric Gustafson and Fabio Pagani and Andrea Continella and Christopher Kruegel and Giovanni Vigna}, title = {{SYMBION:} Interleaving Symbolic with Concrete Execution}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--10}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162164}, doi = {10.1109/CNS48642.2020.9162164}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GrittiFGPCKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SallsMDSKV20, author = {Christopher Salls and Aravind Machiry and Adam Doup{\'{e}} and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, title = {Exploring Abstraction Functions in Fuzzing}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162273}, doi = {10.1109/CNS48642.2020.9162273}, timestamp = {Fri, 14 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SallsMDSKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SpenskyMBLHKV20, author = {Chad Spensky and Aravind Machiry and Marcel Busch and Kevin Leach and Rick Housley and Christopher Kruegel and Giovanni Vigna}, title = {{TRUST.IO:} Protecting Physical Interfaces on Cyber-physical Systems}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162246}, doi = {10.1109/CNS48642.2020.9162246}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SpenskyMBLHKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/BotacinBGGKV20, author = {Marcus Botacin and Giovanni Bert{\~{a}}o and Paulo L. de Geus and Andr{\'{e}} Gr{\'{e}}gio and Christopher Kruegel and Giovanni Vigna}, editor = {Cl{\'{e}}mentine Maurice and Leyla Bilge and Gianluca Stringhini and Nuno Neves}, title = {On the Security of Application Installers and Online Software Repositories}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 17th International Conference, {DIMVA} 2020, Lisbon, Portugal, June 24-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12223}, pages = {192--214}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-52683-2\_10}, doi = {10.1007/978-3-030-52683-2\_10}, timestamp = {Sun, 25 Jul 2021 11:49:24 +0200}, biburl = {https://dblp.org/rec/conf/dimva/BotacinBGGKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AghakhaniGMLOBV20, author = {Hojjat Aghakhani and Fabio Gritti and Francesco Mecca and Martina Lindorfer and Stefano Ortolani and Davide Balzarotti and Giovanni Vigna and Christopher Kruegel}, title = {When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/when-malware-is-packin-heat-limits-of-machine-learning-classifiers-based-on-static-analysis-features/}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/AghakhaniGMLOBV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TakahashiKVYI20, author = {Takeshi Takahashi and Christopher Kruegel and Giovanni Vigna and Katsunari Yoshioka and Daisuke Inoue}, editor = {Manuel Egele and Leyla Bilge}, title = {Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {93--106}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/takahashi}, timestamp = {Mon, 30 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TakahashiKVYI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RediniM0SCSKV20, author = {Nilo Redini and Aravind Machiry and Ruoyu Wang and Chad Spensky and Andrea Continella and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, title = {Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {1544--1561}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00036}, doi = {10.1109/SP40000.2020.00036}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/RediniM0SCSKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MachiryRCKV20, author = {Aravind Machiry and Nilo Redini and Eric Camellini and Christopher Kruegel and Giovanni Vigna}, title = {{SPIDER:} Enabling Fast Patch Propagation In Related Software Repositories}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {1562--1579}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00038}, doi = {10.1109/SP40000.2020.00038}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/MachiryRCKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ClementsGSGFKVB20, author = {Abraham A. Clements and Eric Gustafson and Tobias Scharnowski and Paul Grosen and David Fritz and Christopher Kruegel and Giovanni Vigna and Saurabh Bagchi and Mathias Payer}, editor = {Srdjan Capkun and Franziska Roesner}, title = {HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {1201--1218}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/clements}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/ClementsGSGFKVB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/Sanchez-RolaBKV20, author = {Iskander S{\'{a}}nchez{-}Rola and Davide Balzarotti and Christopher Kruegel and Giovanni Vigna and Igor Santos}, editor = {Yennun Huang and Irwin King and Tie{-}Yan Liu and Maarten van Steen}, title = {Dirty Clicks: {A} Study of the Usability and Security Implications of Click-related Behaviors on the Web}, booktitle = {{WWW} '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020}, pages = {395--406}, publisher = {{ACM} / {IW3C2}}, year = {2020}, url = {https://doi.org/10.1145/3366423.3380124}, doi = {10.1145/3366423.3380124}, timestamp = {Fri, 25 Dec 2020 01:14:58 +0100}, biburl = {https://dblp.org/rec/conf/www/Sanchez-RolaBKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2020, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297}, doi = {10.1145/3372297}, isbn = {978-1-4503-7089-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-00191, author = {Hojjat Aghakhani and Dongyu Meng and Yu{-}Xiang Wang and Christopher Kruegel and Giovanni Vigna}, title = {Bullseye Polytope: {A} Scalable Clean-Label Poisoning Attack with Improved Transferability}, journal = {CoRR}, volume = {abs/2005.00191}, year = {2020}, url = {https://arxiv.org/abs/2005.00191}, eprinttype = {arXiv}, eprint = {2005.00191}, timestamp = {Thu, 30 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-00191.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-10682, author = {Hojjat Aghakhani and Thorsten Eisenhofer and Lea Sch{\"{o}}nherr and Dorothea Kolossa and Thorsten Holz and Christopher Kruegel and Giovanni Vigna}, title = {{VENOMAVE:} Clean-Label Poisoning Against Speech Recognition}, journal = {CoRR}, volume = {abs/2010.10682}, year = {2020}, url = {https://arxiv.org/abs/2010.10682}, eprinttype = {arXiv}, eprint = {2010.10682}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-10682.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HauserMS0VK19, author = {Christophe Hauser and Jayakrishna Menon and Yan Shoshitaishvili and Ruoyu Wang and Giovanni Vigna and Christopher Kruegel}, editor = {David Balenson}, title = {Sleak: automating address space layout derandomization}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {190--202}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359820}, doi = {10.1145/3359789.3359820}, timestamp = {Tue, 26 Nov 2019 09:46:34 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HauserMS0VK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JindalSALKV19, author = {Chani Jindal and Christopher Salls and Hojjat Aghakhani and Keith Long and Christopher Kruegel and Giovanni Vigna}, editor = {David Balenson}, title = {Neurlux: dynamic malware analysis without feature engineering}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {444--455}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359835}, doi = {10.1145/3359789.3359835}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/JindalSALKV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ChevalierCHS0KV19, author = {Ronny Chevalier and Stefano Cristalli and Christophe Hauser and Yan Shoshitaishvili and Ruoyu Wang and Christopher Kruegel and Giovanni Vigna and Danilo Bruschi and Andrea Lanzi}, editor = {Gail{-}Joon Ahn and Bhavani Thuraisingham and Murat Kantarcioglu and Ram Krishnan}, title = {BootKeeper: Validating Software Integrity Properties on Boot Firmware Images}, booktitle = {Proceedings of the Ninth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27, 2019}, pages = {315--325}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3292006.3300026}, doi = {10.1145/3292006.3300026}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ChevalierCHS0KV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/Redini0MSVK19, author = {Nilo Redini and Ruoyu Wang and Aravind Machiry and Yan Shoshitaishvili and Giovanni Vigna and Christopher Kruegel}, editor = {Roberto Perdisci and Cl{\'{e}}mentine Maurice and Giorgio Giacinto and Magnus Almgren}, title = {BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11543}, pages = {482--501}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22038-9\_23}, doi = {10.1007/978-3-030-22038-9\_23}, timestamp = {Tue, 29 Dec 2020 18:36:17 +0100}, biburl = {https://dblp.org/rec/conf/dimva/Redini0MSVK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SongH0SNVVKSF19, author = {Dokyung Song and Felicitas Hetzelt and Dipanjan Das and Chad Spensky and Yeoul Na and Stijn Volckaert and Giovanni Vigna and Christopher Kruegel and Jean{-}Pierre Seifert and Michael Franz}, title = {PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/periscope-an-effective-probing-and-fuzzing-framework-for-the-hardware-os-boundary/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/SongH0SNVVKSF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GustafsonMSRMFB19, author = {Eric Gustafson and Marius Muench and Chad Spensky and Nilo Redini and Aravind Machiry and Yanick Fratantonio and Davide Balzarotti and Aur{\'{e}}lien Francillon and Yung Ryn Choe and Christopher Kruegel and Giovanni Vigna}, title = {Toward the Analysis of Embedded Firmware through Automated Re-hosting}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {135--150}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/gustafson}, timestamp = {Wed, 10 Feb 2021 22:02:04 +0100}, biburl = {https://dblp.org/rec/conf/raid/GustafsonMSRMFB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/NilizadehAGKV19a, author = {Shirin Nilizadeh and Hojjat Aghakhani and Eric Gustafson and Christopher Kruegel and Giovanni Vigna}, editor = {Sihem Amer{-}Yahia and Mohammad Mahdian and Ashish Goel and Geert{-}Jan Houben and Kristina Lerman and Julian J. McAuley and Ricardo Baeza{-}Yates and Leila Zia}, title = {Lightning Talk - Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis}, booktitle = {Companion of The 2019 World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA, May 13-17, 2019}, pages = {1288--1289}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3308560.3316477}, doi = {10.1145/3308560.3316477}, timestamp = {Sun, 22 Sep 2019 18:15:38 +0200}, biburl = {https://dblp.org/rec/conf/www/NilizadehAGKV19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/NilizadehAGKV19, author = {Shirin Nilizadeh and Hojjat Aghakhani and Eric Gustafson and Christopher Kruegel and Giovanni Vigna}, editor = {Ling Liu and Ryen W. White and Amin Mantrach and Fabrizio Silvestri and Julian J. McAuley and Ricardo Baeza{-}Yates and Leila Zia}, title = {Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis}, booktitle = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA, May 13-17, 2019}, pages = {3108--3115}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3308558.3313647}, doi = {10.1145/3308558.3313647}, timestamp = {Sun, 22 Sep 2019 18:12:47 +0200}, biburl = {https://dblp.org/rec/conf/www/NilizadehAGKV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-12505, author = {Ronny Chevalier and Stefano Cristalli and Christophe Hauser and Yan Shoshitaishvili and Ruoyu Wang and Christopher Kruegel and Giovanni Vigna and Danilo Bruschi and Andrea Lanzi}, title = {BootKeeper: Validating Software Integrity Properties on Boot Firmware Images}, journal = {CoRR}, volume = {abs/1903.12505}, year = {2019}, url = {http://arxiv.org/abs/1903.12505}, eprinttype = {arXiv}, eprint = {1903.12505}, timestamp = {Tue, 02 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-12505.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-11376, author = {Chani Jindal and Christopher Salls and Hojjat Aghakhani and Keith Long and Christopher Kruegel and Giovanni Vigna}, title = {Neurlux: Dynamic Malware Analysis Without Feature Engineering}, journal = {CoRR}, volume = {abs/1910.11376}, year = {2019}, url = {http://arxiv.org/abs/1910.11376}, eprinttype = {arXiv}, eprint = {1910.11376}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-11376.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Shoshitaishvili18, author = {Yan Shoshitaishvili and Antonio Bianchi and Kevin Borgolte and Amat Cama and Jacopo Corbetta and Francesco Disperati and Andrew Dutcher and John Grosen and Paul Grosen and Aravind Machiry and Christopher Salls and Nick Stephens and Ruoyu Wang and Giovanni Vigna}, title = {Mechanical Phish: Resilient Autonomous Hacking}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {2}, pages = {12--22}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1870858}, doi = {10.1109/MSP.2018.1870858}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Shoshitaishvili18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MachiryRGFCKV18, author = {Aravind Machiry and Nilo Redini and Eric Gustafson and Yanick Fratantonio and Yung Ryn Choe and Christopher Kruegel and Giovanni Vigna}, title = {Using Loops For Malware Classification Resilient to Feature-unaware Perturbations}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {112--123}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274731}, doi = {10.1145/3274694.3274731}, timestamp = {Wed, 05 Dec 2018 09:44:25 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MachiryRGFCKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/anrw/BorgolteFHKV18, author = {Kevin Borgolte and Tobias Fiebig and Shuang Hao and Christopher Kruegel and Giovanni Vigna}, title = {Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates}, booktitle = {Proceedings of the Applied Networking Research Workshop, {ANRW} 2018, Montreal, QC, Canada, July 16-16, 2018}, pages = {4}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3232755.3232859}, doi = {10.1145/3232755.3232859}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/anrw/BorgolteFHKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KonothVMLKBV18, author = {Radhesh Krishnan Konoth and Emanuele Vineti and Veelasha Moonsamy and Martina Lindorfer and Christopher Kruegel and Herbert Bos and Giovanni Vigna}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1714--1730}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243858}, doi = {10.1145/3243734.3243858}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KonothVMLKBV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/VeenLFPVKBR18, author = {Victor van der Veen and Martina Lindorfer and Yanick Fratantonio and Harikrishnan Padmanabha Pillai and Giovanni Vigna and Christopher Kruegel and Herbert Bos and Kaveh Razavi}, editor = {Cristiano Giuffrida and S{\'{e}}bastien Bardin and Gregory Blanc}, title = {GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on {ARM}}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, {DIMVA} 2018, Saclay, France, June 28-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10885}, pages = {92--113}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93411-2\_5}, doi = {10.1007/978-3-319-93411-2\_5}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/VeenLFPVKBR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwsm/ElSheriefNNVB18, author = {Mai ElSherief and Shirin Nilizadeh and Dana Nguyen and Giovanni Vigna and Elizabeth M. Belding}, title = {Peer to Peer Hate: Hate Speech Instigators and Their Targets}, booktitle = {Proceedings of the Twelfth International Conference on Web and Social Media, {ICWSM} 2018, Stanford, California, USA, June 25-28, 2018}, pages = {52--61}, publisher = {{AAAI} Press}, year = {2018}, url = {https://aaai.org/ocs/index.php/ICWSM/ICWSM18/paper/view/17905}, timestamp = {Fri, 05 Feb 2021 11:07:47 +0100}, biburl = {https://dblp.org/rec/conf/icwsm/ElSheriefNNVB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BianchiFMKVCL18, author = {Antonio Bianchi and Yanick Fratantonio and Aravind Machiry and Christopher Kruegel and Giovanni Vigna and Simon Pak Ho Chung and Wenke Lee}, title = {Broken Fingers: On the Usage of the Fingerprint {API} in Android}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_03B-1\_Bianchi\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/BianchiFMKVCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BorgolteFHKV18, author = {Kevin Borgolte and Tobias Fiebig and Shuang Hao and Christopher Kruegel and Giovanni Vigna}, title = {Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_06A-4\_Borgolte\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/BorgolteFHKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/FiebigBHKVF18, author = {Tobias Fiebig and Kevin Borgolte and Shuang Hao and Christopher Kruegel and Giovanni Vigna and Anja Feldmann}, editor = {Robert Beverly and Georgios Smaragdakis and Anja Feldmann}, title = {In rDNS We Trust: Revisiting a Common Data-Source's Reliability}, booktitle = {Passive and Active Measurement - 19th International Conference, {PAM} 2018, Berlin, Germany, March 26-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10771}, pages = {131--145}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76481-8\_10}, doi = {10.1007/978-3-319-76481-8\_10}, timestamp = {Sat, 30 Sep 2023 09:54:28 +0200}, biburl = {https://dblp.org/rec/conf/pam/FiebigBHKVF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ChandramouliBKV18, author = {Sai Prashanth Chandramouli and Pierre{-}Marie Bajan and Christopher Kruegel and Giovanni Vigna and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, editor = {Hisham M. Haddad and Roger L. Wainwright and Richard Chbeir}, title = {Measuring E-mail header injections on the world wide web}, booktitle = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing, {SAC} 2018, Pau, France, April 09-13, 2018}, pages = {1647--1656}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3167132.3167308}, doi = {10.1145/3167132.3167308}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/ChandramouliBKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AghakhaniMNKV18, author = {Hojjat Aghakhani and Aravind Machiry and Shirin Nilizadeh and Christopher Kruegel and Giovanni Vigna}, title = {Detecting Deceptive Reviews Using Generative Adversarial Networks}, booktitle = {2018 {IEEE} Security and Privacy Workshops, {SP} Workshops 2018, San Francisco, CA, USA, May 24, 2018}, pages = {89--95}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SPW.2018.00022}, doi = {10.1109/SPW.2018.00022}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/sp/AghakhaniMNKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BorgolteHFV18, author = {Kevin Borgolte and Shuang Hao and Tobias Fiebig and Giovanni Vigna}, title = {Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {770--784}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00027}, doi = {10.1109/SP.2018.00027}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BorgolteHFV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/EckertB0SKV18, author = {Moritz Eckert and Antonio Bianchi and Ruoyu Wang and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, editor = {William Enck and Adrienne Porter Felt}, title = {HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {99--116}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/eckert}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/EckertB0SKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0001QHBVKL18, author = {Wei Meng and Chenxiong Qian and Shuang Hao and Kevin Borgolte and Giovanni Vigna and Christopher Kruegel and Wenke Lee}, editor = {William Enck and Adrienne Porter Felt}, title = {Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {393--410}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/meng}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/0001QHBVKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-04649, author = {Mai ElSherief and Shirin Nilizadeh and Dana Nguyen and Giovanni Vigna and Elizabeth M. Belding}, title = {Peer to Peer Hate: Hate Speech Instigators and Their Targets}, journal = {CoRR}, volume = {abs/1804.04649}, year = {2018}, url = {http://arxiv.org/abs/1804.04649}, eprinttype = {arXiv}, eprint = {1804.04649}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-04649.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-10364, author = {Hojjat Aghakhani and Aravind Machiry and Shirin Nilizadeh and Christopher Kruegel and Giovanni Vigna}, title = {Detecting Deceptive Reviews using Generative Adversarial Networks}, journal = {CoRR}, volume = {abs/1805.10364}, year = {2018}, url = {http://arxiv.org/abs/1805.10364}, eprinttype = {arXiv}, eprint = {1805.10364}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-10364.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/ZandMTLKV17, author = {Ali Zand and Gaspar Modelo{-}Howard and Alok Tongaonkar and Sung{-}Ju Lee and Christopher Kruegel and Giovanni Vigna}, title = {Demystifying DDoS as a Service}, journal = {{IEEE} Commun. Mag.}, volume = {55}, number = {7}, pages = {14--21}, year = {2017}, url = {https://doi.org/10.1109/MCOM.2017.1600980}, doi = {10.1109/MCOM.2017.1600980}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/ZandMTLKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/MavroudisHFMKV17, author = {Vasilios Mavroudis and Shuang Hao and Yanick Fratantonio and Federico Maggi and Christopher Kruegel and Giovanni Vigna}, title = {On the Privacy and Security of the Ultrasound Ecosystem}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {2}, pages = {95--112}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0018}, doi = {10.1515/POPETS-2017-0018}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/MavroudisHFMKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/EgeleSKV17, author = {Manuel Egele and Gianluca Stringhini and Christopher Kruegel and Giovanni Vigna}, title = {Towards Detecting Compromised Accounts on Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {4}, pages = {447--460}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2479616}, doi = {10.1109/TDSC.2015.2479616}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/EgeleSKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BianchiGFKV17, author = {Antonio Bianchi and Eric Gustafson and Yanick Fratantonio and Christopher Kruegel and Giovanni Vigna}, title = {Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {16--27}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134615}, doi = {10.1145/3134600.3134615}, timestamp = {Tue, 06 Nov 2018 16:59:23 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BianchiGFKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SallsSSKV17, author = {Christopher Salls and Yan Shoshitaishvili and Nick Stephens and Christopher Kruegel and Giovanni Vigna}, title = {Piston: Uncooperative Remote Runtime Patching}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {141--153}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134611}, doi = {10.1145/3134600.3134611}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SallsSSKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Shoshitaishvili17, author = {Yan Shoshitaishvili and Michael Weissbacher and Lukas Dresel and Christopher Salls and Ruoyu Wang and Christopher Kruegel and Giovanni Vigna}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {347--362}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134105}, doi = {10.1145/3133956.3134105}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Shoshitaishvili17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuangHILFKV17, author = {Cheng Huang and Shuang Hao and Luca Invernizzi and Jiayong Liu and Yong Fang and Christopher Kruegel and Giovanni Vigna}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {494--505}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053017}, doi = {10.1145/3052973.3053017}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HuangHILFKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NilizadehLSZFKS17, author = {Shirin Nilizadeh and Francois Labreche and Alireza Sedighian and Ali Zand and Jos{\'{e}} M. Fernandez and Christopher Kruegel and Gianluca Stringhini and Giovanni Vigna}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POISED:} Spotting Twitter Spam Off the Beaten Paths}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1159--1174}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134055}, doi = {10.1145/3133956.3134055}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NilizadehLSZFKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CorinaMSSHKV17, author = {Jake Corina and Aravind Machiry and Christopher Salls and Yan Shoshitaishvili and Shuang Hao and Christopher Kruegel and Giovanni Vigna}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{DIFUZE:} Interface Aware Fuzzing for Kernel Drivers}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2123--2138}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134069}, doi = {10.1145/3133956.3134069}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CorinaMSSHKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BaoSWKVB17, author = {Tiffany Bao and Yan Shoshitaishvili and Ruoyu Wang and Christopher Kruegel and Giovanni Vigna and David Brumley}, title = {How Shall We Play a Game?: {A} Game-theoretical Model for Cyber-warfare Games}, booktitle = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa Barbara, CA, USA, August 21-25, 2017}, pages = {7--21}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSF.2017.34}, doi = {10.1109/CSF.2017.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BaoSWKVB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ContinellaFLPZK17, author = {Andrea Continella and Yanick Fratantonio and Martina Lindorfer and Alessandro Puccetti and Ali Zand and Christopher Kruegel and Giovanni Vigna}, title = {Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/obfuscation-resilient-privacy-leak-detection-mobile-apps-through-differential-analysis/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ContinellaFLPZK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MachiryGSSSWBCK17, author = {Aravind Machiry and Eric Gustafson and Chad Spensky and Christopher Salls and Nick Stephens and Ruoyu Wang and Antonio Bianchi and Yung Ryn Choe and Christopher Kruegel and Giovanni Vigna}, title = {{BOOMERANG:} Exploiting the Semantic Gap in Trusted Execution Environments}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/boomerang-exploiting-semantic-gap-trusted-execution-environments/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/MachiryGSSSWBCK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WangSBMGGKV17, author = {Ruoyu Wang and Yan Shoshitaishvili and Antonio Bianchi and Aravind Machiry and John Grosen and Paul Grosen and Christopher Kruegel and Giovanni Vigna}, title = {Ramblr: Making Reassembly Great Again}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/ramblr-making-reassembly-great-again/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WangSBMGGKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/FiebigBHKV17, author = {Tobias Fiebig and Kevin Borgolte and Shuang Hao and Christopher Kruegel and Giovanni Vigna}, editor = {Mohamed Ali K{\^{a}}afar and Steve Uhlig and Johanna Amann}, title = {Something from Nothing (There): Collecting Global IPv6 Datasets from {DNS}}, booktitle = {Passive and Active Measurement - 18th International Conference, {PAM} 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10176}, pages = {30--43}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-54328-4\_3}, doi = {10.1007/978-3-319-54328-4\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pam/FiebigBHKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RediniMDFBGSKV17, author = {Nilo Redini and Aravind Machiry and Dipanjan Das and Yanick Fratantonio and Antonio Bianchi and Eric Gustafson and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, editor = {Engin Kirda and Thomas Ristenpart}, title = {BootStomp: On the Security of Bootloaders in Mobile Devices}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {781--798}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/redini}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/RediniMDFBGSKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MachirySCSKV17, author = {Aravind Machiry and Chad Spensky and Jake Corina and Nick Stephens and Christopher Kruegel and Giovanni Vigna}, editor = {Engin Kirda and Thomas Ristenpart}, title = {{DR.} {CHECKER:} {A} Soundy Analysis for Linux Kernel Drivers}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {1007--1024}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/machiry}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MachirySCSKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TrickelDGKMTSDV17, author = {Erik Trickel and Francesco Disperati and Eric Gustafson and Faezeh Kalantari and Mike Mabey and Naveen Tiwari and Yeganeh Safaei and Adam Doup{\'{e}} and Giovanni Vigna}, editor = {Mark A. Gondree and Ashley L. Podhradsky}, title = {Shell We Play {A} Game? CTF-as-a-service for Security Education}, booktitle = {2017 {USENIX} Workshop on Advances in Security Education, {ASE} 2017, Vancouver, BC, Canada, August 15, 2017}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/ase17/workshop-program/presentation/trickel}, timestamp = {Mon, 01 Feb 2021 08:43:06 +0100}, biburl = {https://dblp.org/rec/conf/uss/TrickelDGKMTSDV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-02749, author = {Yan Shoshitaishvili and Michael Weissbacher and Lukas Dresel and Christopher Salls and Ruoyu Wang and Christopher Kruegel and Giovanni Vigna}, title = {Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance}, journal = {CoRR}, volume = {abs/1708.02749}, year = {2017}, url = {http://arxiv.org/abs/1708.02749}, eprinttype = {arXiv}, eprint = {1708.02749}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-02749.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-09058, author = {Shirin Nilizadeh and Francois Labreche and Alireza Sedighian and Ali Zand and Jos{\'{e}} M. Fernandez and Christopher Kruegel and Gianluca Stringhini and Giovanni Vigna}, title = {{POISED:} Spotting Twitter Spam Off the Beaten Paths}, journal = {CoRR}, volume = {abs/1708.09058}, year = {2017}, url = {http://arxiv.org/abs/1708.09058}, eprinttype = {arXiv}, eprint = {1708.09058}, timestamp = {Thu, 21 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-09058.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Vigna16, author = {Giovanni Vigna}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Binary Analysis for Autonomous Hacking: Invited Abstract}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {473}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2901788}, doi = {10.1145/2897845.2901788}, timestamp = {Mon, 25 Apr 2022 08:42:03 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Vigna16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VeenFLGMVBRG16, author = {Victor van der Veen and Yanick Fratantonio and Martina Lindorfer and Daniel Gruss and Cl{\'{e}}mentine Maurice and Giovanni Vigna and Herbert Bos and Kaveh Razavi and Cristiano Giuffrida}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Drammer: Deterministic Rowhammer Attacks on Mobile Platforms}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1675--1689}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978406}, doi = {10.1145/2976749.2978406}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VeenFLGMVBRG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AfonsoGBFKVDP16, author = {Vitor Monte Afonso and Paulo L. de Geus and Antonio Bianchi and Yanick Fratantonio and Christopher Kruegel and Giovanni Vigna and Adam Doup{\'{e}} and Mario Polino}, title = {Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/going-native-large-scale-analysis-android-apps-practical-native-code-sandboxing-policy.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/AfonsoGBFKVDP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/StephensGSDWCSK16, author = {Nick Stephens and John Grosen and Christopher Salls and Andrew Dutcher and Ruoyu Wang and Jacopo Corbetta and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, title = {Driller: Augmenting Fuzzing Through Selective Symbolic Execution}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/driller-augmenting-fuzzing-through-selective-symbolic-execution.pdf}, timestamp = {Tue, 19 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/StephensGSDWCSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MuenchPSKVB16, author = {Marius Muench and Fabio Pagani and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna and Davide Balzarotti}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {24--48}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_2}, doi = {10.1007/978-3-319-45719-2\_2}, timestamp = {Fri, 27 Dec 2019 21:24:31 +0100}, biburl = {https://dblp.org/rec/conf/raid/MuenchPSKVB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Shoshitaishvili16, author = {Yan Shoshitaishvili and Ruoyu Wang and Christopher Salls and Nick Stephens and Mario Polino and Andrew Dutcher and John Grosen and Siji Feng and Christophe Hauser and Christopher Kr{\"{u}}gel and Giovanni Vigna}, title = {{SOK:} (State of) The Art of War: Offensive Techniques in Binary Analysis}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {138--157}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.17}, doi = {10.1109/SP.2016.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Shoshitaishvili16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FratantonioBRKK16, author = {Yanick Fratantonio and Antonio Bianchi and William K. Robertson and Engin Kirda and Christopher Kruegel and Giovanni Vigna}, title = {TriggerScope: Towards Detecting Logic Bombs in Android Applications}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {377--396}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.30}, doi = {10.1109/SP.2016.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/FratantonioBRKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MirkovicDDVD15, author = {Jelena Mirkovic and Melissa Dark and Wenliang Du and Giovanni Vigna and Tamara Denning}, title = {Evaluating Cybersecurity Education Interventions: Three Case Studies}, journal = {{IEEE} Secur. Priv.}, volume = {13}, number = {3}, pages = {63--69}, year = {2015}, url = {https://doi.org/10.1109/MSP.2015.57}, doi = {10.1109/MSP.2015.57}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/MirkovicDDVD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/Shoshitaishvili15, author = {Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, title = {Portrait of a Privacy Invasion}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2015}, number = {1}, pages = {41--60}, year = {2015}, url = {https://doi.org/10.1515/popets-2015-0004}, doi = {10.1515/POPETS-2015-0004}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/Shoshitaishvili15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZandHVKK15, author = {Ali Zand and Amir Houmansadr and Giovanni Vigna and Richard A. Kemmerer and Christopher Kruegel}, title = {Know Your Achilles' Heel: Automatic Detection of Network Critical Services}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {41--50}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818012}, doi = {10.1145/2818000.2818012}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZandHVKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MuttiFBICKKV15, author = {Simone Mutti and Yanick Fratantonio and Antonio Bianchi and Luca Invernizzi and Jacopo Corbetta and Dhilung Kirat and Christopher Kruegel and Giovanni Vigna}, title = {BareDroid: Large-Scale Analysis of Android Apps on Real Devices}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {71--80}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818036}, doi = {10.1145/2818000.2818036}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MuttiFBICKKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FalsinaFZKVM15, author = {Luca Falsina and Yanick Fratantonio and Stefano Zanero and Christopher Kruegel and Giovanni Vigna and Federico Maggi}, title = {Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {201--210}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818042}, doi = {10.1145/2818000.2818042}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/FalsinaFZKVM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BianchiFKV15, author = {Antonio Bianchi and Yanick Fratantonio and Christopher Kruegel and Giovanni Vigna}, editor = {David Lie and Glenn Wurster}, title = {{NJAS:} Sandboxing Unmodified Applications in non-rooted Devices Running stock Android}, booktitle = {Proceedings of the 5th Annual {ACM} {CCS} Workshop on Security and Privacy in Smartphones and Mobile Devices, {SPSM} 2015, Denver, Colorado, USA, October 12, 2015}, pages = {27--38}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808117.2808122}, doi = {10.1145/2808117.2808122}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BianchiFKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KiratV15, author = {Dhilung Kirat and Giovanni Vigna}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {MalGene: Automatic Extraction of Malware Analysis Evasion Signature}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {769--780}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813642}, doi = {10.1145/2810103.2813642}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KiratV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaoBNSEEKV15, author = {Shuang Hao and Kevin Borgolte and Nick Nikiforakis and Gianluca Stringhini and Manuel Egele and Michael Eubanks and Brian Krebs and Giovanni Vigna}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Drops for Stuff: An Analysis of Reshipping Mule Scams}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1081--1092}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813620}, doi = {10.1145/2810103.2813620}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HaoBNSEEKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/FratantonioBREK15, author = {Yanick Fratantonio and Antonio Bianchi and William K. Robertson and Manuel Egele and Christopher Kruegel and Engin Kirda and Giovanni Vigna}, editor = {Magnus Almgren and Vincenzo Gulisano and Federico Maggi}, title = {On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, {DIMVA} 2015, Milan, Italy, July 9-10, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9148}, pages = {282--303}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20550-2\_15}, doi = {10.1007/978-3-319-20550-2\_15}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/FratantonioBREK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/CaillatGKKV15, author = {Benjamin Caillat and Bob Gilbert and Richard A. Kemmerer and Christopher Kruegel and Giovanni Vigna}, title = {Prison: Tracking Process Interactions to Contain Malware}, booktitle = {17th {IEEE} International Conference on High Performance Computing and Communications, {HPCC} 2015, 7th {IEEE} International Symposium on Cyberspace Safety and Security, {CSS} 2015, and 12th {IEEE} International Conference on Embedded Software and Systems, {ICESS} 2015, New York, NY, USA, August 24-26, 2015}, pages = {1282--1291}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/HPCC-CSS-ICESS.2015.297}, doi = {10.1109/HPCC-CSS-ICESS.2015.297}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/CaillatGKKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/CaoFBEKVC15, author = {Yinzhi Cao and Yanick Fratantonio and Antonio Bianchi and Manuel Egele and Christopher Kruegel and Giovanni Vigna and Yan Chen}, title = {EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/edgeminer-automatically-detecting-implicit-control-flow-transitions-through-android-framework}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/CaoFBEKVC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Shoshitaishvili15, author = {Yan Shoshitaishvili and Ruoyu Wang and Christophe Hauser and Christopher Kruegel and Giovanni Vigna}, title = {Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/firmalice-automatic-detection-authentication-bypass-vulnerabilities-binary-firmware}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Shoshitaishvili15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/FratantonioMBKV15a, author = {Yanick Fratantonio and Aravind Machiry and Antonio Bianchi and Christopher Kruegel and Giovanni Vigna}, editor = {Aharon Abadi and Shah Rukh Humayoun and Henry Muccini}, title = {{CLAPP:} characterizing loops in Android applications (invited talk)}, booktitle = {Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile, DeMobile 2015, Bergamo, Italy, August 31 - September 4, 2015}, pages = {33--34}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2804345.2804355}, doi = {10.1145/2804345.2804355}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/FratantonioMBKV15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/FratantonioMBKV15, author = {Yanick Fratantonio and Aravind Machiry and Antonio Bianchi and Christopher Kruegel and Giovanni Vigna}, editor = {Elisabetta Di Nitto and Mark Harman and Patrick Heymans}, title = {{CLAPP:} characterizing loops in Android applications}, booktitle = {Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, {ESEC/FSE} 2015, Bergamo, Italy, August 30 - September 4, 2015}, pages = {687--697}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2786805.2786873}, doi = {10.1145/2786805.2786873}, timestamp = {Tue, 06 Nov 2018 16:59:22 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/FratantonioMBKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BianchiCIFKV15, author = {Antonio Bianchi and Jacopo Corbetta and Luca Invernizzi and Yanick Fratantonio and Christopher Kruegel and Giovanni Vigna}, title = {What the App is That? Deception and Countermeasures in the Android User Interface}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {931--948}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.62}, doi = {10.1109/SP.2015.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BianchiCIFKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/StringhiniMJEKV15, author = {Gianluca Stringhini and Pierre Mourlanne and Gr{\'{e}}goire Jacob and Manuel Egele and Christopher Kruegel and Giovanni Vigna}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {{EVILCOHORT:} Detecting Communities of Malicious Accounts on Online Services}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {563--578}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/stringhini}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/StringhiniMJEKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BorgolteKV15, author = {Kevin Borgolte and Christopher Kruegel and Giovanni Vigna}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Meerkat: Detecting Website Defacements through Image-based Object Recognition}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {595--610}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/borgolte}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/BorgolteKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FedericoCSKV15, author = {Alessandro Di Federico and Amat Cama and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {How the {ELF} Ruined Christmas}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {643--658}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/di-frederico}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/FedericoCSKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WeissbacherRKKV15, author = {Michael Weissbacher and William K. Robertson and Engin Kirda and Christopher Kruegel and Giovanni Vigna}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {737--752}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/weissbacher}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/WeissbacherRKKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/ThomasHWBGHKMSV15, author = {Kurt Thomas and Danny Yuxing Huang and David Y. Wang and Elie Bursztein and Chris Grier and Tom Holt and Christopher Kruegel and Damon McCoy and Stefan Savage and Giovanni Vigna}, title = {Framing Dependencies Introduced by Underground Commoditization}, booktitle = {14th Annual Workshop on the Economics of Information Security, {WEIS} 2015, Delft, The Netherlands, 22-23 June, 2015}, year = {2015}, url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS\_2015\_thomas.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/weis/ThomasHWBGHKMSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/EgeleSKV15, author = {Manuel Egele and Gianluca Stringhini and Christopher Kruegel and Giovanni Vigna}, title = {Towards Detecting Compromised Accounts on Social Networks}, journal = {CoRR}, volume = {abs/1509.03531}, year = {2015}, url = {http://arxiv.org/abs/1509.03531}, eprinttype = {arXiv}, eprint = {1509.03531}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/EgeleSKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/NikiforakisKJKPV14, author = {Nick Nikiforakis and Alexandros Kapravelos and Wouter Joosen and Christopher Kruegel and Frank Piessens and Giovanni Vigna}, title = {On the Workings and Current Practices of Web-Based Device Fingerprinting}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {28--36}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.160}, doi = {10.1109/MSP.2013.160}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/NikiforakisKJKPV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StringhiniHKV14, author = {Gianluca Stringhini and Oliver Hohlfeld and Christopher Kruegel and Giovanni Vigna}, editor = {Shiho Moriai and Trent Jaeger and Kouichi Sakurai}, title = {The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape}, booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014}, pages = {353--364}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2590296.2590302}, doi = {10.1145/2590296.2590302}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/StringhiniHKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/MaioKSKV14, author = {Giancarlo De Maio and Alexandros Kapravelos and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, editor = {Sven Dietrich}, title = {PExy: The Other Side of Exploit Kits}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {132--151}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_8}, doi = {10.1007/978-3-319-08509-8\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/MaioKSKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/ZarrasKSHKV14, author = {Apostolis Zarras and Alexandros Kapravelos and Gianluca Stringhini and Thorsten Holz and Christopher Kruegel and Giovanni Vigna}, editor = {Carey Williamson and Aditya Akella and Nina Taft}, title = {The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements}, booktitle = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014, Vancouver, BC, Canada, November 5-7, 2014}, pages = {373--380}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663716.2663719}, doi = {10.1145/2663716.2663719}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/ZarrasKSHKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZandVKK14, author = {Ali Zand and Giovanni Vigna and Richard A. Kemmerer and Christopher Kruegel}, title = {Rippler: Delay injection for service dependency detection}, booktitle = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014, Toronto, Canada, April 27 - May 2, 2014}, pages = {2157--2165}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFOCOM.2014.6848158}, doi = {10.1109/INFOCOM.2014.6848158}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ZandVKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/InvernizziMTKSVLM14, author = {Luca Invernizzi and Stanislav Miskovic and Ruben Torres and Christopher Kruegel and Sabyasachi Saha and Giovanni Vigna and Sung{-}Ju Lee and Marco Mellia}, title = {Nazca: Detecting Malware Distribution in Large-Scale Networks}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/nazca-detecting-malware-distribution-large-scale-networks}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/InvernizziMTKSVLM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/PoeplauFBKV14, author = {Sebastian Poeplau and Yanick Fratantonio and Antonio Bianchi and Christopher Kruegel and Giovanni Vigna}, title = {Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/execute-analyzing-unsafe-and-malicious-dynamic-code-loading-android-applications}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/PoeplauFBKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CorbettaIKV14, author = {Jacopo Corbetta and Luca Invernizzi and Christopher Kr{\"{u}}gel and Giovanni Vigna}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {130--149}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_7}, doi = {10.1007/978-3-319-11379-1\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/CorbettaIKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CaoSBKVC14, author = {Yinzhi Cao and Yan Shoshitaishvili and Kevin Borgolte and Christopher Kr{\"{u}}gel and Giovanni Vigna and Yan Chen}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {276--298}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_14}, doi = {10.1007/978-3-319-11379-1\_14}, timestamp = {Fri, 20 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CaoSBKVC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ShoshitaishviliIDV14, author = {Yan Shoshitaishvili and Luca Invernizzi and Adam Doup{\'{e}} and Giovanni Vigna}, editor = {Yookun Cho and Sung Y. Shin and Sang{-}Wook Kim and Chih{-}Cheng Hung and Jiman Hong}, title = {Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security}, booktitle = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014}, pages = {1649--1656}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2554850.2554880}, doi = {10.1145/2554850.2554880}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/ShoshitaishviliIDV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ZandVYK14, author = {Ali Zand and Giovanni Vigna and Xifeng Yan and Christopher Kruegel}, editor = {Yookun Cho and Sung Y. Shin and Sang{-}Wook Kim and Chih{-}Cheng Hung and Jiman Hong}, title = {Extracting probable command and control signatures for detecting botnets}, booktitle = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014}, pages = {1657--1662}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2554850.2554896}, doi = {10.1145/2554850.2554896}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/ZandVYK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/IedemskaSKKV14, author = {Jane Iedemska and Gianluca Stringhini and Richard A. Kemmerer and Christopher Kruegel and Giovanni Vigna}, title = {The Tricks of the Trade: What Makes Spam Campaigns Successful?}, booktitle = {35. {IEEE} Security and Privacy Workshops, {SPW} 2014, San Jose, CA, USA, May 17-18, 2014}, pages = {77--83}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SPW.2014.21}, doi = {10.1109/SPW.2014.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/IedemskaSKKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KiratVK14, author = {Dhilung Kirat and Giovanni Vigna and Christopher Kruegel}, editor = {Kevin Fu and Jaeyeon Jung}, title = {BareCloud: Bare-metal Analysis-based Evasive Malware Detection}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {287--301}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/kirat}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/KiratVK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KapravelosGCKVP14, author = {Alexandros Kapravelos and Chris Grier and Neha Chachra and Christopher Kruegel and Giovanni Vigna and Vern Paxson}, editor = {Kevin Fu and Jaeyeon Jung}, title = {Hulk: Eliciting Malicious Behavior in Browser Extensions}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {641--654}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/kapravelos}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KapravelosGCKVP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/VignaBCDFIKS14, author = {Giovanni Vigna and Kevin Borgolte and Jacopo Corbetta and Adam Doup{\'{e}} and Yanick Fratantonio and Luca Invernizzi and Dhilung Kirat and Yan Shoshitaishvili}, editor = {Zachary N. J. Peterson}, title = {Ten Years of iCTF: The Good, The Bad, and The Ugly}, booktitle = {2014 {USENIX} Summit on Gaming, Games, and Gamification in Security Education, 3GSE '14, San Diego, CA, USA, August 18, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/3gse14/summit-program/presentation/vigna}, timestamp = {Mon, 01 Feb 2021 08:43:14 +0100}, biburl = {https://dblp.org/rec/conf/uss/VignaBCDFIKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/NikiforakisMSRJKPVZ14, author = {Nick Nikiforakis and Federico Maggi and Gianluca Stringhini and M. Zubair Rafique and Wouter Joosen and Christopher Kruegel and Frank Piessens and Giovanni Vigna and Stefano Zanero}, editor = {Chin{-}Wan Chung and Andrei Z. Broder and Kyuseok Shim and Torsten Suel}, title = {Stranger danger: exploring the ecosystem of ad-based {URL} shortening services}, booktitle = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic of Korea, April 7-11, 2014}, pages = {51--62}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2566486.2567983}, doi = {10.1145/2566486.2567983}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/NikiforakisMSRJKPVZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/BorgolteKV14, author = {Kevin Borgolte and Christopher Kruegel and Giovanni Vigna}, editor = {Chin{-}Wan Chung and Andrei Z. Broder and Kyuseok Shim and Torsten Suel}, title = {Relevant change detection: a framework for the precise extraction of modified and novel web-based content as a filtering technique for analysis engines}, booktitle = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic of Korea, April 7-11, 2014, Companion Volume}, pages = {595--598}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2567948.2578039}, doi = {10.1145/2567948.2578039}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/BorgolteKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/InvernizziKV13, author = {Luca Invernizzi and Christopher Kruegel and Giovanni Vigna}, editor = {Charles N. Payne Jr.}, title = {Message in a bottle: sailing past censorship}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {39--48}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523654}, doi = {10.1145/2523649.2523654}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/InvernizziKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KiratNVM13, author = {Dhilung Kirat and Lakshmanan Nataraj and Giovanni Vigna and B. S. Manjunath}, editor = {Charles N. Payne Jr.}, title = {SigMal: a static signal processing based malware triage}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {89--98}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523682}, doi = {10.1145/2523649.2523682}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KiratNVM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BorgolteKV13, author = {Kevin Borgolte and Christopher Kruegel and Giovanni Vigna}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Delta: automatic identification of unknown web-based infection campaigns}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {109--120}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516725}, doi = {10.1145/2508859.2516725}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BorgolteKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StringhiniKV13, author = {Gianluca Stringhini and Christopher Kruegel and Giovanni Vigna}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Shady paths: leveraging surfing crowds to detect malicious web pages}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {133--144}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516682}, doi = {10.1145/2508859.2516682}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/StringhiniKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DoupeCJPKV13, author = {Adam Doup{\'{e}} and Weidong Cui and Mariusz H. Jakubowski and Marcus Peinado and Christopher Kruegel and Giovanni Vigna}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {deDacota: toward preventing server-side {XSS} via automatic code and data separation}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1205--1216}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516708}, doi = {10.1145/2508859.2516708}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DoupeCJPKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/VamvoudakisHKV13, author = {Kyriakos G. Vamvoudakis and Jo{\~{a}}o P. Hespanha and Richard A. Kemmerer and Giovanni Vigna}, editor = {Danielle C. Tarraf}, title = {Formulating Cyber-Security as Convex Optimization Problems}, booktitle = {Control of Cyber-Physical Systems, Workshop Held at The Johns Hopkins University, Baltimore, MD, USA, March 2013}, series = {Lecture Notes in Control and Information Sciences}, volume = {449}, pages = {85--100}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-01159-2\_5}, doi = {10.1007/978-3-319-01159-2\_5}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ciss/VamvoudakisHKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/StringhiniWEKVZZ13, author = {Gianluca Stringhini and Gang Wang and Manuel Egele and Christopher Kruegel and Giovanni Vigna and Haitao Zheng and Ben Y. Zhao}, editor = {Konstantina Papagiannaki and P. Krishna Gummadi and Craig Partridge}, title = {Follow the green: growth and dynamics in twitter follower markets}, booktitle = {Proceedings of the 2013 Internet Measurement Conference, {IMC} 2013, Barcelona, Spain, October 23-25, 2013}, pages = {163--176}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2504730.2504731}, doi = {10.1145/2504730.2504731}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/StringhiniWEKVZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/EgeleSKV13, author = {Manuel Egele and Gianluca Stringhini and Christopher Kr{\"{u}}gel and Giovanni Vigna}, title = {{COMPA:} Detecting Compromised Accounts on Social Networks}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/compa-detecting-compromised-accounts-social-networks}, timestamp = {Mon, 01 Feb 2021 08:42:13 +0100}, biburl = {https://dblp.org/rec/conf/ndss/EgeleSKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/EggerSKV13, author = {Christoph Egger and Johannes Schlumberger and Christopher Kruegel and Giovanni Vigna}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Practical Attacks against the {I2P} Network}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {432--451}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_22}, doi = {10.1007/978-3-642-41284-4\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/EggerSKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/PayetDKV13, author = {Pierre Payet and Adam Doup{\'{e}} and Christopher Kruegel and Giovanni Vigna}, editor = {Sung Y. Shin and Jos{\'{e}} Carlos Maldonado}, title = {EARs in the wild: large-scale analysis of execution after redirect vulnerabilities}, booktitle = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing, {SAC} '13, Coimbra, Portugal, March 18-22, 2013}, pages = {1792--1799}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2480362.2480699}, doi = {10.1145/2480362.2480699}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/PayetDKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/NikiforakisKJKPV13, author = {Nick Nikiforakis and Alexandros Kapravelos and Wouter Joosen and Christopher Kruegel and Frank Piessens and Giovanni Vigna}, title = {Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {541--555}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.43}, doi = {10.1109/SP.2013.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/NikiforakisKJKPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KapravelosSCKV13, author = {Alexandros Kapravelos and Yan Shoshitaishvili and Marco Cova and Christopher Kruegel and Giovanni Vigna}, editor = {Samuel T. King}, title = {Revolver: An Automated Approach to the Detection of Evasive Web-based Malware}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {637--652}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/kapravelos}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/KapravelosSCKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangSKV13, author = {Ruoyu Wang and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, editor = {Samuel T. King}, title = {Steal This Movie: Automatically Bypassing {DRM} Protection in Streaming Media Services}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {687--702}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/wang\_ruoyu}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/WangSKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/MaggiFZSSKV13, author = {Federico Maggi and Alessandro Frossi and Stefano Zanero and Gianluca Stringhini and Brett Stone{-}Gross and Christopher Kruegel and Giovanni Vigna}, editor = {Daniel Schwabe and Virg{\'{\i}}lio A. F. Almeida and Hartmut Glaser and Ricardo Baeza{-}Yates and Sue B. Moon}, title = {Two years of short URLs internet measurement: security threats and countermeasures}, booktitle = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro, Brazil, May 13-17, 2013}, pages = {861--872}, publisher = {International World Wide Web Conferences Steering Committee / {ACM}}, year = {2013}, url = {https://doi.org/10.1145/2488388.2488463}, doi = {10.1145/2488388.2488463}, timestamp = {Sun, 22 Sep 2019 18:15:38 +0200}, biburl = {https://dblp.org/rec/conf/www/MaggiFZSSKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/StringhiniEKV12, author = {Gianluca Stringhini and Manuel Egele and Christopher Kruegel and Giovanni Vigna}, title = {Poultry markets: on the underground economy of twitter followers}, journal = {Comput. Commun. Rev.}, volume = {42}, number = {4}, pages = {527--532}, year = {2012}, url = {https://doi.org/10.1145/2377677.2377781}, doi = {10.1145/2377677.2377781}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/StringhiniEKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SchlumbergerKV12, author = {Johannes Schlumberger and Christopher Kruegel and Giovanni Vigna}, editor = {Robert H'obbes' Zakon}, title = {Jarhead analysis and detection of malicious Java applets}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {249--257}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420988}, doi = {10.1145/2420950.2420988}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SchlumbergerKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BianchiSKV12, author = {Antonio Bianchi and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Blacksheep: detecting compromised hosts in homogeneous crowds}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {341--352}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382234}, doi = {10.1145/2382196.2382234}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BianchiSKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NikiforakisIKAJKPV12, author = {Nick Nikiforakis and Luca Invernizzi and Alexandros Kapravelos and Steven {Van Acker} and Wouter Joosen and Christopher Kruegel and Frank Piessens and Giovanni Vigna}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {You are what you include: large-scale evaluation of remote javascript inclusions}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {736--747}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382274}, doi = {10.1145/2382196.2382274}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NikiforakisIKAJKPV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/TegelerFVK12, author = {Florian Tegeler and Xiaoming Fu and Giovanni Vigna and Christopher Kruegel}, editor = {Chadi Barakat and Renata Teixeira and K. K. Ramakrishnan and Patrick Thiran}, title = {BotFinder: finding bots in network traffic without deep packet inspection}, booktitle = {Conference on emerging Networking Experiments and Technologies, CoNEXT '12, Nice, France - December 10 - 13, 2012}, pages = {349--360}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2413176.2413217}, doi = {10.1145/2413176.2413217}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/TegelerFVK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/JacobCNKV12, author = {Gr{\'{e}}goire Jacob and Paolo Milani Comparetti and Matthias Neugschwandtner and Christopher Kruegel and Giovanni Vigna}, editor = {Ulrich Flegel and Evangelos P. Markatos and William K. Robertson}, title = {A Static, Packer-Agnostic Filter to Detect Similar Malware Samples}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, {DIMVA} 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7591}, pages = {102--122}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37300-8\_6}, doi = {10.1007/978-3-642-37300-8\_6}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/JacobCNKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/GregioGKV12, author = {Andr{\'{e}} Ricardo Abed Gr{\'{e}}gio and Paulo L{\'{\i}}cio de Geus and Christopher Kruegel and Giovanni Vigna}, editor = {Ulrich Flegel and Evangelos P. Markatos and William K. Robertson}, title = {Tracking Memory Writes for Malware Classification and Code Reuse Identification}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, {DIMVA} 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7591}, pages = {134--143}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37300-8\_8}, doi = {10.1007/978-3-642-37300-8\_8}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/GregioGKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/OverveldtKV12, author = {Timon Van Overveldt and Christopher Kruegel and Giovanni Vigna}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {FlashDetect: ActionScript 3 Malware Detection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {274--293}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_14}, doi = {10.1007/978-3-642-33338-5\_14}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/OverveldtKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rv/Vigna12, author = {Giovanni Vigna}, editor = {Shaz Qadeer and Serdar Tasiran}, title = {Malware Riding Badware: Challenges in Analyzing (Malicious/Benign) Web Applications}, booktitle = {Runtime Verification, Third International Conference, {RV} 2012, Istanbul, Turkey, September 25-28, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7687}, pages = {183}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35632-2\_19}, doi = {10.1007/978-3-642-35632-2\_19}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/rv/Vigna12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/InvernizziC12, author = {Luca Invernizzi and Paolo Milani Comparetti and Stefano Benvenuti and Christopher Kruegel and Marco Cova and Giovanni Vigna}, title = {EvilSeed: {A} Guided Approach to Finding Malicious Web Pages}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {428--442}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.33}, doi = {10.1109/SP.2012.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/InvernizziC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/StringhiniEZHKV12, author = {Gianluca Stringhini and Manuel Egele and Apostolis Zarras and Thorsten Holz and Christopher Kruegel and Giovanni Vigna}, editor = {Tadayoshi Kohno}, title = {B@bel: Leveraging Email Delivery for Spam Mitigation}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {16--32}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/stringhini}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/StringhiniEZHKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JacobKKV12, author = {Gr{\'{e}}goire Jacob and Engin Kirda and Christopher Kruegel and Giovanni Vigna}, editor = {Tadayoshi Kohno}, title = {{PUBCRAWL:} Protecting Users and Businesses from CRAWLers}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {507--522}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/jacob}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/JacobKKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DoupeCKV12, author = {Adam Doup{\'{e}} and Ludovico Cavedon and Christopher Kruegel and Giovanni Vigna}, editor = {Tadayoshi Kohno}, title = {Enemy of the State: {A} State-Aware Black-Box Web Vulnerability Scanner}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {523--538}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/doupe}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/DoupeCKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wosn/StringhiniEKV12, author = {Gianluca Stringhini and Manuel Egele and Christopher Kruegel and Giovanni Vigna}, editor = {Balachander Krishnamurthy and Stefan Saroiu and Ben Y. Zhao}, title = {Poultry markets: on the underground economy of twitter followers}, booktitle = {Proceedings of the 2012 {ACM} workshop on Workshop on Online Social Networks, {WOSN} 2012, Helsinki, Finland, August 17, 2012}, pages = {1--6}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2342549.2342551}, doi = {10.1145/2342549.2342551}, timestamp = {Mon, 26 Jun 2023 08:43:55 +0200}, biburl = {https://dblp.org/rec/conf/wosn/StringhiniEKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Vigna11, author = {Giovanni Vigna}, title = {The 2010 International Capture the Flag Competition}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {1}, pages = {12--14}, year = {2011}, url = {https://doi.org/10.1109/MSP.2011.21}, doi = {10.1109/MSP.2011.21}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Vigna11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Stone-GrossCGKKV11, author = {Brett Stone{-}Gross and Marco Cova and Bob Gilbert and Richard A. Kemmerer and Christopher Kruegel and Giovanni Vigna}, title = {Analysis of a Botnet Takeover}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {1}, pages = {64--72}, year = {2011}, url = {https://doi.org/10.1109/MSP.2010.144}, doi = {10.1109/MSP.2010.144}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Stone-GrossCGKKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DoupeECSYZCV11, author = {Adam Doup{\'{e}} and Manuel Egele and Benjamin Caillat and Gianluca Stringhini and Gorkem Yakin and Ali Zand and Ludovico Cavedon and Giovanni Vigna}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Hit 'em where it hurts: a live security exercise on cyber situational awareness}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {51--61}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076740}, doi = {10.1145/2076732.2076740}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DoupeECSYZCV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CiprianoZHKV11, author = {Casey Cipriano and Ali Zand and Amir Houmansadr and Christopher Kruegel and Giovanni Vigna}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Nexat: a history-based approach to predict attacker actions}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {383--392}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076787}, doi = {10.1145/2076732.2076787}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CiprianoZHKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KiratVK11, author = {Dhilung Kirat and Giovanni Vigna and Christopher Kruegel}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {BareBox: efficient malware analysis on bare-metal}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {403--412}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076790}, doi = {10.1145/2076732.2076790}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KiratVK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DoupeBKV11, author = {Adam Doup{\'{e}} and Bryce Boe and Christopher Kruegel and Giovanni Vigna}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Fear the {EAR:} discovering and mitigating execution after redirect vulnerabilities}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {251--262}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046736}, doi = {10.1145/2046707.2046736}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DoupeBKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/KapravelosCKV11, author = {Alexandros Kapravelos and Marco Cova and Christopher Kruegel and Giovanni Vigna}, editor = {Thorsten Holz and Herbert Bos}, title = {Escape from Monkey Island: Evading High-Interaction Honeyclients}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6739}, pages = {124--143}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22424-9\_8}, doi = {10.1007/978-3-642-22424-9\_8}, timestamp = {Wed, 25 Sep 2019 18:15:55 +0200}, biburl = {https://dblp.org/rec/conf/dimva/KapravelosCKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/BanksFKKV11, author = {Greg Banks and Aristide Fattori and Richard A. Kemmerer and Christopher Kruegel and Giovanni Vigna}, editor = {Thorsten Holz and Herbert Bos}, title = {{MISHIMA:} Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper)}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6739}, pages = {184--193}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22424-9\_11}, doi = {10.1007/978-3-642-22424-9\_11}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/BanksFKKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-4/SzydlowskiEKV11, author = {Martin Szydlowski and Manuel Egele and Christopher Kruegel and Giovanni Vigna}, editor = {Jan Camenisch and Dogan Kesdogan}, title = {Challenges for Dynamic Analysis of iOS Applications}, booktitle = {Open Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7039}, pages = {65--77}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27585-2\_6}, doi = {10.1007/978-3-642-27585-2\_6}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-4/SzydlowskiEKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/Stone-GrossSZKKV11, author = {Brett Stone{-}Gross and Ryan Stevens and Apostolis Zarras and Richard A. Kemmerer and Christopher Kruegel and Giovanni Vigna}, editor = {Patrick Thiran and Walter Willinger}, title = {Understanding fraudulent activities in online ad exchanges}, booktitle = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} '11, Berlin, Germany, November 2-, 2011}, pages = {279--294}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2068816.2068843}, doi = {10.1145/2068816.2068843}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/Stone-GrossSZKKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Stone-GrossCKV11, author = {Brett Stone{-}Gross and Marco Cova and Christopher Kruegel and Giovanni Vigna}, title = {Peering through the iframe}, booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 10-15 April 2011, Shanghai, China}, pages = {411--415}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INFCOM.2011.5935193}, doi = {10.1109/INFCOM.2011.5935193}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/Stone-GrossCKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/leet/Stone-GrossHSV11, author = {Brett Stone{-}Gross and Thorsten Holz and Gianluca Stringhini and Giovanni Vigna}, editor = {Christopher Kruegel}, title = {The Underground Economy of Spam: {A} Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns}, booktitle = {4th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '11, Boston, MA, USA, March 29, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/leet11/underground-economy-spam-botmasters-perspective-coordinating-large-scale-spam}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/leet/Stone-GrossHSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/EgeleKKV11, author = {Manuel Egele and Christopher Kruegel and Engin Kirda and Giovanni Vigna}, title = {PiOS: Detecting Privacy Leaks in iOS Applications}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2011, San Diego, California, USA, 6th February - 9th February 2011}, publisher = {The Internet Society}, year = {2011}, url = {https://www.ndss-symposium.org/ndss2011/pios-detecting-privacy-leaks-ios-applications-paper}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/EgeleKKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GilbertKKV11, author = {Bob Gilbert and Richard A. Kemmerer and Christopher Kruegel and Giovanni Vigna}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Dymo: Tracking Dynamic Code Identity}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {21--40}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_2}, doi = {10.1007/978-3-642-23644-0\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/GilbertKKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/FratantonioKV11, author = {Yanick Fratantonio and Christopher Kruegel and Giovanni Vigna}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Shellzer: {A} Tool for the Dynamic Analysis of Malicious Shellcode}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {61--80}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_4}, doi = {10.1007/978-3-642-23644-0\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/FratantonioKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CavedonFV11a, author = {Ludovico Cavedon and Luca Foschini and Giovanni Vigna}, editor = {David Brumley and Michal Zalewski}, title = {Getting the Face Behind the Squares: Reconstructing Pixelized Video Streams}, booktitle = {5th {USENIX} Workshop on Offensive Technologies, WOOT'11, August 8, 2011, San Francisco, CA, USA, Proceedings}, pages = {37--45}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/event/woot11/tech/final\_files/Cavedon.pdf}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/CavedonFV11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/StringhiniHSKV11, author = {Gianluca Stringhini and Thorsten Holz and Brett Stone{-}Gross and Christopher Kruegel and Giovanni Vigna}, title = {{BOTMAGNIFIER:} Locating Spambots on the Internet}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Stringhini.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/StringhiniHSKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/Stone-GrossAKKS11a, author = {Brett Stone{-}Gross and Ryan Abman and Richard A. Kemmerer and Christopher Kruegel and Douglas G. Steigerwald and Giovanni Vigna}, editor = {Bruce Schneier}, title = {The Underground Economy of Fake Antivirus Software}, booktitle = {Economics of Information Security and Privacy {III} [papers from the Tenth Workshop on Economics and Information Security, {WEIS} 2011]}, pages = {55--78}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-1981-5\_4}, doi = {10.1007/978-1-4614-1981-5\_4}, timestamp = {Fri, 16 Aug 2019 12:52:37 +0200}, biburl = {https://dblp.org/rec/conf/weis/Stone-GrossAKKS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/CanaliCVK11, author = {Davide Canali and Marco Cova and Giovanni Vigna and Christopher Kruegel}, editor = {Sadagopan Srinivasan and Krithi Ramamritham and Arun Kumar and M. P. Ravindra and Elisa Bertino and Ravi Kumar}, title = {Prophiler: a fast filter for the large-scale detection of malicious web pages}, booktitle = {Proceedings of the 20th International Conference on World Wide Web, {WWW} 2011, Hyderabad, India, March 28 - April 1, 2011}, pages = {197--206}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1963405.1963436}, doi = {10.1145/1963405.1963436}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/CanaliCVK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/BalzarottiBCFKRVV10, author = {Davide Balzarotti and Greg Banks and Marco Cova and Viktoria Felmetsger and Richard A. Kemmerer and William K. Robertson and Fredrik Valeur and Giovanni Vigna}, title = {An Experience in Testing the Security of Real-World Electronic Voting Systems}, journal = {{IEEE} Trans. Software Eng.}, volume = {36}, number = {4}, pages = {453--473}, year = {2010}, url = {https://doi.org/10.1109/TSE.2009.53}, doi = {10.1109/TSE.2009.53}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/BalzarottiBCFKRVV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/StringhiniKV10, author = {Gianluca Stringhini and Christopher Kruegel and Giovanni Vigna}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Detecting spammers on social networks}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {1--9}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920263}, doi = {10.1145/1920261.1920263}, timestamp = {Wed, 28 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/StringhiniKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Vigna10, author = {Giovanni Vigna}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Network intrusion detection: dead or alive?}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {117--126}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920279}, doi = {10.1145/1920261.1920279}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Vigna10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/DoupeCV10, author = {Adam Doup{\'{e}} and Marco Cova and Giovanni Vigna}, editor = {Christian Kreibich and Marko Jahnke}, title = {Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 7th International Conference, {DIMVA} 2010, Bonn, Germany, July 8-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6201}, pages = {111--131}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14215-4\_7}, doi = {10.1007/978-3-642-14215-4\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/DoupeCV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/ChildersBCCCEV10, author = {Nicholas Childers and Bryce Boe and Lorenzo Cavallaro and Ludovico Cavedon and Marco Cova and Manuel Egele and Giovanni Vigna}, editor = {Christian Kreibich and Marko Jahnke}, title = {Organizing Large Scale Hacking Competitions}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 7th International Conference, {DIMVA} 2010, Bonn, Germany, July 8-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6201}, pages = {132--152}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14215-4\_8}, doi = {10.1007/978-3-642-14215-4\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/ChildersBCCCEV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-4/CavedonKV10, author = {Ludovico Cavedon and Christopher Kruegel and Giovanni Vigna}, editor = {Jan Camenisch and Valentin S. Kisimov and Maria Dubovitskaya}, title = {Are {BGP} Routers Open to Attack? An Experiment}, booktitle = {Open Research Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6555}, pages = {88--103}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19228-9\_8}, doi = {10.1007/978-3-642-19228-9\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-4/CavedonKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BalzarottiCKKKV10, author = {Davide Balzarotti and Marco Cova and Christoph Karlberger and Engin Kirda and Christopher Kruegel and Giovanni Vigna}, title = {Efficient Detection of Split Personalities in Malware}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March 2010}, publisher = {The Internet Society}, year = {2010}, url = {https://www.ndss-symposium.org/ndss2010/efficient-detection-split-personalities-malware}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BalzarottiCKKKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/RobertsonMKV10, author = {William K. Robertson and Federico Maggi and Christopher Kruegel and Giovanni Vigna}, title = {Effective Anomaly Detection with Scarce Training Data}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March 2010}, publisher = {The Internet Society}, year = {2010}, url = {https://www.ndss-symposium.org/ndss2010/effective-anomaly-detection-scarce-training-data}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/RobertsonMKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FelmetsgerCKV10, author = {Viktoria Felmetsger and Ludovico Cavedon and Christopher Kruegel and Giovanni Vigna}, title = {Toward Automated Detection of Logic Vulnerabilities in Web Applications}, booktitle = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings}, pages = {143--160}, publisher = {{USENIX} Association}, year = {2010}, url = {http://www.usenix.org/events/sec10/tech/full\_papers/Felmetsger.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/FelmetsgerCKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/CovaKV10, author = {Marco Cova and Christopher Kr{\"{u}}gel and Giovanni Vigna}, editor = {Michael Rappa and Paul Jones and Juliana Freire and Soumen Chakrabarti}, title = {Detection and analysis of drive-by-download attacks and malicious JavaScript code}, booktitle = {Proceedings of the 19th International Conference on World Wide Web, {WWW} 2010, Raleigh, North Carolina, USA, April 26-30, 2010}, pages = {281--290}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1772690.1772720}, doi = {10.1145/1772690.1772720}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/CovaKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KirdaJKV09, author = {Engin Kirda and Nenad Jovanovic and Christopher Kruegel and Giovanni Vigna}, title = {Client-side cross-site scripting protection}, journal = {Comput. Secur.}, volume = {28}, number = {7}, pages = {592--604}, year = {2009}, url = {https://doi.org/10.1016/j.cose.2009.04.008}, doi = {10.1016/J.COSE.2009.04.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KirdaJKV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/VignaVBRKK09, author = {Giovanni Vigna and Fredrik Valeur and Davide Balzarotti and William K. Robertson and Christopher Kruegel and Engin Kirda}, title = {Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and {SQL} queries}, journal = {J. Comput. Secur.}, volume = {17}, number = {3}, pages = {305--329}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0321}, doi = {10.3233/JCS-2009-0321}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/VignaVBRKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FordCKV09, author = {Sean Ford and Marco Cova and Christopher Kruegel and Giovanni Vigna}, title = {Analyzing and Detecting Malicious Flash Advertisements}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {363--372}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.41}, doi = {10.1109/ACSAC.2009.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FordCKV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Stone-GrossCCGSKKV09, author = {Brett Stone{-}Gross and Marco Cova and Lorenzo Cavallaro and Bob Gilbert and Martin Szydlowski and Richard A. Kemmerer and Christopher Kruegel and Giovanni Vigna}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {Your botnet is my botnet: analysis of a botnet takeover}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {635--647}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653738}, doi = {10.1145/1653662.1653738}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Stone-GrossCCGSKKV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/StammingerKVK09, author = {Andreas Stamminger and Christopher Kruegel and Giovanni Vigna and Engin Kirda}, editor = {Pierangela Samarati and Moti Yung and Fabio Martinelli and Claudio A. Ardagna}, title = {Automated Spyware Collection and Analysis}, booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa, Italy, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5735}, pages = {202--217}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04474-8\_17}, doi = {10.1007/978-3-642-04474-8\_17}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/isw/StammingerKVK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MaggiRKV09, author = {Federico Maggi and William K. Robertson and Christopher Kr{\"{u}}gel and Giovanni Vigna}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Protecting a Moving Target: Addressing Web Application Concept Drift}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {21--40}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_2}, doi = {10.1007/978-3-642-04342-0\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/MaggiRKV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RobertsonV09, author = {William K. Robertson and Giovanni Vigna}, editor = {Fabian Monrose}, title = {Static Enforcement of Web Application Integrity Through Strong Typing}, booktitle = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14, 2009, Proceedings}, pages = {283--298}, publisher = {{USENIX} Association}, year = {2009}, url = {http://www.usenix.org/events/sec09/tech/full\_papers/robertson.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/RobertsonV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/FoschiniTCKV08, author = {Luca Foschini and Ashish V. Thapliyal and Lorenzo Cavallaro and Christopher Kruegel and Giovanni Vigna}, editor = {R. Sekar and Arun K. Pujari}, title = {A Parallel Architecture for Stateful, High-Speed Intrusion Detection}, booktitle = {Information Systems Security, 4th International Conference, {ICISS} 2008, Hyderabad, India, December 16-20, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {203--220}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89862-7\_18}, doi = {10.1007/978-3-540-89862-7\_18}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/FoschiniTCKV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/BalzarottiBCFKRVV08, author = {Davide Balzarotti and Greg Banks and Marco Cova and Viktoria Felmetsger and Richard A. Kemmerer and William K. Robertson and Fredrik Valeur and Giovanni Vigna}, editor = {Barbara G. Ryder and Andreas Zeller}, title = {Are your votes \emph{really} counted?: testing the security of real-world electronic voting systems}, booktitle = {Proceedings of the {ACM/SIGSOFT} International Symposium on Software Testing and Analysis, {ISSTA} 2008, Seattle, WA, USA, July 20-24, 2008}, pages = {237--248}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1390630.1390660}, doi = {10.1145/1390630.1390660}, timestamp = {Tue, 06 Nov 2018 16:57:30 +0100}, biburl = {https://dblp.org/rec/conf/issta/BalzarottiBCFKRVV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BalzarottiCV08, author = {Davide Balzarotti and Marco Cova and Giovanni Vigna}, title = {ClearShot: Eavesdropping on Keyboard Input from Video}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {170--183}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.28}, doi = {10.1109/SP.2008.28}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/BalzarottiCV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BalzarottiCFJKKV08, author = {Davide Balzarotti and Marco Cova and Viktoria Felmetsger and Nenad Jovanovic and Engin Kirda and Christopher Kruegel and Giovanni Vigna}, title = {Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {387--401}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.22}, doi = {10.1109/SP.2008.22}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BalzarottiCFJKKV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CovaKV08, author = {Marco Cova and Christopher Kruegel and Giovanni Vigna}, editor = {Dan Boneh and Tal Garfinkel and Dug Song}, title = {There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits}, booktitle = {2nd {USENIX} Workshop on Offensive Technologies, WOOT'08, San Jose, CA, USA, July 28, 2008, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/woot08/tech/full\_papers/cova/cova.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/CovaKV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KlinkoffKKV07, author = {Patrick Klinkoff and Engin Kirda and Christopher Kruegel and Giovanni Vigna}, title = {Extending .NET security to unmanaged code}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {6}, pages = {417--428}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0031-0}, doi = {10.1007/S10207-007-0031-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KlinkoffKKV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/ArnesHVK07, author = {Andr{\'{e}} {\AA}rnes and Paul Haas and Giovanni Vigna and Richard A. Kemmerer}, title = {Using a virtual security testbed for digital forensic reconstruction}, journal = {J. Comput. Virol.}, volume = {2}, number = {4}, pages = {275--289}, year = {2007}, url = {https://doi.org/10.1007/s11416-006-0033-x}, doi = {10.1007/S11416-006-0033-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/ArnesHVK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KruegelBRV07, author = {Christopher Kruegel and Davide Balzarotti and William K. Robertson and Giovanni Vigna}, title = {Improving Signature Testing through Dynamic Data Flow Analysis}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {53--63}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.40}, doi = {10.1109/ACSAC.2007.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KruegelBRV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GundyCSV07, author = {Matthew Van Gundy and Hao Chen and Zhendong Su and Giovanni Vigna}, title = {Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {74--85}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.42}, doi = {10.1109/ACSAC.2007.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GundyCSV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BalzarottiCFV07, author = {Davide Balzarotti and Marco Cova and Viktoria Felmetsger and Giovanni Vigna}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Multi-module vulnerability analysis of web-based applications}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {25--35}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315250}, doi = {10.1145/1315245.1315250}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BalzarottiCFV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/CarzanigaPV07, author = {Antonio Carzaniga and Gian Pietro Picco and Giovanni Vigna}, title = {Is Code Still Moving Around? Looking Back at a Decade of Code Mobility}, booktitle = {29th International Conference on Software Engineering {(ICSE} 2007), Minneapolis, MN, USA, May 20-26, 2007, Companion Volume}, pages = {9--20}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICSECOMPANION.2007.44}, doi = {10.1109/ICSECOMPANION.2007.44}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/CarzanigaPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/VogtNJKKV07, author = {Philipp Vogt and Florian Nentwich and Nenad Jovanovic and Engin Kirda and Christopher Kr{\"{u}}gel and Giovanni Vigna}, title = {Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March 2007}, publisher = {The Internet Society}, year = {2007}, url = {https://www.ndss-symposium.org/ndss2007/cross-site-scripting-prevention-dynamic-data-tainting-and-static-analysis/}, timestamp = {Mon, 01 Feb 2021 08:42:16 +0100}, biburl = {https://dblp.org/rec/conf/ndss/VogtNJKKV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MutzRVK07, author = {Darren Mutz and William K. Robertson and Giovanni Vigna and Richard A. Kemmerer}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {Exploiting Execution Context for the Detection of Anomalous System Calls}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {1--20}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_1}, doi = {10.1007/978-3-540-74320-0\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/MutzRVK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CovaBFV07, author = {Marco Cova and Davide Balzarotti and Viktoria Felmetsger and Giovanni Vigna}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {63--86}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_4}, doi = {10.1007/978-3-540-74320-0\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CovaBFV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/GundyBV07, author = {Matthew Van Gundy and Davide Balzarotti and Giovanni Vigna}, editor = {Dan Boneh and Tal Garfinkel and Dug Song}, title = {Catch Me, If You Can: Evading Network Signatures with Web-based Polymorphic Worms}, booktitle = {First {USENIX} Workshop on Offensive Technologies, {WOOT} '07, Boston, MA, USA, August 6, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/woot-07/catch-me-if-you-can-evading-network-signatures-web-based-polymorphic-worms}, timestamp = {Mon, 01 Feb 2021 08:41:52 +0100}, biburl = {https://dblp.org/rec/conf/woot/GundyBV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/swb/CovaFV07, author = {Marco Cova and Viktoria Felmetsger and Giovanni Vigna}, editor = {Luciano Baresi and Elisabetta Di Nitto}, title = {Vulnerability Analysis of Web-based Applications}, booktitle = {Test and Analysis of Web Services}, pages = {363--394}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72912-9\_13}, doi = {10.1007/978-3-540-72912-9\_13}, timestamp = {Mon, 15 Jun 2020 17:07:26 +0200}, biburl = {https://dblp.org/rec/conf/swb/CovaFV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Vigna07, author = {Giovanni Vigna}, editor = {Mihai Christodorescu and Somesh Jha and Douglas Maughan and Dawn Song and Cliff Wang}, title = {Static Disassembly and Code Analysis}, booktitle = {Malware Detection}, series = {Advances in Information Security}, volume = {27}, pages = {19--41}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44599-1\_2}, doi = {10.1007/978-0-387-44599-1\_2}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/Vigna07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MutzVVK06, author = {Darren Mutz and Fredrik Valeur and Giovanni Vigna and Christopher Kr{\"{u}}gel}, title = {Anomalous system call detection}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {1}, pages = {61--93}, year = {2006}, url = {https://doi.org/10.1145/1127345.1127348}, doi = {10.1145/1127345.1127348}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MutzVVK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MullinerV06, author = {Collin Mulliner and Giovanni Vigna}, title = {Vulnerability Analysis of {MMS} User Agents}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {77--88}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.55}, doi = {10.1109/ACSAC.2006.55}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MullinerV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CovaFBV06, author = {Marco Cova and Viktoria Felmetsger and Greg Banks and Giovanni Vigna}, title = {Static Detection of Vulnerabilities in x86 Executables}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {269--278}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.50}, doi = {10.1109/ACSAC.2006.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CovaFBV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/MullinerVDL06, author = {Collin Mulliner and Giovanni Vigna and David Dagon and Wenke Lee}, editor = {Roland B{\"{u}}schkes and Pavel Laskov}, title = {Using Labeling to Prevent Cross-Service Attacks Against Smart Phones}, booktitle = {Detection of Intrusions and Malware {\&} Vulnerability Assessment, Third International Conference, {DIMVA} 2006, Berlin, Germany, July 13-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4064}, pages = {91--108}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11790754\_6}, doi = {10.1007/11790754\_6}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/MullinerVDL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/ArnesHVK06, author = {Andr{\'{e}} {\AA}rnes and Paul Haas and Giovanni Vigna and Richard A. Kemmerer}, editor = {Roland B{\"{u}}schkes and Pavel Laskov}, title = {Digital Forensic Reconstruction and the Virtual Security Testbed ViSe}, booktitle = {Detection of Intrusions and Malware {\&} Vulnerability Assessment, Third International Conference, {DIMVA} 2006, Berlin, Germany, July 13-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4064}, pages = {144--163}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11790754\_9}, doi = {10.1007/11790754\_9}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/ArnesHVK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KlinkoffKKV06, author = {Patrick Klinkoff and Christopher Kr{\"{u}}gel and Engin Kirda and Giovanni Vigna}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {Extending .NET Security to Unmanaged Code}, booktitle = {Information Security, 9th International Conference, {ISC} 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4176}, pages = {1--16}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11836810\_1}, doi = {10.1007/11836810\_1}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/KlinkoffKKV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BanksCFAKV06, author = {Greg Banks and Marco Cova and Viktoria Felmetsger and Kevin C. Almeroth and Richard A. Kemmerer and Giovanni Vigna}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {{SNOOZE:} Toward a Stateful NetwOrk prOtocol fuzZEr}, booktitle = {Information Security, 9th International Conference, {ISC} 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4176}, pages = {343--358}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11836810\_25}, doi = {10.1007/11836810\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/BanksCFAKV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/RobertsonVKK06, author = {William K. Robertson and Giovanni Vigna and Christopher Kr{\"{u}}gel and Richard A. Kemmerer}, title = {Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2006, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2006}, url = {https://www.ndss-symposium.org/ndss2006/using-generalization-and-characterization-techniques-anomaly-based-detection-web-attacks/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/RobertsonVKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ArnesVVK06, author = {Andr{\'{e}} {\AA}rnes and Fredrik Valeur and Giovanni Vigna and Richard A. Kemmerer}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Using Hidden Markov Models to Evaluate the Risks of Intrusions}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {145--164}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_8}, doi = {10.1007/11856214\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/ArnesVVK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/KirdaKVJ06, author = {Engin Kirda and Christopher Kr{\"{u}}gel and Giovanni Vigna and Nenad Jovanovic}, editor = {Hisham Haddad}, title = {Noxes: a client-side solution for mitigating cross-site scripting attacks}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006}, pages = {330--337}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1141277.1141357}, doi = {10.1145/1141277.1141357}, timestamp = {Tue, 06 Nov 2018 11:06:49 +0100}, biburl = {https://dblp.org/rec/conf/sac/KirdaKVJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ValeurVKK06, author = {Fredrik Valeur and Giovanni Vigna and Christopher Kr{\"{u}}gel and Engin Kirda}, editor = {Hisham Haddad}, title = {An anomaly-driven reverse proxy for web applications}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006}, pages = {361--368}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1141277.1141361}, doi = {10.1145/1141277.1141361}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/ValeurVKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/KruegelVV05, author = {Christopher Kruegel and Fredrik Valeur and Giovanni Vigna}, title = {Intrusion Detection and Correlation - Challenges and Solutions}, series = {Advances in Information Security}, volume = {14}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b101493}, doi = {10.1007/B101493}, isbn = {978-0-387-23398-7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/KruegelVV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KrugelVR05, author = {Christopher Kr{\"{u}}gel and Giovanni Vigna and William K. Robertson}, title = {A multi-model approach to the detection of web-based attacks}, journal = {Comput. Networks}, volume = {48}, number = {5}, pages = {717--738}, year = {2005}, url = {https://doi.org/10.1016/j.comnet.2005.01.009}, doi = {10.1016/J.COMNET.2005.01.009}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/KrugelVR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/KemmererV05, author = {Richard A. Kemmerer and Giovanni Vigna}, title = {Hi-DRA: Intrusion Detection for Internet Security}, journal = {Proc. {IEEE}}, volume = {93}, number = {10}, pages = {1848--1857}, year = {2005}, url = {https://doi.org/10.1109/JPROC.2005.853547}, doi = {10.1109/JPROC.2005.853547}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/KemmererV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/ValeurMV05, author = {Fredrik Valeur and Darren Mutz and Giovanni Vigna}, editor = {Klaus Julisch and Christopher Kr{\"{u}}gel}, title = {A Learning-Based Approach to the Detection of {SQL} Attacks}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, {DIMVA} 2005, Vienna, Austria, July 7-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3548}, pages = {123--140}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506881\_8}, doi = {10.1007/11506881\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/ValeurMV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/HallarakerV05, author = {Oystein Hallaraker and Giovanni Vigna}, title = {Detecting Malicious JavaScript Code in Mozilla}, booktitle = {10th International Conference on Engineering of Complex Computer Systems {(ICECCS} 2005), 16-20 June 2005, Shanghai, China}, pages = {85--94}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICECCS.2005.35}, doi = {10.1109/ICECCS.2005.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceccs/HallarakerV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/FelmetsgerV05, author = {Viktoria Felmetsger and Giovanni Vigna}, title = {Exploiting OS-Level Mechanisms to Implement Mobile Code Security}, booktitle = {10th International Conference on Engineering of Complex Computer Systems {(ICECCS} 2005), 16-20 June 2005, Shanghai, China}, pages = {234--243}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICECCS.2005.41}, doi = {10.1109/ICECCS.2005.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceccs/FelmetsgerV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KrugelKMRV05, author = {Christopher Kr{\"{u}}gel and Engin Kirda and Darren Mutz and William K. Robertson and Giovanni Vigna}, editor = {Alfonso Valdes and Diego Zamboni}, title = {Polymorphic Worm Detection Using Structural Information of Executables}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {207--226}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_11}, doi = {10.1007/11663812\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/KrugelKMRV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KruegelKMRV05, author = {Christopher Kruegel and Engin Kirda and Darren Mutz and William K. Robertson and Giovanni Vigna}, editor = {Patrick D. McDaniel}, title = {Automating Mimicry Attacks Using Static Binary Analysis}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/automating-mimicry-attacks-using-static-binary-analysis}, timestamp = {Mon, 01 Feb 2021 08:42:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/KruegelKMRV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pik/KruegelRV04, author = {Christopher Kruegel and William K. Robertson and Giovanni Vigna}, title = {Using Alert Verification to Identify Successful Intrusion Attempts}, journal = {Prax. Inf.verarb. Kommun.}, volume = {27}, number = {4}, pages = {219--227}, year = {2004}, url = {https://doi.org/10.1515/PIKO.2004.219}, doi = {10.1515/PIKO.2004.219}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pik/KruegelRV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ValeurVKK04, author = {Fredrik Valeur and Giovanni Vigna and Christopher Kr{\"{u}}gel and Richard A. Kemmerer}, title = {A Comprehensive Approach to Intrusion Detection Alert Correlation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {1}, number = {3}, pages = {146--169}, year = {2004}, url = {https://doi.org/10.1109/TDSC.2004.21}, doi = {10.1109/TDSC.2004.21}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ValeurVKK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/VignaGSBK04, author = {Giovanni Vigna and Sumit Gwalani and Kavitha Srinivasan and Elizabeth M. Belding{-}Royer and Richard A. Kemmerer}, title = {An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks}, booktitle = {20th Annual Computer Security Applications Conference {(ACSAC} 2004), 6-10 December 2004, Tucson, AZ, {USA}}, pages = {16--27}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CSAC.2004.6}, doi = {10.1109/CSAC.2004.6}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/VignaGSBK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KrugelRV04, author = {Christopher Kr{\"{u}}gel and William K. Robertson and Giovanni Vigna}, title = {Detecting Kernel-Level Rootkits Through Binary Analysis}, booktitle = {20th Annual Computer Security Applications Conference {(ACSAC} 2004), 6-10 December 2004, Tucson, AZ, {USA}}, pages = {91--100}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CSAC.2004.19}, doi = {10.1109/CSAC.2004.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KrugelRV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhouV04, author = {Jingyu Zhou and Giovanni Vigna}, title = {Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing}, booktitle = {20th Annual Computer Security Applications Conference {(ACSAC} 2004), 6-10 December 2004, Tucson, AZ, {USA}}, pages = {168--178}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CSAC.2004.17}, doi = {10.1109/CSAC.2004.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhouV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VignaRB04, author = {Giovanni Vigna and William K. Robertson and Davide Balzarotti}, editor = {Vijayalakshmi Atluri and Birgit Pfitzmann and Patrick D. McDaniel}, title = {Testing network-based intrusion detection signatures using mutant exploits}, booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004}, pages = {21--30}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1030083.1030088}, doi = {10.1145/1030083.1030088}, timestamp = {Fri, 13 Nov 2020 16:10:44 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VignaRB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdm/Vigna04, author = {Giovanni Vigna}, title = {Mobile Agents: Ten Reasons For Failure}, booktitle = {5th {IEEE} International Conference on Mobile Data Management {(MDM} 2004), 19-22 January 2004, Berkeley, CA, {USA}}, pages = {298--299}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/MDM.2004.1263077}, doi = {10.1109/MDM.2004.1263077}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mdm/Vigna04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KruegelRVV04, author = {Christopher Kr{\"{u}}gel and William K. Robertson and Fredrik Valeur and Giovanni Vigna}, editor = {Matt Blaze}, title = {Static Disassembly of Obfuscated Binaries}, booktitle = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13, 2004, San Diego, CA, {USA}}, pages = {255--270}, publisher = {{USENIX}}, year = {2004}, url = {http://www.usenix.org/publications/library/proceedings/sec04/tech/kruegel.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KruegelRVV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/VignaRKK03, author = {Giovanni Vigna and William K. Robertson and Vishal Kher and Richard A. Kemmerer}, title = {A Stateful Intrusion Detection System for World-Wide Web Servers}, booktitle = {19th Annual Computer Security Applications Conference {(ACSAC} 2003), 8-12 December 2003, Las Vegas, NV, {USA}}, pages = {34--43}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CSAC.2003.1254308}, doi = {10.1109/CSAC.2003.1254308}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/VignaRKK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MutzVK03, author = {Darren Mutz and Giovanni Vigna and Richard A. Kemmerer}, title = {An Experience Developing an {IDS} Stimulator for the Black-Box Testing of Network Intrusion Detection Systems}, booktitle = {19th Annual Computer Security Applications Conference {(ACSAC} 2003), 8-12 December 2003, Las Vegas, NV, {USA}}, pages = {374--383}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CSAC.2003.1254342}, doi = {10.1109/CSAC.2003.1254342}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MutzVK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KrugelV03, author = {Christopher Kr{\"{u}}gel and Giovanni Vigna}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Anomaly detection of web-based attacks}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {251--261}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948144}, doi = {10.1145/948109.948144}, timestamp = {Tue, 10 Nov 2020 20:00:42 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KrugelV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KruegelMVV03, author = {Christopher Kr{\"{u}}gel and Darren Mutz and Fredrik Valeur and Giovanni Vigna}, editor = {Einar Snekkenes and Dieter Gollmann}, title = {On the Detection of Anomalous System Call Arguments}, booktitle = {Computer Security - {ESORICS} 2003, 8th European Symposium on Research in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2808}, pages = {326--343}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39650-5\_19}, doi = {10.1007/978-3-540-39650-5\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KruegelMVV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/Vigna03, author = {Giovanni Vigna}, editor = {Keijiro Araki and Stefania Gnesi and Dino Mandrioli}, title = {A Topological Characterization of {TCP/IP} Security}, booktitle = {{FME} 2003: Formal Methods, International Symposium of Formal Methods Europe, Pisa, Italy, September 8-14, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2805}, pages = {914--939}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45236-2\_49}, doi = {10.1007/978-3-540-45236-2\_49}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/fm/Vigna03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/KemmererV03, author = {Richard A. Kemmerer and Giovanni Vigna}, editor = {Lori A. Clarke and Laurie Dillon and Walter F. Tichy}, title = {Internet Security and Intrusion Detection}, booktitle = {Proceedings of the 25th International Conference on Software Engineering, May 3-10, 2003, Portland, Oregon, {USA}}, pages = {748--749}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSE.2003.10000}, doi = {10.1109/ICSE.2003.10000}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/KemmererV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-8/Vigna03, author = {Giovanni Vigna}, editor = {Cynthia E. Irvine and Helen L. Armstrong}, title = {Teaching Network Security Through Live Exercises}, booktitle = {Security Education and Critical Infrastructures, {IFIP} {TC11} / {WG11.8} Third Annual World Conference on Information Security Education (WISE3), June 26-28, 2003, Monterey, California, {USA}}, series = {{IFIP} Conference Proceedings}, volume = {253}, pages = {3--18}, publisher = {Kluwer}, year = {2003}, timestamp = {Thu, 06 May 2004 14:39:20 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-8/Vigna03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/VignaVK03, author = {Giovanni Vigna and Fredrik Valeur and Richard A. Kemmerer}, editor = {Jukka Paakki and Paola Inverardi}, title = {Designing and implementing a family of intrusion detection systems}, booktitle = {Proceedings of the 11th {ACM} {SIGSOFT} Symposium on Foundations of Software Engineering 2003 held jointly with 9th European Software Engineering Conference, {ESEC/FSE} 2003, Helsinki, Finland, September 1-5, 2003}, pages = {88--97}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/940071.940084}, doi = {10.1145/940071.940084}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/VignaVK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SomanKV03, author = {Sunil Soman and Chandra Krintz and Giovanni Vigna}, title = {Detecting Malicious Java Code Using Virtual Machine Auditing}, booktitle = {Proceedings of the 12th {USENIX} Security Symposium, Washington, D.C., USA, August 4-8, 2003}, publisher = {{USENIX} Association}, year = {2003}, url = {https://www.usenix.org/conference/12th-usenix-security-symposium/detecting-malicious-java-code-using-virtual-machine}, timestamp = {Mon, 01 Feb 2021 08:43:16 +0100}, biburl = {https://dblp.org/rec/conf/uss/SomanKV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2003, editor = {Giovanni Vigna and Erland Jonsson and Christopher Kr{\"{u}}gel}, title = {Recent Advances in Intrusion Detection, 6th International Symposium, {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2820}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/b13476}, doi = {10.1007/B13476}, isbn = {3-540-40878-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/EckmannVK02, author = {Steven T. Eckmann and Giovanni Vigna and Richard A. Kemmerer}, title = {{STATL:} An Attack Language for State-Based Intrusion Detection}, journal = {J. Comput. Secur.}, volume = {10}, number = {1/2}, pages = {71--104}, year = {2002}, url = {https://doi.org/10.3233/jcs-2002-101-204}, doi = {10.3233/JCS-2002-101-204}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/EckmannVK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/VignaVZK02, author = {Giovanni Vigna and Fredrik Valeur and Jingyu Zhou and Richard A. Kemmerer}, title = {Composable Tools For Network Discovery and Security Analysis}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {14--24}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176274}, doi = {10.1109/CSAC.2002.1176274}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/VignaVZK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MittalV02, author = {Vishal Mittal and Giovanni Vigna}, editor = {Vijayalakshmi Atluri}, title = {Sensor-based intrusion detection for intra-domain distance-vector routing}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {127--137}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586129}, doi = {10.1145/586110.586129}, timestamp = {Tue, 10 Nov 2020 20:00:47 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MittalV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/VignaM02, author = {Giovanni Vigna and Andrew Mitchel}, title = {Mnemosyne: Designing and Implementing Network Short-Term Memory}, booktitle = {8th International Conference on Engineering of Complex Computer Systems {(ICECCS} 2002), 2-4 December 2002, Greenbelt, MD, {USA}}, pages = {91--100}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ICECCS.2002.1181501}, doi = {10.1109/ICECCS.2002.1181501}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceccs/VignaM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ma/VignaCF02, author = {Giovanni Vigna and Bryan Cassell and Dave Fayram}, editor = {Niranjan Suri}, title = {An Intrusion Detection System for Aglets}, booktitle = {Mobile Agents, 6th International Conference, {MA} 2002, Barcelona, Spain, October 22-25, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2535}, pages = {64--77}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36112-X\_5}, doi = {10.1007/3-540-36112-X\_5}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/ma/VignaCF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KrugelVVK02, author = {Christopher Kr{\"{u}}gel and Fredrik Valeur and Giovanni Vigna and Richard A. Kemmerer}, title = {Stateful Intrusion Detection for High-Speed Networks}, booktitle = {2002 {IEEE} Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002}, pages = {285--293}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/SECPRI.2002.1004378}, doi = {10.1109/SECPRI.2002.1004378}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/KrugelVVK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2002, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0}, doi = {10.1007/3-540-36084-0}, isbn = {3-540-00020-8}, timestamp = {Sat, 07 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ma/FischmeisterVK01, author = {Sebastian Fischmeister and Giovanni Vigna and Richard A. Kemmerer}, editor = {Gian Pietro Picco}, title = {Evaluating the Security of Three Java-Based Mobile Agent Systems}, booktitle = {Mobile Agents, 5th International Conference, {MA} 2001 Atlanta, GA, USA, December 2-4, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2240}, pages = {31--41}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45647-3\_3}, doi = {10.1007/3-540-45647-3\_3}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/ma/FischmeisterVK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/VignaKB01, author = {Giovanni Vigna and Richard A. Kemmerer and Per Blix}, editor = {Wenke Lee and Ludovic M{\'{e}} and Andreas Wespi}, title = {Designing a Web of Highly-Configurable Intrusion Detection Sensors}, booktitle = {Recent Advances in Intrusion Detection, 4th International Symposium, {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2212}, pages = {69--84}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45474-8\_5}, doi = {10.1007/3-540-45474-8\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/VignaKB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SantosVK01, author = {Andr{\'{e}} L. M. dos Santos and Giovanni Vigna and Richard A. Kemmerer}, editor = {Anup K. Ghosh}, title = {Security Testing of an Online Banking Service}, booktitle = {E-Commerce Security and Privacy}, series = {Advances in Information Security}, volume = {2}, pages = {3--15}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/978-1-4615-1467-1\_1}, doi = {10.1007/978-1-4615-1467-1\_1}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/SantosVK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/VignaK99, author = {Giovanni Vigna and Richard A. Kemmerer}, title = {NetSTAT: {A} Network-based Intrusion Detection System}, journal = {J. Comput. Secur.}, volume = {7}, number = {1}, pages = {37--71}, year = {1999}, url = {https://doi.org/10.3233/jcs-1999-7103}, doi = {10.3233/JCS-1999-7103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/VignaK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/FuggettaPV98, author = {Alfonso Fuggetta and Gian Pietro Picco and Giovanni Vigna}, title = {Understanding Code Mobility}, journal = {{IEEE} Trans. Software Eng.}, volume = {24}, number = {5}, pages = {342--361}, year = {1998}, url = {https://doi.org/10.1109/32.685258}, doi = {10.1109/32.685258}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tse/FuggettaPV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/VignaK98, author = {Giovanni Vigna and Richard A. Kemmerer}, title = {NetSTAT: {A} Network-Based Intrusion Detection Approach}, booktitle = {14th Annual Computer Security Applications Conference {(ACSAC} 1998), 7-11 December 1998, Scottsdale, AZ, {USA}}, pages = {25--34}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/CSAC.1998.738566}, doi = {10.1109/CSAC.1998.738566}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/VignaK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwssd/CodaGVG98, author = {Francesco Coda and Carlo Ghezzi and Giovanni Vigna and Franca Garzotto}, title = {Towards a Software Engineering Approach to Web Site Development}, booktitle = {Proceedings of the 9th International Workshop on Software Specification and Design, {IWSSD} 1998, USA, April 16-18, 1998}, pages = {8--17}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://dl.acm.org/doi/10.5555/857205.858298}, doi = {10.5555/857205.858298}, timestamp = {Mon, 16 May 2022 14:03:08 +0200}, biburl = {https://dblp.org/rec/conf/iwssd/CodaGVG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mas/Vigna98, author = {Giovanni Vigna}, editor = {Giovanni Vigna}, title = {Cryptographic Traces for Mobile Agents}, booktitle = {Mobile Agents and Security}, series = {Lecture Notes in Computer Science}, volume = {1419}, pages = {137--153}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-68671-1\_8}, doi = {10.1007/3-540-68671-1\_8}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/mas/Vigna98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mas/1998, editor = {Giovanni Vigna}, title = {Mobile Agents and Security}, series = {Lecture Notes in Computer Science}, volume = {1419}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-68671-1}, doi = {10.1007/3-540-68671-1}, isbn = {3-540-64792-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mas/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/CarzanigaPV97, author = {Antonio Carzaniga and Gian Pietro Picco and Giovanni Vigna}, editor = {W. Richards Adrion and Alfonso Fuggetta and Richard N. Taylor and Anthony I. Wasserman}, title = {Designing Distributed Applications with Mobile Code Paradigms}, booktitle = {Pulling Together, Proceedings of the 19th International Conference on Software Engineering, Boston, Massachusetts, USA, May 17-23, 1997}, pages = {22--32}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/253228.253236}, doi = {10.1145/253228.253236}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/CarzanigaPV97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ma/GhezziV97, author = {Carlo Ghezzi and Giovanni Vigna}, editor = {Kurt Rothermel and Radu Popescu{-}Zeletin}, title = {Mobile Code Paradigms and Technologies: {A} Case Study}, booktitle = {Mobile Agents, First International Workshop, MA'97, Berlin, Germany, April 7-8, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1219}, pages = {39--49}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-62803-7\_22}, doi = {10.1007/3-540-62803-7\_22}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/ma/GhezziV97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rtse/GhezziV97, author = {Carlo Ghezzi and Giovanni Vigna}, editor = {Manfred Broy and Bernhard Rumpe}, title = {Software Engineering Issues for Network Computing}, booktitle = {Requirements Targeting Software and Systems Engineering, International Workshop {RTSE} '97, Bernried, Germany, October 12-14, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1526}, pages = {155--177}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/10692867\_7}, doi = {10.1007/10692867\_7}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/rtse/GhezziV97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mos/CugolaGPV96, author = {Gianpaolo Cugola and Carlo Ghezzi and Gian Pietro Picco and Giovanni Vigna}, editor = {Jan Vitek and Christian F. Tschudin}, title = {Analyzing Mobile Code Languages}, booktitle = {Mobile Object Systems - Towards the Programmable Internet, Second International Workshop, MOS'96, Linz, Austria, July 8-9, 1996, Selected Presentations and Invited Papers}, series = {Lecture Notes in Computer Science}, volume = {1222}, pages = {93--110}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62852-5\_9}, doi = {10.1007/3-540-62852-5\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/mos/CugolaGPV96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isooms/CarzanigaPV94, author = {Antonio Carzaniga and Gian Pietro Picco and Giovanni Vigna}, editor = {Elisa Bertino and Susan Darling Urban}, title = {Designing and Implementing Inter-Client Communication in the {O2} Object-Oriented Database Management System}, booktitle = {Object-Oriented Methodologies and Systems, International Symposium {ISOOMS} '94, Palermo, Italy, September 21-22, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {858}, pages = {53--64}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0014016}, doi = {10.1007/BFB0014016}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isooms/CarzanigaPV94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.