BibTeX records: Giovanni Vigna

download as .bib file

@inproceedings{DBLP:conf/eurosp/PletinckxNFKV23,
  author       = {Stijn Pletinckx and
                  Thanh{-}Dat Nguyen and
                  Tobias Fiebig and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Certifiably Vulnerable: Using Certificate Transparency Logs for Target
                  Reconnaissance},
  booktitle    = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023, Delft, Netherlands, July 3-7, 2023},
  pages        = {817--831},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSP57164.2023.00053},
  doi          = {10.1109/EUROSP57164.2023.00053},
  timestamp    = {Mon, 07 Aug 2023 15:56:23 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/PletinckxNFKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/BoseDVMGCBKV23,
  author       = {Priyanka Bose and
                  Dipanjan Das and
                  Saastha Vasan and
                  Sebastiano Mariani and
                  Ilya Grishchenko and
                  Andrea Continella and
                  Antonio Bianchi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Columbus: Android App Testing Through Systematic Callback Exploration},
  booktitle    = {45th {IEEE/ACM} International Conference on Software Engineering,
                  {ICSE} 2023, Melbourne, Australia, May 14-20, 2023},
  pages        = {1381--1392},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICSE48619.2023.00121},
  doi          = {10.1109/ICSE48619.2023.00121},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/BoseDVMGCBKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GustafsonGRJC0F23,
  author       = {Eric Gustafson and
                  Paul Grosen and
                  Nilo Redini and
                  Saagar Jha and
                  Andrea Continella and
                  Ruoyu Wang and
                  Kevin Fu and
                  Sara Rampazzi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Shimware: Toward Practical Security Retrofitting for Monolithic Firmware
                  Images},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {32--45},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607217},
  doi          = {10.1145/3607199.3607217},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GustafsonGRJC0F23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SpahnHHKV23,
  author       = {Noah Spahn and
                  Nils Hanke and
                  Thorsten Holz and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Container Orchestration Honeypot: Observing Attacks in the Wild},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {381--396},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607205},
  doi          = {10.1145/3607199.3607205},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SpahnHHKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BuschMSVKP23,
  author       = {Marcel Busch and
                  Aravind Machiry and
                  Chad Spensky and
                  Giovanni Vigna and
                  Christopher Kruegel and
                  Mathias Payer},
  title        = {TEEzz: Fuzzing Trusted Applications on {COTS} Android Devices},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {1204--1219},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179302},
  doi          = {10.1109/SP46215.2023.10179302},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BuschMSVKP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/TrickelPZDVKWBSD23,
  author       = {Erik Trickel and
                  Fabio Pagani and
                  Chang Zhu and
                  Lukas Dresel and
                  Giovanni Vigna and
                  Christopher Kruegel and
                  Ruoyu Wang and
                  Tiffany Bao and
                  Yan Shoshitaishvili and
                  Adam Doup{\'{e}}},
  title        = {Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational
                  Fuzzing to Detect {SQL} and Command Injection Vulnerabilities},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {2658--2675},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179317},
  doi          = {10.1109/SP46215.2023.10179317},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/TrickelPZDVKWBSD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GrittiRMB0GKV23,
  author       = {Fabio Gritti and
                  Nicola Ruaro and
                  Robert McLaughlin and
                  Priyanka Bose and
                  Dipanjan Das and
                  Ilya Grishchenko and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart
                  Contracts},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {1793--1810},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/gritti},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/GrittiRMB0GKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/McLaughlinKV23,
  author       = {Robert McLaughlin and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {A Large Scale Study of the Ethereum Arbitrage Ecosystem},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {3295--3312},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/mclaughlin},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/McLaughlinKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Fleischer0BBLPK23,
  author       = {Marius Fleischer and
                  Dipanjan Das and
                  Priyanka Bose and
                  Weiheng Bai and
                  Kangjie Lu and
                  Mathias Payer and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {{ACTOR:} Action-Guided Kernel Fuzzing},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5003--5020},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/fleischer},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Fleischer0BBLPK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-02344,
  author       = {Hojjat Aghakhani and
                  Wei Dai and
                  Andre Manoel and
                  Xavier Fernandes and
                  Anant Kharkar and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  David Evans and
                  Ben Zorn and
                  Robert Sim},
  title        = {TrojanPuzzle: Covertly Poisoning Code-Suggestion Models},
  journal      = {CoRR},
  volume       = {abs/2301.02344},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.02344},
  doi          = {10.48550/ARXIV.2301.02344},
  eprinttype    = {arXiv},
  eprint       = {2301.02344},
  timestamp    = {Fri, 25 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-02344.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-09806,
  author       = {Sayak Saha Roy and
                  Dipanjan Das and
                  Priyanka Bose and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Shirin Nilizadeh},
  title        = {Demystifying {NFT} Promotion and Phishing Scams},
  journal      = {CoRR},
  volume       = {abs/2301.09806},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.09806},
  doi          = {10.48550/ARXIV.2301.09806},
  eprinttype    = {arXiv},
  eprint       = {2301.09806},
  timestamp    = {Thu, 26 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-09806.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-09116,
  author       = {Priyanka Bose and
                  Dipanjan Das and
                  Saastha Vasan and
                  Sebastiano Mariani and
                  Ilya Grishchenko and
                  Andrea Continella and
                  Antonio Bianchi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Columbus: Android App Testing Through Systematic Callback Exploration},
  journal      = {CoRR},
  volume       = {abs/2302.09116},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.09116},
  doi          = {10.48550/ARXIV.2302.09116},
  eprinttype    = {arXiv},
  eprint       = {2302.09116},
  timestamp    = {Thu, 23 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-09116.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-02103,
  author       = {Christopher Salls and
                  Chani Jindal and
                  Jake Corina and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Token-Level Fuzzing},
  journal      = {CoRR},
  volume       = {abs/2304.02103},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.02103},
  doi          = {10.48550/ARXIV.2304.02103},
  eprinttype    = {arXiv},
  eprint       = {2304.02103},
  timestamp    = {Mon, 17 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-02103.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-06844,
  author       = {Priyanka Bose and
                  Dipanjan Das and
                  Fabio Gritti and
                  Nicola Ruaro and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Exploiting Unfair Advantages: Investigating Opportunistic Trading
                  in the {NFT} Market},
  journal      = {CoRR},
  volume       = {abs/2310.06844},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.06844},
  doi          = {10.48550/ARXIV.2310.06844},
  eprinttype    = {arXiv},
  eprint       = {2310.06844},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-06844.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HauserNSTRKV23,
  author       = {Christophe Hauser and
                  Shirin Nilizadeh and
                  Yan Shoshitaishvili and
                  Ni Trieu and
                  Srivatsan Ravi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Street Rep: {A} Privacy-Preserving Reputation Aggregation System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1346},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1346},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HauserNSTRKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GuptaDSVKK22,
  author       = {Rajat Gupta and
                  Lukas Patrick Dresel and
                  Noah Spahn and
                  Giovanni Vigna and
                  Christopher Kruegel and
                  Taesoo Kim},
  title        = {{POPKORN:} Popping Windows Kernel Drivers At Scale},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {854--868},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564631},
  doi          = {10.1145/3564625.3564631},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GuptaDSVKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0002BRKV22,
  author       = {Dipanjan Das and
                  Priyanka Bose and
                  Nicola Ruaro and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Understanding Security Issues in the {NFT} Ecosystem},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {667--681},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3559342},
  doi          = {10.1145/3548606.3559342},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0002BRKV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/DasBMMSVK22,
  author       = {Dipanjan Das and
                  Priyanka Bose and
                  Aravind Machiry and
                  Sebastiano Mariani and
                  Yan Shoshitaishvili and
                  Giovanni Vigna and
                  Christopher Kruegel},
  editor       = {Lorenzo Cavallaro and
                  Daniel Gruss and
                  Giancarlo Pellegrino and
                  Giorgio Giacinto},
  title        = {Hybrid Pruning: Towards Precise Pointer and Taint Analysis},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 19th International Conference, {DIMVA} 2022, Cagliari, Italy, June
                  29 - July 1, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13358},
  pages        = {1--22},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09484-2\_1},
  doi          = {10.1007/978-3-031-09484-2\_1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/DasBMMSVK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Bose0C0KV22,
  author       = {Priyanka Bose and
                  Dipanjan Das and
                  Yanju Chen and
                  Yu Feng and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{SAILFISH:} Vetting Smart Contract State-Inconsistency Bugs in Seconds},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {161--178},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833721},
  doi          = {10.1109/SP46214.2022.9833721},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Bose0C0KV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/EdeASBCCSPKV22,
  author       = {Thijs van Ede and
                  Hojjat Aghakhani and
                  Noah Spahn and
                  Riccardo Bortolameotti and
                  Marco Cova and
                  Andrea Continella and
                  Maarten van Steen and
                  Andreas Peter and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{DEEPCASE:} Semi-Supervised Contextual Analysis of Security Events},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {522--539},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833671},
  doi          = {10.1109/SP46214.2022.9833671},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/EdeASBCCSPKV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RuaroPOKV22,
  author       = {Nicola Ruaro and
                  Fabio Pagani and
                  Stefano Ortolani and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{SYMBEXCEL:} Automated Analysis and Understanding of Malicious Excel
                  4.0 Macros},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {1066--1081},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833765},
  doi          = {10.1109/SP46214.2022.9833765},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/RuaroPOKV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GrittiPGDRKV22,
  author       = {Fabio Gritti and
                  Fabio Pagani and
                  Ilya Grishchenko and
                  Lukas Dresel and
                  Nilo Redini and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{HEAPSTER:} Analyzing the Security of Dynamic Allocators for Monolithic
                  Firmware Images},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {1082--1099},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833610},
  doi          = {10.1109/SP46214.2022.9833610},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GrittiPGDRKV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ScharnowskiBSGM22,
  author       = {Tobias Scharnowski and
                  Nils Bars and
                  Moritz Schloegel and
                  Eric Gustafson and
                  Marius Muench and
                  Giovanni Vigna and
                  Christopher Kruegel and
                  Thorsten Holz and
                  Ali Abbasi},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Fuzzware: Using Precise {MMIO} Modeling for Effective Firmware Fuzzing},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {1239--1256},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/scharnowski},
  timestamp    = {Thu, 16 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ScharnowskiBSGM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BurkPKV22,
  author       = {Kevin Burk and
                  Fabio Pagani and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Decomperson: How Humans Decompile and What We Can Learn From It},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {2765--2782},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/burk},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BurkPKV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/McLaughlinPSKV22,
  author       = {Robert McLaughlin and
                  Fabio Pagani and
                  Noah Spahn and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Regulator: Dynamic Analysis to Detect ReDoS},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {4219--4235},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/mclaughlin},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/McLaughlinPSKV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BotacinAOKVOGG21,
  author       = {Marcus Botacin and
                  Hojjat Aghakhani and
                  Stefano Ortolani and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Daniela Oliveira and
                  Paulo L{\'{\i}}cio de Geus and
                  Andr{\'{e}} Gr{\'{e}}gio},
  title        = {One Size Does Not Fit All: {A} Longitudinal Analysis of Brazilian
                  Financial Malware},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {11:1--11:31},
  year         = {2021},
  url          = {https://doi.org/10.1145/3429741},
  doi          = {10.1145/3429741},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BotacinAOKVOGG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/SpenskyMRUFBOKV21,
  author       = {Chad Spensky and
                  Aravind Machiry and
                  Nilo Redini and
                  Colin Unger and
                  Graham Foster and
                  Evan Blasband and
                  Hamed Okhravi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {Conware: Automated Modeling of Hardware Peripherals},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {95--109},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3437532},
  doi          = {10.1145/3433210.3437532},
  timestamp    = {Wed, 09 Jun 2021 15:14:39 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/SpenskyMRUFBOKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/MengGMABCKV21,
  author       = {Dongyu Meng and
                  Michele Guerriero and
                  Aravind Machiry and
                  Hojjat Aghakhani and
                  Priyanka Bose and
                  Andrea Continella and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {Bran: Reduce Vulnerability Search Space in Large Open Source Repositories
                  by Learning Bug Symptoms},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {731--743},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3453115},
  doi          = {10.1145/3433210.3453115},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiaccs/MengGMABCKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/QuartaIMFGBLVK21,
  author       = {Davide Quarta and
                  Michele Ianni and
                  Aravind Machiry and
                  Yanick Fratantonio and
                  Eric Gustafson and
                  Davide Balzarotti and
                  Martina Lindorfer and
                  Giovanni Vigna and
                  Christopher Kruegel},
  editor       = {Christophe Hauser and
                  Yonghwi Kwon and
                  Sebastian Banescu},
  title        = {Tarnhelm: Isolated, Transparent {\&} Confidential Execution of
                  Arbitrary Code in ARM's TrustZone},
  booktitle    = {Checkmate@CCS 2021, Proceedings of the Research on offensive and defensive
                  techniques in the Context of Man At The End {(MATE)} Attacks, Virtual
                  Event, Republic of Korea, 19 November 2021},
  pages        = {43--57},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3465413.3488571},
  doi          = {10.1145/3465413.3488571},
  timestamp    = {Tue, 23 Nov 2021 15:54:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/QuartaIMFGBLVK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/SpenskyMBOHGJKV21,
  author       = {Chad Spensky and
                  Aravind Machiry and
                  Nathan Burow and
                  Hamed Okhravi and
                  Rick Housley and
                  Zhongshu Gu and
                  Hani Jamjoom and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Glitching Demystified: Analyzing Control-flow-based Glitching Attacks
                  and Defenses},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021},
  pages        = {400--412},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN48987.2021.00051},
  doi          = {10.1109/DSN48987.2021.00051},
  timestamp    = {Mon, 09 Aug 2021 14:50:25 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/SpenskyMBOHGJKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/AghakhaniMWKV21,
  author       = {Hojjat Aghakhani and
                  Dongyu Meng and
                  Yu{-}Xiang Wang and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Bullseye Polytope: {A} Scalable Clean-Label Poisoning Attack with
                  Improved Transferability},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2021, Vienna, Austria, September 6-10, 2021},
  pages        = {159--178},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuroSP51992.2021.00021},
  doi          = {10.1109/EUROSP51992.2021.00021},
  timestamp    = {Thu, 11 Nov 2021 09:11:58 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/AghakhaniMWKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RuaroZDPBCZKV21,
  author       = {Nicola Ruaro and
                  Kyle Zeng and
                  Lukas Dresel and
                  Mario Polino and
                  Tiffany Bao and
                  Andrea Continella and
                  Stefano Zanero and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {SyML: Guiding Symbolic Execution Toward Vulnerable States Through
                  Pattern Learning},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {456--468},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471865},
  doi          = {10.1145/3471621.3471865},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/RuaroZDPBCZKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RediniCDPSMBKV21,
  author       = {Nilo Redini and
                  Andrea Continella and
                  Dipanjan Das and
                  Giulio De Pasquale and
                  Noah Spahn and
                  Aravind Machiry and
                  Antonio Bianchi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained
                  Inputs for IoT Devices},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {484--500},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00066},
  doi          = {10.1109/SP40001.2021.00066},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/RediniCDPSMBKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SallsJCKV21,
  author       = {Christopher Salls and
                  Chani Jindal and
                  Jake Corina and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Token-Level Fuzzing},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2795--2809},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/salls},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SallsJCKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GargMCKV21,
  author       = {Chinmay Garg and
                  Aravind Machiry and
                  Andrea Continella and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Toward a secure crowdsourced location tracking system},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {311--322},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467821},
  doi          = {10.1145/3448300.3467821},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/GargMCKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2021,
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120},
  doi          = {10.1145/3460120},
  isbn         = {978-1-4503-8454-4},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-08638,
  author       = {Priyanka Bose and
                  Dipanjan Das and
                  Yanju Chen and
                  Yu Feng and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{SAILFISH:} Vetting Smart Contract State-Inconsistency Bugs in Seconds},
  journal      = {CoRR},
  volume       = {abs/2104.08638},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.08638},
  eprinttype    = {arXiv},
  eprint       = {2104.08638},
  timestamp    = {Mon, 28 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-08638.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-00217,
  author       = {Chinmay Garg and
                  Aravind Machiry and
                  Andrea Continella and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Toward a Secure Crowdsourced Location Tracking System},
  journal      = {CoRR},
  volume       = {abs/2106.00217},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.00217},
  eprinttype    = {arXiv},
  eprint       = {2106.00217},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-00217.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-08893,
  author       = {Dipanjan Das and
                  Priyanka Bose and
                  Nicola Ruaro and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Understanding Security Issues in the {NFT} Ecosystem},
  journal      = {CoRR},
  volume       = {abs/2111.08893},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.08893},
  eprinttype    = {arXiv},
  eprint       = {2111.08893},
  timestamp    = {Mon, 22 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-08893.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GrittiFGPCKV20,
  author       = {Fabio Gritti and
                  Lorenzo Fontana and
                  Eric Gustafson and
                  Fabio Pagani and
                  Andrea Continella and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{SYMBION:} Interleaving Symbolic with Concrete Execution},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162164},
  doi          = {10.1109/CNS48642.2020.9162164},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GrittiFGPCKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SallsMDSKV20,
  author       = {Christopher Salls and
                  Aravind Machiry and
                  Adam Doup{\'{e}} and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Exploring Abstraction Functions in Fuzzing},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162273},
  doi          = {10.1109/CNS48642.2020.9162273},
  timestamp    = {Fri, 14 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SallsMDSKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SpenskyMBLHKV20,
  author       = {Chad Spensky and
                  Aravind Machiry and
                  Marcel Busch and
                  Kevin Leach and
                  Rick Housley and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{TRUST.IO:} Protecting Physical Interfaces on Cyber-physical Systems},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162246},
  doi          = {10.1109/CNS48642.2020.9162246},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SpenskyMBLHKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/BotacinBGGKV20,
  author       = {Marcus Botacin and
                  Giovanni Bert{\~{a}}o and
                  Paulo L. de Geus and
                  Andr{\'{e}} Gr{\'{e}}gio and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Cl{\'{e}}mentine Maurice and
                  Leyla Bilge and
                  Gianluca Stringhini and
                  Nuno Neves},
  title        = {On the Security of Application Installers and Online Software Repositories},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 17th International Conference, {DIMVA} 2020, Lisbon, Portugal, June
                  24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12223},
  pages        = {192--214},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-52683-2\_10},
  doi          = {10.1007/978-3-030-52683-2\_10},
  timestamp    = {Sun, 25 Jul 2021 11:49:24 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/BotacinBGGKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AghakhaniGMLOBV20,
  author       = {Hojjat Aghakhani and
                  Fabio Gritti and
                  Francesco Mecca and
                  Martina Lindorfer and
                  Stefano Ortolani and
                  Davide Balzarotti and
                  Giovanni Vigna and
                  Christopher Kruegel},
  title        = {When Malware is Packin' Heat; Limits of Machine Learning Classifiers
                  Based on Static Analysis Features},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/when-malware-is-packin-heat-limits-of-machine-learning-classifiers-based-on-static-analysis-features/},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/AghakhaniGMLOBV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TakahashiKVYI20,
  author       = {Takeshi Takahashi and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Katsunari Yoshioka and
                  Daisuke Inoue},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Tracing and Analyzing Web Access Paths Based on User-Side Data Collection:
                  How Do Users Reach Malicious URLs?},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {93--106},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/takahashi},
  timestamp    = {Mon, 30 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TakahashiKVYI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RediniM0SCSKV20,
  author       = {Nilo Redini and
                  Aravind Machiry and
                  Ruoyu Wang and
                  Chad Spensky and
                  Andrea Continella and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Karonte: Detecting Insecure Multi-binary Interactions in Embedded
                  Firmware},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {1544--1561},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00036},
  doi          = {10.1109/SP40000.2020.00036},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/RediniM0SCSKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MachiryRCKV20,
  author       = {Aravind Machiry and
                  Nilo Redini and
                  Eric Camellini and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{SPIDER:} Enabling Fast Patch Propagation In Related Software Repositories},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {1562--1579},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00038},
  doi          = {10.1109/SP40000.2020.00038},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MachiryRCKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ClementsGSGFKVB20,
  author       = {Abraham A. Clements and
                  Eric Gustafson and
                  Tobias Scharnowski and
                  Paul Grosen and
                  David Fritz and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Saurabh Bagchi and
                  Mathias Payer},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {1201--1218},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/clements},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ClementsGSGFKVB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/Sanchez-RolaBKV20,
  author       = {Iskander S{\'{a}}nchez{-}Rola and
                  Davide Balzarotti and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Igor Santos},
  editor       = {Yennun Huang and
                  Irwin King and
                  Tie{-}Yan Liu and
                  Maarten van Steen},
  title        = {Dirty Clicks: {A} Study of the Usability and Security Implications
                  of Click-related Behaviors on the Web},
  booktitle    = {{WWW} '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020},
  pages        = {395--406},
  publisher    = {{ACM} / {IW3C2}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3366423.3380124},
  doi          = {10.1145/3366423.3380124},
  timestamp    = {Fri, 25 Dec 2020 01:14:58 +0100},
  biburl       = {https://dblp.org/rec/conf/www/Sanchez-RolaBKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2020,
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297},
  doi          = {10.1145/3372297},
  isbn         = {978-1-4503-7089-9},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-00191,
  author       = {Hojjat Aghakhani and
                  Dongyu Meng and
                  Yu{-}Xiang Wang and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Bullseye Polytope: {A} Scalable Clean-Label Poisoning Attack with
                  Improved Transferability},
  journal      = {CoRR},
  volume       = {abs/2005.00191},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.00191},
  eprinttype    = {arXiv},
  eprint       = {2005.00191},
  timestamp    = {Thu, 30 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-00191.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-10682,
  author       = {Hojjat Aghakhani and
                  Thorsten Eisenhofer and
                  Lea Sch{\"{o}}nherr and
                  Dorothea Kolossa and
                  Thorsten Holz and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{VENOMAVE:} Clean-Label Poisoning Against Speech Recognition},
  journal      = {CoRR},
  volume       = {abs/2010.10682},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.10682},
  eprinttype    = {arXiv},
  eprint       = {2010.10682},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-10682.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HauserMS0VK19,
  author       = {Christophe Hauser and
                  Jayakrishna Menon and
                  Yan Shoshitaishvili and
                  Ruoyu Wang and
                  Giovanni Vigna and
                  Christopher Kruegel},
  editor       = {David Balenson},
  title        = {Sleak: automating address space layout derandomization},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {190--202},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359820},
  doi          = {10.1145/3359789.3359820},
  timestamp    = {Tue, 26 Nov 2019 09:46:34 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HauserMS0VK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JindalSALKV19,
  author       = {Chani Jindal and
                  Christopher Salls and
                  Hojjat Aghakhani and
                  Keith Long and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {David Balenson},
  title        = {Neurlux: dynamic malware analysis without feature engineering},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {444--455},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359835},
  doi          = {10.1145/3359789.3359835},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JindalSALKV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ChevalierCHS0KV19,
  author       = {Ronny Chevalier and
                  Stefano Cristalli and
                  Christophe Hauser and
                  Yan Shoshitaishvili and
                  Ruoyu Wang and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Danilo Bruschi and
                  Andrea Lanzi},
  editor       = {Gail{-}Joon Ahn and
                  Bhavani Thuraisingham and
                  Murat Kantarcioglu and
                  Ram Krishnan},
  title        = {BootKeeper: Validating Software Integrity Properties on Boot Firmware
                  Images},
  booktitle    = {Proceedings of the Ninth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27,
                  2019},
  pages        = {315--325},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292006.3300026},
  doi          = {10.1145/3292006.3300026},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ChevalierCHS0KV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/Redini0MSVK19,
  author       = {Nilo Redini and
                  Ruoyu Wang and
                  Aravind Machiry and
                  Yan Shoshitaishvili and
                  Giovanni Vigna and
                  Christopher Kruegel},
  editor       = {Roberto Perdisci and
                  Cl{\'{e}}mentine Maurice and
                  Giorgio Giacinto and
                  Magnus Almgren},
  title        = {BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden,
                  June 19-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11543},
  pages        = {482--501},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22038-9\_23},
  doi          = {10.1007/978-3-030-22038-9\_23},
  timestamp    = {Tue, 29 Dec 2020 18:36:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/Redini0MSVK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SongH0SNVVKSF19,
  author       = {Dokyung Song and
                  Felicitas Hetzelt and
                  Dipanjan Das and
                  Chad Spensky and
                  Yeoul Na and
                  Stijn Volckaert and
                  Giovanni Vigna and
                  Christopher Kruegel and
                  Jean{-}Pierre Seifert and
                  Michael Franz},
  title        = {PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS
                  Boundary},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/periscope-an-effective-probing-and-fuzzing-framework-for-the-hardware-os-boundary/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/SongH0SNVVKSF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GustafsonMSRMFB19,
  author       = {Eric Gustafson and
                  Marius Muench and
                  Chad Spensky and
                  Nilo Redini and
                  Aravind Machiry and
                  Yanick Fratantonio and
                  Davide Balzarotti and
                  Aur{\'{e}}lien Francillon and
                  Yung Ryn Choe and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Toward the Analysis of Embedded Firmware through Automated Re-hosting},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {135--150},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/gustafson},
  timestamp    = {Wed, 10 Feb 2021 22:02:04 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/GustafsonMSRMFB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/NilizadehAGKV19a,
  author       = {Shirin Nilizadeh and
                  Hojjat Aghakhani and
                  Eric Gustafson and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Sihem Amer{-}Yahia and
                  Mohammad Mahdian and
                  Ashish Goel and
                  Geert{-}Jan Houben and
                  Kristina Lerman and
                  Julian J. McAuley and
                  Ricardo Baeza{-}Yates and
                  Leila Zia},
  title        = {Lightning Talk - Think Outside the Dataset: Finding Fraudulent Reviews
                  using Cross-Dataset Analysis},
  booktitle    = {Companion of The 2019 World Wide Web Conference, {WWW} 2019, San Francisco,
                  CA, USA, May 13-17, 2019},
  pages        = {1288--1289},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3308560.3316477},
  doi          = {10.1145/3308560.3316477},
  timestamp    = {Sun, 22 Sep 2019 18:15:38 +0200},
  biburl       = {https://dblp.org/rec/conf/www/NilizadehAGKV19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/NilizadehAGKV19,
  author       = {Shirin Nilizadeh and
                  Hojjat Aghakhani and
                  Eric Gustafson and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Ling Liu and
                  Ryen W. White and
                  Amin Mantrach and
                  Fabrizio Silvestri and
                  Julian J. McAuley and
                  Ricardo Baeza{-}Yates and
                  Leila Zia},
  title        = {Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset
                  Analysis},
  booktitle    = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA,
                  May 13-17, 2019},
  pages        = {3108--3115},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3308558.3313647},
  doi          = {10.1145/3308558.3313647},
  timestamp    = {Sun, 22 Sep 2019 18:12:47 +0200},
  biburl       = {https://dblp.org/rec/conf/www/NilizadehAGKV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-12505,
  author       = {Ronny Chevalier and
                  Stefano Cristalli and
                  Christophe Hauser and
                  Yan Shoshitaishvili and
                  Ruoyu Wang and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Danilo Bruschi and
                  Andrea Lanzi},
  title        = {BootKeeper: Validating Software Integrity Properties on Boot Firmware
                  Images},
  journal      = {CoRR},
  volume       = {abs/1903.12505},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.12505},
  eprinttype    = {arXiv},
  eprint       = {1903.12505},
  timestamp    = {Tue, 02 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-12505.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-11376,
  author       = {Chani Jindal and
                  Christopher Salls and
                  Hojjat Aghakhani and
                  Keith Long and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Neurlux: Dynamic Malware Analysis Without Feature Engineering},
  journal      = {CoRR},
  volume       = {abs/1910.11376},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.11376},
  eprinttype    = {arXiv},
  eprint       = {1910.11376},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-11376.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Shoshitaishvili18,
  author       = {Yan Shoshitaishvili and
                  Antonio Bianchi and
                  Kevin Borgolte and
                  Amat Cama and
                  Jacopo Corbetta and
                  Francesco Disperati and
                  Andrew Dutcher and
                  John Grosen and
                  Paul Grosen and
                  Aravind Machiry and
                  Christopher Salls and
                  Nick Stephens and
                  Ruoyu Wang and
                  Giovanni Vigna},
  title        = {Mechanical Phish: Resilient Autonomous Hacking},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {2},
  pages        = {12--22},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1870858},
  doi          = {10.1109/MSP.2018.1870858},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Shoshitaishvili18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MachiryRGFCKV18,
  author       = {Aravind Machiry and
                  Nilo Redini and
                  Eric Gustafson and
                  Yanick Fratantonio and
                  Yung Ryn Choe and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Using Loops For Malware Classification Resilient to Feature-unaware
                  Perturbations},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {112--123},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274731},
  doi          = {10.1145/3274694.3274731},
  timestamp    = {Wed, 05 Dec 2018 09:44:25 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MachiryRGFCKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/anrw/BorgolteFHKV18,
  author       = {Kevin Borgolte and
                  Tobias Fiebig and
                  Shuang Hao and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates},
  booktitle    = {Proceedings of the Applied Networking Research Workshop, {ANRW} 2018,
                  Montreal, QC, Canada, July 16-16, 2018},
  pages        = {4},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3232755.3232859},
  doi          = {10.1145/3232755.3232859},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/anrw/BorgolteFHKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KonothVMLKBV18,
  author       = {Radhesh Krishnan Konoth and
                  Emanuele Vineti and
                  Veelasha Moonsamy and
                  Martina Lindorfer and
                  Christopher Kruegel and
                  Herbert Bos and
                  Giovanni Vigna},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining
                  and Its Defense},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1714--1730},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243858},
  doi          = {10.1145/3243734.3243858},
  timestamp    = {Tue, 10 Nov 2020 20:00:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KonothVMLKBV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/VeenLFPVKBR18,
  author       = {Victor van der Veen and
                  Martina Lindorfer and
                  Yanick Fratantonio and
                  Harikrishnan Padmanabha Pillai and
                  Giovanni Vigna and
                  Christopher Kruegel and
                  Herbert Bos and
                  Kaveh Razavi},
  editor       = {Cristiano Giuffrida and
                  S{\'{e}}bastien Bardin and
                  Gregory Blanc},
  title        = {GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on {ARM}},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 15th International Conference, {DIMVA} 2018, Saclay, France, June
                  28-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10885},
  pages        = {92--113},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93411-2\_5},
  doi          = {10.1007/978-3-319-93411-2\_5},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/VeenLFPVKBR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwsm/ElSheriefNNVB18,
  author       = {Mai ElSherief and
                  Shirin Nilizadeh and
                  Dana Nguyen and
                  Giovanni Vigna and
                  Elizabeth M. Belding},
  title        = {Peer to Peer Hate: Hate Speech Instigators and Their Targets},
  booktitle    = {Proceedings of the Twelfth International Conference on Web and Social
                  Media, {ICWSM} 2018, Stanford, California, USA, June 25-28, 2018},
  pages        = {52--61},
  publisher    = {{AAAI} Press},
  year         = {2018},
  url          = {https://aaai.org/ocs/index.php/ICWSM/ICWSM18/paper/view/17905},
  timestamp    = {Fri, 05 Feb 2021 11:07:47 +0100},
  biburl       = {https://dblp.org/rec/conf/icwsm/ElSheriefNNVB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BianchiFMKVCL18,
  author       = {Antonio Bianchi and
                  Yanick Fratantonio and
                  Aravind Machiry and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Simon Pak Ho Chung and
                  Wenke Lee},
  title        = {Broken Fingers: On the Usage of the Fingerprint {API} in Android},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_03B-1\_Bianchi\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/BianchiFMKVCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BorgolteFHKV18,
  author       = {Kevin Borgolte and
                  Tobias Fiebig and
                  Shuang Hao and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_06A-4\_Borgolte\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/BorgolteFHKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/FiebigBHKVF18,
  author       = {Tobias Fiebig and
                  Kevin Borgolte and
                  Shuang Hao and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Anja Feldmann},
  editor       = {Robert Beverly and
                  Georgios Smaragdakis and
                  Anja Feldmann},
  title        = {In rDNS We Trust: Revisiting a Common Data-Source's Reliability},
  booktitle    = {Passive and Active Measurement - 19th International Conference, {PAM}
                  2018, Berlin, Germany, March 26-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10771},
  pages        = {131--145},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76481-8\_10},
  doi          = {10.1007/978-3-319-76481-8\_10},
  timestamp    = {Sat, 30 Sep 2023 09:54:28 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/FiebigBHKVF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ChandramouliBKV18,
  author       = {Sai Prashanth Chandramouli and
                  Pierre{-}Marie Bajan and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  editor       = {Hisham M. Haddad and
                  Roger L. Wainwright and
                  Richard Chbeir},
  title        = {Measuring E-mail header injections on the world wide web},
  booktitle    = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing,
                  {SAC} 2018, Pau, France, April 09-13, 2018},
  pages        = {1647--1656},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3167132.3167308},
  doi          = {10.1145/3167132.3167308},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/ChandramouliBKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AghakhaniMNKV18,
  author       = {Hojjat Aghakhani and
                  Aravind Machiry and
                  Shirin Nilizadeh and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Detecting Deceptive Reviews Using Generative Adversarial Networks},
  booktitle    = {2018 {IEEE} Security and Privacy Workshops, {SP} Workshops 2018, San
                  Francisco, CA, USA, May 24, 2018},
  pages        = {89--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SPW.2018.00022},
  doi          = {10.1109/SPW.2018.00022},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AghakhaniMNKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BorgolteHFV18,
  author       = {Kevin Borgolte and
                  Shuang Hao and
                  Tobias Fiebig and
                  Giovanni Vigna},
  title        = {Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed
                  Reverse Zones},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {770--784},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00027},
  doi          = {10.1109/SP.2018.00027},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BorgolteHFV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/EckertB0SKV18,
  author       = {Moritz Eckert and
                  Antonio Bianchi and
                  Ruoyu Wang and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {HeapHopper: Bringing Bounded Model Checking to Heap Implementation
                  Security},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {99--116},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/eckert},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/EckertB0SKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0001QHBVKL18,
  author       = {Wei Meng and
                  Chenxiong Qian and
                  Shuang Hao and
                  Kevin Borgolte and
                  Giovanni Vigna and
                  Christopher Kruegel and
                  Wenke Lee},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service
                  Attacks},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {393--410},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/meng},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/0001QHBVKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-04649,
  author       = {Mai ElSherief and
                  Shirin Nilizadeh and
                  Dana Nguyen and
                  Giovanni Vigna and
                  Elizabeth M. Belding},
  title        = {Peer to Peer Hate: Hate Speech Instigators and Their Targets},
  journal      = {CoRR},
  volume       = {abs/1804.04649},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.04649},
  eprinttype    = {arXiv},
  eprint       = {1804.04649},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-04649.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-10364,
  author       = {Hojjat Aghakhani and
                  Aravind Machiry and
                  Shirin Nilizadeh and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Detecting Deceptive Reviews using Generative Adversarial Networks},
  journal      = {CoRR},
  volume       = {abs/1805.10364},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.10364},
  eprinttype    = {arXiv},
  eprint       = {1805.10364},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-10364.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/ZandMTLKV17,
  author       = {Ali Zand and
                  Gaspar Modelo{-}Howard and
                  Alok Tongaonkar and
                  Sung{-}Ju Lee and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Demystifying DDoS as a Service},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {55},
  number       = {7},
  pages        = {14--21},
  year         = {2017},
  url          = {https://doi.org/10.1109/MCOM.2017.1600980},
  doi          = {10.1109/MCOM.2017.1600980},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/ZandMTLKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MavroudisHFMKV17,
  author       = {Vasilios Mavroudis and
                  Shuang Hao and
                  Yanick Fratantonio and
                  Federico Maggi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {On the Privacy and Security of the Ultrasound Ecosystem},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {2},
  pages        = {95--112},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0018},
  doi          = {10.1515/POPETS-2017-0018},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/MavroudisHFMKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/EgeleSKV17,
  author       = {Manuel Egele and
                  Gianluca Stringhini and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Towards Detecting Compromised Accounts on Social Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {4},
  pages        = {447--460},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2479616},
  doi          = {10.1109/TDSC.2015.2479616},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/EgeleSKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BianchiGFKV17,
  author       = {Antonio Bianchi and
                  Eric Gustafson and
                  Yanick Fratantonio and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Exploitation and Mitigation of Authentication Schemes Based on Device-Public
                  Information},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {16--27},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134615},
  doi          = {10.1145/3134600.3134615},
  timestamp    = {Tue, 06 Nov 2018 16:59:23 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BianchiGFKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SallsSSKV17,
  author       = {Christopher Salls and
                  Yan Shoshitaishvili and
                  Nick Stephens and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Piston: Uncooperative Remote Runtime Patching},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {141--153},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134611},
  doi          = {10.1145/3134600.3134611},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SallsSSKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Shoshitaishvili17,
  author       = {Yan Shoshitaishvili and
                  Michael Weissbacher and
                  Lukas Dresel and
                  Christopher Salls and
                  Ruoyu Wang and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with
                  Human Assistance},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {347--362},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134105},
  doi          = {10.1145/3133956.3134105},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Shoshitaishvili17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuangHILFKV17,
  author       = {Cheng Huang and
                  Shuang Hao and
                  Luca Invernizzi and
                  Jiayong Liu and
                  Yong Fang and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Gossip: Automatically Identifying Malicious Domains from Mailing List
                  Discussions},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {494--505},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053017},
  doi          = {10.1145/3052973.3053017},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HuangHILFKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NilizadehLSZFKS17,
  author       = {Shirin Nilizadeh and
                  Francois Labreche and
                  Alireza Sedighian and
                  Ali Zand and
                  Jos{\'{e}} M. Fernandez and
                  Christopher Kruegel and
                  Gianluca Stringhini and
                  Giovanni Vigna},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{POISED:} Spotting Twitter Spam Off the Beaten Paths},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1159--1174},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134055},
  doi          = {10.1145/3133956.3134055},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NilizadehLSZFKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CorinaMSSHKV17,
  author       = {Jake Corina and
                  Aravind Machiry and
                  Christopher Salls and
                  Yan Shoshitaishvili and
                  Shuang Hao and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{DIFUZE:} Interface Aware Fuzzing for Kernel Drivers},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2123--2138},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134069},
  doi          = {10.1145/3133956.3134069},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CorinaMSSHKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BaoSWKVB17,
  author       = {Tiffany Bao and
                  Yan Shoshitaishvili and
                  Ruoyu Wang and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  David Brumley},
  title        = {How Shall We Play a Game?: {A} Game-theoretical Model for Cyber-warfare
                  Games},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {7--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.34},
  doi          = {10.1109/CSF.2017.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BaoSWKVB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ContinellaFLPZK17,
  author       = {Andrea Continella and
                  Yanick Fratantonio and
                  Martina Lindorfer and
                  Alessandro Puccetti and
                  Ali Zand and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through
                  Differential Analysis},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/obfuscation-resilient-privacy-leak-detection-mobile-apps-through-differential-analysis/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ContinellaFLPZK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MachiryGSSSWBCK17,
  author       = {Aravind Machiry and
                  Eric Gustafson and
                  Chad Spensky and
                  Christopher Salls and
                  Nick Stephens and
                  Ruoyu Wang and
                  Antonio Bianchi and
                  Yung Ryn Choe and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{BOOMERANG:} Exploiting the Semantic Gap in Trusted Execution Environments},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/boomerang-exploiting-semantic-gap-trusted-execution-environments/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/MachiryGSSSWBCK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WangSBMGGKV17,
  author       = {Ruoyu Wang and
                  Yan Shoshitaishvili and
                  Antonio Bianchi and
                  Aravind Machiry and
                  John Grosen and
                  Paul Grosen and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Ramblr: Making Reassembly Great Again},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/ramblr-making-reassembly-great-again/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WangSBMGGKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/FiebigBHKV17,
  author       = {Tobias Fiebig and
                  Kevin Borgolte and
                  Shuang Hao and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Mohamed Ali K{\^{a}}afar and
                  Steve Uhlig and
                  Johanna Amann},
  title        = {Something from Nothing (There): Collecting Global IPv6 Datasets from
                  {DNS}},
  booktitle    = {Passive and Active Measurement - 18th International Conference, {PAM}
                  2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10176},
  pages        = {30--43},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-54328-4\_3},
  doi          = {10.1007/978-3-319-54328-4\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/FiebigBHKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RediniMDFBGSKV17,
  author       = {Nilo Redini and
                  Aravind Machiry and
                  Dipanjan Das and
                  Yanick Fratantonio and
                  Antonio Bianchi and
                  Eric Gustafson and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {BootStomp: On the Security of Bootloaders in Mobile Devices},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {781--798},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/redini},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RediniMDFBGSKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MachirySCSKV17,
  author       = {Aravind Machiry and
                  Chad Spensky and
                  Jake Corina and
                  Nick Stephens and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {{DR.} {CHECKER:} {A} Soundy Analysis for Linux Kernel Drivers},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {1007--1024},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/machiry},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MachirySCSKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TrickelDGKMTSDV17,
  author       = {Erik Trickel and
                  Francesco Disperati and
                  Eric Gustafson and
                  Faezeh Kalantari and
                  Mike Mabey and
                  Naveen Tiwari and
                  Yeganeh Safaei and
                  Adam Doup{\'{e}} and
                  Giovanni Vigna},
  editor       = {Mark A. Gondree and
                  Ashley L. Podhradsky},
  title        = {Shell We Play {A} Game? CTF-as-a-service for Security Education},
  booktitle    = {2017 {USENIX} Workshop on Advances in Security Education, {ASE} 2017,
                  Vancouver, BC, Canada, August 15, 2017},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/ase17/workshop-program/presentation/trickel},
  timestamp    = {Mon, 01 Feb 2021 08:43:06 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/TrickelDGKMTSDV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-02749,
  author       = {Yan Shoshitaishvili and
                  Michael Weissbacher and
                  Lukas Dresel and
                  Christopher Salls and
                  Ruoyu Wang and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with
                  Human Assistance},
  journal      = {CoRR},
  volume       = {abs/1708.02749},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.02749},
  eprinttype    = {arXiv},
  eprint       = {1708.02749},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-02749.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-09058,
  author       = {Shirin Nilizadeh and
                  Francois Labreche and
                  Alireza Sedighian and
                  Ali Zand and
                  Jos{\'{e}} M. Fernandez and
                  Christopher Kruegel and
                  Gianluca Stringhini and
                  Giovanni Vigna},
  title        = {{POISED:} Spotting Twitter Spam Off the Beaten Paths},
  journal      = {CoRR},
  volume       = {abs/1708.09058},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.09058},
  eprinttype    = {arXiv},
  eprint       = {1708.09058},
  timestamp    = {Thu, 21 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-09058.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Vigna16,
  author       = {Giovanni Vigna},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Binary Analysis for Autonomous Hacking: Invited Abstract},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {473},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2901788},
  doi          = {10.1145/2897845.2901788},
  timestamp    = {Mon, 25 Apr 2022 08:42:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Vigna16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VeenFLGMVBRG16,
  author       = {Victor van der Veen and
                  Yanick Fratantonio and
                  Martina Lindorfer and
                  Daniel Gruss and
                  Cl{\'{e}}mentine Maurice and
                  Giovanni Vigna and
                  Herbert Bos and
                  Kaveh Razavi and
                  Cristiano Giuffrida},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Drammer: Deterministic Rowhammer Attacks on Mobile Platforms},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1675--1689},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978406},
  doi          = {10.1145/2976749.2978406},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/VeenFLGMVBRG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AfonsoGBFKVDP16,
  author       = {Vitor Monte Afonso and
                  Paulo L. de Geus and
                  Antonio Bianchi and
                  Yanick Fratantonio and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Adam Doup{\'{e}} and
                  Mario Polino},
  title        = {Going Native: Using a Large-Scale Analysis of Android Apps to Create
                  a Practical Native-Code Sandboxing Policy},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/going-native-large-scale-analysis-android-apps-practical-native-code-sandboxing-policy.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/AfonsoGBFKVDP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/StephensGSDWCSK16,
  author       = {Nick Stephens and
                  John Grosen and
                  Christopher Salls and
                  Andrew Dutcher and
                  Ruoyu Wang and
                  Jacopo Corbetta and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Driller: Augmenting Fuzzing Through Selective Symbolic Execution},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/driller-augmenting-fuzzing-through-selective-symbolic-execution.pdf},
  timestamp    = {Tue, 19 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/StephensGSDWCSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MuenchPSKVB16,
  author       = {Marius Muench and
                  Fabio Pagani and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Davide Balzarotti},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Taming Transactions: Towards Hardware-Assisted Control Flow Integrity
                  Using Transactional Memory},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {24--48},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_2},
  doi          = {10.1007/978-3-319-45719-2\_2},
  timestamp    = {Fri, 27 Dec 2019 21:24:31 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/MuenchPSKVB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Shoshitaishvili16,
  author       = {Yan Shoshitaishvili and
                  Ruoyu Wang and
                  Christopher Salls and
                  Nick Stephens and
                  Mario Polino and
                  Andrew Dutcher and
                  John Grosen and
                  Siji Feng and
                  Christophe Hauser and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna},
  title        = {{SOK:} (State of) The Art of War: Offensive Techniques in Binary Analysis},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {138--157},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.17},
  doi          = {10.1109/SP.2016.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Shoshitaishvili16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FratantonioBRKK16,
  author       = {Yanick Fratantonio and
                  Antonio Bianchi and
                  William K. Robertson and
                  Engin Kirda and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {TriggerScope: Towards Detecting Logic Bombs in Android Applications},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {377--396},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.30},
  doi          = {10.1109/SP.2016.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/FratantonioBRKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MirkovicDDVD15,
  author       = {Jelena Mirkovic and
                  Melissa Dark and
                  Wenliang Du and
                  Giovanni Vigna and
                  Tamara Denning},
  title        = {Evaluating Cybersecurity Education Interventions: Three Case Studies},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {13},
  number       = {3},
  pages        = {63--69},
  year         = {2015},
  url          = {https://doi.org/10.1109/MSP.2015.57},
  doi          = {10.1109/MSP.2015.57},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MirkovicDDVD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/Shoshitaishvili15,
  author       = {Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Portrait of a Privacy Invasion},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2015},
  number       = {1},
  pages        = {41--60},
  year         = {2015},
  url          = {https://doi.org/10.1515/popets-2015-0004},
  doi          = {10.1515/POPETS-2015-0004},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/Shoshitaishvili15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZandHVKK15,
  author       = {Ali Zand and
                  Amir Houmansadr and
                  Giovanni Vigna and
                  Richard A. Kemmerer and
                  Christopher Kruegel},
  title        = {Know Your Achilles' Heel: Automatic Detection of Network Critical
                  Services},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818012},
  doi          = {10.1145/2818000.2818012},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZandHVKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MuttiFBICKKV15,
  author       = {Simone Mutti and
                  Yanick Fratantonio and
                  Antonio Bianchi and
                  Luca Invernizzi and
                  Jacopo Corbetta and
                  Dhilung Kirat and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {BareDroid: Large-Scale Analysis of Android Apps on Real Devices},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {71--80},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818036},
  doi          = {10.1145/2818000.2818036},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MuttiFBICKKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FalsinaFZKVM15,
  author       = {Luca Falsina and
                  Yanick Fratantonio and
                  Stefano Zanero and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Federico Maggi},
  title        = {Grab 'n Run: Secure and Practical Dynamic Code Loading for Android
                  Applications},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {201--210},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818042},
  doi          = {10.1145/2818000.2818042},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/FalsinaFZKVM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BianchiFKV15,
  author       = {Antonio Bianchi and
                  Yanick Fratantonio and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {David Lie and
                  Glenn Wurster},
  title        = {{NJAS:} Sandboxing Unmodified Applications in non-rooted Devices Running
                  stock Android},
  booktitle    = {Proceedings of the 5th Annual {ACM} {CCS} Workshop on Security and
                  Privacy in Smartphones and Mobile Devices, {SPSM} 2015, Denver, Colorado,
                  USA, October 12, 2015},
  pages        = {27--38},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808117.2808122},
  doi          = {10.1145/2808117.2808122},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BianchiFKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KiratV15,
  author       = {Dhilung Kirat and
                  Giovanni Vigna},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {MalGene: Automatic Extraction of Malware Analysis Evasion Signature},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {769--780},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813642},
  doi          = {10.1145/2810103.2813642},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KiratV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaoBNSEEKV15,
  author       = {Shuang Hao and
                  Kevin Borgolte and
                  Nick Nikiforakis and
                  Gianluca Stringhini and
                  Manuel Egele and
                  Michael Eubanks and
                  Brian Krebs and
                  Giovanni Vigna},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Drops for Stuff: An Analysis of Reshipping Mule Scams},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1081--1092},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813620},
  doi          = {10.1145/2810103.2813620},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HaoBNSEEKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/FratantonioBREK15,
  author       = {Yanick Fratantonio and
                  Antonio Bianchi and
                  William K. Robertson and
                  Manuel Egele and
                  Christopher Kruegel and
                  Engin Kirda and
                  Giovanni Vigna},
  editor       = {Magnus Almgren and
                  Vincenzo Gulisano and
                  Federico Maggi},
  title        = {On the Security and Engineering Implications of Finer-Grained Access
                  Controls for Android Developers and Users},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 12th International Conference, {DIMVA} 2015, Milan, Italy, July
                  9-10, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9148},
  pages        = {282--303},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20550-2\_15},
  doi          = {10.1007/978-3-319-20550-2\_15},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/FratantonioBREK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/CaillatGKKV15,
  author       = {Benjamin Caillat and
                  Bob Gilbert and
                  Richard A. Kemmerer and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Prison: Tracking Process Interactions to Contain Malware},
  booktitle    = {17th {IEEE} International Conference on High Performance Computing
                  and Communications, {HPCC} 2015, 7th {IEEE} International Symposium
                  on Cyberspace Safety and Security, {CSS} 2015, and 12th {IEEE} International
                  Conference on Embedded Software and Systems, {ICESS} 2015, New York,
                  NY, USA, August 24-26, 2015},
  pages        = {1282--1291},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/HPCC-CSS-ICESS.2015.297},
  doi          = {10.1109/HPCC-CSS-ICESS.2015.297},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/CaillatGKKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CaoFBEKVC15,
  author       = {Yinzhi Cao and
                  Yanick Fratantonio and
                  Antonio Bianchi and
                  Manuel Egele and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Yan Chen},
  title        = {EdgeMiner: Automatically Detecting Implicit Control Flow Transitions
                  through the Android Framework},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/edgeminer-automatically-detecting-implicit-control-flow-transitions-through-android-framework},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/CaoFBEKVC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Shoshitaishvili15,
  author       = {Yan Shoshitaishvili and
                  Ruoyu Wang and
                  Christophe Hauser and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities
                  in Binary Firmware},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/firmalice-automatic-detection-authentication-bypass-vulnerabilities-binary-firmware},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/Shoshitaishvili15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/FratantonioMBKV15a,
  author       = {Yanick Fratantonio and
                  Aravind Machiry and
                  Antonio Bianchi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Aharon Abadi and
                  Shah Rukh Humayoun and
                  Henry Muccini},
  title        = {{CLAPP:} characterizing loops in Android applications (invited talk)},
  booktitle    = {Proceedings of the 3rd International Workshop on Software Development
                  Lifecycle for Mobile, DeMobile 2015, Bergamo, Italy, August 31 - September
                  4, 2015},
  pages        = {33--34},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2804345.2804355},
  doi          = {10.1145/2804345.2804355},
  timestamp    = {Tue, 01 Feb 2022 10:45:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/FratantonioMBKV15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/FratantonioMBKV15,
  author       = {Yanick Fratantonio and
                  Aravind Machiry and
                  Antonio Bianchi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Elisabetta Di Nitto and
                  Mark Harman and
                  Patrick Heymans},
  title        = {{CLAPP:} characterizing loops in Android applications},
  booktitle    = {Proceedings of the 2015 10th Joint Meeting on Foundations of Software
                  Engineering, {ESEC/FSE} 2015, Bergamo, Italy, August 30 - September
                  4, 2015},
  pages        = {687--697},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2786805.2786873},
  doi          = {10.1145/2786805.2786873},
  timestamp    = {Tue, 06 Nov 2018 16:59:22 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/FratantonioMBKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BianchiCIFKV15,
  author       = {Antonio Bianchi and
                  Jacopo Corbetta and
                  Luca Invernizzi and
                  Yanick Fratantonio and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {What the App is That? Deception and Countermeasures in the Android
                  User Interface},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {931--948},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.62},
  doi          = {10.1109/SP.2015.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BianchiCIFKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StringhiniMJEKV15,
  author       = {Gianluca Stringhini and
                  Pierre Mourlanne and
                  Gr{\'{e}}goire Jacob and
                  Manuel Egele and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {{EVILCOHORT:} Detecting Communities of Malicious Accounts on Online
                  Services},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {563--578},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/stringhini},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/StringhiniMJEKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BorgolteKV15,
  author       = {Kevin Borgolte and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Meerkat: Detecting Website Defacements through Image-based Object
                  Recognition},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {595--610},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/borgolte},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BorgolteKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FedericoCSKV15,
  author       = {Alessandro Di Federico and
                  Amat Cama and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {How the {ELF} Ruined Christmas},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {643--658},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/di-frederico},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FedericoCSKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WeissbacherRKKV15,
  author       = {Michael Weissbacher and
                  William K. Robertson and
                  Engin Kirda and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {ZigZag: Automatically Hardening Web Applications Against Client-side
                  Validation Vulnerabilities},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {737--752},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/weissbacher},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WeissbacherRKKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/ThomasHWBGHKMSV15,
  author       = {Kurt Thomas and
                  Danny Yuxing Huang and
                  David Y. Wang and
                  Elie Bursztein and
                  Chris Grier and
                  Tom Holt and
                  Christopher Kruegel and
                  Damon McCoy and
                  Stefan Savage and
                  Giovanni Vigna},
  title        = {Framing Dependencies Introduced by Underground Commoditization},
  booktitle    = {14th Annual Workshop on the Economics of Information Security, {WEIS}
                  2015, Delft, The Netherlands, 22-23 June, 2015},
  year         = {2015},
  url          = {http://www.econinfosec.org/archive/weis2015/papers/WEIS\_2015\_thomas.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/weis/ThomasHWBGHKMSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/EgeleSKV15,
  author       = {Manuel Egele and
                  Gianluca Stringhini and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Towards Detecting Compromised Accounts on Social Networks},
  journal      = {CoRR},
  volume       = {abs/1509.03531},
  year         = {2015},
  url          = {http://arxiv.org/abs/1509.03531},
  eprinttype    = {arXiv},
  eprint       = {1509.03531},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/EgeleSKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/NikiforakisKJKPV14,
  author       = {Nick Nikiforakis and
                  Alexandros Kapravelos and
                  Wouter Joosen and
                  Christopher Kruegel and
                  Frank Piessens and
                  Giovanni Vigna},
  title        = {On the Workings and Current Practices of Web-Based Device Fingerprinting},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {28--36},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.160},
  doi          = {10.1109/MSP.2013.160},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/NikiforakisKJKPV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/StringhiniHKV14,
  author       = {Gianluca Stringhini and
                  Oliver Hohlfeld and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {The harvester, the botmaster, and the spammer: on the relations between
                  the different actors in the spam landscape},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {353--364},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590302},
  doi          = {10.1145/2590296.2590302},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/StringhiniHKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/MaioKSKV14,
  author       = {Giancarlo De Maio and
                  Alexandros Kapravelos and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Sven Dietrich},
  title        = {PExy: The Other Side of Exploit Kits},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {132--151},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_8},
  doi          = {10.1007/978-3-319-08509-8\_8},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/MaioKSKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/ZarrasKSHKV14,
  author       = {Apostolis Zarras and
                  Alexandros Kapravelos and
                  Gianluca Stringhini and
                  Thorsten Holz and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Carey Williamson and
                  Aditya Akella and
                  Nina Taft},
  title        = {The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements},
  booktitle    = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014,
                  Vancouver, BC, Canada, November 5-7, 2014},
  pages        = {373--380},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663716.2663719},
  doi          = {10.1145/2663716.2663719},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/ZarrasKSHKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZandVKK14,
  author       = {Ali Zand and
                  Giovanni Vigna and
                  Richard A. Kemmerer and
                  Christopher Kruegel},
  title        = {Rippler: Delay injection for service dependency detection},
  booktitle    = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014,
                  Toronto, Canada, April 27 - May 2, 2014},
  pages        = {2157--2165},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFOCOM.2014.6848158},
  doi          = {10.1109/INFOCOM.2014.6848158},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ZandVKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/InvernizziMTKSVLM14,
  author       = {Luca Invernizzi and
                  Stanislav Miskovic and
                  Ruben Torres and
                  Christopher Kruegel and
                  Sabyasachi Saha and
                  Giovanni Vigna and
                  Sung{-}Ju Lee and
                  Marco Mellia},
  title        = {Nazca: Detecting Malware Distribution in Large-Scale Networks},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/nazca-detecting-malware-distribution-large-scale-networks},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/InvernizziMTKSVLM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/PoeplauFBKV14,
  author       = {Sebastian Poeplau and
                  Yanick Fratantonio and
                  Antonio Bianchi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading
                  in Android Applications},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/execute-analyzing-unsafe-and-malicious-dynamic-code-loading-android-applications},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/PoeplauFBKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CorbettaIKV14,
  author       = {Jacopo Corbetta and
                  Luca Invernizzi and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Eyes of a Human, Eyes of a Program: Leveraging Different Views of
                  the Web for Analysis and Detection},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {130--149},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_7},
  doi          = {10.1007/978-3-319-11379-1\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CorbettaIKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CaoSBKVC14,
  author       = {Yinzhi Cao and
                  Yan Shoshitaishvili and
                  Kevin Borgolte and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna and
                  Yan Chen},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Protecting Web-Based Single Sign-on Protocols against Relying Party
                  Impersonation Attacks through a Dedicated Bi-directional Authenticated
                  Secure Channel},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {276--298},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_14},
  doi          = {10.1007/978-3-319-11379-1\_14},
  timestamp    = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CaoSBKVC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ShoshitaishviliIDV14,
  author       = {Yan Shoshitaishvili and
                  Luca Invernizzi and
                  Adam Doup{\'{e}} and
                  Giovanni Vigna},
  editor       = {Yookun Cho and
                  Sung Y. Shin and
                  Sang{-}Wook Kim and
                  Chih{-}Cheng Hung and
                  Jiman Hong},
  title        = {Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs
                  in cyber security},
  booktitle    = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of
                  Korea - March 24 - 28, 2014},
  pages        = {1649--1656},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2554850.2554880},
  doi          = {10.1145/2554850.2554880},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/ShoshitaishviliIDV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ZandVYK14,
  author       = {Ali Zand and
                  Giovanni Vigna and
                  Xifeng Yan and
                  Christopher Kruegel},
  editor       = {Yookun Cho and
                  Sung Y. Shin and
                  Sang{-}Wook Kim and
                  Chih{-}Cheng Hung and
                  Jiman Hong},
  title        = {Extracting probable command and control signatures for detecting botnets},
  booktitle    = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of
                  Korea - March 24 - 28, 2014},
  pages        = {1657--1662},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2554850.2554896},
  doi          = {10.1145/2554850.2554896},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/ZandVYK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/IedemskaSKKV14,
  author       = {Jane Iedemska and
                  Gianluca Stringhini and
                  Richard A. Kemmerer and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {The Tricks of the Trade: What Makes Spam Campaigns Successful?},
  booktitle    = {35. {IEEE} Security and Privacy Workshops, {SPW} 2014, San Jose, CA,
                  USA, May 17-18, 2014},
  pages        = {77--83},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SPW.2014.21},
  doi          = {10.1109/SPW.2014.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/IedemskaSKKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KiratVK14,
  author       = {Dhilung Kirat and
                  Giovanni Vigna and
                  Christopher Kruegel},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {BareCloud: Bare-metal Analysis-based Evasive Malware Detection},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {287--301},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/kirat},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KiratVK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KapravelosGCKVP14,
  author       = {Alexandros Kapravelos and
                  Chris Grier and
                  Neha Chachra and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Vern Paxson},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {Hulk: Eliciting Malicious Behavior in Browser Extensions},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {641--654},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/kapravelos},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KapravelosGCKVP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/VignaBCDFIKS14,
  author       = {Giovanni Vigna and
                  Kevin Borgolte and
                  Jacopo Corbetta and
                  Adam Doup{\'{e}} and
                  Yanick Fratantonio and
                  Luca Invernizzi and
                  Dhilung Kirat and
                  Yan Shoshitaishvili},
  editor       = {Zachary N. J. Peterson},
  title        = {Ten Years of iCTF: The Good, The Bad, and The Ugly},
  booktitle    = {2014 {USENIX} Summit on Gaming, Games, and Gamification in Security
                  Education, 3GSE '14, San Diego, CA, USA, August 18, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/3gse14/summit-program/presentation/vigna},
  timestamp    = {Mon, 01 Feb 2021 08:43:14 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/VignaBCDFIKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/NikiforakisMSRJKPVZ14,
  author       = {Nick Nikiforakis and
                  Federico Maggi and
                  Gianluca Stringhini and
                  M. Zubair Rafique and
                  Wouter Joosen and
                  Christopher Kruegel and
                  Frank Piessens and
                  Giovanni Vigna and
                  Stefano Zanero},
  editor       = {Chin{-}Wan Chung and
                  Andrei Z. Broder and
                  Kyuseok Shim and
                  Torsten Suel},
  title        = {Stranger danger: exploring the ecosystem of ad-based {URL} shortening
                  services},
  booktitle    = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic
                  of Korea, April 7-11, 2014},
  pages        = {51--62},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2566486.2567983},
  doi          = {10.1145/2566486.2567983},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/NikiforakisMSRJKPVZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/BorgolteKV14,
  author       = {Kevin Borgolte and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Chin{-}Wan Chung and
                  Andrei Z. Broder and
                  Kyuseok Shim and
                  Torsten Suel},
  title        = {Relevant change detection: a framework for the precise extraction
                  of modified and novel web-based content as a filtering technique for
                  analysis engines},
  booktitle    = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic
                  of Korea, April 7-11, 2014, Companion Volume},
  pages        = {595--598},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2567948.2578039},
  doi          = {10.1145/2567948.2578039},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/BorgolteKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/InvernizziKV13,
  author       = {Luca Invernizzi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Charles N. Payne Jr.},
  title        = {Message in a bottle: sailing past censorship},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {39--48},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523654},
  doi          = {10.1145/2523649.2523654},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/InvernizziKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KiratNVM13,
  author       = {Dhilung Kirat and
                  Lakshmanan Nataraj and
                  Giovanni Vigna and
                  B. S. Manjunath},
  editor       = {Charles N. Payne Jr.},
  title        = {SigMal: a static signal processing based malware triage},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {89--98},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523682},
  doi          = {10.1145/2523649.2523682},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KiratNVM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BorgolteKV13,
  author       = {Kevin Borgolte and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Delta: automatic identification of unknown web-based infection campaigns},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {109--120},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516725},
  doi          = {10.1145/2508859.2516725},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BorgolteKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/StringhiniKV13,
  author       = {Gianluca Stringhini and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Shady paths: leveraging surfing crowds to detect malicious web pages},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {133--144},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516682},
  doi          = {10.1145/2508859.2516682},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/StringhiniKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DoupeCJPKV13,
  author       = {Adam Doup{\'{e}} and
                  Weidong Cui and
                  Mariusz H. Jakubowski and
                  Marcus Peinado and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {deDacota: toward preventing server-side {XSS} via automatic code and
                  data separation},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1205--1216},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516708},
  doi          = {10.1145/2508859.2516708},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DoupeCJPKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/VamvoudakisHKV13,
  author       = {Kyriakos G. Vamvoudakis and
                  Jo{\~{a}}o P. Hespanha and
                  Richard A. Kemmerer and
                  Giovanni Vigna},
  editor       = {Danielle C. Tarraf},
  title        = {Formulating Cyber-Security as Convex Optimization Problems},
  booktitle    = {Control of Cyber-Physical Systems, Workshop Held at The Johns Hopkins
                  University, Baltimore, MD, USA, March 2013},
  series       = {Lecture Notes in Control and Information Sciences},
  volume       = {449},
  pages        = {85--100},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-01159-2\_5},
  doi          = {10.1007/978-3-319-01159-2\_5},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ciss/VamvoudakisHKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/StringhiniWEKVZZ13,
  author       = {Gianluca Stringhini and
                  Gang Wang and
                  Manuel Egele and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Haitao Zheng and
                  Ben Y. Zhao},
  editor       = {Konstantina Papagiannaki and
                  P. Krishna Gummadi and
                  Craig Partridge},
  title        = {Follow the green: growth and dynamics in twitter follower markets},
  booktitle    = {Proceedings of the 2013 Internet Measurement Conference, {IMC} 2013,
                  Barcelona, Spain, October 23-25, 2013},
  pages        = {163--176},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2504730.2504731},
  doi          = {10.1145/2504730.2504731},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/StringhiniWEKVZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/EgeleSKV13,
  author       = {Manuel Egele and
                  Gianluca Stringhini and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna},
  title        = {{COMPA:} Detecting Compromised Accounts on Social Networks},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/compa-detecting-compromised-accounts-social-networks},
  timestamp    = {Mon, 01 Feb 2021 08:42:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/EgeleSKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/EggerSKV13,
  author       = {Christoph Egger and
                  Johannes Schlumberger and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Practical Attacks against the {I2P} Network},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {432--451},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_22},
  doi          = {10.1007/978-3-642-41284-4\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/EggerSKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/PayetDKV13,
  author       = {Pierre Payet and
                  Adam Doup{\'{e}} and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Sung Y. Shin and
                  Jos{\'{e}} Carlos Maldonado},
  title        = {EARs in the wild: large-scale analysis of execution after redirect
                  vulnerabilities},
  booktitle    = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing,
                  {SAC} '13, Coimbra, Portugal, March 18-22, 2013},
  pages        = {1792--1799},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480362.2480699},
  doi          = {10.1145/2480362.2480699},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/PayetDKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/NikiforakisKJKPV13,
  author       = {Nick Nikiforakis and
                  Alexandros Kapravelos and
                  Wouter Joosen and
                  Christopher Kruegel and
                  Frank Piessens and
                  Giovanni Vigna},
  title        = {Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {541--555},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.43},
  doi          = {10.1109/SP.2013.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/NikiforakisKJKPV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KapravelosSCKV13,
  author       = {Alexandros Kapravelos and
                  Yan Shoshitaishvili and
                  Marco Cova and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Samuel T. King},
  title        = {Revolver: An Automated Approach to the Detection of Evasive Web-based
                  Malware},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {637--652},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/kapravelos},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KapravelosSCKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangSKV13,
  author       = {Ruoyu Wang and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Samuel T. King},
  title        = {Steal This Movie: Automatically Bypassing {DRM} Protection in Streaming
                  Media Services},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {687--702},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/wang\_ruoyu},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WangSKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/MaggiFZSSKV13,
  author       = {Federico Maggi and
                  Alessandro Frossi and
                  Stefano Zanero and
                  Gianluca Stringhini and
                  Brett Stone{-}Gross and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Daniel Schwabe and
                  Virg{\'{\i}}lio A. F. Almeida and
                  Hartmut Glaser and
                  Ricardo Baeza{-}Yates and
                  Sue B. Moon},
  title        = {Two years of short URLs internet measurement: security threats and
                  countermeasures},
  booktitle    = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro,
                  Brazil, May 13-17, 2013},
  pages        = {861--872},
  publisher    = {International World Wide Web Conferences Steering Committee / {ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2488388.2488463},
  doi          = {10.1145/2488388.2488463},
  timestamp    = {Sun, 22 Sep 2019 18:15:38 +0200},
  biburl       = {https://dblp.org/rec/conf/www/MaggiFZSSKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/StringhiniEKV12,
  author       = {Gianluca Stringhini and
                  Manuel Egele and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Poultry markets: on the underground economy of twitter followers},
  journal      = {Comput. Commun. Rev.},
  volume       = {42},
  number       = {4},
  pages        = {527--532},
  year         = {2012},
  url          = {https://doi.org/10.1145/2377677.2377781},
  doi          = {10.1145/2377677.2377781},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/StringhiniEKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchlumbergerKV12,
  author       = {Johannes Schlumberger and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Robert H'obbes' Zakon},
  title        = {Jarhead analysis and detection of malicious Java applets},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {249--257},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420988},
  doi          = {10.1145/2420950.2420988},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SchlumbergerKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BianchiSKV12,
  author       = {Antonio Bianchi and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Blacksheep: detecting compromised hosts in homogeneous crowds},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {341--352},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382234},
  doi          = {10.1145/2382196.2382234},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BianchiSKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NikiforakisIKAJKPV12,
  author       = {Nick Nikiforakis and
                  Luca Invernizzi and
                  Alexandros Kapravelos and
                  Steven {Van Acker} and
                  Wouter Joosen and
                  Christopher Kruegel and
                  Frank Piessens and
                  Giovanni Vigna},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {You are what you include: large-scale evaluation of remote javascript
                  inclusions},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {736--747},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382274},
  doi          = {10.1145/2382196.2382274},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NikiforakisIKAJKPV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/TegelerFVK12,
  author       = {Florian Tegeler and
                  Xiaoming Fu and
                  Giovanni Vigna and
                  Christopher Kruegel},
  editor       = {Chadi Barakat and
                  Renata Teixeira and
                  K. K. Ramakrishnan and
                  Patrick Thiran},
  title        = {BotFinder: finding bots in network traffic without deep packet inspection},
  booktitle    = {Conference on emerging Networking Experiments and Technologies, CoNEXT
                  '12, Nice, France - December 10 - 13, 2012},
  pages        = {349--360},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2413176.2413217},
  doi          = {10.1145/2413176.2413217},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/TegelerFVK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/JacobCNKV12,
  author       = {Gr{\'{e}}goire Jacob and
                  Paolo Milani Comparetti and
                  Matthias Neugschwandtner and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Ulrich Flegel and
                  Evangelos P. Markatos and
                  William K. Robertson},
  title        = {A Static, Packer-Agnostic Filter to Detect Similar Malware Samples},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 9th International Conference, {DIMVA} 2012, Heraklion, Crete, Greece,
                  July 26-27, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7591},
  pages        = {102--122},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37300-8\_6},
  doi          = {10.1007/978-3-642-37300-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/JacobCNKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/GregioGKV12,
  author       = {Andr{\'{e}} Ricardo Abed Gr{\'{e}}gio and
                  Paulo L{\'{\i}}cio de Geus and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Ulrich Flegel and
                  Evangelos P. Markatos and
                  William K. Robertson},
  title        = {Tracking Memory Writes for Malware Classification and Code Reuse Identification},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 9th International Conference, {DIMVA} 2012, Heraklion, Crete, Greece,
                  July 26-27, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7591},
  pages        = {134--143},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37300-8\_8},
  doi          = {10.1007/978-3-642-37300-8\_8},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/GregioGKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/OverveldtKV12,
  author       = {Timon Van Overveldt and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {FlashDetect: ActionScript 3 Malware Detection},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {274--293},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_14},
  doi          = {10.1007/978-3-642-33338-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/OverveldtKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/Vigna12,
  author       = {Giovanni Vigna},
  editor       = {Shaz Qadeer and
                  Serdar Tasiran},
  title        = {Malware Riding Badware: Challenges in Analyzing (Malicious/Benign)
                  Web Applications},
  booktitle    = {Runtime Verification, Third International Conference, {RV} 2012, Istanbul,
                  Turkey, September 25-28, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7687},
  pages        = {183},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35632-2\_19},
  doi          = {10.1007/978-3-642-35632-2\_19},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/Vigna12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/InvernizziC12,
  author       = {Luca Invernizzi and
                  Paolo Milani Comparetti and
                  Stefano Benvenuti and
                  Christopher Kruegel and
                  Marco Cova and
                  Giovanni Vigna},
  title        = {EvilSeed: {A} Guided Approach to Finding Malicious Web Pages},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {428--442},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.33},
  doi          = {10.1109/SP.2012.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/InvernizziC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StringhiniEZHKV12,
  author       = {Gianluca Stringhini and
                  Manuel Egele and
                  Apostolis Zarras and
                  Thorsten Holz and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Tadayoshi Kohno},
  title        = {B@bel: Leveraging Email Delivery for Spam Mitigation},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {16--32},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/stringhini},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/StringhiniEZHKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JacobKKV12,
  author       = {Gr{\'{e}}goire Jacob and
                  Engin Kirda and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Tadayoshi Kohno},
  title        = {{PUBCRAWL:} Protecting Users and Businesses from CRAWLers},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {507--522},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/jacob},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JacobKKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DoupeCKV12,
  author       = {Adam Doup{\'{e}} and
                  Ludovico Cavedon and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Tadayoshi Kohno},
  title        = {Enemy of the State: {A} State-Aware Black-Box Web Vulnerability Scanner},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {523--538},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/doupe},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DoupeCKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wosn/StringhiniEKV12,
  author       = {Gianluca Stringhini and
                  Manuel Egele and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Balachander Krishnamurthy and
                  Stefan Saroiu and
                  Ben Y. Zhao},
  title        = {Poultry markets: on the underground economy of twitter followers},
  booktitle    = {Proceedings of the 2012 {ACM} workshop on Workshop on Online Social
                  Networks, {WOSN} 2012, Helsinki, Finland, August 17, 2012},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2342549.2342551},
  doi          = {10.1145/2342549.2342551},
  timestamp    = {Mon, 26 Jun 2023 08:43:55 +0200},
  biburl       = {https://dblp.org/rec/conf/wosn/StringhiniEKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Vigna11,
  author       = {Giovanni Vigna},
  title        = {The 2010 International Capture the Flag Competition},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {9},
  number       = {1},
  pages        = {12--14},
  year         = {2011},
  url          = {https://doi.org/10.1109/MSP.2011.21},
  doi          = {10.1109/MSP.2011.21},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Vigna11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Stone-GrossCGKKV11,
  author       = {Brett Stone{-}Gross and
                  Marco Cova and
                  Bob Gilbert and
                  Richard A. Kemmerer and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Analysis of a Botnet Takeover},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {9},
  number       = {1},
  pages        = {64--72},
  year         = {2011},
  url          = {https://doi.org/10.1109/MSP.2010.144},
  doi          = {10.1109/MSP.2010.144},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Stone-GrossCGKKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DoupeECSYZCV11,
  author       = {Adam Doup{\'{e}} and
                  Manuel Egele and
                  Benjamin Caillat and
                  Gianluca Stringhini and
                  Gorkem Yakin and
                  Ali Zand and
                  Ludovico Cavedon and
                  Giovanni Vigna},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Hit 'em where it hurts: a live security exercise on cyber situational
                  awareness},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {51--61},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076740},
  doi          = {10.1145/2076732.2076740},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DoupeECSYZCV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CiprianoZHKV11,
  author       = {Casey Cipriano and
                  Ali Zand and
                  Amir Houmansadr and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Nexat: a history-based approach to predict attacker actions},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {383--392},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076787},
  doi          = {10.1145/2076732.2076787},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CiprianoZHKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KiratVK11,
  author       = {Dhilung Kirat and
                  Giovanni Vigna and
                  Christopher Kruegel},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {BareBox: efficient malware analysis on bare-metal},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {403--412},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076790},
  doi          = {10.1145/2076732.2076790},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KiratVK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DoupeBKV11,
  author       = {Adam Doup{\'{e}} and
                  Bryce Boe and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Fear the {EAR:} discovering and mitigating execution after redirect
                  vulnerabilities},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {251--262},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046736},
  doi          = {10.1145/2046707.2046736},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DoupeBKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/KapravelosCKV11,
  author       = {Alexandros Kapravelos and
                  Marco Cova and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Thorsten Holz and
                  Herbert Bos},
  title        = {Escape from Monkey Island: Evading High-Interaction Honeyclients},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands,
                  July 7-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6739},
  pages        = {124--143},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22424-9\_8},
  doi          = {10.1007/978-3-642-22424-9\_8},
  timestamp    = {Wed, 25 Sep 2019 18:15:55 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/KapravelosCKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/BanksFKKV11,
  author       = {Greg Banks and
                  Aristide Fattori and
                  Richard A. Kemmerer and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Thorsten Holz and
                  Herbert Bos},
  title        = {{MISHIMA:} Multilateration of Internet Hosts Hidden Using Malicious
                  Fast-Flux Agents (Short Paper)},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands,
                  July 7-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6739},
  pages        = {184--193},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22424-9\_11},
  doi          = {10.1007/978-3-642-22424-9\_11},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/BanksFKKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-4/SzydlowskiEKV11,
  author       = {Martin Szydlowski and
                  Manuel Egele and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Jan Camenisch and
                  Dogan Kesdogan},
  title        = {Challenges for Dynamic Analysis of iOS Applications},
  booktitle    = {Open Problems in Network Security - {IFIP} {WG} 11.4 International
                  Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7039},
  pages        = {65--77},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27585-2\_6},
  doi          = {10.1007/978-3-642-27585-2\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-4/SzydlowskiEKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/Stone-GrossSZKKV11,
  author       = {Brett Stone{-}Gross and
                  Ryan Stevens and
                  Apostolis Zarras and
                  Richard A. Kemmerer and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Patrick Thiran and
                  Walter Willinger},
  title        = {Understanding fraudulent activities in online ad exchanges},
  booktitle    = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} '11, Berlin, Germany, November 2-, 2011},
  pages        = {279--294},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2068816.2068843},
  doi          = {10.1145/2068816.2068843},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/Stone-GrossSZKKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/Stone-GrossCKV11,
  author       = {Brett Stone{-}Gross and
                  Marco Cova and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Peering through the iframe},
  booktitle    = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  10-15 April 2011, Shanghai, China},
  pages        = {411--415},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INFCOM.2011.5935193},
  doi          = {10.1109/INFCOM.2011.5935193},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/Stone-GrossCKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/Stone-GrossHSV11,
  author       = {Brett Stone{-}Gross and
                  Thorsten Holz and
                  Gianluca Stringhini and
                  Giovanni Vigna},
  editor       = {Christopher Kruegel},
  title        = {The Underground Economy of Spam: {A} Botmaster's Perspective of Coordinating
                  Large-Scale Spam Campaigns},
  booktitle    = {4th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '11, Boston, MA, USA, March 29, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/leet11/underground-economy-spam-botmasters-perspective-coordinating-large-scale-spam},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/leet/Stone-GrossHSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/EgeleKKV11,
  author       = {Manuel Egele and
                  Christopher Kruegel and
                  Engin Kirda and
                  Giovanni Vigna},
  title        = {PiOS: Detecting Privacy Leaks in iOS Applications},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
                  2011},
  publisher    = {The Internet Society},
  year         = {2011},
  url          = {https://www.ndss-symposium.org/ndss2011/pios-detecting-privacy-leaks-ios-applications-paper},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/EgeleKKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GilbertKKV11,
  author       = {Bob Gilbert and
                  Richard A. Kemmerer and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Dymo: Tracking Dynamic Code Identity},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_2},
  doi          = {10.1007/978-3-642-23644-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GilbertKKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/FratantonioKV11,
  author       = {Yanick Fratantonio and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Shellzer: {A} Tool for the Dynamic Analysis of Malicious Shellcode},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {61--80},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_4},
  doi          = {10.1007/978-3-642-23644-0\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/FratantonioKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CavedonFV11a,
  author       = {Ludovico Cavedon and
                  Luca Foschini and
                  Giovanni Vigna},
  editor       = {David Brumley and
                  Michal Zalewski},
  title        = {Getting the Face Behind the Squares: Reconstructing Pixelized Video
                  Streams},
  booktitle    = {5th {USENIX} Workshop on Offensive Technologies, WOOT'11, August 8,
                  2011, San Francisco, CA, USA, Proceedings},
  pages        = {37--45},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/event/woot11/tech/final\_files/Cavedon.pdf},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CavedonFV11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StringhiniHSKV11,
  author       = {Gianluca Stringhini and
                  Thorsten Holz and
                  Brett Stone{-}Gross and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{BOTMAGNIFIER:} Locating Spambots on the Internet},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Stringhini.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/StringhiniHSKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/Stone-GrossAKKS11a,
  author       = {Brett Stone{-}Gross and
                  Ryan Abman and
                  Richard A. Kemmerer and
                  Christopher Kruegel and
                  Douglas G. Steigerwald and
                  Giovanni Vigna},
  editor       = {Bruce Schneier},
  title        = {The Underground Economy of Fake Antivirus Software},
  booktitle    = {Economics of Information Security and Privacy {III} [papers from the
                  Tenth Workshop on Economics and Information Security, {WEIS} 2011]},
  pages        = {55--78},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4614-1981-5\_4},
  doi          = {10.1007/978-1-4614-1981-5\_4},
  timestamp    = {Fri, 16 Aug 2019 12:52:37 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/Stone-GrossAKKS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/CanaliCVK11,
  author       = {Davide Canali and
                  Marco Cova and
                  Giovanni Vigna and
                  Christopher Kruegel},
  editor       = {Sadagopan Srinivasan and
                  Krithi Ramamritham and
                  Arun Kumar and
                  M. P. Ravindra and
                  Elisa Bertino and
                  Ravi Kumar},
  title        = {Prophiler: a fast filter for the large-scale detection of malicious
                  web pages},
  booktitle    = {Proceedings of the 20th International Conference on World Wide Web,
                  {WWW} 2011, Hyderabad, India, March 28 - April 1, 2011},
  pages        = {197--206},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1963405.1963436},
  doi          = {10.1145/1963405.1963436},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/CanaliCVK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/BalzarottiBCFKRVV10,
  author       = {Davide Balzarotti and
                  Greg Banks and
                  Marco Cova and
                  Viktoria Felmetsger and
                  Richard A. Kemmerer and
                  William K. Robertson and
                  Fredrik Valeur and
                  Giovanni Vigna},
  title        = {An Experience in Testing the Security of Real-World Electronic Voting
                  Systems},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {36},
  number       = {4},
  pages        = {453--473},
  year         = {2010},
  url          = {https://doi.org/10.1109/TSE.2009.53},
  doi          = {10.1109/TSE.2009.53},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/BalzarottiBCFKRVV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/StringhiniKV10,
  author       = {Gianluca Stringhini and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Detecting spammers on social networks},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920263},
  doi          = {10.1145/1920261.1920263},
  timestamp    = {Wed, 28 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/StringhiniKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Vigna10,
  author       = {Giovanni Vigna},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Network intrusion detection: dead or alive?},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {117--126},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920279},
  doi          = {10.1145/1920261.1920279},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Vigna10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/DoupeCV10,
  author       = {Adam Doup{\'{e}} and
                  Marco Cova and
                  Giovanni Vigna},
  editor       = {Christian Kreibich and
                  Marko Jahnke},
  title        = {Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability
                  Scanners},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  7th International Conference, {DIMVA} 2010, Bonn, Germany, July 8-9,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6201},
  pages        = {111--131},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14215-4\_7},
  doi          = {10.1007/978-3-642-14215-4\_7},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/DoupeCV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/ChildersBCCCEV10,
  author       = {Nicholas Childers and
                  Bryce Boe and
                  Lorenzo Cavallaro and
                  Ludovico Cavedon and
                  Marco Cova and
                  Manuel Egele and
                  Giovanni Vigna},
  editor       = {Christian Kreibich and
                  Marko Jahnke},
  title        = {Organizing Large Scale Hacking Competitions},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  7th International Conference, {DIMVA} 2010, Bonn, Germany, July 8-9,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6201},
  pages        = {132--152},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14215-4\_8},
  doi          = {10.1007/978-3-642-14215-4\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/ChildersBCCCEV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-4/CavedonKV10,
  author       = {Ludovico Cavedon and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Jan Camenisch and
                  Valentin S. Kisimov and
                  Maria Dubovitskaya},
  title        = {Are {BGP} Routers Open to Attack? An Experiment},
  booktitle    = {Open Research Problems in Network Security - {IFIP} {WG} 11.4 International
                  Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6555},
  pages        = {88--103},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19228-9\_8},
  doi          = {10.1007/978-3-642-19228-9\_8},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-4/CavedonKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BalzarottiCKKKV10,
  author       = {Davide Balzarotti and
                  Marco Cova and
                  Christoph Karlberger and
                  Engin Kirda and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Efficient Detection of Split Personalities in Malware},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
                  2010},
  publisher    = {The Internet Society},
  year         = {2010},
  url          = {https://www.ndss-symposium.org/ndss2010/efficient-detection-split-personalities-malware},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BalzarottiCKKKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/RobertsonMKV10,
  author       = {William K. Robertson and
                  Federico Maggi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Effective Anomaly Detection with Scarce Training Data},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
                  2010},
  publisher    = {The Internet Society},
  year         = {2010},
  url          = {https://www.ndss-symposium.org/ndss2010/effective-anomaly-detection-scarce-training-data},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/RobertsonMKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FelmetsgerCKV10,
  author       = {Viktoria Felmetsger and
                  Ludovico Cavedon and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Toward Automated Detection of Logic Vulnerabilities in Web Applications},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {143--160},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Felmetsger.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FelmetsgerCKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/CovaKV10,
  author       = {Marco Cova and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna},
  editor       = {Michael Rappa and
                  Paul Jones and
                  Juliana Freire and
                  Soumen Chakrabarti},
  title        = {Detection and analysis of drive-by-download attacks and malicious
                  JavaScript code},
  booktitle    = {Proceedings of the 19th International Conference on World Wide Web,
                  {WWW} 2010, Raleigh, North Carolina, USA, April 26-30, 2010},
  pages        = {281--290},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1772690.1772720},
  doi          = {10.1145/1772690.1772720},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/CovaKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KirdaJKV09,
  author       = {Engin Kirda and
                  Nenad Jovanovic and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Client-side cross-site scripting protection},
  journal      = {Comput. Secur.},
  volume       = {28},
  number       = {7},
  pages        = {592--604},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.cose.2009.04.008},
  doi          = {10.1016/J.COSE.2009.04.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KirdaJKV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/VignaVBRKK09,
  author       = {Giovanni Vigna and
                  Fredrik Valeur and
                  Davide Balzarotti and
                  William K. Robertson and
                  Christopher Kruegel and
                  Engin Kirda},
  title        = {Reducing errors in the anomaly-based detection of web-based attacks
                  through the combined analysis of web requests and {SQL} queries},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {305--329},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0321},
  doi          = {10.3233/JCS-2009-0321},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/VignaVBRKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FordCKV09,
  author       = {Sean Ford and
                  Marco Cova and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Analyzing and Detecting Malicious Flash Advertisements},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {363--372},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.41},
  doi          = {10.1109/ACSAC.2009.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FordCKV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Stone-GrossCCGSKKV09,
  author       = {Brett Stone{-}Gross and
                  Marco Cova and
                  Lorenzo Cavallaro and
                  Bob Gilbert and
                  Martin Szydlowski and
                  Richard A. Kemmerer and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {Your botnet is my botnet: analysis of a botnet takeover},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {635--647},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653738},
  doi          = {10.1145/1653662.1653738},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Stone-GrossCCGSKKV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/StammingerKVK09,
  author       = {Andreas Stamminger and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Engin Kirda},
  editor       = {Pierangela Samarati and
                  Moti Yung and
                  Fabio Martinelli and
                  Claudio A. Ardagna},
  title        = {Automated Spyware Collection and Analysis},
  booktitle    = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
                  Italy, September 7-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5735},
  pages        = {202--217},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04474-8\_17},
  doi          = {10.1007/978-3-642-04474-8\_17},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/StammingerKVK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MaggiRKV09,
  author       = {Federico Maggi and
                  William K. Robertson and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Protecting a Moving Target: Addressing Web Application Concept Drift},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_2},
  doi          = {10.1007/978-3-642-04342-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MaggiRKV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RobertsonV09,
  author       = {William K. Robertson and
                  Giovanni Vigna},
  editor       = {Fabian Monrose},
  title        = {Static Enforcement of Web Application Integrity Through Strong Typing},
  booktitle    = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14,
                  2009, Proceedings},
  pages        = {283--298},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {http://www.usenix.org/events/sec09/tech/full\_papers/robertson.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RobertsonV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/FoschiniTCKV08,
  author       = {Luca Foschini and
                  Ashish V. Thapliyal and
                  Lorenzo Cavallaro and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {R. Sekar and
                  Arun K. Pujari},
  title        = {A Parallel Architecture for Stateful, High-Speed Intrusion Detection},
  booktitle    = {Information Systems Security, 4th International Conference, {ICISS}
                  2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {203--220},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89862-7\_18},
  doi          = {10.1007/978-3-540-89862-7\_18},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/FoschiniTCKV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/BalzarottiBCFKRVV08,
  author       = {Davide Balzarotti and
                  Greg Banks and
                  Marco Cova and
                  Viktoria Felmetsger and
                  Richard A. Kemmerer and
                  William K. Robertson and
                  Fredrik Valeur and
                  Giovanni Vigna},
  editor       = {Barbara G. Ryder and
                  Andreas Zeller},
  title        = {Are your votes \emph{really} counted?: testing the security of real-world
                  electronic voting systems},
  booktitle    = {Proceedings of the {ACM/SIGSOFT} International Symposium on Software
                  Testing and Analysis, {ISSTA} 2008, Seattle, WA, USA, July 20-24,
                  2008},
  pages        = {237--248},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1390630.1390660},
  doi          = {10.1145/1390630.1390660},
  timestamp    = {Tue, 06 Nov 2018 16:57:30 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/BalzarottiBCFKRVV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BalzarottiCV08,
  author       = {Davide Balzarotti and
                  Marco Cova and
                  Giovanni Vigna},
  title        = {ClearShot: Eavesdropping on Keyboard Input from Video},
  booktitle    = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May
                  2008, Oakland, California, {USA}},
  pages        = {170--183},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SP.2008.28},
  doi          = {10.1109/SP.2008.28},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BalzarottiCV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BalzarottiCFJKKV08,
  author       = {Davide Balzarotti and
                  Marco Cova and
                  Viktoria Felmetsger and
                  Nenad Jovanovic and
                  Engin Kirda and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Saner: Composing Static and Dynamic Analysis to Validate Sanitization
                  in Web Applications},
  booktitle    = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May
                  2008, Oakland, California, {USA}},
  pages        = {387--401},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SP.2008.22},
  doi          = {10.1109/SP.2008.22},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BalzarottiCFJKKV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CovaKV08,
  author       = {Marco Cova and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Dan Boneh and
                  Tal Garfinkel and
                  Dug Song},
  title        = {There Is No Free Phish: An Analysis of "Free" and Live Phishing
                  Kits},
  booktitle    = {2nd {USENIX} Workshop on Offensive Technologies, WOOT'08, San Jose,
                  CA, USA, July 28, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/woot08/tech/full\_papers/cova/cova.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CovaKV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KlinkoffKKV07,
  author       = {Patrick Klinkoff and
                  Engin Kirda and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Extending .NET security to unmanaged code},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {6},
  pages        = {417--428},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0031-0},
  doi          = {10.1007/S10207-007-0031-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KlinkoffKKV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/ArnesHVK07,
  author       = {Andr{\'{e}} {\AA}rnes and
                  Paul Haas and
                  Giovanni Vigna and
                  Richard A. Kemmerer},
  title        = {Using a virtual security testbed for digital forensic reconstruction},
  journal      = {J. Comput. Virol.},
  volume       = {2},
  number       = {4},
  pages        = {275--289},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11416-006-0033-x},
  doi          = {10.1007/S11416-006-0033-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/ArnesHVK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KruegelBRV07,
  author       = {Christopher Kruegel and
                  Davide Balzarotti and
                  William K. Robertson and
                  Giovanni Vigna},
  title        = {Improving Signature Testing through Dynamic Data Flow Analysis},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {53--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.40},
  doi          = {10.1109/ACSAC.2007.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KruegelBRV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GundyCSV07,
  author       = {Matthew Van Gundy and
                  Hao Chen and
                  Zhendong Su and
                  Giovanni Vigna},
  title        = {Feature Omission Vulnerabilities: Thwarting Signature Generation for
                  Polymorphic Worms},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {74--85},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.42},
  doi          = {10.1109/ACSAC.2007.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GundyCSV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BalzarottiCFV07,
  author       = {Davide Balzarotti and
                  Marco Cova and
                  Viktoria Felmetsger and
                  Giovanni Vigna},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Multi-module vulnerability analysis of web-based applications},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {25--35},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315250},
  doi          = {10.1145/1315245.1315250},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BalzarottiCFV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/CarzanigaPV07,
  author       = {Antonio Carzaniga and
                  Gian Pietro Picco and
                  Giovanni Vigna},
  title        = {Is Code Still Moving Around? Looking Back at a Decade of Code Mobility},
  booktitle    = {29th International Conference on Software Engineering {(ICSE} 2007),
                  Minneapolis, MN, USA, May 20-26, 2007, Companion Volume},
  pages        = {9--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICSECOMPANION.2007.44},
  doi          = {10.1109/ICSECOMPANION.2007.44},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/CarzanigaPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/VogtNJKKV07,
  author       = {Philipp Vogt and
                  Florian Nentwich and
                  Nenad Jovanovic and
                  Engin Kirda and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna},
  title        = {Cross Site Scripting Prevention with Dynamic Data Tainting and Static
                  Analysis},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March
                  2007},
  publisher    = {The Internet Society},
  year         = {2007},
  url          = {https://www.ndss-symposium.org/ndss2007/cross-site-scripting-prevention-dynamic-data-tainting-and-static-analysis/},
  timestamp    = {Mon, 01 Feb 2021 08:42:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/VogtNJKKV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MutzRVK07,
  author       = {Darren Mutz and
                  William K. Robertson and
                  Giovanni Vigna and
                  Richard A. Kemmerer},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {Exploiting Execution Context for the Detection of Anomalous System
                  Calls},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_1},
  doi          = {10.1007/978-3-540-74320-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MutzRVK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CovaBFV07,
  author       = {Marco Cova and
                  Davide Balzarotti and
                  Viktoria Felmetsger and
                  Giovanni Vigna},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {Swaddler: An Approach for the Anomaly-Based Detection of State Violations
                  in Web Applications},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {63--86},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_4},
  doi          = {10.1007/978-3-540-74320-0\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CovaBFV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/GundyBV07,
  author       = {Matthew Van Gundy and
                  Davide Balzarotti and
                  Giovanni Vigna},
  editor       = {Dan Boneh and
                  Tal Garfinkel and
                  Dug Song},
  title        = {Catch Me, If You Can: Evading Network Signatures with Web-based Polymorphic
                  Worms},
  booktitle    = {First {USENIX} Workshop on Offensive Technologies, {WOOT} '07, Boston,
                  MA, USA, August 6, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/woot-07/catch-me-if-you-can-evading-network-signatures-web-based-polymorphic-worms},
  timestamp    = {Mon, 01 Feb 2021 08:41:52 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/GundyBV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/swb/CovaFV07,
  author       = {Marco Cova and
                  Viktoria Felmetsger and
                  Giovanni Vigna},
  editor       = {Luciano Baresi and
                  Elisabetta Di Nitto},
  title        = {Vulnerability Analysis of Web-based Applications},
  booktitle    = {Test and Analysis of Web Services},
  pages        = {363--394},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72912-9\_13},
  doi          = {10.1007/978-3-540-72912-9\_13},
  timestamp    = {Mon, 15 Jun 2020 17:07:26 +0200},
  biburl       = {https://dblp.org/rec/conf/swb/CovaFV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Vigna07,
  author       = {Giovanni Vigna},
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {Static Disassembly and Code Analysis},
  booktitle    = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  pages        = {19--41},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1\_2},
  doi          = {10.1007/978-0-387-44599-1\_2},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Vigna07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MutzVVK06,
  author       = {Darren Mutz and
                  Fredrik Valeur and
                  Giovanni Vigna and
                  Christopher Kr{\"{u}}gel},
  title        = {Anomalous system call detection},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {61--93},
  year         = {2006},
  url          = {https://doi.org/10.1145/1127345.1127348},
  doi          = {10.1145/1127345.1127348},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MutzVVK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MullinerV06,
  author       = {Collin Mulliner and
                  Giovanni Vigna},
  title        = {Vulnerability Analysis of {MMS} User Agents},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {77--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.55},
  doi          = {10.1109/ACSAC.2006.55},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MullinerV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CovaFBV06,
  author       = {Marco Cova and
                  Viktoria Felmetsger and
                  Greg Banks and
                  Giovanni Vigna},
  title        = {Static Detection of Vulnerabilities in x86 Executables},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {269--278},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.50},
  doi          = {10.1109/ACSAC.2006.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CovaFBV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/MullinerVDL06,
  author       = {Collin Mulliner and
                  Giovanni Vigna and
                  David Dagon and
                  Wenke Lee},
  editor       = {Roland B{\"{u}}schkes and
                  Pavel Laskov},
  title        = {Using Labeling to Prevent Cross-Service Attacks Against Smart Phones},
  booktitle    = {Detection of Intrusions and Malware {\&} Vulnerability Assessment,
                  Third International Conference, {DIMVA} 2006, Berlin, Germany, July
                  13-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4064},
  pages        = {91--108},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11790754\_6},
  doi          = {10.1007/11790754\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/MullinerVDL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/ArnesHVK06,
  author       = {Andr{\'{e}} {\AA}rnes and
                  Paul Haas and
                  Giovanni Vigna and
                  Richard A. Kemmerer},
  editor       = {Roland B{\"{u}}schkes and
                  Pavel Laskov},
  title        = {Digital Forensic Reconstruction and the Virtual Security Testbed ViSe},
  booktitle    = {Detection of Intrusions and Malware {\&} Vulnerability Assessment,
                  Third International Conference, {DIMVA} 2006, Berlin, Germany, July
                  13-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4064},
  pages        = {144--163},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11790754\_9},
  doi          = {10.1007/11790754\_9},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/ArnesHVK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KlinkoffKKV06,
  author       = {Patrick Klinkoff and
                  Christopher Kr{\"{u}}gel and
                  Engin Kirda and
                  Giovanni Vigna},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {Extending .NET Security to Unmanaged Code},
  booktitle    = {Information Security, 9th International Conference, {ISC} 2006, Samos
                  Island, Greece, August 30 - September 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4176},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11836810\_1},
  doi          = {10.1007/11836810\_1},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KlinkoffKKV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BanksCFAKV06,
  author       = {Greg Banks and
                  Marco Cova and
                  Viktoria Felmetsger and
                  Kevin C. Almeroth and
                  Richard A. Kemmerer and
                  Giovanni Vigna},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {{SNOOZE:} Toward a Stateful NetwOrk prOtocol fuzZEr},
  booktitle    = {Information Security, 9th International Conference, {ISC} 2006, Samos
                  Island, Greece, August 30 - September 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4176},
  pages        = {343--358},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11836810\_25},
  doi          = {10.1007/11836810\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BanksCFAKV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/RobertsonVKK06,
  author       = {William K. Robertson and
                  Giovanni Vigna and
                  Christopher Kr{\"{u}}gel and
                  Richard A. Kemmerer},
  title        = {Using Generalization and Characterization Techniques in the Anomaly-based
                  Detection of Web Attacks},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2006, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2006},
  url          = {https://www.ndss-symposium.org/ndss2006/using-generalization-and-characterization-techniques-anomaly-based-detection-web-attacks/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/RobertsonVKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ArnesVVK06,
  author       = {Andr{\'{e}} {\AA}rnes and
                  Fredrik Valeur and
                  Giovanni Vigna and
                  Richard A. Kemmerer},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {Using Hidden Markov Models to Evaluate the Risks of Intrusions},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {145--164},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_8},
  doi          = {10.1007/11856214\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ArnesVVK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/KirdaKVJ06,
  author       = {Engin Kirda and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna and
                  Nenad Jovanovic},
  editor       = {Hisham Haddad},
  title        = {Noxes: a client-side solution for mitigating cross-site scripting
                  attacks},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC),
                  Dijon, France, April 23-27, 2006},
  pages        = {330--337},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1141277.1141357},
  doi          = {10.1145/1141277.1141357},
  timestamp    = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/KirdaKVJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ValeurVKK06,
  author       = {Fredrik Valeur and
                  Giovanni Vigna and
                  Christopher Kr{\"{u}}gel and
                  Engin Kirda},
  editor       = {Hisham Haddad},
  title        = {An anomaly-driven reverse proxy for web applications},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC),
                  Dijon, France, April 23-27, 2006},
  pages        = {361--368},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1141277.1141361},
  doi          = {10.1145/1141277.1141361},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/ValeurVKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/KruegelVV05,
  author       = {Christopher Kruegel and
                  Fredrik Valeur and
                  Giovanni Vigna},
  title        = {Intrusion Detection and Correlation - Challenges and Solutions},
  series       = {Advances in Information Security},
  volume       = {14},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b101493},
  doi          = {10.1007/B101493},
  isbn         = {978-0-387-23398-7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/KruegelVV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/KrugelVR05,
  author       = {Christopher Kr{\"{u}}gel and
                  Giovanni Vigna and
                  William K. Robertson},
  title        = {A multi-model approach to the detection of web-based attacks},
  journal      = {Comput. Networks},
  volume       = {48},
  number       = {5},
  pages        = {717--738},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.comnet.2005.01.009},
  doi          = {10.1016/J.COMNET.2005.01.009},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/KrugelVR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/KemmererV05,
  author       = {Richard A. Kemmerer and
                  Giovanni Vigna},
  title        = {Hi-DRA: Intrusion Detection for Internet Security},
  journal      = {Proc. {IEEE}},
  volume       = {93},
  number       = {10},
  pages        = {1848--1857},
  year         = {2005},
  url          = {https://doi.org/10.1109/JPROC.2005.853547},
  doi          = {10.1109/JPROC.2005.853547},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/KemmererV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/ValeurMV05,
  author       = {Fredrik Valeur and
                  Darren Mutz and
                  Giovanni Vigna},
  editor       = {Klaus Julisch and
                  Christopher Kr{\"{u}}gel},
  title        = {A Learning-Based Approach to the Detection of {SQL} Attacks},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  Second International Conference, {DIMVA} 2005, Vienna, Austria, July
                  7-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3548},
  pages        = {123--140},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506881\_8},
  doi          = {10.1007/11506881\_8},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/ValeurMV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/HallarakerV05,
  author       = {Oystein Hallaraker and
                  Giovanni Vigna},
  title        = {Detecting Malicious JavaScript Code in Mozilla},
  booktitle    = {10th International Conference on Engineering of Complex Computer Systems
                  {(ICECCS} 2005), 16-20 June 2005, Shanghai, China},
  pages        = {85--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICECCS.2005.35},
  doi          = {10.1109/ICECCS.2005.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/HallarakerV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/FelmetsgerV05,
  author       = {Viktoria Felmetsger and
                  Giovanni Vigna},
  title        = {Exploiting OS-Level Mechanisms to Implement Mobile Code Security},
  booktitle    = {10th International Conference on Engineering of Complex Computer Systems
                  {(ICECCS} 2005), 16-20 June 2005, Shanghai, China},
  pages        = {234--243},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICECCS.2005.41},
  doi          = {10.1109/ICECCS.2005.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/FelmetsgerV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KrugelKMRV05,
  author       = {Christopher Kr{\"{u}}gel and
                  Engin Kirda and
                  Darren Mutz and
                  William K. Robertson and
                  Giovanni Vigna},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {Polymorphic Worm Detection Using Structural Information of Executables},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {207--226},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_11},
  doi          = {10.1007/11663812\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KrugelKMRV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KruegelKMRV05,
  author       = {Christopher Kruegel and
                  Engin Kirda and
                  Darren Mutz and
                  William K. Robertson and
                  Giovanni Vigna},
  editor       = {Patrick D. McDaniel},
  title        = {Automating Mimicry Attacks Using Static Binary Analysis},
  booktitle    = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD,
                  USA, July 31 - August 5, 2005},
  publisher    = {{USENIX} Association},
  year         = {2005},
  url          = {https://www.usenix.org/conference/14th-usenix-security-symposium/automating-mimicry-attacks-using-static-binary-analysis},
  timestamp    = {Mon, 01 Feb 2021 08:42:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KruegelKMRV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pik/KruegelRV04,
  author       = {Christopher Kruegel and
                  William K. Robertson and
                  Giovanni Vigna},
  title        = {Using Alert Verification to Identify Successful Intrusion Attempts},
  journal      = {Prax. Inf.verarb. Kommun.},
  volume       = {27},
  number       = {4},
  pages        = {219--227},
  year         = {2004},
  url          = {https://doi.org/10.1515/PIKO.2004.219},
  doi          = {10.1515/PIKO.2004.219},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pik/KruegelRV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ValeurVKK04,
  author       = {Fredrik Valeur and
                  Giovanni Vigna and
                  Christopher Kr{\"{u}}gel and
                  Richard A. Kemmerer},
  title        = {A Comprehensive Approach to Intrusion Detection Alert Correlation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {1},
  number       = {3},
  pages        = {146--169},
  year         = {2004},
  url          = {https://doi.org/10.1109/TDSC.2004.21},
  doi          = {10.1109/TDSC.2004.21},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ValeurVKK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/VignaGSBK04,
  author       = {Giovanni Vigna and
                  Sumit Gwalani and
                  Kavitha Srinivasan and
                  Elizabeth M. Belding{-}Royer and
                  Richard A. Kemmerer},
  title        = {An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks},
  booktitle    = {20th Annual Computer Security Applications Conference {(ACSAC} 2004),
                  6-10 December 2004, Tucson, AZ, {USA}},
  pages        = {16--27},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CSAC.2004.6},
  doi          = {10.1109/CSAC.2004.6},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/VignaGSBK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KrugelRV04,
  author       = {Christopher Kr{\"{u}}gel and
                  William K. Robertson and
                  Giovanni Vigna},
  title        = {Detecting Kernel-Level Rootkits Through Binary Analysis},
  booktitle    = {20th Annual Computer Security Applications Conference {(ACSAC} 2004),
                  6-10 December 2004, Tucson, AZ, {USA}},
  pages        = {91--100},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CSAC.2004.19},
  doi          = {10.1109/CSAC.2004.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KrugelRV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhouV04,
  author       = {Jingyu Zhou and
                  Giovanni Vigna},
  title        = {Detecting Attacks That Exploit Application-Logic Errors Through Application-Level
                  Auditing},
  booktitle    = {20th Annual Computer Security Applications Conference {(ACSAC} 2004),
                  6-10 December 2004, Tucson, AZ, {USA}},
  pages        = {168--178},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CSAC.2004.17},
  doi          = {10.1109/CSAC.2004.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhouV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VignaRB04,
  author       = {Giovanni Vigna and
                  William K. Robertson and
                  Davide Balzarotti},
  editor       = {Vijayalakshmi Atluri and
                  Birgit Pfitzmann and
                  Patrick D. McDaniel},
  title        = {Testing network-based intrusion detection signatures using mutant
                  exploits},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages        = {21--30},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1030083.1030088},
  doi          = {10.1145/1030083.1030088},
  timestamp    = {Fri, 13 Nov 2020 16:10:44 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/VignaRB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdm/Vigna04,
  author       = {Giovanni Vigna},
  title        = {Mobile Agents: Ten Reasons For Failure},
  booktitle    = {5th {IEEE} International Conference on Mobile Data Management {(MDM}
                  2004), 19-22 January 2004, Berkeley, CA, {USA}},
  pages        = {298--299},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/MDM.2004.1263077},
  doi          = {10.1109/MDM.2004.1263077},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mdm/Vigna04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KruegelRVV04,
  author       = {Christopher Kr{\"{u}}gel and
                  William K. Robertson and
                  Fredrik Valeur and
                  Giovanni Vigna},
  editor       = {Matt Blaze},
  title        = {Static Disassembly of Obfuscated Binaries},
  booktitle    = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13,
                  2004, San Diego, CA, {USA}},
  pages        = {255--270},
  publisher    = {{USENIX}},
  year         = {2004},
  url          = {http://www.usenix.org/publications/library/proceedings/sec04/tech/kruegel.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KruegelRVV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/VignaRKK03,
  author       = {Giovanni Vigna and
                  William K. Robertson and
                  Vishal Kher and
                  Richard A. Kemmerer},
  title        = {A Stateful Intrusion Detection System for World-Wide Web Servers},
  booktitle    = {19th Annual Computer Security Applications Conference {(ACSAC} 2003),
                  8-12 December 2003, Las Vegas, NV, {USA}},
  pages        = {34--43},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CSAC.2003.1254308},
  doi          = {10.1109/CSAC.2003.1254308},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/VignaRKK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MutzVK03,
  author       = {Darren Mutz and
                  Giovanni Vigna and
                  Richard A. Kemmerer},
  title        = {An Experience Developing an {IDS} Stimulator for the Black-Box Testing
                  of Network Intrusion Detection Systems},
  booktitle    = {19th Annual Computer Security Applications Conference {(ACSAC} 2003),
                  8-12 December 2003, Las Vegas, NV, {USA}},
  pages        = {374--383},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CSAC.2003.1254342},
  doi          = {10.1109/CSAC.2003.1254342},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MutzVK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KrugelV03,
  author       = {Christopher Kr{\"{u}}gel and
                  Giovanni Vigna},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {Anomaly detection of web-based attacks},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {251--261},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948144},
  doi          = {10.1145/948109.948144},
  timestamp    = {Tue, 10 Nov 2020 20:00:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KrugelV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KruegelMVV03,
  author       = {Christopher Kr{\"{u}}gel and
                  Darren Mutz and
                  Fredrik Valeur and
                  Giovanni Vigna},
  editor       = {Einar Snekkenes and
                  Dieter Gollmann},
  title        = {On the Detection of Anomalous System Call Arguments},
  booktitle    = {Computer Security - {ESORICS} 2003, 8th European Symposium on Research
                  in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2808},
  pages        = {326--343},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39650-5\_19},
  doi          = {10.1007/978-3-540-39650-5\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KruegelMVV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/Vigna03,
  author       = {Giovanni Vigna},
  editor       = {Keijiro Araki and
                  Stefania Gnesi and
                  Dino Mandrioli},
  title        = {A Topological Characterization of {TCP/IP} Security},
  booktitle    = {{FME} 2003: Formal Methods, International Symposium of Formal Methods
                  Europe, Pisa, Italy, September 8-14, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2805},
  pages        = {914--939},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45236-2\_49},
  doi          = {10.1007/978-3-540-45236-2\_49},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/Vigna03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/KemmererV03,
  author       = {Richard A. Kemmerer and
                  Giovanni Vigna},
  editor       = {Lori A. Clarke and
                  Laurie Dillon and
                  Walter F. Tichy},
  title        = {Internet Security and Intrusion Detection},
  booktitle    = {Proceedings of the 25th International Conference on Software Engineering,
                  May 3-10, 2003, Portland, Oregon, {USA}},
  pages        = {748--749},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSE.2003.10000},
  doi          = {10.1109/ICSE.2003.10000},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/KemmererV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-8/Vigna03,
  author       = {Giovanni Vigna},
  editor       = {Cynthia E. Irvine and
                  Helen L. Armstrong},
  title        = {Teaching Network Security Through Live Exercises},
  booktitle    = {Security Education and Critical Infrastructures, {IFIP} {TC11} / {WG11.8}
                  Third Annual World Conference on Information Security Education (WISE3),
                  June 26-28, 2003, Monterey, California, {USA}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {253},
  pages        = {3--18},
  publisher    = {Kluwer},
  year         = {2003},
  timestamp    = {Thu, 06 May 2004 14:39:20 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-8/Vigna03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/VignaVK03,
  author       = {Giovanni Vigna and
                  Fredrik Valeur and
                  Richard A. Kemmerer},
  editor       = {Jukka Paakki and
                  Paola Inverardi},
  title        = {Designing and implementing a family of intrusion detection systems},
  booktitle    = {Proceedings of the 11th {ACM} {SIGSOFT} Symposium on Foundations of
                  Software Engineering 2003 held jointly with 9th European Software
                  Engineering Conference, {ESEC/FSE} 2003, Helsinki, Finland, September
                  1-5, 2003},
  pages        = {88--97},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/940071.940084},
  doi          = {10.1145/940071.940084},
  timestamp    = {Tue, 01 Feb 2022 10:45:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/VignaVK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SomanKV03,
  author       = {Sunil Soman and
                  Chandra Krintz and
                  Giovanni Vigna},
  title        = {Detecting Malicious Java Code Using Virtual Machine Auditing},
  booktitle    = {Proceedings of the 12th {USENIX} Security Symposium, Washington, D.C.,
                  USA, August 4-8, 2003},
  publisher    = {{USENIX} Association},
  year         = {2003},
  url          = {https://www.usenix.org/conference/12th-usenix-security-symposium/detecting-malicious-java-code-using-virtual-machine},
  timestamp    = {Mon, 01 Feb 2021 08:43:16 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SomanKV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2003,
  editor       = {Giovanni Vigna and
                  Erland Jonsson and
                  Christopher Kr{\"{u}}gel},
  title        = {Recent Advances in Intrusion Detection, 6th International Symposium,
                  {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2820},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/b13476},
  doi          = {10.1007/B13476},
  isbn         = {3-540-40878-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/EckmannVK02,
  author       = {Steven T. Eckmann and
                  Giovanni Vigna and
                  Richard A. Kemmerer},
  title        = {{STATL:} An Attack Language for State-Based Intrusion Detection},
  journal      = {J. Comput. Secur.},
  volume       = {10},
  number       = {1/2},
  pages        = {71--104},
  year         = {2002},
  url          = {https://doi.org/10.3233/jcs-2002-101-204},
  doi          = {10.3233/JCS-2002-101-204},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/EckmannVK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/VignaVZK02,
  author       = {Giovanni Vigna and
                  Fredrik Valeur and
                  Jingyu Zhou and
                  Richard A. Kemmerer},
  title        = {Composable Tools For Network Discovery and Security Analysis},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {14--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176274},
  doi          = {10.1109/CSAC.2002.1176274},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/VignaVZK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MittalV02,
  author       = {Vishal Mittal and
                  Giovanni Vigna},
  editor       = {Vijayalakshmi Atluri},
  title        = {Sensor-based intrusion detection for intra-domain distance-vector
                  routing},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {127--137},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586129},
  doi          = {10.1145/586110.586129},
  timestamp    = {Tue, 10 Nov 2020 20:00:47 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MittalV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/VignaM02,
  author       = {Giovanni Vigna and
                  Andrew Mitchel},
  title        = {Mnemosyne: Designing and Implementing Network Short-Term Memory},
  booktitle    = {8th International Conference on Engineering of Complex Computer Systems
                  {(ICECCS} 2002), 2-4 December 2002, Greenbelt, MD, {USA}},
  pages        = {91--100},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/ICECCS.2002.1181501},
  doi          = {10.1109/ICECCS.2002.1181501},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/VignaM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ma/VignaCF02,
  author       = {Giovanni Vigna and
                  Bryan Cassell and
                  Dave Fayram},
  editor       = {Niranjan Suri},
  title        = {An Intrusion Detection System for Aglets},
  booktitle    = {Mobile Agents, 6th International Conference, {MA} 2002, Barcelona,
                  Spain, October 22-25, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2535},
  pages        = {64--77},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36112-X\_5},
  doi          = {10.1007/3-540-36112-X\_5},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ma/VignaCF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KrugelVVK02,
  author       = {Christopher Kr{\"{u}}gel and
                  Fredrik Valeur and
                  Giovanni Vigna and
                  Richard A. Kemmerer},
  title        = {Stateful Intrusion Detection for High-Speed Networks},
  booktitle    = {2002 {IEEE} Symposium on Security and Privacy, Berkeley, California,
                  USA, May 12-15, 2002},
  pages        = {285--293},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/SECPRI.2002.1004378},
  doi          = {10.1109/SECPRI.2002.1004378},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KrugelVVK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2002,
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0},
  doi          = {10.1007/3-540-36084-0},
  isbn         = {3-540-00020-8},
  timestamp    = {Sat, 07 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ma/FischmeisterVK01,
  author       = {Sebastian Fischmeister and
                  Giovanni Vigna and
                  Richard A. Kemmerer},
  editor       = {Gian Pietro Picco},
  title        = {Evaluating the Security of Three Java-Based Mobile Agent Systems},
  booktitle    = {Mobile Agents, 5th International Conference, {MA} 2001 Atlanta, GA,
                  USA, December 2-4, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2240},
  pages        = {31--41},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45647-3\_3},
  doi          = {10.1007/3-540-45647-3\_3},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ma/FischmeisterVK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/VignaKB01,
  author       = {Giovanni Vigna and
                  Richard A. Kemmerer and
                  Per Blix},
  editor       = {Wenke Lee and
                  Ludovic M{\'{e}} and
                  Andreas Wespi},
  title        = {Designing a Web of Highly-Configurable Intrusion Detection Sensors},
  booktitle    = {Recent Advances in Intrusion Detection, 4th International Symposium,
                  {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2212},
  pages        = {69--84},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45474-8\_5},
  doi          = {10.1007/3-540-45474-8\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/VignaKB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SantosVK01,
  author       = {Andr{\'{e}} L. M. dos Santos and
                  Giovanni Vigna and
                  Richard A. Kemmerer},
  editor       = {Anup K. Ghosh},
  title        = {Security Testing of an Online Banking Service},
  booktitle    = {E-Commerce Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {2},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-1-4615-1467-1\_1},
  doi          = {10.1007/978-1-4615-1467-1\_1},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/SantosVK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/VignaK99,
  author       = {Giovanni Vigna and
                  Richard A. Kemmerer},
  title        = {NetSTAT: {A} Network-based Intrusion Detection System},
  journal      = {J. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {37--71},
  year         = {1999},
  url          = {https://doi.org/10.3233/jcs-1999-7103},
  doi          = {10.3233/JCS-1999-7103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/VignaK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/FuggettaPV98,
  author       = {Alfonso Fuggetta and
                  Gian Pietro Picco and
                  Giovanni Vigna},
  title        = {Understanding Code Mobility},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {24},
  number       = {5},
  pages        = {342--361},
  year         = {1998},
  url          = {https://doi.org/10.1109/32.685258},
  doi          = {10.1109/32.685258},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tse/FuggettaPV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/VignaK98,
  author       = {Giovanni Vigna and
                  Richard A. Kemmerer},
  title        = {NetSTAT: {A} Network-Based Intrusion Detection Approach},
  booktitle    = {14th Annual Computer Security Applications Conference {(ACSAC} 1998),
                  7-11 December 1998, Scottsdale, AZ, {USA}},
  pages        = {25--34},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/CSAC.1998.738566},
  doi          = {10.1109/CSAC.1998.738566},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/VignaK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwssd/CodaGVG98,
  author       = {Francesco Coda and
                  Carlo Ghezzi and
                  Giovanni Vigna and
                  Franca Garzotto},
  title        = {Towards a Software Engineering Approach to Web Site Development},
  booktitle    = {Proceedings of the 9th International Workshop on Software Specification
                  and Design, {IWSSD} 1998, USA, April 16-18, 1998},
  pages        = {8--17},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://dl.acm.org/doi/10.5555/857205.858298},
  doi          = {10.5555/857205.858298},
  timestamp    = {Mon, 16 May 2022 14:03:08 +0200},
  biburl       = {https://dblp.org/rec/conf/iwssd/CodaGVG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mas/Vigna98,
  author       = {Giovanni Vigna},
  editor       = {Giovanni Vigna},
  title        = {Cryptographic Traces for Mobile Agents},
  booktitle    = {Mobile Agents and Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {1419},
  pages        = {137--153},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-68671-1\_8},
  doi          = {10.1007/3-540-68671-1\_8},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/mas/Vigna98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mas/1998,
  editor       = {Giovanni Vigna},
  title        = {Mobile Agents and Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {1419},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-68671-1},
  doi          = {10.1007/3-540-68671-1},
  isbn         = {3-540-64792-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mas/1998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/CarzanigaPV97,
  author       = {Antonio Carzaniga and
                  Gian Pietro Picco and
                  Giovanni Vigna},
  editor       = {W. Richards Adrion and
                  Alfonso Fuggetta and
                  Richard N. Taylor and
                  Anthony I. Wasserman},
  title        = {Designing Distributed Applications with Mobile Code Paradigms},
  booktitle    = {Pulling Together, Proceedings of the 19th International Conference
                  on Software Engineering, Boston, Massachusetts, USA, May 17-23, 1997},
  pages        = {22--32},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/253228.253236},
  doi          = {10.1145/253228.253236},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/CarzanigaPV97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ma/GhezziV97,
  author       = {Carlo Ghezzi and
                  Giovanni Vigna},
  editor       = {Kurt Rothermel and
                  Radu Popescu{-}Zeletin},
  title        = {Mobile Code Paradigms and Technologies: {A} Case Study},
  booktitle    = {Mobile Agents, First International Workshop, MA'97, Berlin, Germany,
                  April 7-8, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1219},
  pages        = {39--49},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-62803-7\_22},
  doi          = {10.1007/3-540-62803-7\_22},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ma/GhezziV97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rtse/GhezziV97,
  author       = {Carlo Ghezzi and
                  Giovanni Vigna},
  editor       = {Manfred Broy and
                  Bernhard Rumpe},
  title        = {Software Engineering Issues for Network Computing},
  booktitle    = {Requirements Targeting Software and Systems Engineering, International
                  Workshop {RTSE} '97, Bernried, Germany, October 12-14, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1526},
  pages        = {155--177},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/10692867\_7},
  doi          = {10.1007/10692867\_7},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/rtse/GhezziV97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mos/CugolaGPV96,
  author       = {Gianpaolo Cugola and
                  Carlo Ghezzi and
                  Gian Pietro Picco and
                  Giovanni Vigna},
  editor       = {Jan Vitek and
                  Christian F. Tschudin},
  title        = {Analyzing Mobile Code Languages},
  booktitle    = {Mobile Object Systems - Towards the Programmable Internet, Second
                  International Workshop, MOS'96, Linz, Austria, July 8-9, 1996, Selected
                  Presentations and Invited Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {1222},
  pages        = {93--110},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62852-5\_9},
  doi          = {10.1007/3-540-62852-5\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/mos/CugolaGPV96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isooms/CarzanigaPV94,
  author       = {Antonio Carzaniga and
                  Gian Pietro Picco and
                  Giovanni Vigna},
  editor       = {Elisa Bertino and
                  Susan Darling Urban},
  title        = {Designing and Implementing Inter-Client Communication in the {O2}
                  Object-Oriented Database Management System},
  booktitle    = {Object-Oriented Methodologies and Systems, International Symposium
                  {ISOOMS} '94, Palermo, Italy, September 21-22, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {858},
  pages        = {53--64},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0014016},
  doi          = {10.1007/BFB0014016},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isooms/CarzanigaPV94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics