Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Christopher Krügel
Christopher Kruegel
2010 – today
- 2013
[c120]Manuel Egele, Gianluca Stringhini, Christopher Krügel, Giovanni Vigna: COMPA: Detecting Compromised Accounts on Social Networks. NDSS 2013
[c119]Tobias Lauinger, Martin Szydlowski, Kaan Onarlioglu, Gilbert Wondracek, Engin Kirda, Christopher Krügel: Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting. NDSS 2013
[c118]Pierre Payet, Adam Doupé, Christopher Kruegel, Giovanni Vigna: EARs in the wild: large-scale analysis of execution after redirect vulnerabilities. SAC 2013: 1792-1799
[c117]Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna: Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting. IEEE Symposium on Security and Privacy 2013: 541-555
[c116]Federico Maggi, Alessandro Frossi, Stefano Zanero, Gianluca Stringhini, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna: Two years of short URLs internet measurement: security threats and countermeasures. WWW 2013: 861-872- 2012
[j18]Gianluca Stringhini, Manuel Egele, Christopher Kruegel, Giovanni Vigna: Poultry markets: on the underground economy of twitter followers. Computer Communication Review 42(4): 527-532 (2012)
[j17]Manuel Egele, Andreas Moser, Christopher Kruegel, Engin Kirda: PoX: Protecting users from malicious Facebook applications. Computer Communications 35(12): 1507-1515 (2012)
[j16]Manuel Egele, Theodoor Scholte, Engin Kirda, Christopher Kruegel: A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv. 44(2): 6 (2012)
[c115]Leyla Bilge, Davide Balzarotti, William K. Robertson, Engin Kirda, Christopher Kruegel: Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis. ACSAC 2012: 129-138
[c114]Johannes Schlumberger, Christopher Kruegel, Giovanni Vigna: Jarhead analysis and detection of malicious Java applets. ACSAC 2012: 249-257
[c113]Antonio Bianchi, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna: Blacksheep: detecting compromised hosts in homogeneous crowds. ACM Conference on Computer and Communications Security 2012: 341-352
[c112]Zhaoyan Xu, Lingfeng Chen, Guofei Gu, Christopher Kruegel: PeerPress: utilizing enemies' P2P strength against them. ACM Conference on Computer and Communications Security 2012: 581-592
[c111]Nick Nikiforakis, Luca Invernizzi, Alexandros Kapravelos, Steven Van Acker, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna: You are what you include: large-scale evaluation of remote javascript inclusions. ACM Conference on Computer and Communications Security 2012: 736-747
[c110]Florian Tegeler, Xiaoming Fu, Giovanni Vigna, Christopher Kruegel: BotFinder: finding bots in network traffic without deep packet inspection. CoNEXT 2012: 349-360
[c109]Grégoire Jacob, Paolo Milani Comparetti, Matthias Neugschwandtner, Christopher Kruegel, Giovanni Vigna: A Static, Packer-Agnostic Filter to Detect Similar Malware Samples. DIMVA 2012: 102-122
[c108]André Ricardo Abed Grégio, Paulo Lício de Geus, Christopher Kruegel, Giovanni Vigna: Tracking Memory Writes for Malware Classification and Code Reuse Identification. DIMVA 2012: 134-143
[c107]
[c106]Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazzini, Tevfik Bultan, Alessandro Orso, Christopher Kruegel: ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies. ISSTA 2012: 56-66
[c105]Davide Canali, Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda: A quantitative study of accuracy in system call-based malware detection. ISSTA 2012: 122-132
[c104]Lei Yang, Zengbin Zhang, Ben Y. Zhao, Christopher Kruegel, Haitao Zheng: Enforcing dynamic spectrum access with spectrum permits. MobiHoc 2012: 195-204
[c103]Hakan Yildiz, Christopher Kruegel: Detecting social cliques for automated privacy control in online social networks. PerCom Workshops 2012: 353-359
[c102]Timon Van Overveldt, Christopher Kruegel, Giovanni Vigna: FlashDetect: ActionScript 3 Malware Detection. RAID 2012: 274-293- 2011
[j15]Christopher Kruegel: Making browser extensions secure: technical perspective. Commun. ACM 54(9): 90 (2011)
[j14]Brett Stone-Gross, Marco Cova, Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna: Analysis of a Botnet Takeover. IEEE Security & Privacy 9(1): 64-72 (2011)
[c101]Matthias Neugschwandtner, Paolo Milani Comparetti, Grégoire Jacob, Christopher Kruegel: FORECAST: skimming off the malware cream. ACSAC 2011: 11-20
[c100]Casey Cipriano, Ali Zand, Amir Houmansadr, Christopher Kruegel, Giovanni Vigna: Nexat: a history-based approach to predict attacker actions. ACSAC 2011: 383-392
[c99]Dhilung Kirat, Giovanni Vigna, Christopher Kruegel: BareBox: efficient malware analysis on bare-metal. ACSAC 2011: 403-412
[c98]Adam Doupé, Bryce Boe, Christopher Kruegel, Giovanni Vigna: Fear the EAR: discovering and mitigating execution after redirect vulnerabilities. ACM Conference on Computer and Communications Security 2011: 251-262
[c97]Clemens Kolbitsch, Engin Kirda, Christopher Kruegel: The power of procrastination: detection and mitigation of execution-stalling malicious code. ACM Conference on Computer and Communications Security 2011: 285-296
[c96]Krishna P. N. Puttaswamy, Christopher Kruegel, Ben Y. Zhao: Silverline: toward data confidentiality in storage-intensive cloud applications. SoCC 2011: 10
[c95]Alexandros Kapravelos, Marco Cova, Christopher Kruegel, Giovanni Vigna: Escape from Monkey Island: Evading High-Interaction Honeyclients. DIMVA 2011: 124-143
[c94]Greg Banks, Aristide Fattori, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna: MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper). DIMVA 2011: 184-193
[c93]Martin Szydlowski, Ben Y. Zhao, Engin Kirda, Christopher Kruegel: BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients. ICCCN 2011: 1-6
[c92]Martin Szydlowski, Manuel Egele, Christopher Kruegel, Giovanni Vigna: Challenges for Dynamic Analysis of iOS Applications. iNetSeC 2011: 65-77
[c91]Brett Stone-Gross, Ryan Stevens, Apostolis Zarras, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna: Understanding fraudulent activities in online ad exchanges. Internet Measurement Conference 2011: 279-294
[c90]Brett Stone-Gross, Marco Cova, Christopher Kruegel, Giovanni Vigna: Peering through the iframe. INFOCOM 2011: 411-415
[c89]Leyla Bilge, Engin Kirda, Christopher Kruegel, Marco Balduzzi: EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. NDSS 2011
[c88]Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna: PiOS: Detecting Privacy Leaks in iOS Applications. NDSS 2011
[c87]Manuel Egele, Andreas Moser, Christopher Kruegel, Engin Kirda: PoX: Protecting users from malicious Facebook applications. PerCom Workshops 2011: 288-294
[c86]Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna: Dymo: Tracking Dynamic Code Identity. RAID 2011: 21-40
[c85]Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna: Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode. RAID 2011: 61-80
[c84]Grégoire Jacob, Ralf Hund, Christopher Kruegel, Thorsten Holz: JACKSTRAWS: Picking Command and Control Connections from Bot Traffic. USENIX Security Symposium 2011
[c83]Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna: BOTMAGNIFIER: Locating Spambots on the Internet. USENIX Security Symposium 2011
[c82]Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald: The Underground Economy of Fake Antivirus Software. WEIS 2011
[c81]Davide Canali, Marco Cova, Giovanni Vigna, Christopher Kruegel: Prophiler: a fast filter for the large-scale detection of malicious web pages. WWW 2011: 197-206- 2010
[j13]Nenad Jovanovic, Christopher Kruegel, Engin Kirda: Static analysis for detecting taint-style vulnerabilities in web applications. Journal of Computer Security 18(5): 861-907 (2010)
[c80]Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna: Detecting spammers on social networks. ACSAC 2010: 1-9
[c79]Marco Balduzzi, Manuel Egele, Engin Kirda, Davide Balzarotti, Christopher Kruegel: A solution for the automated detection of clickjacking attacks. ASIACCS 2010: 135-144
[c78]Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda: AccessMiner: using system-centric models for malware protection. ACM Conference on Computer and Communications Security 2010: 399-412
[c77]Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna: Are BGP Routers Open to Attack? An Experiment. iNetSec 2010: 88-103
[c76]Davide Balzarotti, Marco Cova, Christoph Karlberger, Engin Kirda, Christopher Kruegel, Giovanni Vigna: Efficient Detection of Split Personalities in Malware. NDSS 2010
[c75]William K. Robertson, Federico Maggi, Christopher Kruegel, Giovanni Vigna: Effective Anomaly Detection with Scarce Training Data. NDSS 2010
[c74]Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, Christopher Kruegel: Abusing Social Networks for Automated User Profiling. RAID 2010: 422-441
[c73]Manuel Egele, Leyla Bilge, Engin Kirda, Christopher Kruegel: CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms. SAC 2010: 1865-1870
[c72]Ulrich Bayer, Engin Kirda, Christopher Kruegel: Improving the efficiency of dynamic malware analysis. SAC 2010: 1871-1878
[c71]Clemens Kolbitsch, Thorsten Holz, Christopher Kruegel, Engin Kirda: Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries. IEEE Symposium on Security and Privacy 2010: 29-44
[c70]Paolo Milani Comparetti, Guido Salvaneschi, Engin Kirda, Clemens Kolbitsch, Christopher Kruegel, Stefano Zanero: Identifying Dormant Functionality in Malware Programs. IEEE Symposium on Security and Privacy 2010: 61-76
[c69]Gilbert Wondracek, Thorsten Holz, Engin Kirda, Christopher Kruegel: A Practical Attack to De-anonymize Social Network Users. IEEE Symposium on Security and Privacy 2010: 223-238
[c68]Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna: Toward Automated Detection of Logic Vulnerabilities in Web Applications. USENIX Security Symposium 2010: 143-160
[c67]Gilbert Wondracek, Thorsten Holz, Christian Platzer, Engin Kirda, Christopher Kruegel: Is the Internet for Porn? An Insight Into the Online Adult Industry. WEIS 2010
[c66]Marco Cova, Christopher Krügel, Giovanni Vigna: Detection and analysis of drive-by-download attacks and malicious JavaScript code. WWW 2010: 281-290
2000 – 2009
- 2009
[j12]Engin Kirda, Nenad Jovanovic, Christopher Kruegel, Giovanni Vigna: Client-side cross-site scripting protection. Computers & Security 28(7): 592-604 (2009)
[j11]Sotiris Ioannidis, Evangelos P. Markatos, Christopher Kruegel: On looking FORWARD. ERCIM News 2009(76) (2009)
[j10]Stefan Mitterhofer, Christopher Krügel, Engin Kirda, Christian Platzer: Server-Side Bot Detection in Massively Multiplayer Online Games. IEEE Security & Privacy 7(3): 29-36 (2009)
[j9]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov: Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008. Computer Science - R&D 23(1): 15-25 (2009)
[j8]Giovanni Vigna, Fredrik Valeur, Davide Balzarotti, William K. Robertson, Christopher Kruegel, Engin Kirda: Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries. Journal of Computer Security 17(3): 305-329 (2009)
[c65]Brett Stone-Gross, Christopher Kruegel, Kevin C. Almeroth, Andreas Moser, Engin Kirda: FIRE: FInding Rogue nEtworks. ACSAC 2009: 231-240
[c64]Sean Ford, Marco Cova, Christopher Kruegel, Giovanni Vigna: Analyzing and Detecting Malicious Flash Advertisements. ACSAC 2009: 363-372
[c63]Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna: Your botnet is my botnet: analysis of a botnet takeover. ACM Conference on Computer and Communications Security 2009: 635-647
[c62]Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda: Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. DIMVA 2009: 88-106
[c61]Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel, Engin Kirda: Automatically Generating Models for Botnet Detection. ESORICS 2009: 232-249
[c60]Manuel Egele, Engin Kirda, Christopher Kruegel: Mitigating Drive-By Download Attacks: Challenges and Open Problems. iNetSeC 2009: 52-62
[c59]Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda: Automated Spyware Collection and Analysis. ISC 2009: 202-217
[c58]Ulrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Krügel, Engin Kirda: Scalable, Behavior-Based Malware Clustering. NDSS 2009
[c57]Federico Maggi, William K. Robertson, Christopher Krügel, Giovanni Vigna: Protecting a Moving Target: Addressing Web Application Concept Drift. RAID 2009: 21-40
[c56]Paolo Milani Comparetti, Gilbert Wondracek, Christopher Krügel, Engin Kirda: Prospex: Protocol Specification Extraction. IEEE Symposium on Security and Privacy 2009: 110-125
[c55]Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Xiao-yong Zhou, XiaoFeng Wang: Effective and Efficient Malware Detection at the End Host. USENIX Security Symposium 2009: 351-366- 2008
[c54]Lothar Braun, Falko Dressler, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Tobias Limmer, Konrad Rieck, James P. G. Sterbenz: 08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective. Network Attack Detection and Defense 2008
[c53]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel: 08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008
[c52]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov: 08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008
[c51]Marc Dacier, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, James P. G. Sterbenz: 8102 Working Group -- Attack Taxonomy. Network Attack Detection and Defense 2008
[c50]Brett Stone-Gross, David Sigal, Rob Cohn, John Morse, Kevin C. Almeroth, Christopher Kruegel: VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges. DIMVA 2008: 44-63
[c49]Luca Foschini, Ashish V. Thapliyal, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna: A Parallel Architecture for Stateful, High-Speed Intrusion Detection. ICISS 2008: 203-220
[c48]Mihai Christodorescu, Somesh Jha, Christopher Kruegel: Mining specifications of malicious behavior. ISEC 2008: 5-14
[c47]Gilbert Wondracek, Paolo Milani Comparetti, Christopher Krügel, Engin Kirda: Automatic Network Protocol Analysis. NDSS 2008
[c46]Sean McAllister, Engin Kirda, Christopher Kruegel: Leveraging User Interactions for In-Depth Testing of Web Applications. RAID 2008: 191-210
[c45]Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna: Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. IEEE Symposium on Security and Privacy 2008: 387-401
[c44]Marco Cova, Christopher Kruegel, Giovanni Vigna: There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. WOOT 2008
[e5]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel (Eds.): Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008. Dagstuhl Seminar Proceedings 08102, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008- 2007
[j7]Patrick Klinkoff, Engin Kirda, Christopher Kruegel, Giovanni Vigna: Extending .NET security to unmanaged code. Int. J. Inf. Sec. 6(6): 417-428 (2007)
[c43]Christopher Kruegel, Davide Balzarotti, William K. Robertson, Giovanni Vigna: Improving Signature Testing through Dynamic Data Flow Analysis. ACSAC 2007: 53-63
[c42]Martin Szydlowski, Christopher Kruegel, Engin Kirda: Secure Input for Web Applications. ACSAC 2007: 375-384
[c41]Andreas Moser, Christopher Kruegel, Engin Kirda: Limits of Static Analysis for Malware Detection. ACSAC 2007: 421-430
[c40]Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda: Panorama: capturing system-wide information flow for malware detection and analysis. ACM Conference on Computer and Communications Security 2007: 116-127
[c39]Christian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel: On the Effectiveness of Techniques to Detect Phishing Sites. DIMVA 2007: 20-39
[c38]
[c37]Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Krügel, Giovanni Vigna: Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. NDSS 2007
[c36]Angelo P. E. Rosiello, Engin Kirda, Christopher Kruegel, Fabrizio Ferrandi: A layout-similarity-based approach for detecting phishing pages. SecureComm 2007: 454-463
[c35]Mihai Christodorescu, Somesh Jha, Christopher Kruegel: Mining specifications of malicious behavior. ESEC/SIGSOFT FSE 2007: 5-14
[c34]Andreas Moser, Christopher Krügel, Engin Kirda: Exploring Multiple Execution Paths for Malware Analysis. IEEE Symposium on Security and Privacy 2007: 231-245
[c33]Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, Dawn Xiaodong Song: Dynamic Spyware Analysis. USENIX Annual Technical Conference 2007: 233-246
[p2]Christopher Kruegel: Behavioral and Structural Properties of Malicious Code. Malware Detection 2007: 63-83
[e4]Christopher Krügel, Richard Lippmann, Andrew J. Clark (Eds.): Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings. Lecture Notes in Computer Science 4637, Springer 2007, ISBN 978-3-540-74319-4- 2006
[j6]Engin Kirda, Christopher Krügel: Protecting Users against Phishing Attacks. Comput. J. 49(5): 554-561 (2006)
[j5]Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel: Anomalous system call detection. ACM Trans. Inf. Syst. Secur. 9(1): 61-93 (2006)
[j4]Ulrich Bayer, Andreas Moser, Christopher Krügel, Engin Kirda: Dynamic Analysis of Malicious Code. Journal in Computer Virology 2(1): 67-77 (2006)
[c32]Manuel Egele, Martin Szydlowski, Engin Kirda, Christopher Krügel: Using Static Program Analysis to Aid Intrusion Detection. DIMVA 2006: 17-36
[c31]Patrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna: Extending .NET Security to Unmanaged Code. ISC 2006: 1-16
[c30]William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer: Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. NDSS 2006
[c29]Nenad Jovanovic, Christopher Kruegel, Engin Kirda: Precise alias analysis for static detection of web application vulnerabilities. PLAS 2006: 27-36
[c28]Engin Kirda, Christopher Krügel, Giovanni Vigna, Nenad Jovanovic: Noxes: a client-side solution for mitigating cross-site scripting attacks. SAC 2006: 330-337
[c27]Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Engin Kirda: An anomaly-driven reverse proxy for web applications. SAC 2006: 361-368
[c26]Nenad Jovanovic, Engin Kirda, Christopher Kruegel: Preventing Cross Site Request Forgery Attacks. SecureComm 2006: 1-10
[c25]Nenad Jovanovic, Christopher Krügel, Engin Kirda: Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). IEEE Symposium on Security and Privacy 2006: 258-263
[c24]Stefan Kals, Engin Kirda, Christopher Krügel, Nenad Jovanovic: SecuBat: a web vulnerability scanner. WWW 2006: 247-256
[e3]Diego Zamboni, Christopher Krügel (Eds.): Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings. Lecture Notes in Computer Science 4219, Springer 2006, ISBN 3-540-39723-X- 2005
[b1]Christopher Kruegel, Fredrik Valeur, Giovanni Vigna: Intrusion Detection and Correlation - Challenges and Solutions. Advances in Information Security 14, Springer 2005, ISBN 978-0-387-23398-7, pp. 1-118
[j3]Christopher Krügel, Giovanni Vigna, William K. Robertson: A multi-model approach to the detection of web-based attacks. Computer Networks 48(5): 717-738 (2005)
[c23]Engin Kirda, Christopher Krügel: Protecting Users Against Phishing Attacks with AntiPhish. COMPSAC (1) 2005: 517-524
[c22]Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna: Polymorphic Worm Detection Using Structural Information of Executables. RAID 2005: 207-226
[p1]Christopher Krügel: Network Security and Secure Applications. The Industrial Information Technology Handbook 2005: 1-13
[e2]Klaus Julisch, Christopher Krügel (Eds.): Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings. Lecture Notes in Computer Science 3548, Springer 2005, ISBN 3-540-26613-5- 2004
[j2]Christopher Kruegel, William K. Robertson, Giovanni Vigna: Using Alert Verification to Identify Successful Intrusion Attempts. Praxis der Informationsverarbeitung und Kommunikation 27(4): 219-227 (2004)
[j1]Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer: A Comprehensive Approach to Intrusion Detection Alert Correlation. IEEE Trans. Dependable Sec. Comput. 1(3): 146-169 (2004)
[c21]Christopher Krügel, William K. Robertson, Giovanni Vigna: Detecting Kernel-Level Rootkits Through Binary Analysis. ACSAC 2004: 91-100
[c20]Christopher Krügel, William K. Robertson: Alert Verification Determining the Success of Intrusion Attempts. DIMVA 2004: 25-38
[c19]Christopher Krügel, William K. Robertson, Fredrik Valeur, Giovanni Vigna: Static Disassembly of Obfuscated Binaries. USENIX Security Symposium 2004: 255-270- 2003
[c18]Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur: Bayesian Event Classification for Intrusion Detection. ACSAC 2003: 14-23
[c17]Christopher Krügel, Giovanni Vigna: Anomaly detection of web-based attacks. ACM Conference on Computer and Communications Security 2003: 251-261
[c16]Christopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna: On the Detection of Anomalous System Call Arguments. ESORICS 2003: 326-343
[c15]Engin Kirda, Clemens Kerer, Christopher Krügel, Roman Kurmanowytsch: Web Service Engineering with DIWE. EUROMICRO 2003: 283-290
[c14]William K. Robertson, Christopher Krügel, Darren Mutz, Fredrik Valeur: Run-time Detection of Heap-based Overflows. LISA 2003: 51-60
[c13]Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur: Topology-Based Detection of Anomalous BGP Messages. RAID 2003: 17-35
[c12]Christopher Krügel, Thomas Toth: Using Decision Trees to Improve Signature-Based Intrusion Detection. RAID 2003: 173-191
[e1]Giovanni Vigna, Erland Jonsson, Christopher Krügel (Eds.): Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings. Lecture Notes in Computer Science 2820, Springer 2003, ISBN 3-540-40878-9- 2002
[c11]Thomas Toth, Christopher Krügel: Evaluating the Impact of Automated Intrusion Response Mechanisms. ACSAC 2002: 301-310
[c10]Pascal Fenkam, Harald Gall, Mehdi Jazayeri, Christopher Krügel: DPS : An Architectural Style for Development of Secure Software. InfraSec 2002: 180-198
[c9]
[c8]Clemens Kerer, Engin Kirda, Christopher Krügel: XGuide - A Practical Guide to XML-Based Web Engineering. NETWORKING Workshops 2002: 104-117
[c7]Thomas Toth, Christopher Krügel: Accurate Buffer Overflow Detection via Abstract Payload Execution. RAID 2002: 274-291
[c6]Christopher Krügel, Thomas Toth, Engin Kirda: Service specific anomaly detection for network intrusion detection. SAC 2002: 201-208
[c5]Christopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer: Stateful Intrusion Detection for High-Speed Networks. IEEE Symposium on Security and Privacy 2002: 285-293- 2001
[c4]Christopher Krügel, Thomas Toth, Clemens Kerer: Decentralized Event Correlation for Intrusion Detection. ICISC 2001: 114-131
[c3]Christopher Krügel, Thomas Toth, Engin Kirda: SPARTA, a Mobile Agent Based Instrusion Detection System. Network Security 2001: 187-200
[c2]Engin Kirda, Clemens Kerer, Mehdi Jazayeri, Christopher Krügel: Supporting Multi-Device Enabled Web Services: Challenges and Open Problems. WETICE 2001: 49-54
1990 – 1999
- 1999
[c1]Wolfgang Kastner, Christopher Krügel, Heinrich Reiter: Jini-ein guter Geist für die Gebäudesystemtechnik. Java-Informations-Tage 1999: 213-222
Coauthor Index
[c119] [j17] [j16] [c115] [c105] [c97] [c93] [c89] [c88] [c87] [j13] [c79] [c78] [c76] [c74] [c73] [c72] [c71] [c70] [c69] [c67] [j12] [j10] [j8] [c65] [c62] [c61] [c60] [c59] [c58] [c56] [c55] [c54] [c51] [c47] [c46] [c45] [j7] [c42] [c41] [c40] [c39] [c38] [c37] [c36] [c34] [c33] [j6] [j4] [c32] [c31] [c29] [c28] [c27] [c26] [c25] [c24] [c23] [c22] [c15] [c8] [c6] [c3] [c2]
[c120] [c118] [c117] [c116] [j18] [c114] [c113] [c111] [c110] [c109] [c108] [c102] [j14] [c100] [c99] [c98] [c95] [c94] [c92] [c91] [c90] [c88] [c86] [c85] [c83] [c81] [c80] [c77] [c76] [c75] [c68] [c66] [j12] [j8] [c64] [c63] [c59] [c57] [c49] [c45] [c44] [j7] [c43] [c37] [j5] [c31] [c30] [c28] [c27] [b1] [j3] [c22] [j2] [j1] [c21] [c19] [c17] [c16] [e1] [c5]
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:12 CEST by the dblp team



