Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Giovanni Vigna
2010 – today
- 2013
[c95]Manuel Egele, Gianluca Stringhini, Christopher Krügel, Giovanni Vigna: COMPA: Detecting Compromised Accounts on Social Networks. NDSS 2013
[c94]Pierre Payet, Adam Doupé, Christopher Kruegel, Giovanni Vigna: EARs in the wild: large-scale analysis of execution after redirect vulnerabilities. SAC 2013: 1792-1799
[c93]Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna: Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting. IEEE Symposium on Security and Privacy 2013: 541-555
[c92]Federico Maggi, Alessandro Frossi, Stefano Zanero, Gianluca Stringhini, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna: Two years of short URLs internet measurement: security threats and countermeasures. WWW 2013: 861-872- 2012
[j15]Gianluca Stringhini, Manuel Egele, Christopher Kruegel, Giovanni Vigna: Poultry markets: on the underground economy of twitter followers. Computer Communication Review 42(4): 527-532 (2012)
[c91]Johannes Schlumberger, Christopher Kruegel, Giovanni Vigna: Jarhead analysis and detection of malicious Java applets. ACSAC 2012: 249-257
[c90]Antonio Bianchi, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna: Blacksheep: detecting compromised hosts in homogeneous crowds. ACM Conference on Computer and Communications Security 2012: 341-352
[c89]Nick Nikiforakis, Luca Invernizzi, Alexandros Kapravelos, Steven Van Acker, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna: You are what you include: large-scale evaluation of remote javascript inclusions. ACM Conference on Computer and Communications Security 2012: 736-747
[c88]Florian Tegeler, Xiaoming Fu, Giovanni Vigna, Christopher Kruegel: BotFinder: finding bots in network traffic without deep packet inspection. CoNEXT 2012: 349-360
[c87]Grégoire Jacob, Paolo Milani Comparetti, Matthias Neugschwandtner, Christopher Kruegel, Giovanni Vigna: A Static, Packer-Agnostic Filter to Detect Similar Malware Samples. DIMVA 2012: 102-122
[c86]André Ricardo Abed Grégio, Paulo Lício de Geus, Christopher Kruegel, Giovanni Vigna: Tracking Memory Writes for Malware Classification and Code Reuse Identification. DIMVA 2012: 134-143
[c85]Timon Van Overveldt, Christopher Kruegel, Giovanni Vigna: FlashDetect: ActionScript 3 Malware Detection. RAID 2012: 274-293
[c84]Giovanni Vigna: Malware Riding Badware: Challenges in Analyzing (Malicious/Benign) Web Applications. RV 2012: 183- 2011
[j14]Giovanni Vigna: The 2010 International Capture the Flag Competition. IEEE Security & Privacy 9(1): 12-14 (2011)
[j13]Brett Stone-Gross, Marco Cova, Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna: Analysis of a Botnet Takeover. IEEE Security & Privacy 9(1): 64-72 (2011)
[c83]Adam Doupé, Manuel Egele, Benjamin Caillat, Gianluca Stringhini, Gorkem Yakin, Ali Zand, Ludovico Cavedon, Giovanni Vigna: Hit 'em where it hurts: a live security exercise on cyber situational awareness. ACSAC 2011: 51-61
[c82]Casey Cipriano, Ali Zand, Amir Houmansadr, Christopher Kruegel, Giovanni Vigna: Nexat: a history-based approach to predict attacker actions. ACSAC 2011: 383-392
[c81]Dhilung Kirat, Giovanni Vigna, Christopher Kruegel: BareBox: efficient malware analysis on bare-metal. ACSAC 2011: 403-412
[c80]Adam Doupé, Bryce Boe, Christopher Kruegel, Giovanni Vigna: Fear the EAR: discovering and mitigating execution after redirect vulnerabilities. ACM Conference on Computer and Communications Security 2011: 251-262
[c79]Alexandros Kapravelos, Marco Cova, Christopher Kruegel, Giovanni Vigna: Escape from Monkey Island: Evading High-Interaction Honeyclients. DIMVA 2011: 124-143
[c78]Greg Banks, Aristide Fattori, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna: MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper). DIMVA 2011: 184-193
[c77]Martin Szydlowski, Manuel Egele, Christopher Kruegel, Giovanni Vigna: Challenges for Dynamic Analysis of iOS Applications. iNetSeC 2011: 65-77
[c76]Brett Stone-Gross, Ryan Stevens, Apostolis Zarras, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna: Understanding fraudulent activities in online ad exchanges. Internet Measurement Conference 2011: 279-294
[c75]Brett Stone-Gross, Marco Cova, Christopher Kruegel, Giovanni Vigna: Peering through the iframe. INFOCOM 2011: 411-415
[c74]Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna: PiOS: Detecting Privacy Leaks in iOS Applications. NDSS 2011
[c73]Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna: Dymo: Tracking Dynamic Code Identity. RAID 2011: 21-40
[c72]Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna: Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode. RAID 2011: 61-80
[c71]Ludovico Cavedon, Luca Foschini, Giovanni Vigna: Getting the Face Behind the Squares: Reconstructing Pixelized Video Streams. WOOT 2011: 37-45
[c70]Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna: BOTMAGNIFIER: Locating Spambots on the Internet. USENIX Security Symposium 2011
[c69]Davide Canali, Marco Cova, Giovanni Vigna, Christopher Kruegel: Prophiler: a fast filter for the large-scale detection of malicious web pages. WWW 2011: 197-206- 2010
[j12]Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna: An Experience in Testing the Security of Real-World Electronic Voting Systems. IEEE Trans. Software Eng. 36(4): 453-473 (2010)
[c68]Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna: Detecting spammers on social networks. ACSAC 2010: 1-9
[c67]
[c66]Adam Doupé, Marco Cova, Giovanni Vigna: Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners. DIMVA 2010: 111-131
[c65]Nicholas Childers, Bryce Boe, Lorenzo Cavallaro, Ludovico Cavedon, Marco Cova, Manuel Egele, Giovanni Vigna: Organizing Large Scale Hacking Competitions. DIMVA 2010: 132-152
[c64]Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna: Are BGP Routers Open to Attack? An Experiment. iNetSec 2010: 88-103
[c63]Davide Balzarotti, Marco Cova, Christoph Karlberger, Engin Kirda, Christopher Kruegel, Giovanni Vigna: Efficient Detection of Split Personalities in Malware. NDSS 2010
[c62]William K. Robertson, Federico Maggi, Christopher Kruegel, Giovanni Vigna: Effective Anomaly Detection with Scarce Training Data. NDSS 2010
[c61]Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna: Toward Automated Detection of Logic Vulnerabilities in Web Applications. USENIX Security Symposium 2010: 143-160
[c60]Marco Cova, Christopher Krügel, Giovanni Vigna: Detection and analysis of drive-by-download attacks and malicious JavaScript code. WWW 2010: 281-290
2000 – 2009
- 2009
[j11]Engin Kirda, Nenad Jovanovic, Christopher Kruegel, Giovanni Vigna: Client-side cross-site scripting protection. Computers & Security 28(7): 592-604 (2009)
[j10]Giovanni Vigna, Fredrik Valeur, Davide Balzarotti, William K. Robertson, Christopher Kruegel, Engin Kirda: Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries. Journal of Computer Security 17(3): 305-329 (2009)
[c59]Sean Ford, Marco Cova, Christopher Kruegel, Giovanni Vigna: Analyzing and Detecting Malicious Flash Advertisements. ACSAC 2009: 363-372
[c58]Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna: Your botnet is my botnet: analysis of a botnet takeover. ACM Conference on Computer and Communications Security 2009: 635-647
[c57]Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda: Automated Spyware Collection and Analysis. ISC 2009: 202-217
[c56]Federico Maggi, William K. Robertson, Christopher Krügel, Giovanni Vigna: Protecting a Moving Target: Addressing Web Application Concept Drift. RAID 2009: 21-40
[c55]William K. Robertson, Giovanni Vigna: Static Enforcement of Web Application Integrity Through Strong Typing. USENIX Security Symposium 2009: 283-298- 2008
[c54]Luca Foschini, Ashish V. Thapliyal, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna: A Parallel Architecture for Stateful, High-Speed Intrusion Detection. ICISS 2008: 203-220
[c53]Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna: Are your votes really counted?: testing the security of real-world electronic voting systems. ISSTA 2008: 237-248
[c52]Davide Balzarotti, Marco Cova, Giovanni Vigna: ClearShot: Eavesdropping on Keyboard Input from Video. IEEE Symposium on Security and Privacy 2008: 170-183
[c51]Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna: Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. IEEE Symposium on Security and Privacy 2008: 387-401
[c50]Marco Cova, Christopher Kruegel, Giovanni Vigna: There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. WOOT 2008- 2007
[j9]Patrick Klinkoff, Engin Kirda, Christopher Kruegel, Giovanni Vigna: Extending .NET security to unmanaged code. Int. J. Inf. Sec. 6(6): 417-428 (2007)
[j8]André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer: Using a virtual security testbed for digital forensic reconstruction. Journal in Computer Virology 2(4): 275-289 (2007)
[c49]Christopher Kruegel, Davide Balzarotti, William K. Robertson, Giovanni Vigna: Improving Signature Testing through Dynamic Data Flow Analysis. ACSAC 2007: 53-63
[c48]Matthew Van Gundy, Hao Chen, Zhendong Su, Giovanni Vigna: Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms. ACSAC 2007: 74-85
[c47]Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Giovanni Vigna: Multi-module vulnerability analysis of web-based applications. ACM Conference on Computer and Communications Security 2007: 25-35
[c46]Antonio Carzaniga, Gian Pietro Picco, Giovanni Vigna: Is Code Still Moving Around? Looking Back at a Decade of Code Mobility. ICSE Companion 2007: 9-20
[c45]Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Krügel, Giovanni Vigna: Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. NDSS 2007
[c44]Darren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer: Exploiting Execution Context for the Detection of Anomalous System Calls. RAID 2007: 1-20
[c43]Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna: Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications. RAID 2007: 63-86
[p3]Marco Cova, Viktoria Felmetsger, Giovanni Vigna: Vulnerability Analysis of Web-based Applications. Test and Analysis of Web Services 2007: 363-394
[p2]- 2006
[j7]Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel: Anomalous system call detection. ACM Trans. Inf. Syst. Secur. 9(1): 61-93 (2006)
[c42]
[c41]Marco Cova, Viktoria Felmetsger, Greg Banks, Giovanni Vigna: Static Detection of Vulnerabilities in x86 Executables. ACSAC 2006: 269-278
[c40]Collin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee: Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. DIMVA 2006: 91-108
[c39]André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer: Digital Forensic Reconstruction and the Virtual Security Testbed ViSe. DIMVA 2006: 144-163
[c38]Patrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna: Extending .NET Security to Unmanaged Code. ISC 2006: 1-16
[c37]Greg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna: SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. ISC 2006: 343-358
[c36]William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer: Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. NDSS 2006
[c35]André Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer: Using Hidden Markov Models to Evaluate the Risks of Intrusions. RAID 2006: 145-164
[c34]Engin Kirda, Christopher Krügel, Giovanni Vigna, Nenad Jovanovic: Noxes: a client-side solution for mitigating cross-site scripting attacks. SAC 2006: 330-337
[c33]Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Engin Kirda: An anomaly-driven reverse proxy for web applications. SAC 2006: 361-368- 2005
[b1]Christopher Kruegel, Fredrik Valeur, Giovanni Vigna: Intrusion Detection and Correlation - Challenges and Solutions. Advances in Information Security 14, Springer 2005, ISBN 978-0-387-23398-7, pp. 1-118
[j6]Christopher Krügel, Giovanni Vigna, William K. Robertson: A multi-model approach to the detection of web-based attacks. Computer Networks 48(5): 717-738 (2005)
[c32]Fredrik Valeur, Darren Mutz, Giovanni Vigna: A Learning-Based Approach to the Detection of SQL Attacks. DIMVA 2005: 123-140
[c31]Oystein Hallaraker, Giovanni Vigna: Detecting Malicious JavaScript Code in Mozilla. ICECCS 2005: 85-94
[c30]Viktoria Felmetsger, Giovanni Vigna: Exploiting OS-Level Mechanisms to Implement Mobile Code Security. ICECCS 2005: 234-243
[c29]Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna: Polymorphic Worm Detection Using Structural Information of Executables. RAID 2005: 207-226- 2004
[j5]Christopher Kruegel, William K. Robertson, Giovanni Vigna: Using Alert Verification to Identify Successful Intrusion Attempts. Praxis der Informationsverarbeitung und Kommunikation 27(4): 219-227 (2004)
[j4]Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer: A Comprehensive Approach to Intrusion Detection Alert Correlation. IEEE Trans. Dependable Sec. Comput. 1(3): 146-169 (2004)
[c28]Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, Elizabeth M. Belding-Royer, Richard A. Kemmerer: An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks. ACSAC 2004: 16-27
[c27]Christopher Krügel, William K. Robertson, Giovanni Vigna: Detecting Kernel-Level Rootkits Through Binary Analysis. ACSAC 2004: 91-100
[c26]Jingyu Zhou, Giovanni Vigna: Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing. ACSAC 2004: 168-178
[c25]Giovanni Vigna, William K. Robertson, Davide Balzarotti: Testing network-based intrusion detection signatures using mutant exploits. ACM Conference on Computer and Communications Security 2004: 21-30
[c24]
[c23]Christopher Krügel, William K. Robertson, Fredrik Valeur, Giovanni Vigna: Static Disassembly of Obfuscated Binaries. USENIX Security Symposium 2004: 255-270- 2003
[c22]Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer: A Stateful Intrusion Detection System for World-Wide Web Servers. ACSAC 2003: 34-43
[c21]Darren Mutz, Giovanni Vigna, Richard A. Kemmerer: An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. ACSAC 2003: 374-383
[c20]Christopher Krügel, Giovanni Vigna: Anomaly detection of web-based attacks. ACM Conference on Computer and Communications Security 2003: 251-261
[c19]Christopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna: On the Detection of Anomalous System Call Arguments. ESORICS 2003: 326-343
[c18]
[c17]
[c16]Giovanni Vigna: Teaching Network Security Through Live Exercises. World Conference on Information Security Education 2003: 3-18
[c15]Giovanni Vigna, Fredrik Valeur, Richard A. Kemmerer: Designing and implementing a family of intrusion detection systems. ESEC / SIGSOFT FSE 2003: 88-97
[e3]Giovanni Vigna, Erland Jonsson, Christopher Krügel (Eds.): Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings. Lecture Notes in Computer Science 2820, Springer 2003, ISBN 3-540-40878-9- 2002
[j3]Steve T. Eckmann, Giovanni Vigna, Richard A. Kemmerer: STATL: An Attack Language for State-Based Intrusion Detection. Journal of Computer Security 10(1/2): 71-104 (2002)
[c14]Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richard A. Kemmerer: Composable Tools For Network Discovery and Security Analysis. ACSAC 2002: 14-24
[c13]Vishal Mittal, Giovanni Vigna: Sensor-based intrusion detection for intra-domain distance-vector routing. ACM Conference on Computer and Communications Security 2002: 127-137
[c12]Giovanni Vigna, Andrew Mitchel: Mnemosyne: Designing and Implementing Network Short-Term Memory. ICECCS 2002: 91-100
[c11]Giovanni Vigna, Bryan Cassell, Dave Fayram: An Intrusion Detection System for Aglets. Mobile Agents 2002: 64-77
[c10]Christopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer: Stateful Intrusion Detection for High-Speed Networks. IEEE Symposium on Security and Privacy 2002: 285-293
[e2]Andreas Wespi, Giovanni Vigna, Luca Deri (Eds.): Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings. Lecture Notes in Computer Science 2516, Springer 2002, ISBN 3-540-00020-8- 2001
[c9]Sebastian Fischmeister, Giovanni Vigna, Richard A. Kemmerer: Evaluating the Security of Three Java-Based Mobile Agent Systems. Mobile Agents 2001: 31-41
[c8]Giovanni Vigna, Richard A. Kemmerer, Per Blix: Designing a Web of Highly-Configurable Intrusion Detection Sensors. Recent Advances in Intrusion Detection 2001: 69-84
[p1]André L. M. dos Santos, Giovanni Vigna, Richard A. Kemmerer: Security Testing of an Online Banking Service. E-Commerce Security and Privacy 2001: 3-15
1990 – 1999
- 1999
[j2]Giovanni Vigna, Richard A. Kemmerer: NetSTAT: A Network-based Intrusion Detection System. Journal of Computer Security 7(1): 37-71 (1999)- 1998
[j1]Alfonso Fuggetta, Gian Pietro Picco, Giovanni Vigna: Understanding Code Mobility. IEEE Trans. Software Eng. 24(5): 342-361 (1998)
[c7]Giovanni Vigna, Richard A. Kemmerer: NetSTAT: A Network-Based Intrusion Detection Approach. ACSAC 1998: 25-34
[c6]
[e1]Giovanni Vigna (Ed.): Mobile Agents and Security. Lecture Notes in Computer Science 1419, Springer 1998, ISBN 3-540-64792-9- 1997
[c5]Antonio Carzaniga, Gian Pietro Picco, Giovanni Vigna: Designing Distributed Applications with Mobile Code Paradigms. ICSE 1997: 22-32
[c4]Carlo Ghezzi, Giovanni Vigna: Mobile Code Paradigms and Technologies: A Case Study. Mobile Agents 1997: 39-49
[c3]Carlo Ghezzi, Giovanni Vigna: Software Engineering Issues for Network Computing. Requirements Targeting Software and Systems Engineering 1997: 155-177- 1996
[c2]Gianpaolo Cugola, Carlo Ghezzi, Gian Pietro Picco, Giovanni Vigna: Analyzing Mobile Code Languages. Mobile Object Systems 1996: 93-110- 1994
[c1]Antonio Carzaniga, Gian Pietro Picco, Giovanni Vigna: Designing and Implementing Inter-Client Communication in the O2 Object-Oriented Database Management System. ISOOMS 1994: 53-64
Coauthor Index
[c95] [c94] [c93] [c92] [j15] [c91] [c90] [c89] [c88] [c87] [c86] [c85] [j13] [c82] [c81] [c80] [c79] [c78] [c77] [c76] [c75] [c74] [c73] [c72] [c70] [c69] [c68] [c64] [c63] [c62] [c61] [c60] [j11] [j10] [c59] [c58] [c57] [c56] [c54] [c51] [c50] [j9] [c49] [c45] [j7] [c38] [c36] [c34] [c33] [b1] [j6] [c29] [j5] [j4] [c27] [c23] [c20] [c19] [e3] [c10]
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:09 CEST by the dblp team



