default search action
Christopher Krügel
- > Home > Persons > Christopher Krügel
Publications
- 2016
- [c170]Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
TriggerScope: Towards Detecting Logic Bombs in Android Applications. IEEE Symposium on Security and Privacy 2016: 377-396 - 2015
- [c165]Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna:
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users. DIMVA 2015: 282-303 - [c155]Michael Weissbacher, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities. USENIX Security Symposium 2015: 737-752 - 2014
- [j19]Leyla Bilge, Sevil Sen, Davide Balzarotti, Engin Kirda, Christopher Kruegel:
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains. ACM Trans. Inf. Syst. Secur. 16(4): 14 (2014) - 2013
- [c131]Tobias Lauinger, Martin Szydlowski, Kaan Onarlioglu, Gilbert Wondracek, Engin Kirda, Christopher Krügel:
Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting. NDSS 2013 - 2012
- [j16]Manuel Egele, Andreas Moser, Christopher Kruegel, Engin Kirda:
PoX: Protecting users from malicious Facebook applications. Comput. Commun. 35(12): 1507-1515 (2012) - [j15]Manuel Egele, Theodoor Scholte, Engin Kirda, Christopher Kruegel:
A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv. 44(2): 6:1-6:42 (2012) - [c124]Leyla Bilge, Davide Balzarotti, William K. Robertson, Engin Kirda, Christopher Kruegel:
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis. ACSAC 2012: 129-138 - [c114]Davide Canali, Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda:
A quantitative study of accuracy in system call-based malware detection. ISSTA 2012: 122-132 - [c108]Grégoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
PUBCRAWL: Protecting Users and Businesses from CRAWLers. USENIX Security Symposium 2012: 507-522 - 2011
- [c101]Clemens Kolbitsch, Engin Kirda, Christopher Kruegel:
The power of procrastination: detection and mitigation of execution-stalling malicious code. CCS 2011: 285-296 - [c97]Martin Szydlowski, Ben Y. Zhao, Engin Kirda, Christopher Kruegel:
BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients. ICCCN 2011: 1-6 - [c93]Leyla Bilge, Engin Kirda, Christopher Kruegel, Marco Balduzzi:
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. NDSS 2011 - [c92]Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna:
PiOS: Detecting Privacy Leaks in iOS Applications. NDSS 2011 - [c91]Manuel Egele, Andreas Moser, Christopher Kruegel, Engin Kirda:
PoX: Protecting users from malicious Facebook applications. PerCom Workshops 2011: 288-294 - 2010
- [j12]Nenad Jovanovic, Christopher Kruegel, Engin Kirda:
Static analysis for detecting taint-style vulnerabilities in web applications. J. Comput. Secur. 18(5): 861-907 (2010) - [c82]Marco Balduzzi, Manuel Egele, Engin Kirda, Davide Balzarotti, Christopher Kruegel:
A solution for the automated detection of clickjacking attacks. AsiaCCS 2010: 135-144 - [c81]Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda:
AccessMiner: using system-centric models for malware protection. CCS 2010: 399-412 - [c79]Davide Balzarotti, Marco Cova, Christoph Karlberger, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
Efficient Detection of Split Personalities in Malware. NDSS 2010 - [c77]Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, Christopher Kruegel:
Abusing Social Networks for Automated User Profiling. RAID 2010: 422-441 - [c76]Manuel Egele, Leyla Bilge, Engin Kirda, Christopher Kruegel:
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms. SAC 2010: 1865-1870 - [c75]Ulrich Bayer, Engin Kirda, Christopher Kruegel:
Improving the efficiency of dynamic malware analysis. SAC 2010: 1871-1878 - [c74]Clemens Kolbitsch, Thorsten Holz, Christopher Kruegel, Engin Kirda:
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries. IEEE Symposium on Security and Privacy 2010: 29-44 - [c73]Paolo Milani Comparetti, Guido Salvaneschi, Engin Kirda, Clemens Kolbitsch, Christopher Kruegel, Stefano Zanero:
Identifying Dormant Functionality in Malware Programs. IEEE Symposium on Security and Privacy 2010: 61-76 - [c72]Gilbert Wondracek, Thorsten Holz, Engin Kirda, Christopher Kruegel:
A Practical Attack to De-anonymize Social Network Users. IEEE Symposium on Security and Privacy 2010: 223-238 - [c70]Gilbert Wondracek, Thorsten Holz, Christian Platzer, Engin Kirda, Christopher Kruegel:
Is the Internet for Porn? An Insight Into the Online Adult Industry. WEIS 2010 - 2009
- [j11]Engin Kirda, Nenad Jovanovic, Christopher Kruegel, Giovanni Vigna:
Client-side cross-site scripting protection. Comput. Secur. 28(7): 592-604 (2009) - [j10]Stefan Mitterhofer, Christopher Krügel, Engin Kirda, Christian Platzer:
Server-Side Bot Detection in Massively Multiplayer Online Games. IEEE Secur. Priv. 7(3): 29-36 (2009) - [j8]Giovanni Vigna, Fredrik Valeur, Davide Balzarotti, William K. Robertson, Christopher Kruegel, Engin Kirda:
Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries. J. Comput. Secur. 17(3): 305-329 (2009) - [c68]Brett Stone-Gross, Christopher Kruegel, Kevin C. Almeroth, Andreas Moser, Engin Kirda:
FIRE: FInding Rogue nEtworks. ACSAC 2009: 231-240 - [c65]Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda:
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. DIMVA 2009: 88-106 - [c64]Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel, Engin Kirda:
Automatically Generating Models for Botnet Detection. ESORICS 2009: 232-249 - [c63]Peter Würzinger, Christian Platzer, Christian Ludl, Engin Kirda, Christopher Kruegel:
SWAP: Mitigating XSS attacks using a reverse proxy. SESS@ICSE 2009: 33-39 - [c62]Manuel Egele, Engin Kirda, Christopher Kruegel:
Mitigating Drive-By Download Attacks: Challenges and Open Problems. iNetSeC 2009: 52-62 - [c61]Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda:
Automated Spyware Collection and Analysis. ISC 2009: 202-217 - [c60]Ulrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Krügel, Engin Kirda:
Scalable, Behavior-Based Malware Clustering. NDSS 2009 - [c58]Paolo Milani Comparetti, Gilbert Wondracek, Christopher Krügel, Engin Kirda:
Prospex: Protocol Specification Extraction. SP 2009: 110-125 - [c57]Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Xiao-yong Zhou, XiaoFeng Wang:
Effective and Efficient Malware Detection at the End Host. USENIX Security Symposium 2009: 351-366 - 2008
- [c53]Gilbert Wondracek, Paolo Milani Comparetti, Christopher Krügel, Engin Kirda:
Automatic Network Protocol Analysis. NDSS 2008 - [c52]Sean McAllister, Engin Kirda, Christopher Kruegel:
Leveraging User Interactions for In-Depth Testing of Web Applications. RAID 2008: 191-210 - [c51]Guenther Starnberger, Christopher Kruegel, Engin Kirda:
Overbot: a botnet protocol based on Kademlia. SecureComm 2008: 13 - [c50]Eric Medvet, Engin Kirda, Christopher Kruegel:
Visual-similarity-based phishing detection. SecureComm 2008: 22 - [c49]Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. SP 2008: 387-401 - [i4]Lothar Braun, Falko Dressler, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Tobias Limmer, Konrad Rieck, James P. G. Sterbenz:
08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective. Network Attack Detection and Defense 2008 - [i1]Marc Dacier, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, James P. G. Sterbenz:
8102 Working Group -- Attack Taxonomy. Network Attack Detection and Defense 2008 - 2007
- [j7]Patrick Klinkoff, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
Extending .NET security to unmanaged code. Int. J. Inf. Sec. 6(6): 417-428 (2007) - [c46]Martin Szydlowski, Christopher Kruegel, Engin Kirda:
Secure Input for Web Applications. ACSAC 2007: 375-384 - [c45]Andreas Moser, Christopher Kruegel, Engin Kirda:
Limits of Static Analysis for Malware Detection. ACSAC 2007: 421-430 - [c44]Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda:
Panorama: capturing system-wide information flow for malware detection and analysis. CCS 2007: 116-127 - [c43]Christian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel:
On the Effectiveness of Techniques to Detect Phishing Sites. DIMVA 2007: 20-39 - [c42]Thomas Raffetseder, Engin Kirda, Christopher Kruegel:
Building Anti-Phishing Browser Plug-Ins: An Experience Report. SESS@ICSE 2007: 6 - [c41]Thomas Raffetseder, Christopher Krügel, Engin Kirda:
Detecting System Emulators. ISC 2007: 1-18 - [c40]Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Krügel, Giovanni Vigna:
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. NDSS 2007 - [c39]Angelo P. E. Rosiello, Engin Kirda, Christopher Kruegel, Fabrizio Ferrandi:
A layout-similarity-based approach for detecting phishing pages. SecureComm 2007: 454-463 - [c37]Andreas Moser, Christopher Krügel, Engin Kirda:
Exploring Multiple Execution Paths for Malware Analysis. S&P 2007: 231-245 - [c36]Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, Dawn Xiaodong Song:
Dynamic Spyware Analysis. USENIX ATC 2007: 233-246 - [c35]Christoph Karlberger, Günther Bayler, Christopher Kruegel, Engin Kirda:
Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters. WOOT 2007 - 2006
- [j6]Engin Kirda, Christopher Krügel:
Protecting Users against Phishing Attacks. Comput. J. 49(5): 554-561 (2006) - [j4]Ulrich Bayer, Andreas Moser, Christopher Krügel, Engin Kirda:
Dynamic Analysis of Malicious Code. J. Comput. Virol. 2(1): 67-77 (2006) - [c34]Manuel Egele, Martin Szydlowski, Engin Kirda, Christopher Krügel:
Using Static Program Analysis to Aid Intrusion Detection. DIMVA 2006: 17-36 - [c33]Patrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna:
Extending .NET Security to Unmanaged Code. ISC 2006: 1-16 - [c31]Nenad Jovanovic, Christopher Kruegel, Engin Kirda:
Precise alias analysis for static detection of web application vulnerabilities. PLAS 2006: 27-36 - [c30]Engin Kirda, Christopher Krügel, Giovanni Vigna, Nenad Jovanovic:
Noxes: a client-side solution for mitigating cross-site scripting attacks. SAC 2006: 330-337 - [c29]Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Engin Kirda:
An anomaly-driven reverse proxy for web applications. SAC 2006: 361-368 - [c28]Nenad Jovanovic, Engin Kirda, Christopher Kruegel:
Preventing Cross Site Request Forgery Attacks. SecureComm 2006: 1-10 - [c27]Nenad Jovanovic, Christopher Krügel, Engin Kirda:
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). S&P 2006: 258-263 - [c26]Engin Kirda, Christopher Kruegel:
Behavior-based Spyware Detection. USENIX Security Symposium 2006 - [c25]Stefan Kals, Engin Kirda, Christopher Krügel, Nenad Jovanovic:
SecuBat: a web vulnerability scanner. WWW 2006: 247-256 - 2005
- [c24]Engin Kirda, Christopher Krügel:
Protecting Users Against Phishing Attacks with AntiPhish. COMPSAC (1) 2005: 517-524 - [c23]Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna:
Polymorphic Worm Detection Using Structural Information of Executables. RAID 2005: 207-226 - [c22]Christopher Kruegel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna:
Automating Mimicry Attacks Using Static Binary Analysis. USENIX Security Symposium 2005 - 2003
- [c15]Engin Kirda, Clemens Kerer, Christopher Krügel, Roman Kurmanowytsch:
Web Service Engineering with DIWE. EUROMICRO 2003: 283-290 - 2002
- [c8]Clemens Kerer, Engin Kirda, Christopher Krügel:
XGuide - A Practical Guide to XML-Based Web Engineering. NETWORKING Workshops 2002: 104-117 - [c6]Christopher Krügel, Thomas Toth, Engin Kirda:
Service specific anomaly detection for network intrusion detection. SAC 2002: 201-208 - 2001
- [c3]Christopher Krügel, Thomas Toth, Engin Kirda:
SPARTA, a Mobile Agent Based Instrusion Detection System. Network Security 2001: 187-198 - [c2]Engin Kirda, Clemens Kerer, Mehdi Jazayeri, Christopher Krügel:
Supporting Multi-Device Enabled Web Services: Challenges and Open Problems. WETICE 2001: 49-54
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-23 00:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint