


Остановите войну!
for scientists:


default search action
Engin Kirda
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j24]Amit Kumar Sikder
, Leonardo Babun
, Z. Berkay Celik
, Hidayet Aksu
, Patrick D. McDaniel
, Engin Kirda
, A. Selcuk Uluagac
:
Who's Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment. ACM Trans. Internet Things 3(4): 27:1-27:39 (2022) - [j23]William Blair
, Andrea Mambretti
, Sajjad Arshad
, Michael Weissbacher
, William Robertson
, Engin Kirda
, Manuel Egele
:
HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. ACM Trans. Priv. Secur. 25(4): 33:1-33:35 (2022) - [c159]Afsah Anwar
, Yi Hui Chen
, Roy Hodgman
, Tom Sellers
, Engin Kirda
, Alina Oprea
:
A Recent Year On the Internet: Measuring and Understanding the Threats to Everyday Internet Devices. ACSAC 2022: 251-266 - [c158]Steven Sprecher, Christoph Kerschbaumer, Engin Kirda:
SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward. EuroS&P 2022: 206-222 - [c157]Alejandro Mera, Yi Hui Chen, Ruimin Sun, Engin Kirda, Long Lu:
D-Box: DMA-enabled Compartmentalization for Embedded Applications. NDSS 2022 - [c156]Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo:
Web Cache Deception Escalates! USENIX Security Symposium 2022: 179-196 - [c155]Bahruz Jabiyev, Steven Sprecher, Anthony Gavazzi, Tommaso Innocenti, Kaan Onarlioglu, Engin Kirda:
FRAMESHIFTER: Security Implications of HTTP/2-to-HTTP/1 Conversion Anomalies. USENIX Security Symposium 2022: 1061-1075 - [i15]Alejandro Mera, Yi Hui Chen, Ruimin Sun, Engin Kirda, Long Lu:
D-Box: DMA-enabled Compartmentalization for Embedded Applications. CoRR abs/2201.05199 (2022) - [i14]Narmeen Shafqat, Cem Topcuoglu, Engin Kirda, Aanjhan Ranganathan:
Experience Report on the Challenges and Opportunities in Securing Smartphones Against Zero-Click Attacks. CoRR abs/2211.03015 (2022) - 2021
- [c154]Bahruz Jabiyev, Sinan Pehlivanoglu, Kaan Onarlioglu, Engin Kirda:
FADE: Detecting Fake News Articles on the Web. ARES 2021: 15:1-15:10 - [c153]Bahruz Jabiyev, Steven Sprecher, Kaan Onarlioglu, Engin Kirda:
T-Reqs: HTTP Request Smuggling with Differential Fuzzing. CCS 2021: 1805-1820 - [c152]Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk:
In-Browser Cryptomining for Good: An Untold Story. DAPPS 2021: 20-29 - [c151]Tommaso Innocenti, Seyed Ali Mirheidari, Amin Kharraz, Bruno Crispo, Engin Kirda:
You've Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures. DIMVA 2021: 1-20 - [c150]Omid Mirzaei, Roman Vasilenko, Engin Kirda, Long Lu, Amin Kharraz:
SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning. DIMVA 2021: 130-150 - [c149]Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk:
SoK: Cryptojacking Malware. EuroS&P 2021: 120-139 - [c148]Andrea Mambretti, Alexandra Sandulescu, Alessandro Sorniotti, William Robertson, Engin Kirda, Anil Kurmus:
Bypassing memory safety mechanisms through speculative control flow hijacks. EuroS&P 2021: 633-649 - [c147]Seyed Ali Akhavani, Jordan Jueckstock, Junhua Su, Alexandros Kapravelos, Engin Kirda, Long Lu:
Browserprint: an Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy. ISC 2021: 161-176 - [c146]Bahruz Jabiyev, Omid Mirzaei, Amin Kharraz, Engin Kirda:
Preventing server-side request forgery attacks. SAC 2021: 1626-1635 - [c145]Alejandro Mera, Bo Feng, Long Lu, Engin Kirda:
DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis. IEEE Symposium on Security and Privacy 2021: 1938-1954 - [c144]Bahruz Jabiyev, Jeremiah Onaolapo, Gianluca Stringhini, Engin Kirda:
e-Game of FAME: Automatic Detection of FAke MEmes. TTO 2021: 1-11 - [c143]Andrea Mambretti, Pasquale Convertini, Alessandro Sorniotti, Alexandra Sandulescu, Engin Kirda, Anil Kurmus:
GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkers. SANER 2021: 307-317 - [i13]Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk:
SoK: Cryptojacking Malware. CoRR abs/2103.03851 (2021) - 2020
- [c142]William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson, Engin Kirda, Manuel Egele:
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. NDSS 2020 - [c141]Ahmet Salih Buyukkayhan, Can Gemicioglu, Tobias Lauinger, Alina Oprea, William Robertson, Engin Kirda:
What's in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation Techniques. RAID 2020: 107-120 - [c140]Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William Robertson:
Cached and Confused: Web Cache Deception in the Wild. USENIX Security Symposium 2020: 665-682 - [c139]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Kratos: multi-user multi-device-aware access control system for the smart home. WISEC 2020: 1-12 - [i12]William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William K. Robertson, Engin Kirda, Manuel Egele:
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. CoRR abs/2002.03416 (2020) - [i11]Andrea Mambretti, Alexandra Sandulescu, Alessandro Sorniotti, William K. Robertson, Engin Kirda, Anil Kurmus:
Bypassing memory safety mechanisms through speculative control flow hijacks. CoRR abs/2003.05503 (2020) - [i10]Alejandro Mera, Bo Feng, Long Lu, Engin Kirda, William K. Robertson:
DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis. CoRR abs/2007.01502 (2020)
2010 – 2019
- 2019
- [c138]Andrea Mambretti, Matthias Neugschwandtner, Alessandro Sorniotti, Engin Kirda, William K. Robertson, Anil Kurmus:
Speculator: a tool to analyze speculative execution attacks and mitigations. ACSAC 2019: 747-761 - [c137]Florian Quinkert, Tobias Lauinger, William K. Robertson, Engin Kirda, Thorsten Holz:
It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains. CNS 2019: 259-267 - [c136]Muhammad Ahmad Bashir, Sajjad Arshad, Engin Kirda, William K. Robertson, Christo Wilson:
A Longitudinal Analysis of the ads.txt Standard. Internet Measurement Conference 2019: 294-307 - [c135]Walter Rweyemamu, Tobias Lauinger, Christo Wilson, William K. Robertson, Engin Kirda:
Getting Under Alexa's Umbrella: Infiltration Attacks Against Internet Top Domain Lists. ISC 2019: 255-276 - [c134]Abbas Acar
, Long Lu, A. Selcuk Uluagac
, Engin Kirda:
An Analysis of Malware Trends in Enterprise Networks. ISC 2019: 360-380 - [c133]Walter Rweyemamu, Tobias Lauinger, Christo Wilson, William K. Robertson, Engin Kirda:
Clustering and the Weekend Effect: Recommendations for the Use of Top Domain Lists in Security Research. PAM 2019: 161-177 - [c132]Amin Kharraz, Brandon L. Daley, Graham Z. Baker, William Robertson, Engin Kirda:
USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks. RAID 2019: 89-103 - [e8]Steven D. Galbraith, Giovanni Russello, Willy Susilo, Dieter Gollmann, Engin Kirda, Zhenkai Liang:
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019. ACM 2019, ISBN 978-1-4503-6752-3 [contents] - [i9]Abbas Acar, Long Lu, A. Selcuk Uluagac, Engin Kirda:
An Analysis of Malware Trends in Enterprise Networks. CoRR abs/1910.00508 (2019) - [i8]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Multi-User Multi-Device-Aware Access Control System for Smart Home. CoRR abs/1911.10186 (2019) - [i7]Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William K. Robertson:
Cached and Confused: Web Cache Deception in the Wild. CoRR abs/1912.10190 (2019) - 2018
- [j22]Amin Kharraz, William K. Robertson, Engin Kirda:
Protecting against Ransomware: A New Line of Research or Restating Classic Ideas? IEEE Secur. Priv. 16(3): 103-107 (2018) - [c131]Reza Mirzazade Farkhani, Saman Jafari, Sajjad Arshad, William K. Robertson, Engin Kirda, Hamed Okhravi:
On the Effectiveness of Type-based Control Flow Integrity. ACSAC 2018: 28-39 - [c130]Kaan Onarlioglu, William K. Robertson, Engin Kirda:
Eraser: Your Data Won't Be Back. EuroS&P 2018: 153-166 - [c129]Tobias Lauinger, Ahmet Salih Buyukkayhan, Abdelberi Chaabane, William K. Robertson, Engin Kirda:
From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop. Internet Measurement Conference 2018: 322-328 - [c128]Muhammad Ahmad Bashir, Sajjad Arshad, Engin Kirda, William K. Robertson, Christo Wilson:
How Tracking Companies Circumvented Ad Blockers Using WebSockets. Internet Measurement Conference 2018: 471-477 - [c127]Amin Kharraz, William K. Robertson, Engin Kirda:
Surveylance: Automatically Detecting Online Survey Scams. IEEE Symposium on Security and Privacy 2018: 70-86 - [c126]Sajjad Arshad, Seyed Ali Mirheidari, Tobias Lauinger, Bruno Crispo, Engin Kirda, William K. Robertson:
Large-Scale Analysis of Style Injection by Relative Path Overwrite. WWW 2018: 237-246 - [i6]Reza Mirzazade Farkhani, Saman Jafari, Sajjad Arshad, William K. Robertson, Engin Kirda, Hamed Okhravi:
On the Effectiveness of Type-based Control Flow Integrity. CoRR abs/1810.10649 (2018) - [i5]Sajjad Arshad, Seyed Ali Mirheidari, Tobias Lauinger, Bruno Crispo, Engin Kirda, William K. Robertson:
Large-Scale Analysis of Style Injection by Relative Path Overwrite. CoRR abs/1811.00917 (2018) - [i4]Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William K. Robertson, Christo Wilson, Engin Kirda:
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web. CoRR abs/1811.00918 (2018) - 2017
- [j21]Wojciech Mazurczyk, Maciej Korczynski, Koji Nakao, Engin Kirda, Cristian Hesselman, Katsunari Yoshioka:
Traffic Measurements for Cyber Security. IEEE Commun. Mag. 55(7): 12-13 (2017) - [j20]Collin Mulliner, William K. Robertson, Engin Kirda:
On the misuse of graphical user interface elements to implement security controls. it Inf. Technol. 59(2): 59 (2017) - [c125]Michael Weissbacher, Enrico Mariconti
, Guillermo Suarez-Tangil
, Gianluca Stringhini, William K. Robertson, Engin Kirda:
Ex-Ray: Detection of History-Leaking Browser Extensions. ACSAC 2017: 590-602 - [c124]William Koch, Abdelberi Chaabane, Manuel Egele, William K. Robertson, Engin Kirda:
Semi-automated discovery of server-based information oversharing vulnerabilities in Android applications. ISSTA 2017: 147-157 - [c123]Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William Robertson, Christo Wilson, Engin Kirda:
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web. NDSS 2017 - [c122]Amin Kharraz, Engin Kirda:
Redemption: Real-Time Protection Against Ransomware at End-Hosts. RAID 2017: 98-119 - [c121]Engin Kirda:
UNVEIL: A large-scale, automated approach to detecting ransomware (keynote). SANER 2017: 1 - [e7]Engin Kirda, Thomas Ristenpart:
26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017. USENIX Association 2017 [contents] - 2016
- [c120]Sevtap Duman, Kubra Kalkan-Cakmakci, Manuel Egele, William K. Robertson, Engin Kirda:
EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails. COMPSAC 2016: 408-416 - [c119]Kaan Onarlioglu, William Robertson, Engin Kirda:
Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems. DSN 2016: 443-454 - [c118]Patrick Carter, Collin Mulliner, Martina Lindorfer, William K. Robertson, Engin Kirda:
CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes. Financial Cryptography 2016: 231-249 - [c117]Tobias Lauinger, Kaan Onarlioglu, Abdelberi Chaabane, William Robertson, Engin Kirda:
WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration. Internet Measurement Conference 2016: 247-253 - [c116]Ahmet Salih Buyukkayhan, Kaan Onarlioglu, William K. Robertson, Engin Kirda:
CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities. NDSS 2016 - [c115]Andrea Mambretti, Kaan Onarlioglu, Collin Mulliner, William Robertson, Engin Kirda, Federico Maggi, Stefano Zanero
:
Trellis: Privilege Separation for Multi-user Applications Made Easy. RAID 2016: 437-456 - [c114]Brendan Dolan-Gavitt, Patrick Hulin, Engin Kirda, Tim Leek, Andrea Mambretti, William K. Robertson, Frederick Ulrich, Ryan Whelan:
LAVA: Large-Scale Automated Vulnerability Addition. IEEE Symposium on Security and Privacy 2016: 110-121 - [c113]Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
TriggerScope: Towards Detecting Logic Bombs in Android Applications. IEEE Symposium on Security and Privacy 2016: 377-396 - [c112]Matthias Neugschwandtner, Collin Mulliner, William K. Robertson, Engin Kirda:
Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices. TRUST 2016: 60-81 - [c111]Amin Kharraz, Sajjad Arshad, Collin Mulliner, William K. Robertson, Engin Kirda:
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware. USENIX Security Symposium 2016: 757-772 - 2015
- [j19]Kaan Onarlioglu, Ahmet Salih Buyukkayhan, William K. Robertson, Engin Kirda:
SENTINEL: Securing Legacy Firefox Extensions. Comput. Secur. 49: 147-161 (2015) - [j18]Aristide Fattori, Andrea Lanzi, Davide Balzarotti, Engin Kirda:
Hypervisor-based malware protection with AccessMiner. Comput. Secur. 52: 33-50 (2015) - [c110]Amin Kharraz, William K. Robertson, Davide Balzarotti, Leyla Bilge, Engin Kirda:
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. DIMVA 2015: 3-24 - [c109]Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna:
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users. DIMVA 2015: 282-303 - [c108]Ahmet Talha Ozcan, Can Gemicioglu, Kaan Onarlioglu, Michael Weissbacher, Collin Mulliner, William K. Robertson, Engin Kirda:
BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications. Financial Cryptography 2015: 355-369 - [c107]Michael Weissbacher, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities. USENIX Security Symposium 2015: 737-752 - 2014
- [j17]Leyla Bilge, Sevil Sen, Davide Balzarotti, Engin Kirda, Christopher Kruegel:
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains. ACM Trans. Inf. Syst. Secur. 16(4): 14 (2014) - [c106]Sevtap Duman, Kaan Onarlioglu, Ali Osman Ulusoy, William K. Robertson, Engin Kirda:
TrueClick: automatically distinguishing trick banners from genuine download links. ACSAC 2014: 456-465 - [c105]Collin Mulliner, William K. Robertson, Engin Kirda:
VirtualSwindle: an automated attack against in-app billing on android. AsiaCCS 2014: 459-470 - [c104]Amin Kharraz, Engin Kirda, William K. Robertson, Davide Balzarotti, Aurélien Francillon
:
Optical Delusions: A Study of Malicious QR Codes in the Wild. DSN 2014: 192-203 - [c103]Collin Mulliner, William K. Robertson, Engin Kirda:
Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces. IEEE Symposium on Security and Privacy 2014: 149-162 - [c102]Stevens Le Blond, Adina Uritesc, Cédric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda:
A Look at Targeted Attacks Through the Lense of an NGO. USENIX Security Symposium 2014: 543-558 - 2013
- [c101]Ting-Fang Yen, Alina Oprea, Kaan Onarlioglu, Todd Leetham, William K. Robertson, Ari Juels, Engin Kirda:
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks. ACSAC 2013: 199-208 - [c100]Collin Mulliner, Jon Oberheide, William K. Robertson, Engin Kirda:
PatchDroid: scalable third-party security patches for Android devices. ACSAC 2013: 259-268 - [c99]Kaan Onarlioglu, Mustafa Battal, William K. Robertson, Engin Kirda:
Securing Legacy Firefox Extensions with SENTINEL. DIMVA 2013: 122-138 - [c98]Aldo Cassola, William K. Robertson, Engin Kirda, Guevara Noubir:
A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication. NDSS 2013 - [c97]Tobias Lauinger, Martin Szydlowski, Kaan Onarlioglu, Gilbert Wondracek, Engin Kirda, Christopher Krügel:
Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting. NDSS 2013 - [c96]Tobias Lauinger, Kaan Onarlioglu, Chaabane Abdelberi, Engin Kirda, William K. Robertson, Mohamed Ali Kâafar
:
Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters. RAID 2013: 369-389 - [c95]Kaan Onarlioglu, Collin Mulliner, William K. Robertson, Engin Kirda:
PrivExec: Private Execution as an Operating System Service. IEEE Symposium on Security and Privacy 2013: 206-220 - [i3]Engin Kirda:
DarkDroid - Exposing the Dark Side of Malicious Mobile Applications. ERCIM News 2013(93) (2013) - 2012
- [j16]Tobias Lauinger, Nikolaos Laoutaris
, Pablo Rodriguez, Thorsten Strufe, Ernst W. Biersack, Engin Kirda:
Privacy risks in named data networking: what is the cost of performance? Comput. Commun. Rev. 42(5): 54-57 (2012) - [j15]Manuel Egele, Andreas Moser, Christopher Kruegel, Engin Kirda:
PoX: Protecting users from malicious Facebook applications. Comput. Commun. 35(12): 1507-1515 (2012) - [j14]Theodoor Scholte, Davide Balzarotti, Engin Kirda:
Have things changed now? An empirical study on input validation vulnerabilities in web applications. Comput. Secur. 31(3): 344-356 (2012) - [j13]Manuel Egele, Theodoor Scholte, Engin Kirda, Christopher Kruegel:
A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv. 44(2): 6:1-6:42 (2012) - [j12]Advait Abhay Dixit, Rik Farrow, Andrew D. Ferguson, Katrina LaCurts, Marcelo Martins, Karthik Nagaraj, Kevin Ngo, Will Scott, Manuel Egele, Engin Kirda:
NSDI '12 and LEET '12. login Usenix Mag. 37(4) (2012) - [c94]Leyla Bilge, Davide Balzarotti, William K. Robertson, Engin Kirda, Christopher Kruegel:
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis. ACSAC 2012: 129-138 - [c93]Theodoor Scholte, William K. Robertson, Davide Balzarotti, Engin Kirda:
Preventing Input Validation Vulnerabilities in Web Applications through Automated Type Analysis. COMPSAC 2012: 233-243 - [c92]Engin Kirda:
A security analysis of Amazon's Elastic Compute Cloud service. DSN Workshops 2012: 1 - [c91]Davide Canali, Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda:
A quantitative study of accuracy in system call-based malware detection. ISSTA 2012: 122-132 - [c90]Kaan Onarlioglu, Utku Ozan Yilmaz, Engin Kirda, Davide Balzarotti:
Insights into User Behavior in Dealing with Internet Attacks. NDSS 2012 - [c89]Tobias Lauinger, Engin Kirda, Pietro Michiardi:
Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes. RAID 2012: 169-189 - [c88]Theodoor Scholte, William K. Robertson, Davide Balzarotti, Engin Kirda:
An empirical analysis of input validation mechanisms in web applications and languages. SAC 2012: 1419-1426 - [c87]Marco Balduzzi, Jonas Zaddach, Davide Balzarotti, Engin Kirda, Sergio Loureiro:
A security analysis of amazon's elastic compute cloud service. SAC 2012: 1427-1434 - [c86]Grégoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
PUBCRAWL: Protecting Users and Businesses from CRAWLers. USENIX Security Symposium 2012: 507-522 - [e6]Engin Kirda:
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '12, San Jose, CA, USA, April 24, 2012. USENIX Association 2012 [contents] - 2011
- [c85]Clemens Kolbitsch, Engin Kirda, Christopher Kruegel:
The power of procrastination: detection and mitigation of execution-stalling malicious code. CCS 2011: 285-296 - [c84]Danesh Irani, Marco Balduzzi, Davide Balzarotti, Engin Kirda, Calton Pu:
Reverse Social Engineering Attacks in Online Social Networks. DIMVA 2011: 55-74 - [c83]Theodoor Scholte, Davide Balzarotti, Engin Kirda:
Quo Vadis? A Study of the Evolution of Input Validation Vulnerabilities in Web Applications. Financial Cryptography 2011: 284-298 - [c82]Martin Szydlowski, Ben Y. Zhao, Engin Kirda, Christopher Kruegel:
BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients. ICCCN 2011: 1-6 - [c81]Endre Bangerter, Stefan Bühlmann, Engin Kirda:
Efficient and Stealthy Instruction Tracing and Its Applications in Automated Malware Analysis: Open Problems and Challenges. iNetSeC 2011: 55-64 - [c80]Marco Balduzzi, Carmen Torrano Gimenez, Davide Balzarotti, Engin Kirda:
Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications. NDSS 2011 - [c79]Leyla Bilge, Engin Kirda, Christopher Kruegel, Marco Balduzzi:
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. NDSS 2011 - [c78]Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna:
PiOS: Detecting Privacy Leaks in iOS Applications. NDSS 2011 - [c77]Manuel Egele, Andreas Moser, Christopher Kruegel, Engin Kirda:
PoX: Protecting users from malicious Facebook applications. PerCom Workshops 2011: 288-294 - [e5]Engin Kirda, Thorsten Holz:
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@EuroSys 2011, Salzburg, Austria, April 10, 2011. ACM 2011, ISBN 978-1-4503-0768-0 [contents] - [e4]