|
Search the dblp DataBase
Christopher Kruegel:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Christian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel
On the Effectiveness of Techniques to Detect Phishing Sites. [Citation Graph (0, 0)][DBLP] DIMVA, 2007, pp:20-39 [Conf]
- Mihai Christodorescu, Somesh Jha, Christopher Kruegel
Mining specifications of malicious behavior. [Citation Graph (0, 0)][DBLP] ESEC/SIGSOFT FSE, 2007, pp:5-14 [Conf]
Improving Signature Testing through Dynamic Data Flow Analysis. [Citation Graph (, )][DBLP]
Limits of Static Analysis for Malware Detection. [Citation Graph (, )][DBLP]
Secure Input for Web Applications. [Citation Graph (, )][DBLP]
FIRE: FInding Rogue nEtworks. [Citation Graph (, )][DBLP]
Analyzing and Detecting Malicious Flash Advertisements. [Citation Graph (, )][DBLP]
Panorama: capturing system-wide information flow for malware detection and analysis. [Citation Graph (, )][DBLP]
Your botnet is my botnet: analysis of a botnet takeover. [Citation Graph (, )][DBLP]
A solution for the automated detection of clickjacking attacks. [Citation Graph (, )][DBLP]
08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective. [Citation Graph (, )][DBLP]
08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. [Citation Graph (, )][DBLP]
8102 Working Group -- Attack Taxonomy. [Citation Graph (, )][DBLP]
08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. [Citation Graph (, )][DBLP]
VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges. [Citation Graph (, )][DBLP]
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. [Citation Graph (, )][DBLP]
Automatically Generating Models for Botnet Detection. [Citation Graph (, )][DBLP]
A Parallel Architecture for Stateful, High-Speed Intrusion Detection. [Citation Graph (, )][DBLP]
Automated Spyware Collection and Analysis. [Citation Graph (, )][DBLP]
Precise alias analysis for static detection of web application vulnerabilities. [Citation Graph (, )][DBLP]
Leveraging User Interactions for In-Depth Testing of Web Applications. [Citation Graph (, )][DBLP]
Abusing Social Networks for Automated User Profiling. [Citation Graph (, )][DBLP]
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms. [Citation Graph (, )][DBLP]
Improving the efficiency of dynamic malware analysis. [Citation Graph (, )][DBLP]
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries. [Citation Graph (, )][DBLP]
Identifying Dormant Functionality in Malware Programs. [Citation Graph (, )][DBLP]
A Practical Attack to De-anonymize Social Network Users. [Citation Graph (, )][DBLP]
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. [Citation Graph (, )][DBLP]
Dynamic Spyware Analysis. [Citation Graph (, )][DBLP]
There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. [Citation Graph (, )][DBLP]
Mining specifications of malicious behavior. [Citation Graph (, )][DBLP]
Client-side cross-site scripting protection. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|