The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Christopher Kruegel: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Christian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel
    On the Effectiveness of Techniques to Detect Phishing Sites. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:20-39 [Conf]
  2. Mihai Christodorescu, Somesh Jha, Christopher Kruegel
    Mining specifications of malicious behavior. [Citation Graph (0, 0)][DBLP]
    ESEC/SIGSOFT FSE, 2007, pp:5-14 [Conf]

  3. Improving Signature Testing through Dynamic Data Flow Analysis. [Citation Graph (, )][DBLP]


  4. Limits of Static Analysis for Malware Detection. [Citation Graph (, )][DBLP]


  5. Secure Input for Web Applications. [Citation Graph (, )][DBLP]


  6. FIRE: FInding Rogue nEtworks. [Citation Graph (, )][DBLP]


  7. Analyzing and Detecting Malicious Flash Advertisements. [Citation Graph (, )][DBLP]


  8. Panorama: capturing system-wide information flow for malware detection and analysis. [Citation Graph (, )][DBLP]


  9. Your botnet is my botnet: analysis of a botnet takeover. [Citation Graph (, )][DBLP]


  10. A solution for the automated detection of clickjacking attacks. [Citation Graph (, )][DBLP]


  11. 08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective. [Citation Graph (, )][DBLP]


  12. 08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. [Citation Graph (, )][DBLP]


  13. 8102 Working Group -- Attack Taxonomy. [Citation Graph (, )][DBLP]


  14. 08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. [Citation Graph (, )][DBLP]


  15. VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges. [Citation Graph (, )][DBLP]


  16. Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. [Citation Graph (, )][DBLP]


  17. Automatically Generating Models for Botnet Detection. [Citation Graph (, )][DBLP]


  18. A Parallel Architecture for Stateful, High-Speed Intrusion Detection. [Citation Graph (, )][DBLP]


  19. Automated Spyware Collection and Analysis. [Citation Graph (, )][DBLP]


  20. Precise alias analysis for static detection of web application vulnerabilities. [Citation Graph (, )][DBLP]


  21. Leveraging User Interactions for In-Depth Testing of Web Applications. [Citation Graph (, )][DBLP]


  22. Abusing Social Networks for Automated User Profiling. [Citation Graph (, )][DBLP]


  23. CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms. [Citation Graph (, )][DBLP]


  24. Improving the efficiency of dynamic malware analysis. [Citation Graph (, )][DBLP]


  25. Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries. [Citation Graph (, )][DBLP]


  26. Identifying Dormant Functionality in Malware Programs. [Citation Graph (, )][DBLP]


  27. A Practical Attack to De-anonymize Social Network Users. [Citation Graph (, )][DBLP]


  28. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. [Citation Graph (, )][DBLP]


  29. Dynamic Spyware Analysis. [Citation Graph (, )][DBLP]


  30. There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. [Citation Graph (, )][DBLP]


  31. Mining specifications of malicious behavior. [Citation Graph (, )][DBLP]


  32. Client-side cross-site scripting protection. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002