
Engin Kirda
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [c141]William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson, Engin Kirda, Manuel Egele:
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. NDSS 2020 - [c140]Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William Robertson:
Cached and Confused: Web Cache Deception in the Wild. USENIX Security Symposium 2020: 665-682 - [c139]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Kratos: multi-user multi-device-aware access control system for the smart home. WISEC 2020: 1-12 - [i12]William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William K. Robertson, Engin Kirda, Manuel Egele:
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. CoRR abs/2002.03416 (2020) - [i11]Andrea Mambretti, Alexandra Sandulescu, Alessandro Sorniotti, William K. Robertson, Engin Kirda, Anil Kurmus:
Bypassing memory safety mechanisms through speculative control flow hijacks. CoRR abs/2003.05503 (2020) - [i10]Alejandro Mera, Bo Feng, Long Lu, Engin Kirda, William K. Robertson:
DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis. CoRR abs/2007.01502 (2020)
2010 – 2019
- 2019
- [c138]Andrea Mambretti, Matthias Neugschwandtner, Alessandro Sorniotti, Engin Kirda, William K. Robertson, Anil Kurmus:
Speculator: a tool to analyze speculative execution attacks and mitigations. ACSAC 2019: 747-761 - [c137]Florian Quinkert, Tobias Lauinger, William K. Robertson, Engin Kirda, Thorsten Holz:
It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains. CNS 2019: 259-267 - [c136]Muhammad Ahmad Bashir, Sajjad Arshad, Engin Kirda, William K. Robertson, Christo Wilson:
A Longitudinal Analysis of the ads.txt Standard. Internet Measurement Conference 2019: 294-307 - [c135]Walter Rweyemamu, Tobias Lauinger, Christo Wilson, William K. Robertson, Engin Kirda:
Getting Under Alexa's Umbrella: Infiltration Attacks Against Internet Top Domain Lists. ISC 2019: 255-276 - [c134]Abbas Acar
, Long Lu, A. Selcuk Uluagac
, Engin Kirda:
An Analysis of Malware Trends in Enterprise Networks. ISC 2019: 360-380 - [c133]Walter Rweyemamu, Tobias Lauinger, Christo Wilson, William K. Robertson, Engin Kirda:
Clustering and the Weekend Effect: Recommendations for the Use of Top Domain Lists in Security Research. PAM 2019: 161-177 - [c132]Amin Kharraz, Brandon L. Daley, Graham Z. Baker, William Robertson, Engin Kirda:
USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks. RAID 2019: 89-103 - [e8]Steven D. Galbraith, Giovanni Russello, Willy Susilo, Dieter Gollmann, Engin Kirda, Zhenkai Liang:
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019. ACM 2019, ISBN 978-1-4503-6752-3 [contents] - [i9]Abbas Acar, Long Lu, A. Selcuk Uluagac, Engin Kirda:
An Analysis of Malware Trends in Enterprise Networks. CoRR abs/1910.00508 (2019) - [i8]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Multi-User Multi-Device-Aware Access Control System for Smart Home. CoRR abs/1911.10186 (2019) - [i7]Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William K. Robertson:
Cached and Confused: Web Cache Deception in the Wild. CoRR abs/1912.10190 (2019) - 2018
- [j22]Amin Kharraz, William K. Robertson, Engin Kirda:
Protecting against Ransomware: A New Line of Research or Restating Classic Ideas? IEEE Secur. Priv. 16(3): 103-107 (2018) - [c131]Reza Mirzazade Farkhani, Saman Jafari, Sajjad Arshad, William K. Robertson, Engin Kirda, Hamed Okhravi:
On the Effectiveness of Type-based Control Flow Integrity. ACSAC 2018: 28-39 - [c130]Kaan Onarlioglu, William K. Robertson, Engin Kirda:
Eraser: Your Data Won't Be Back. EuroS&P 2018: 153-166 - [c129]Tobias Lauinger, Ahmet Salih Buyukkayhan, Abdelberi Chaabane, William K. Robertson, Engin Kirda:
From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop. Internet Measurement Conference 2018: 322-328 - [c128]Muhammad Ahmad Bashir, Sajjad Arshad, Engin Kirda, William K. Robertson, Christo Wilson:
How Tracking Companies Circumvented Ad Blockers Using WebSockets. Internet Measurement Conference 2018: 471-477 - [c127]Amin Kharraz, William K. Robertson, Engin Kirda:
Surveylance: Automatically Detecting Online Survey Scams. IEEE Symposium on Security and Privacy 2018: 70-86 - [c126]Sajjad Arshad, Seyed Ali Mirheidari, Tobias Lauinger, Bruno Crispo, Engin Kirda, William K. Robertson:
Large-Scale Analysis of Style Injection by Relative Path Overwrite. WWW 2018: 237-246 - [i6]Reza Mirzazade Farkhani, Saman Jafari, Sajjad Arshad, William K. Robertson, Engin Kirda, Hamed Okhravi:
On the Effectiveness of Type-based Control Flow Integrity. CoRR abs/1810.10649 (2018) - [i5]Sajjad Arshad, Seyed Ali Mirheidari, Tobias Lauinger, Bruno Crispo, Engin Kirda, William K. Robertson:
Large-Scale Analysis of Style Injection by Relative Path Overwrite. CoRR abs/1811.00917 (2018) - [i4]Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William K. Robertson, Christo Wilson, Engin Kirda:
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web. CoRR abs/1811.00918 (2018) - 2017
- [j21]Wojciech Mazurczyk, Maciej Korczynski, Koji Nakao, Engin Kirda, Cristian Hesselman, Katsunari Yoshioka:
Traffic Measurements for Cyber Security. IEEE Commun. Mag. 55(7): 12-13 (2017) - [j20]Collin Mulliner, William K. Robertson, Engin Kirda:
On the misuse of graphical user interface elements to implement security controls. it Inf. Technol. 59(2): 59 (2017) - [c125]Michael Weissbacher, Enrico Mariconti, Guillermo Suarez-Tangil
, Gianluca Stringhini, William K. Robertson, Engin Kirda:
Ex-Ray: Detection of History-Leaking Browser Extensions. ACSAC 2017: 590-602 - [c124]William Koch, Abdelberi Chaabane, Manuel Egele, William K. Robertson, Engin Kirda:
Semi-automated discovery of server-based information oversharing vulnerabilities in Android applications. ISSTA 2017: 147-157 - [c123]Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William Robertson, Christo Wilson, Engin Kirda:
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web. NDSS 2017 - [c122]Amin Kharraz, Engin Kirda:
Redemption: Real-Time Protection Against Ransomware at End-Hosts. RAID 2017: 98-119 - [c121]Engin Kirda:
UNVEIL: A large-scale, automated approach to detecting ransomware (keynote). SANER 2017: 1 - [e7]Engin Kirda, Thomas Ristenpart:
26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017. USENIX Association 2017 [contents] - 2016
- [c120]Sevtap Duman, Kubra Kalkan-Cakmakci, Manuel Egele, William K. Robertson, Engin Kirda:
EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails. COMPSAC 2016: 408-416 - [c119]Kaan Onarlioglu, William Robertson, Engin Kirda:
Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems. DSN 2016: 443-454 - [c118]Patrick Carter, Collin Mulliner, Martina Lindorfer, William K. Robertson, Engin Kirda:
CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes. Financial Cryptography 2016: 231-249 - [c117]Tobias Lauinger, Kaan Onarlioglu, Abdelberi Chaabane, William Robertson, Engin Kirda:
WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration. Internet Measurement Conference 2016: 247-253 - [c116]Ahmet Salih Buyukkayhan, Kaan Onarlioglu, William K. Robertson, Engin Kirda:
CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities. NDSS 2016 - [c115]Andrea Mambretti, Kaan Onarlioglu, Collin Mulliner, William Robertson, Engin Kirda, Federico Maggi, Stefano Zanero:
Trellis: Privilege Separation for Multi-user Applications Made Easy. RAID 2016: 437-456 - [c114]Brendan Dolan-Gavitt, Patrick Hulin, Engin Kirda, Tim Leek, Andrea Mambretti, William K. Robertson, Frederick Ulrich, Ryan Whelan:
LAVA: Large-Scale Automated Vulnerability Addition. IEEE Symposium on Security and Privacy 2016: 110-121 - [c113]Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
TriggerScope: Towards Detecting Logic Bombs in Android Applications. IEEE Symposium on Security and Privacy 2016: 377-396 - [c112]Matthias Neugschwandtner, Collin Mulliner, William K. Robertson, Engin Kirda:
Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices. TRUST 2016: 60-81 - [c111]Amin Kharraz, Sajjad Arshad, Collin Mulliner, William K. Robertson, Engin Kirda:
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware. USENIX Security Symposium 2016: 757-772 - 2015
- [j19]Kaan Onarlioglu, Ahmet Salih Buyukkayhan, William K. Robertson, Engin Kirda:
SENTINEL: Securing Legacy Firefox Extensions. Comput. Secur. 49: 147-161 (2015) - [j18]Aristide Fattori, Andrea Lanzi, Davide Balzarotti, Engin Kirda:
Hypervisor-based malware protection with AccessMiner. Comput. Secur. 52: 33-50 (2015) - [c110]Amin Kharraz, William K. Robertson, Davide Balzarotti, Leyla Bilge, Engin Kirda:
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. DIMVA 2015: 3-24 - [c109]Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna:
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users. DIMVA 2015: 282-303 - [c108]Ahmet Talha Ozcan, Can Gemicioglu, Kaan Onarlioglu, Michael Weissbacher, Collin Mulliner, William K. Robertson, Engin Kirda:
BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications. Financial Cryptography 2015: 355-369 - [c107]Michael Weissbacher, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities. USENIX Security Symposium 2015: 737-752 - 2014
- [j17]Leyla Bilge, Sevil Sen, Davide Balzarotti, Engin Kirda, Christopher Kruegel:
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains. ACM Trans. Inf. Syst. Secur. 16(4): 14:1-14:28 (2014) - [c106]Sevtap Duman, Kaan Onarlioglu, Ali Osman Ulusoy, William K. Robertson, Engin Kirda:
TrueClick: automatically distinguishing trick banners from genuine download links. ACSAC 2014: 456-465 - [c105]Collin Mulliner, William K. Robertson, Engin Kirda:
VirtualSwindle: an automated attack against in-app billing on android. AsiaCCS 2014: 459-470 - [c104]Amin Kharraz, Engin Kirda, William K. Robertson, Davide Balzarotti, Aurélien Francillon:
Optical Delusions: A Study of Malicious QR Codes in the Wild. DSN 2014: 192-203 - [c103]Collin Mulliner, William K. Robertson, Engin Kirda:
Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces. IEEE Symposium on Security and Privacy 2014: 149-162 - [c102]Stevens Le Blond, Adina Uritesc, Cédric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda:
A Look at Targeted Attacks Through the Lense of an NGO. USENIX Security Symposium 2014: 543-558 - 2013
- [c101]Ting-Fang Yen, Alina Oprea, Kaan Onarlioglu, Todd Leetham, William K. Robertson, Ari Juels, Engin Kirda:
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks. ACSAC 2013: 199-208 - [c100]Collin Mulliner, Jon Oberheide, William K. Robertson, Engin Kirda:
PatchDroid: scalable third-party security patches for Android devices. ACSAC 2013: 259-268 - [c99]Kaan Onarlioglu, Mustafa Battal, William K. Robertson, Engin Kirda:
Securing Legacy Firefox Extensions with SENTINEL. DIMVA 2013: 122-138 - [c98]Aldo Cassola, William K. Robertson, Engin Kirda, Guevara Noubir:
A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication. NDSS 2013 - [c97]Tobias Lauinger, Martin Szydlowski, Kaan Onarlioglu, Gilbert Wondracek, Engin Kirda, Christopher Krügel:
Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting. NDSS 2013 - [c96]Tobias Lauinger, Kaan Onarlioglu, Chaabane Abdelberi, Engin Kirda, William K. Robertson, Mohamed Ali Kâafar
:
Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters. RAID 2013: 369-389 - [c95]Kaan Onarlioglu, Collin Mulliner, William K. Robertson, Engin Kirda:
PrivExec: Private Execution as an Operating System Service. IEEE Symposium on Security and Privacy 2013: 206-220 - [i3]Engin Kirda:
DarkDroid - Exposing the Dark Side of Malicious Mobile Applications. ERCIM News 2013(93) (2013) - 2012
- [j16]Tobias Lauinger, Nikolaos Laoutaris
, Pablo Rodriguez, Thorsten Strufe, Ernst Biersack, Engin Kirda:
Privacy risks in named data networking: what is the cost of performance? Comput. Commun. Rev. 42(5): 54-57 (2012) - [j15]Manuel Egele, Andreas Moser, Christopher Kruegel, Engin Kirda:
PoX: Protecting users from malicious Facebook applications. Comput. Commun. 35(12): 1507-1515 (2012) - [j14]Theodoor Scholte, Davide Balzarotti, Engin Kirda:
Have things changed now? An empirical study on input validation vulnerabilities in web applications. Comput. Secur. 31(3): 344-356 (2012) - [j13]Manuel Egele, Theodoor Scholte, Engin Kirda, Christopher Kruegel:
A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv. 44(2): 6:1-6:42 (2012) - [j12]Advait Abhay Dixit, Rik Farrow, Andrew Ferguson, Katrina LaCurts, Marcelo Martins, Karthik Nagaraj, Kevin Ngo, Will Scott, Manuel Egele, Engin Kirda:
NSDI '12 and LEET '12. login Usenix Mag. 37(4) (2012) - [c94]Leyla Bilge, Davide Balzarotti, William K. Robertson, Engin Kirda, Christopher Kruegel:
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis. ACSAC 2012: 129-138 - [c93]Theodoor Scholte, William K. Robertson, Davide Balzarotti, Engin Kirda:
Preventing Input Validation Vulnerabilities in Web Applications through Automated Type Analysis. COMPSAC 2012: 233-243 - [c92]Engin Kirda:
A security analysis of Amazon's Elastic Compute Cloud service. DSN Workshops 2012: 1 - [c91]Davide Canali, Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda:
A quantitative study of accuracy in system call-based malware detection. ISSTA 2012: 122-132 - [c90]Kaan Onarlioglu, Utku Ozan Yilmaz, Engin Kirda, Davide Balzarotti:
Insights into User Behavior in Dealing with Internet Attacks. NDSS 2012 - [c89]Tobias Lauinger, Engin Kirda, Pietro Michiardi:
Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes. RAID 2012: 169-189 - [c88]Theodoor Scholte, William K. Robertson, Davide Balzarotti, Engin Kirda:
An empirical analysis of input validation mechanisms in web applications and languages. SAC 2012: 1419-1426 - [c87]Marco Balduzzi, Jonas Zaddach, Davide Balzarotti, Engin Kirda, Sergio Loureiro:
A security analysis of amazon's elastic compute cloud service. SAC 2012: 1427-1434 - [c86]Grégoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
PUBCRAWL: Protecting Users and Businesses from CRAWLers. USENIX Security Symposium 2012: 507-522 - [e6]Engin Kirda:
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '12, San Jose, CA, USA, April 24, 2012. USENIX Association 2012 [contents] - 2011
- [c85]Clemens Kolbitsch, Engin Kirda, Christopher Kruegel:
The power of procrastination: detection and mitigation of execution-stalling malicious code. CCS 2011: 285-296 - [c84]Danesh Irani, Marco Balduzzi, Davide Balzarotti, Engin Kirda, Calton Pu:
Reverse Social Engineering Attacks in Online Social Networks. DIMVA 2011: 55-74 - [c83]Theodoor Scholte, Davide Balzarotti, Engin Kirda:
Quo Vadis? A Study of the Evolution of Input Validation Vulnerabilities in Web Applications. Financial Cryptography 2011: 284-298 - [c82]Martin Szydlowski, Ben Y. Zhao, Engin Kirda, Christopher Kruegel:
BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients. ICCCN 2011: 1-6 - [c81]Endre Bangerter, Stefan Bühlmann, Engin Kirda:
Efficient and Stealthy Instruction Tracing and Its Applications in Automated Malware Analysis: Open Problems and Challenges. iNetSeC 2011: 55-64 - [c80]Marco Balduzzi, Carmen Torrano Gimenez, Davide Balzarotti, Engin Kirda:
Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications. NDSS 2011 - [c79]Leyla Bilge, Engin Kirda, Christopher Kruegel, Marco Balduzzi:
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. NDSS 2011 - [c78]Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna:
PiOS: Detecting Privacy Leaks in iOS Applications. NDSS 2011 - [c77]Manuel Egele, Andreas Moser, Christopher Kruegel, Engin Kirda:
PoX: Protecting users from malicious Facebook applications. PerCom Workshops 2011: 288-294 - [e5]Engin Kirda, Thorsten Holz:
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@EuroSys 2011, Salzburg, Austria, April 10, 2011. ACM 2011, ISBN 978-1-4503-0768-0 [contents] - [e4]Engin Kirda, Steven Hand:
Proceedings of the Fourth European Workshop on System Security, EUROSEC'11, April 10, 2011, Salzburg, Austria. ACM 2011, ISBN 978-1-4503-0613-3 [contents] - [r2]Engin Kirda:
Cross Site Scripting Attacks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 275-277 - [r1]Engin Kirda:
Malware Behavior Clustering. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 751-752 - 2010
- [j11]Nenad Jovanovic, Christopher Kruegel, Engin Kirda:
Static analysis for detecting taint-style vulnerabilities in web applications. J. Comput. Secur. 18(5): 861-907 (2010) - [c76]Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide Balzarotti, Engin Kirda:
G-Free: defeating return-oriented programming through gadget-less binaries. ACSAC 2010: 49-58 - [c75]Marco Balduzzi, Manuel Egele, Engin Kirda, Davide Balzarotti, Christopher Kruegel:
A solution for the automated detection of clickjacking attacks. AsiaCCS 2010: 135-144 - [c74]Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda:
AccessMiner: using system-centric models for malware protection. CCS 2010: 399-412 - [c73]Corrado Leita, Ulrich Bayer, Engin Kirda:
Exploiting diverse observation perspectives to get insights on the malware landscape. DSN 2010: 393-402 - [c72]Tobias Lauinger, Veikko Pankakoski, Davide Balzarotti, Engin Kirda:
Honeybot, Your Man in the Middle for Automated Social Engineering. LEET 2010 - [c71]Davide Balzarotti, Marco Cova, Christoph Karlberger, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
Efficient Detection of Split Personalities in Malware. NDSS 2010 - [c70]Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, Christopher Kruegel:
Abusing Social Networks for Automated User Profiling. RAID 2010: 422-441 - [c69]Manuel Egele, Leyla Bilge, Engin Kirda, Christopher Kruegel:
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms. SAC 2010: 1865-1870 - [c68]Ulrich Bayer, Engin Kirda, Christopher Kruegel:
Improving the efficiency of dynamic malware analysis. SAC 2010: 1871-1878 - [c67]Clemens Kolbitsch, Thorsten Holz
, Christopher Kruegel, Engin Kirda:
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries. IEEE Symposium on Security and Privacy 2010: 29-44 - [c66]Paolo Milani Comparetti, Guido Salvaneschi, Engin Kirda, Clemens Kolbitsch, Christopher Kruegel, Stefano Zanero
:
Identifying Dormant Functionality in Malware Programs. IEEE Symposium on Security and Privacy 2010: 61-76 - [c65]Gilbert Wondracek, Thorsten Holz
, Engin Kirda, Christopher Kruegel:
A Practical Attack to De-anonymize Social Network Users. IEEE Symposium on Security and Privacy 2010: 223-238 - [c64]Gilbert Wondracek, Thorsten Holz, Christian Platzer, Engin Kirda, Christopher Kruegel:
Is the Internet for Porn? An Insight Into the Online Adult Industry. WEIS 2010 - [p1]Marc Dacier
, Corrado Leita, Olivier Thonnard, Hau-Van Pham, Engin Kirda:
Assessing Cybercrime Through the Eyes of the WOMBAT. Cyber Situational Awareness 2010: 103-136 - [e3]Manuel Costa, Engin Kirda:
Proceedings of the Third European Workshop on System Security, EUROSEC 2010, Paris, France, April 13, 2010. ACM 2010, ISBN 978-1-4503-0059-9 [contents]
2000 – 2009
- 2009
- [j10]Engin Kirda, Nenad Jovanovic, Christopher Kruegel, Giovanni Vigna:
Client-side cross-site scripting protection. Comput. Secur. 28(7): 592-604 (2009) - [j9]Stefan Mitterhofer, Christopher Krügel, Engin Kirda, Christian Platzer:
Server-Side Bot Detection in Massively Multiplayer Online Games. IEEE Secur. Priv. 7(3): 29-36 (2009) - [j8]Giovanni Vigna, Fredrik Valeur, Davide Balzarotti, William K. Robertson, Christopher Kruegel, Engin Kirda:
Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries. J. Comput. Secur. 17(3): 305-329 (2009) - [c63]Brett Stone-Gross, Christopher Kruegel, Kevin C. Almeroth, Andreas Moser, Engin Kirda:
FIRE: FInding Rogue nEtworks. ACSAC 2009: 231-240 - [c62]Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda:
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. DIMVA 2009: 88-106 - [c61]Peter Wurzinger, Leyla Bilge, Thorsten Holz
, Jan Goebel, Christopher Kruegel, Engin Kirda:
Automatically Generating Models for Botnet Detection. ESORICS 2009: 232-249 - [c60]Theodoor Scholte, Engin Kirda:
Achieving Life-Cycle Compliance of Service-Oriented Architectures: Open Issues and Challenges. DPM/SETOP 2009: 253-267 - [c59]Peter Würzinger, Christian Platzer, Christian Ludl, Engin Kirda, Christopher Kruegel:
SWAP: Mitigating XSS attacks using a reverse proxy. SESS@ICSE 2009: 33-39 - [c58]Manuel Egele, Engin Kirda, Christopher Kruegel:
Mitigating Drive-By Download Attacks: Challenges and Open Problems. iNetSeC 2009: 52-62 - [c57]Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda:
Automated Spyware Collection and Analysis. ISC 2009: 202-217 - [c56]Ulrich Bayer, Imam Habibi, Davide Balzarotti, Engin Kirda:
A View on Current Malware Behaviors. LEET 2009 - [c55]Ulrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Krügel, Engin Kirda:
Scalable, Behavior-Based Malware Clustering. NDSS 2009 - [c54]