dblp.uni-trier.dewww.uni-trier.de

Christopher Krügel Vis

Christopher Kruegel

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
72EEManuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda: Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. DIMVA 2009: 88-106
71EEPeter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel, Engin Kirda: Automatically Generating Models for Botnet Detection. ESORICS 2009: 232-249
70EEPaolo Milani Comparetti, Gilbert Wondracek, Christopher Krügel, Engin Kirda: Prospex: Protocol Specification Extraction. IEEE Symposium on Security and Privacy 2009: 110-125
69EEAndreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda: Automated Spyware Collection and Analysis. ISC 2009: 202-217
68EEUlrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Krügel, Engin Kirda: Scalable, Behavior-Based Malware Clustering. NDSS 2009
67EEFederico Maggi, William K. Robertson, Christopher Krügel, Giovanni Vigna: Protecting a Moving Target: Addressing Web Application Concept Drift. RAID 2009: 21-40
66EEGeorg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov: Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008. Computer Science - R&D 23(1): 15-25 (2009)
65EEGiovanni Vigna, Fredrik Valeur, Davide Balzarotti, William K. Robertson, Christopher Kruegel, Engin Kirda: Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries. Journal of Computer Security 17(3): 305-329 (2009)
2008
64 Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel: Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008
63EEBrett Stone-Gross, David Sigal, Rob Cohn, John Morse, Kevin C. Almeroth, Christopher Kruegel: VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges. DIMVA 2008: 44-63
62EELuca Foschini, Ashish V. Thapliyal, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna: A Parallel Architecture for Stateful, High-Speed Intrusion Detection. ICISS 2008: 203-220
61EEDavide Balzarotti, Marco Cova, Viktoria Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna: Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. IEEE Symposium on Security and Privacy 2008: 387-401
60EEMihai Christodorescu, Somesh Jha, Christopher Kruegel: Mining specifications of malicious behavior. ISEC 2008: 5-14
59EEGilbert Wondracek, Paolo Milani Comparetti, Christopher Krügel, Engin Kirda: Automatic Network Protocol Analysis. NDSS 2008
58EEGeorg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel: 08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008
57EEGeorg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov: 08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008
56EELothar Braun, Falko Dressler, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Tobias Limmer, Konrad Rieck, James P. G. Sterbenz: 08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective. Network Attack Detection and Defense 2008
55EEMarc Dacier, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, James P. G. Sterbenz: 8102 Working Group -- Attack Taxonomy. Network Attack Detection and Defense 2008
54EESean McAllister, Engin Kirda, Christopher Kruegel: Leveraging User Interactions for In-Depth Testing of Web Applications. RAID 2008: 191-210
53EEMarco Cova, Christopher Kruegel, Giovanni Vigna: There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. WOOT 2008
2007
52 Christopher Krügel, Richard Lippmann, Andrew Clark: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings Springer 2007
51EEHeng Yin, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda: Panorama: capturing system-wide information flow for malware detection and analysis. ACM Conference on Computer and Communications Security 2007: 116-127
50EEMartin Szydlowski, Christopher Kruegel, Engin Kirda: Secure Input for Web Applications. ACSAC 2007: 375-384
49EEAndreas Moser, Christopher Kruegel, Engin Kirda: Limits of Static Analysis for Malware Detection. ACSAC 2007: 421-430
48EEChristopher Kruegel, Davide Balzarotti, William K. Robertson, Giovanni Vigna: Improving Signature Testing through Dynamic Data Flow Analysis. ACSAC 2007: 53-63
47EEChristian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel: On the Effectiveness of Techniques to Detect Phishing Sites. DIMVA 2007: 20-39
46EEMihai Christodorescu, Somesh Jha, Christopher Kruegel: Mining specifications of malicious behavior. ESEC/SIGSOFT FSE 2007: 5-14
45EEAndreas Moser, Christopher Krügel, Engin Kirda: Exploring Multiple Execution Paths for Malware Analysis. IEEE Symposium on Security and Privacy 2007: 231-245
44EEThomas Raffetseder, Christopher Krügel, Engin Kirda: Detecting System Emulators. ISC 2007: 1-18
43EEPhilipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Krügel, Giovanni Vigna: Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. NDSS 2007
42EEManuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, Dawn Xiaodong Song: Dynamic Spyware Analysis. USENIX Annual Technical Conference 2007: 233-246
41EEPatrick Klinkoff, Engin Kirda, Christopher Kruegel, Giovanni Vigna: Extending .NET security to unmanaged code. Int. J. Inf. Sec. 6(6): 417-428 (2007)
2006
40 Diego Zamboni, Christopher Krügel: Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings Springer 2006
39EEManuel Egele, Martin Szydlowski, Engin Kirda, Christopher Krügel: Using Static Program Analysis to Aid Intrusion Detection. DIMVA 2006: 17-36
38EENenad Jovanovic, Christopher Krügel, Engin Kirda: Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). IEEE Symposium on Security and Privacy 2006: 258-263
37EEPatrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna: Extending .NET Security to Unmanaged Code. ISC 2006: 1-16
36EEWilliam K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer: Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. NDSS 2006
35EENenad Jovanovic, Christopher Kruegel, Engin Kirda: Precise alias analysis for static detection of web application vulnerabilities. PLAS 2006: 27-36
34EEEngin Kirda, Christopher Krügel, Giovanni Vigna, Nenad Jovanovic: Noxes: a client-side solution for mitigating cross-site scripting attacks. SAC 2006: 330-337
33EEFredrik Valeur, Giovanni Vigna, Christopher Krügel, Engin Kirda: An anomaly-driven reverse proxy for web applications. SAC 2006: 361-368
32EEStefan Kals, Engin Kirda, Christopher Krügel, Nenad Jovanovic: SecuBat: a web vulnerability scanner. WWW 2006: 247-256
31EEDarren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel: Anomalous system call detection. ACM Trans. Inf. Syst. Secur. 9(1): 61-93 (2006)
30EEEngin Kirda, Christopher Krügel: Protecting Users against Phishing Attacks. Comput. J. 49(5): 554-561 (2006)
29EEUlrich Bayer, Andreas Moser, Christopher Krügel, Engin Kirda: Dynamic Analysis of Malicious Code. Journal in Computer Virology 2(1): 67-77 (2006)
2005
28 Klaus Julisch, Christopher Krügel: Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings Springer 2005
27EEEngin Kirda, Christopher Krügel: Protecting Users Against Phishing Attacks with AntiPhish. COMPSAC (1) 2005: 517-524
26EEChristopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna: Polymorphic Worm Detection Using Structural Information of Executables. RAID 2005: 207-226
25 Christopher Krügel: Network Security and Secure Applications. The Industrial Information Technology Handbook 2005: 1-13
24EEChristopher Krügel, Giovanni Vigna, William K. Robertson: A multi-model approach to the detection of web-based attacks. Computer Networks 48(5): 717-738 (2005)
2004
23EEChristopher Krügel, William K. Robertson, Giovanni Vigna: Detecting Kernel-Level Rootkits Through Binary Analysis. ACSAC 2004: 91-100
22 Christopher Krügel, William K. Robertson: Alert Verification Determining the Success of Intrusion Attempts. DIMVA 2004: 25-38
21EEChristopher Krügel, William K. Robertson, Fredrik Valeur, Giovanni Vigna: Static Disassembly of Obfuscated Binaries. USENIX Security Symposium 2004: 255-270
20EEFredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer: A Comprehensive Approach to Intrusion Detection Alert Correlation. IEEE Trans. Dependable Sec. Comput. 1(3): 146-169 (2004)
2003
19 Giovanni Vigna, Erland Jonsson, Christopher Krügel: Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings Springer 2003
18EEChristopher Krügel, Giovanni Vigna: Anomaly detection of web-based attacks. ACM Conference on Computer and Communications Security 2003: 251-261
17EEChristopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur: Bayesian Event Classification for Intrusion Detection. ACSAC 2003: 14-23
16EEChristopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna: On the Detection of Anomalous System Call Arguments. ESORICS 2003: 326-343
15EEEngin Kirda, Clemens Kerer, Christopher Krügel, Roman Kurmanowytsch: Web Service Engineering with DIWE. EUROMICRO 2003: 283-290
14EEWilliam K. Robertson, Christopher Krügel, Darren Mutz, Fredrik Valeur: Run-time Detection of Heap-based Overflows. LISA 2003: 51-60
13EEChristopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur: Topology-Based Detection of Anomalous BGP Messages. RAID 2003: 17-35
12EEChristopher Krügel, Thomas Toth: Using Decision Trees to Improve Signature-Based Intrusion Detection. RAID 2003: 173-191
2002
11EEThomas Toth, Christopher Krügel: Evaluating the Impact of Automated Intrusion Response Mechanisms. ACSAC 2002: 301-310
10EEChristopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer: Stateful Intrusion Detection for High-Speed Networks. IEEE Symposium on Security and Privacy 2002: 285-
9EEPascal Fenkam, Harald Gall, Mehdi Jazayeri, Christopher Krügel: DPS : An Architectural Style for Development of Secure Software. InfraSec 2002: 180-198
8EEChristopher Krügel, Thomas Toth: Distributed Pattern Detection for Intrusion Detection. NDSS 2002
7EEClemens Kerer, Engin Kirda, Christopher Krügel: XGuide - A Practical Guide to XML-Based Web Engineering. NETWORKING Workshops 2002: 104-117
6EEThomas Toth, Christopher Krügel: Accurate Buffer Overflow Detection via Abstract Payload Execution. RAID 2002: 274-291
5EEChristopher Krügel, Thomas Toth, Engin Kirda: Service specific anomaly detection for network intrusion detection. SAC 2002: 201-208
2001
4EEChristopher Krügel, Thomas Toth, Clemens Kerer: Decentralized Event Correlation for Intrusion Detection. ICISC 2001: 114-131
3 Christopher Krügel, Thomas Toth, Engin Kirda: SPARTA, a Mobile Agent Based Instrusion Detection System. Network Security 2001: 187-200
2EEEngin Kirda, Clemens Kerer, Mehdi Jazayeri, Christopher Krügel: Supporting Multi-Device Enabled Web Services: Challenges and Open Problems. WETICE 2001: 49-54
1999
1 Wolfgang Kastner, Christopher Krügel, Heinrich Reiter: Jini-ein guter Geist für die Gebäudesystemtechnik. Java-Informations-Tage 1999: 213-222

Coauthor Index

1Kevin C. Almeroth [63]
2Davide Balzarotti [48] [61] [65]
3Ulrich Bayer [29] [68]
4Leyla Bilge [71]
5Lothar Braun [56]
6Georg Carle [57] [58] [64] [66]
7Lorenzo Cavallaro [62]
8Mihai Christodorescu [46] [60]
9Andrew Clark [52]
10Rob Cohn [63]
11Paolo Milani Comparetti [59] [68] [70]
12Marco Cova [53] [61]
13Marc Dacier [55]
14Hervé Debar [55]
15Falko Dressler [56] [57] [58] [64] [66]
16Manuel Egele [39] [42] [51] [72]
17Viktoria Felmetsger [61]
18Pascal Fenkam [9]
19Luca Foschini [62]
20Harald Gall [9]
21Jan Göbel (Jan Goebel) [71]
22Clemens Hlauschek [68]
23Thorsten Holz [55] [56] [71]
24Mehdi Jazayeri [2] [9]
25Somesh Jha [46] [60]
26Erland Jonsson [19]
27Nenad Jovanovic [32] [34] [35] [38] [43] [61]
28Klaus Julisch [28]
29Stefan Kals [32]
30Wolfgang Kastner [1]
31Richard A. Kemmerer [10] [20] [36] [57] [58] [64] [66]
32Clemens Kerer [2] [4] [7] [15]
33Engin Kirda [2] [3] [5] [7] [15] [26] [27] [29] [30] [32] [33] [34] [35] [37] [38] [39] [41] [42] [43] [44] [45] [47] [49] [50] [51] [54] [55] [56] [59] [61] [65] [68] [69] [70] [71] [72]
34Patrick Klinkoff [37] [41]
35Jan Kohlrausch [55] [56]
36Hartmut König [57] [58] [64] [66]
37Roman Kurmanowytsch [15]
38Pavel Laskov [57] [66]
39Tobias Limmer [56]
40Richard Lippmann [52]
41Christian Ludl [47]
42Federico Maggi [67]
43Sean McAllister [47] [54]
44John Morse [63]
45Andreas Moser [29] [45] [49]
46Darren Mutz [13] [14] [16] [17] [26] [31]
47Florian Nentwich [43]
48Thomas Raffetseder [44]
49Heinrich Reiter [1]
50Konrad Rieck [55] [56]
51William K. Robertson [13] [14] [17] [21] [22] [23] [24] [26] [36] [48] [65] [67]
52David Sigal [63]
53Dawn Xiaodong Song (Dawn Song) [42] [51]
54Andreas Stamminger [69]
55James P. G. Sterbenz [55] [56]
56Brett Stone-Gross [63]
57Martin Szydlowski [39] [50]
58Ashish V. Thapliyal [62]
59Thomas Toth [3] [4] [5] [6] [8] [11] [12]
60Fredrik Valeur [10] [13] [14] [16] [17] [20] [21] [31] [33] [65]
61Giovanni Vigna [10] [16] [18] [19] [20] [21] [23] [24] [26] [31] [33] [34] [36] [37] [41] [43] [48] [53] [61] [62] [65] [67] [69]
62Philipp Vogt [43]
63Gilbert Wondracek [59] [70]
64Peter Wurzinger [71] [72]
65Heng Yin [42] [51]
66Diego Zamboni [40]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)