Sok:(state of) the art of war: Offensive techniques in binary analysis Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ... 2016 IEEE symposium on security and privacy (SP), 138-157, 2016 | 1385 | 2016 |
A survey on automated dynamic malware-analysis techniques and tools M Egele, T Scholte, E Kirda, C Kruegel ACM computing surveys (CSUR) 44 (2), 1-42, 2008 | 1336 | 2008 |
Limits of static analysis for malware detection A Moser, C Kruegel, E Kirda Twenty-third annual computer security applications conference (ACSAC 2007 …, 2007 | 1301 | 2007 |
Driller: Augmenting fuzzing through selective symbolic execution. N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ... NDSS 16 (2016), 1-16, 2016 | 1231 | 2016 |
Panorama: capturing system-wide information flow for malware detection and analysis H Yin, D Song, M Egele, C Kruegel, E Kirda Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 1141 | 2007 |
Detecting spammers on social networks G Stringhini, C Kruegel, G Vigna Proceedings of the 26th annual computer security applications conference, 1-9, 2010 | 1116 | 2010 |
Pixy: A static analysis tool for detecting web application vulnerabilities N Jovanovic, C Kruegel, E Kirda 2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-263, 2006 | 1058 | 2006 |
Anomaly detection of web-based attacks C Kruegel, G Vigna Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 999 | 2003 |
Scalable, behavior-based malware clustering. U Bayer, PM Comparetti, C Hlauschek, C Kruegel, E Kirda NDSS 9, 8-11, 2009 | 997 | 2009 |
Your botnet is my botnet: analysis of a botnet takeover B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, ... Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 996 | 2009 |
Detection and analysis of drive-by-download attacks and malicious JavaScript code M Cova, C Kruegel, G Vigna Proceedings of the 19th international conference on World wide web, 281-290, 2010 | 940 | 2010 |
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. L Bilge, E Kirda, C Kruegel, M Balduzzi Ndss, 1-17, 2011 | 935 | 2011 |
Exploring multiple execution paths for malware analysis A Moser, C Kruegel, E Kirda 2007 IEEE Symposium on Security and Privacy (SP'07), 231-245, 2007 | 827 | 2007 |
Cross site scripting prevention with dynamic data tainting and static analysis. P Vogt, F Nentwich, N Jovanovic, E Kirda, C Kruegel, G Vigna NDSS 2007, 12, 2007 | 819 | 2007 |
Pios: Detecting privacy leaks in ios applications. M Egele, C Kruegel, E Kirda, G Vigna NDSS 2011, 18th, 2011 | 765 | 2011 |
Comprehensive approach to intrusion detection alert correlation F Valeur, G Vigna, C Kruegel, RA Kemmerer IEEE Transactions on dependable and secure computing 1 (3), 146-169, 2004 | 761 | 2004 |
Effective and efficient malware detection at the end host. C Kolbitsch, PM Comparetti, C Kruegel, E Kirda, X Zhou, XF Wang USENIX security symposium 4 (1), 351-366, 2009 | 735 | 2009 |
Cookieless monster: Exploring the ecosystem of web-based device fingerprinting N Nikiforakis, A Kapravelos, W Joosen, C Kruegel, F Piessens, G Vigna 2013 IEEE Symposium on Security and Privacy, 541-555, 2013 | 670 | 2013 |
Mining specifications of malicious behavior M Christodorescu, S Jha, C Kruegel Proceedings of the the 6th joint meeting of the European software …, 2007 | 651 | 2007 |
An empirical study of cryptographic misuse in android applications M Egele, D Brumley, Y Fratantonio, C Kruegel Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 633 | 2013 |