Full name Familienname, Vorname
Kirda, Engin
 
Main Affiliation Organisations­zuordnung
 

Results 1-20 of 52 (Search time: 0.003 seconds).

PreviewAuthor(s)TitleTypeIssue Date
1Carter, Patrick ; Mulliner, Collin ; Lindorfer, Martina ; Robertson, William ; Kirda, Engin CuriousDroid: Automated User Interface Interaction for Android Application Analysis SandboxesKonferenzbeitrag Inproceedings 2016
2Kolbitsch, Clemens ; Kirda, Engin ; Krügel, Christopher The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious CodeKonferenzbeitrag Inproceedings 2011
3Szydlowski, Martin ; Zhao, Ben Y. ; Kirda, Engin ; Krügel, Christopher BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent ClientsKonferenzbeitrag Inproceedings 2011
4Balduzzi, Marco ; Egele, Manuel ; Balzarotti, Davide ; Kirda, Engin ; Krügel, Christopher A solution for the automated detection of clickjacking attacksKonferenzbeitrag Inproceedings 2010
5Kolbitsch, Clemens ; Krügel, Christopher ; Kirda, Engin Extending Mondrian Memory ProtectionKonferenzbeitrag Inproceedings 2010
6Balduzzi, Marco ; Platzer, Christian ; Holz, Thorsten ; Kirda, Engin ; Balzarotti, Davide ; Krügel, Christopher Abusing Social Networks for Automated User ProfilingKonferenzbeitrag Inproceedings 2010
7Wondracek, Gilbert ; Holz, Thorsten ; Platzer, Christian ; Kirda, Engin ; Krügel, Christopher Is the Internet for Porn? An Insight Into the Online Adult IndustryKonferenzbeitrag Inproceedings 2010
8Kolbitsch, Clemens ; Holz, Thorsten ; Krügel, Christopher ; Kirda, Engin Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware BinariesKonferenzbeitrag Inproceedings 2010
9Milani Comparetti, Paolo ; Salvaneschi, Guido ; Kirda, Engin ; Kolbitsch, Clemens ; Krügel, Christopher ; Zanero, Stefano Identifying Dormant Functionality in Malware ProgramsKonferenzbeitrag Inproceedings 2010
10Leita, Corrado ; Bayer, Ulrich ; Kirda, Engin Exploiting diverse observation perspectives to get insights on the malware landscapeKonferenzbeitrag Inproceedings2010
11Wondracek, Gilbert ; Holz, Thorsten ; Kirda, Engin ; Kruegel, Christopher A Practical Attack to De-anonymize Social Network UsersKonferenzbeitrag Inproceedings 2010
12Krügel, Christopher ; Platzer, Christian ; Kirda, Engin ; Ludl, Christian ; Wurzinger, Peter SWAP: Mitigating XSS Attacks using a Reverse ProxyKonferenzbeitrag Inproceedings 2009
13Stone-Gross, Brett ; Moser, Andreas ; Krügel, Christopher ; Kirda, Engin ; Almaroth, Kevin FIRE: FInding Rogue nEtworksKonferenzbeitrag Inproceedings 2009
14Wurzinger, Peter ; Bilge, Leyla ; Kirda, Engin ; Krügel, Christopher ; Holz, Thorsten ; Göbel, Jan Automatically Generating Models for Botnet DetectionKonferenzbeitrag Inproceedings 2009
15Milani Comparetti, Paolo ; Kolbitsch, Clemens ; Kirda, Engin ; Krügel, Christopher ; Xiaoyong, Zhou ; Xiaofeng, Wang Effective and Efficient Malware Detection at the End HostKonferenzbeitrag Inproceedings 2009
16Milani Comparetti, Paolo ; Wondracek, Gilbert ; Krügel, Christopher ; Kirda, Engin Prospex: Protocol Specification ExtractionKonferenzbeitrag Inproceedings2009
17Mitterhofer, Stefan Karl ; Krügel, Christopher ; Kirda, Engin ; Platzer, Christian Server-Side Bot Detection in Massively Multiplayer Online GamesArtikel Article 2009
18Bayer, Ulrich ; Kirda, Engin ; Krügel, Christopher ; Milani Comparetti, Paolo ; Hlauschek, Clemens Scalable, Behavior-Based Malware ClusteringKonferenzbeitrag Inproceedings2009
19Kirda, Engin ; Egele, Manuel ; Krügel, Christopher Removing Web Spam Links from Search Engine ResultsKonferenzbeitrag Inproceedings 2009
20Wurzinger, Peter ; Egele, Manuel ; Kirda, Engin ; Krügel, Christopher Defending Browsers against Drive-by Downloads: Mitigating Heap-spraying Code Injection AttacksKonferenzbeitrag Inproceedings 2009

Results 1-20 of 21 (Search time: 0.009 seconds).

PreviewAuthor(s)TitleTypeIssue Date
1Lindorfer Martina - 2015 - Malware through the looking glass malware analysis in...pdf.jpgLindorfer, Martina Malware through the looking glass : malware analysis in an evolving threat landscapeThesis Hochschulschrift 2015
2Neugschwandtner, Matthias Mitigating malware communication infrastructures and exploitation techniquesThesis Hochschulschrift2014
3Weissbacher, Michael ZigZag : hardening web applications against CSV attacksThesis Hochschulschrift2014
4Starnberger, Günther Trading dependability, performance, and security in first-price sealed-bid online auctions with temporal decouplingThesis Hochschulschrift2011
5Egele Manuel - 2011 - Protecting web clients from internet threats.pdf.jpgEgele, Manuel Protecting web clients from internet threatsThesis Hochschulschrift 2011
6Raffetseder, Thomas Smart fuzzingThesis Hochschulschrift2010
7Mitterhofer, Stefan Server-side bot detection for massively multiplayer online gamesThesis Hochschulschrift2009
8Wondracek Gilbert - 2009 - Threats to privacy sensitive data.pdf.jpgWondracek, Gilbert Threats to privacy sensitive dataThesis Hochschulschrift 2009
9Kolbitsch Clemens - 2008 - Extending Mondrian memory protection.pdf.jpgKolbitsch, Clemens Extending Mondrian memory protectionThesis Hochschulschrift 2008
10McAllister Sean - 2008 - In-depth security testing of Web applications.pdf.jpgMcAllister, Sean In-depth security testing of Web applicationsThesis Hochschulschrift 2008
11Ludl, Christian SWAP : a proxy-based solution for mitigating XSS attacksThesis Hochschulschrift2008
12Stamminger, Andreas Automated spyware collection and analysisThesis Hochschulschrift2007
13Bayler Guenther Michael - 2007 - Penetrating Bayesian spam filters using...pdf.jpgBayler, Günther Michael Penetrating Bayesian spam filters using redundancy in natural languageThesis Hochschulschrift 2007
14Petritsch Helmut - 2007 - Understanding and replaying network traffic in Windows...pdf.jpgPetritsch, Helmut Understanding and replaying network traffic in Windows XP for dynamic malware analysisThesis Hochschulschrift 2007
15Szydlowski Martin - 2007 - Secure input for web applications.pdf.jpgSzydlowski, Martin Secure input for web applicationsThesis Hochschulschrift 2007
16Egele, Manuel Behavior-based spyware detection using dynamic taint analysisThesis Hochschulschrift2006
17Kals, Stefan SecuBat : a web vulnerability scannerThesis Hochschulschrift2006
18Vogt, PhilippCross site scripting (XSS) attack prevention with dynamic data tainting on the client sideThesis Hochschulschrift2006
19Moser, Viktor FOXY : a proxy for mobile web accessThesis Hochschulschrift2006
20Klinkoff, Patrick Extending .Net security to native codeThesis Hochschulschrift2005