Full name Familienname, Vorname
Krügel, Christopher
 
Main Affiliation Organisations­zuordnung
 

Results 1-20 of 77 (Search time: 0.007 seconds).

PreviewAuthor(s)TitleTypeIssue Date
1Quarta, Davide ; Ianni, Michele ; Machiry, Aravind ; Fratantonio, Yanick ; Gustafson, Eric ; Balzarotti, Davide ; Lindorfer, Martina ; Vigna, Giovanni ; Kruegel, Christopher Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZoneKonferenzbeitrag Inproceedings 2021
2Aghakhani, Hojjat ; Gritti, Fabio ; Mecca, Francesco ; Lindorfer, Martina ; Ortolani, Stefano ; Balzarotti, Davide ; Vigna, Giovanni ; Krügel, Christopher When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis FeaturesKonferenzbeitrag Inproceedings 2020
3Konoth, Radhesh Krishnan ; Vineti, Emanuele ; Moonsamy, Veelasha ; Lindorfer, Martina ; Kruegel, Christopher ; Bos, Herbert ; Vigna, Giovanni MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its DefenseKonferenzbeitrag Inproceedings 2018
4van der Veen, Victor ; Lindorfer, Martina ; Fratantonio, Yanick ; Padmanabha Pillai, Harikrishnan ; Vigna, Giovanni ; Kruegel, Christopher ; Bos, Herbert ; Razavi, Kaveh GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARMKonferenzbeitrag Inproceedings 2018
5Continella, Andrea ; Fratantonio, Yanick ; Lindorfer, Martina ; Puccetti, Alessandro ; Zand, Ali ; Kruegel, Christopher ; Vigna, Giovanni Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential AnalysisKonferenzbeitrag Inproceedings 2017
6Invernizzi, Luca ; Benvenuti, Stefano ; Cova, Marco ; Milani Comparetti, Paolo ; Krügel, Christopher ; Vigna, Giovanni EVILSEED: A Guided Approach to Finding Malicious Web PagesKonferenzbeitrag Inproceedings 2012
7Jacob, Gregoire ; Milani Comparetti, Paolo ; Neugschwandtner, Matthias ; Krügel, Christopher ; Vigna, Giovanni A Static, Packer-Agnostic Filter to Detect Similar Malware SampleKonferenzbeitrag Inproceedings 2012
8Neugschwandtner, Matthias ; Comparetti, Paolo Milani ; Jacob, Gregoire ; Kruegel, Christopher FORECASTKonferenzbeitrag Inproceedings 2011
9Kolbitsch, Clemens ; Kirda, Engin ; Krügel, Christopher The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious CodeKonferenzbeitrag Inproceedings 2011
10Szydlowski, Martin ; Zhao, Ben Y. ; Kirda, Engin ; Krügel, Christopher BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent ClientsKonferenzbeitrag Inproceedings 2011
11Balduzzi, Marco ; Egele, Manuel ; Balzarotti, Davide ; Kirda, Engin ; Krügel, Christopher A solution for the automated detection of clickjacking attacksKonferenzbeitrag Inproceedings 2010
12Kolbitsch, Clemens ; Krügel, Christopher ; Kirda, Engin Extending Mondrian Memory ProtectionKonferenzbeitrag Inproceedings 2010
13Balduzzi, Marco ; Platzer, Christian ; Holz, Thorsten ; Kirda, Engin ; Balzarotti, Davide ; Krügel, Christopher Abusing Social Networks for Automated User ProfilingKonferenzbeitrag Inproceedings 2010
14Wondracek, Gilbert ; Holz, Thorsten ; Platzer, Christian ; Kirda, Engin ; Krügel, Christopher Is the Internet for Porn? An Insight Into the Online Adult IndustryKonferenzbeitrag Inproceedings 2010
15Kolbitsch, Clemens ; Holz, Thorsten ; Krügel, Christopher ; Kirda, Engin Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware BinariesKonferenzbeitrag Inproceedings 2010
16Milani Comparetti, Paolo ; Salvaneschi, Guido ; Kirda, Engin ; Kolbitsch, Clemens ; Krügel, Christopher ; Zanero, Stefano Identifying Dormant Functionality in Malware ProgramsKonferenzbeitrag Inproceedings 2010
17Wondracek, Gilbert ; Holz, Thorsten ; Kirda, Engin ; Kruegel, Christopher A Practical Attack to De-anonymize Social Network UsersKonferenzbeitrag Inproceedings 2010
18Stone-Gross, Brett ; Moser, Andreas ; Krügel, Christopher ; Kirda, Engin ; Almaroth, Kevin FIRE: FInding Rogue nEtworksKonferenzbeitrag Inproceedings 2009
19Wurzinger, Peter ; Bilge, Leyla ; Kirda, Engin ; Krügel, Christopher ; Holz, Thorsten ; Göbel, Jan Automatically Generating Models for Botnet DetectionKonferenzbeitrag Inproceedings 2009
20Milani Comparetti, Paolo ; Kolbitsch, Clemens ; Kirda, Engin ; Krügel, Christopher ; Xiaoyong, Zhou ; Xiaofeng, Wang Effective and Efficient Malware Detection at the End HostKonferenzbeitrag Inproceedings 2009

Results 1-20 of 23 (Search time: 0.012 seconds).

PreviewAuthor(s)TitleTypeIssue Date
1Weissbacher, Michael ZigZag : hardening web applications against CSV attacksThesis Hochschulschrift2014
2Kolbitsch Clemens - 2011 - Behavior based malware analysis and detection.pdf.jpgKolbitsch, Clemens Behavior based malware analysis and detectionThesis Hochschulschrift 2011
3Egele Manuel - 2011 - Protecting web clients from internet threats.pdf.jpgEgele, Manuel Protecting web clients from internet threatsThesis Hochschulschrift 2011
4Raffetseder, Thomas Smart fuzzingThesis Hochschulschrift2010
5Amanshauser, Max On the detection of cheating on private BitTorrent trackersThesis Hochschulschrift2009
6Mitterhofer, Stefan Server-side bot detection for massively multiplayer online gamesThesis Hochschulschrift2009
7Bayer Ulrich - 2009 - Large-scale dynamic malware analysis.pdf.jpgBayer, Ulrich Large-scale dynamic malware analysisThesis Hochschulschrift 2009
8Wondracek Gilbert - 2009 - Threats to privacy sensitive data.pdf.jpgWondracek, Gilbert Threats to privacy sensitive dataThesis Hochschulschrift 2009
9Kolbitsch Clemens - 2008 - Extending Mondrian memory protection.pdf.jpgKolbitsch, Clemens Extending Mondrian memory protectionThesis Hochschulschrift 2008
10McAllister Sean - 2008 - In-depth security testing of Web applications.pdf.jpgMcAllister, Sean In-depth security testing of Web applicationsThesis Hochschulschrift 2008
11Ludl, Christian SWAP : a proxy-based solution for mitigating XSS attacksThesis Hochschulschrift2008
12Stamminger, Andreas Automated spyware collection and analysisThesis Hochschulschrift2007
13Bayler Guenther Michael - 2007 - Penetrating Bayesian spam filters using...pdf.jpgBayler, Günther Michael Penetrating Bayesian spam filters using redundancy in natural languageThesis Hochschulschrift 2007
14Petritsch Helmut - 2007 - Understanding and replaying network traffic in Windows...pdf.jpgPetritsch, Helmut Understanding and replaying network traffic in Windows XP for dynamic malware analysisThesis Hochschulschrift 2007
15Preiss Franz-Stefan - 2007 - Access control policy editor and analyzer for...pdf.jpgPreiss, Franz-Stefan Access control policy editor and analyzer for policies on a business levelThesis Hochschulschrift 2007
16Szydlowski Martin - 2007 - Secure input for web applications.pdf.jpgSzydlowski, Martin Secure input for web applicationsThesis Hochschulschrift 2007
17Jovanovic Nenad - 2007 - Web application security.pdf.jpgJovanovic, Nenad Web application securityThesis Hochschulschrift 2007
18Egele, Manuel Behavior-based spyware detection using dynamic taint analysisThesis Hochschulschrift2006
19Kals, Stefan SecuBat : a web vulnerability scannerThesis Hochschulschrift2006
20Vogt, PhilippCross site scripting (XSS) attack prevention with dynamic data tainting on the client sideThesis Hochschulschrift2006