Scalable, behavior-based malware clustering U Bayer, P Milani Comparetti, C Hlauschek, C Kruegel, E Kirda Network and Distributed System Security Symposium (NDSS), 2009 | 692 | 2009 |
Effective and efficient malware detection at the end host C Kolbitsch, P Milani Comparetti, C Kruegel, E Kirda, X Zhou, XF Wang Proceedings of the 18th USENIX security symposium, 351-366, 2009 | 520 | 2009 |
Detecting environment-sensitive malware M Lindorfer, C Kolbitsch, PM Comparetti International Workshop on Recent Advances in Intrusion Detection, 338-357, 2011 | 300 | 2011 |
Prospex: Protocol specification extraction P Milani Comparetti, G Wondracek, C Kruegel, E Kirda Security and Privacy, 2009 30th IEEE Symposium on, 110-125, 2009 | 287* | 2009 |
Automatic network protocol analysis G Wondracek, P Milani Comparetti, C Kruegel, E Kirda 15th Symposium on Network and Distributed System Security (NDSS), 2008 | 242 | 2008 |
EVILSEED: A Guided Approach to Finding Malicious Web Pages L Invernizzi, UC Santa Barbara, S Benvenuti, M Cova, ... Security and Privacy (SP), 2011 IEEE Symposium on, 2012 | 174 | 2012 |
Hulk: Eliciting malicious behavior in browser extensions A Kapravelos, C Grier, N Chachra, C Kruegel, G Vigna, V Paxson 23rd {USENIX} Security Symposium ({USENIX} Security 14), 641-654, 2014 | 124 | 2014 |
Identifying dormant functionality in malware programs P Milani Comparetti, G Salvaneschi, E Kirda, C Kolbitsch, C Kruegel, ... Security and Privacy (SP), 2010 IEEE Symposium on, 61-76, 2010 | 110* | 2010 |
A static, packer-agnostic filter to detect similar malware samples G Jacob, M Neugschwandtner, P Milani Comparetti, C Kruegel, G Vigna Department of Computer Science University of California Santa Barbara …, 2010 | 70 | 2010 |
Lines of Malicious Code: Insights Into the Malicious Software Industry M Lindorfer, A Di Federico, F Maggi, P Milani Comparetti, S Zanero | 42 | 2012 |
The borg: Nanoprobing binaries for buffer overreads M Neugschwandtner, P Milani Comparetti, I Haller, H Bos Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 37 | 2015 |
FORECAST: skimming off the malware cream M Neugschwandtner, P Milani Comparetti, G Jacob, C Kruegel Proceedings of the 27th Annual Computer Security Applications Conference, 11-20, 2011 | 36 | 2011 |
Detecting malware's failover C&C strategies with squeeze M Neugschwandtner, P Milani Comparetti, C Platzer Proceedings of the 27th Annual Computer Security Applications Conference, 21-30, 2011 | 30 | 2011 |
dAnubis–dynamic device driver analysis based on virtual machine introspection M Neugschwandtner, C Platzer, P Milani Comparetti, U Bayer Detection of Intrusions and Malware, and Vulnerability Assessment, 41-60, 2010 | 22 | 2010 |
Methods and systems for malware detection based on environment-dependent behavior C Kolbitsch, PM Comparetti, L Cavedon US Patent 9,361,459, 2016 | 16 | 2016 |
Methods and systems for reciprocal generation of watch-lists and malware signatures C Kolbitsch, PM Comparetti, L Cavedon US Patent 8,910,285, 2014 | 10 | 2014 |
Lobotomy: An architecture for jit spraying mitigation M Jauernig, M Neugschwandtner, C Platzer, PM Comparetti 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 7 | 2014 |
dAnubis U Bayer, P Milani Comparetti, M Neugschwandtner, C Platzer DIMVA 2010, July 8-9, 2010, Paris, France, 2010 | | 2010 |
Reference clustering P Milani Comparetti | | 2010 |
Beiträge in Tagungsbänden M Lindorfer, C Kolbitsch, PM Comparetti | | |