Christopher Kruegel
Christopher Kruegel
Verified email at cs.ucsb.edu - Homepage
TitleCited byYear
Panorama: capturing system-wide information flow for malware detection and analysis
H Yin, D Song, M Egele, C Kruegel, E Kirda
Proceedings of the 14th ACM conference on Computer and communications …, 2007
8992007
Anomaly detection of web-based attacks
C Kruegel, G Vigna
Proceedings of the 10th ACM conference on Computer and communications …, 2003
7942003
A survey on automated dynamic malware-analysis techniques and tools
M Egele, T Scholte, E Kirda, C Kruegel
ACM computing surveys (CSUR) 44 (2), 6, 2012
7802012
Limits of static analysis for malware detection
A Moser, C Kruegel, E Kirda
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
7542007
Your botnet is my botnet: analysis of a botnet takeover
B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, ...
Proceedings of the 16th ACM conference on Computer and communications …, 2009
7512009
Detecting spammers on social networks
G Stringhini, C Kruegel, G Vigna
Proceedings of the 26th annual computer security applications conference, 1-9, 2010
7492010
Pixy: A static analysis tool for detecting web application vulnerabilities
N Jovanovic, C Kruegel, E Kirda
2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-263, 2006
7312006
Scalable, behavior-based malware clustering.
U Bayer, PM Comparetti, C Hlauschek, C Kruegel, E Kirda
NDSS 9, 8-11, 2009
6942009
Detection and analysis of drive-by-download attacks and malicious JavaScript code
M Cova, C Kruegel, G Vigna
Proceedings of the 19th international conference on World wide web, 281-290, 2010
6822010
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis.
P Vogt, F Nentwich, N Jovanovic, E Kirda, C Kruegel, G Vigna
NDSS 2007, 12, 2007
6272007
Exploring multiple execution paths for malware analysis
A Moser, C Kruegel, E Kirda
2007 IEEE Symposium on Security and Privacy (SP'07), 231-245, 2007
6232007
Comprehensive approach to intrusion detection alert correlation
F Valeur, G Vigna, C Kruegel, RA Kemmerer
IEEE Transactions on dependable and secure computing 1 (3), 146-169, 2004
6112004
PiOS: Detecting Privacy Leaks in iOS Applications.
M Egele, C Kruegel, E Kirda, G Vigna
NDSS, 177-183, 2011
5892011
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.
L Bilge, E Kirda, C Kruegel, M Balduzzi
Ndss, 1-17, 2011
5602011
Effective and Efficient Malware Detection at the End Host.
C Kolbitsch, PM Comparetti, C Kruegel, E Kirda, X Zhou, XF Wang
USENIX security symposium 4 (1), 351-366, 2009
5222009
Mining specifications of malicious behavior
M Christodorescu, S Jha, C Kruegel
Proceedings of the the 6th joint meeting of the European software …, 2007
5092007
Polymorphic worm detection using structural information of executables
C Kruegel, E Kirda, D Mutz, W Robertson, G Vigna
International Workshop on Recent Advances in Intrusion Detection, 207-226, 2005
4932005
Service specific anomaly detection for network intrusion detection
C Krügel, T Toth, E Kirda
Proceedings of the 2002 ACM symposium on Applied computing, 201-208, 2002
4582002
Saner: Composing static and dynamic analysis to validate sanitization in web applications
D Balzarotti, M Cova, V Felmetsger, N Jovanovic, E Kirda, C Kruegel, ...
2008 IEEE Symposium on Security and Privacy (sp 2008), 387-401, 2008
4372008
TTAnalyze: A tool for analyzing malware
U Bayer, C Kruegel, E Kirda
na, 2006
4352006
The system can't perform the operation now. Try again later.
Articles 1–20