default search action
Giovanni Vigna
Person information
- affiliation: University of California, Santa Barbara, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c238]Sayak Saha Roy, Dipanjan Das, Priyanka Bose, Christopher Kruegel, Giovanni Vigna, Shirin Nilizadeh:
Unveiling the Risks of NFT Promotion Scams. ICWSM 2024: 1367-1380 - [c237]Nicola Ruaro, Fabio Gritti, Robert McLaughlin, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna:
Not your Type! Detecting Storage Collision Vulnerabilities in Ethereum Smart Contracts. NDSS 2024 - [c236]Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim:
TrojanPuzzle: Covertly Poisoning Code-Suggestion Models. SP 2024: 1122-1140 - [c235]Wil Gibbs, Arvind S. Raj, Jayakrishna Menon Vadayath, Hui Jun Tay, Justin Miller, Akshay Ajayan, Zion Leonahenahe Basque, Audrey Dutcher, Fangzhou Dong, Xavier J. Maso, Giovanni Vigna, Christopher Kruegel, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang:
Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services. USENIX Security Symposium 2024 - [c234]Giulio De Pasquale, Ilya Grishchenko, Riccardo Iesari, Gabriel Pizarro, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna:
ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning. USENIX Security Symposium 2024 - [c233]Ravindu De Silva, Wenbo Guo, Nicola Ruaro, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna:
GuideEnricher: Protecting the Anonymity of Ethereum Mixing Service Users with Deep Reinforcement Learning. USENIX Security Symposium 2024 - [c232]Zihao Su, Kunlin Cai, Reuben Beeler, Lukas Dresel, Allan Garcia, Ilya Grishchenko, Yuan Tian, Christopher Kruegel, Giovanni Vigna:
Remote Keylogging Attacks in Multi-user VR Applications. USENIX Security Symposium 2024 - [i19]Zihao Su, Kunlin Cai, Reuben Beeler, Lukas Dresel, Allan Garcia, Ilya Grishchenko, Yuan Tian, Christopher Kruegel, Giovanni Vigna:
Remote Keylogging Attacks in Multi-user VR Applications. CoRR abs/2405.14036 (2024) - 2023
- [j25]Oleg Boyarchuk, Sebastiano Mariani, Stefano Ortolani, Giovanni Vigna:
Keeping Up with the Emotets: Tracking a Multi-infrastructure Botnet. DTRAP 4(3): 41:1-41:29 (2023) - [c231]Stijn Pletinckx, Thanh-Dat Nguyen, Tobias Fiebig, Christopher Kruegel, Giovanni Vigna:
Certifiably Vulnerable: Using Certificate Transparency Logs for Target Reconnaissance. EuroS&P 2023: 817-831 - [c230]Priyanka Bose, Dipanjan Das, Saastha Vasan, Sebastiano Mariani, Ilya Grishchenko, Andrea Continella, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
Columbus: Android App Testing Through Systematic Callback Exploration. ICSE 2023: 1381-1392 - [c229]Eric Gustafson, Paul Grosen, Nilo Redini, Saagar Jha, Andrea Continella, Ruoyu Wang, Kevin Fu, Sara Rampazzi, Christopher Kruegel, Giovanni Vigna:
Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images. RAID 2023: 32-45 - [c228]Noah Spahn, Nils Hanke, Thorsten Holz, Christopher Kruegel, Giovanni Vigna:
Container Orchestration Honeypot: Observing Attacks in the Wild. RAID 2023: 381-396 - [c227]Hojjat Aghakhani, Lea Schönherr, Thorsten Eisenhofer, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna:
Venomave: Targeted Poisoning Against Speech Recognition. SaTML 2023: 404-417 - [c226]Marcel Busch, Aravind Machiry, Chad Spensky, Giovanni Vigna, Christopher Kruegel, Mathias Payer:
TEEzz: Fuzzing Trusted Applications on COTS Android Devices. SP 2023: 1204-1219 - [c225]Erik Trickel, Fabio Pagani, Chang Zhu, Lukas Dresel, Giovanni Vigna, Christopher Kruegel, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé:
Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities. SP 2023: 2658-2675 - [c224]Fabio Gritti, Nicola Ruaro, Robert McLaughlin, Priyanka Bose, Dipanjan Das, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna:
Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart Contracts. USENIX Security Symposium 2023: 1793-1810 - [c223]Robert McLaughlin, Christopher Kruegel, Giovanni Vigna:
A Large Scale Study of the Ethereum Arbitrage Ecosystem. USENIX Security Symposium 2023: 3295-3312 - [c222]Marius Fleischer, Dipanjan Das, Priyanka Bose, Weiheng Bai, Kangjie Lu, Mathias Payer, Christopher Kruegel, Giovanni Vigna:
ACTOR: Action-Guided Kernel Fuzzing. USENIX Security Symposium 2023: 5003-5020 - [i18]Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim:
TrojanPuzzle: Covertly Poisoning Code-Suggestion Models. CoRR abs/2301.02344 (2023) - [i17]Sayak Saha Roy, Dipanjan Das, Priyanka Bose, Christopher Kruegel, Giovanni Vigna, Shirin Nilizadeh:
Demystifying NFT Promotion and Phishing Scams. CoRR abs/2301.09806 (2023) - [i16]Priyanka Bose, Dipanjan Das, Saastha Vasan, Sebastiano Mariani, Ilya Grishchenko, Andrea Continella, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
Columbus: Android App Testing Through Systematic Callback Exploration. CoRR abs/2302.09116 (2023) - [i15]Christopher Salls, Chani Jindal, Jake Corina, Christopher Kruegel, Giovanni Vigna:
Token-Level Fuzzing. CoRR abs/2304.02103 (2023) - [i14]Priyanka Bose, Dipanjan Das, Fabio Gritti, Nicola Ruaro, Christopher Kruegel, Giovanni Vigna:
Exploiting Unfair Advantages: Investigating Opportunistic Trading in the NFT Market. CoRR abs/2310.06844 (2023) - [i13]Christophe Hauser, Shirin Nilizadeh, Yan Shoshitaishvili, Ni Trieu, Srivatsan Ravi, Christopher Kruegel, Giovanni Vigna:
Street Rep: A Privacy-Preserving Reputation Aggregation System. IACR Cryptol. ePrint Arch. 2023: 1346 (2023) - 2022
- [c221]Rajat Gupta, Lukas Patrick Dresel, Noah Spahn, Giovanni Vigna, Christopher Kruegel, Taesoo Kim:
POPKORN: Popping Windows Kernel Drivers At Scale. ACSAC 2022: 854-868 - [c220]Dipanjan Das, Priyanka Bose, Nicola Ruaro, Christopher Kruegel, Giovanni Vigna:
Understanding Security Issues in the NFT Ecosystem. CCS 2022: 667-681 - [c219]Dipanjan Das, Priyanka Bose, Aravind Machiry, Sebastiano Mariani, Yan Shoshitaishvili, Giovanni Vigna, Christopher Kruegel:
Hybrid Pruning: Towards Precise Pointer and Taint Analysis. DIMVA 2022: 1-22 - [c218]Priyanka Bose, Dipanjan Das, Yanju Chen, Yu Feng, Christopher Kruegel, Giovanni Vigna:
SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds. SP 2022: 161-178 - [c217]Thijs van Ede, Hojjat Aghakhani, Noah Spahn, Riccardo Bortolameotti, Marco Cova, Andrea Continella, Maarten van Steen, Andreas Peter, Christopher Kruegel, Giovanni Vigna:
DEEPCASE: Semi-Supervised Contextual Analysis of Security Events. SP 2022: 522-539 - [c216]Nicola Ruaro, Fabio Pagani, Stefano Ortolani, Christopher Kruegel, Giovanni Vigna:
SYMBEXCEL: Automated Analysis and Understanding of Malicious Excel 4.0 Macros. SP 2022: 1066-1081 - [c215]Fabio Gritti, Fabio Pagani, Ilya Grishchenko, Lukas Dresel, Nilo Redini, Christopher Kruegel, Giovanni Vigna:
HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images. SP 2022: 1082-1099 - [c214]Tobias Scharnowski, Nils Bars, Moritz Schloegel, Eric Gustafson, Marius Muench, Giovanni Vigna, Christopher Kruegel, Thorsten Holz, Ali Abbasi:
Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing. USENIX Security Symposium 2022: 1239-1256 - [c213]Kevin Burk, Fabio Pagani, Christopher Kruegel, Giovanni Vigna:
Decomperson: How Humans Decompile and What We Can Learn From It. USENIX Security Symposium 2022: 2765-2782 - [c212]Robert McLaughlin, Fabio Pagani, Noah Spahn, Christopher Kruegel, Giovanni Vigna:
Regulator: Dynamic Analysis to Detect ReDoS. USENIX Security Symposium 2022: 4219-4235 - [d1]Dipanjan Das, Priyanka Bose, Nicola Ruaro, Christopher Kruegel, Giovanni Vigna:
Understanding Security Issues in the NFT Ecosystem. Zenodo, 2022 - 2021
- [j24]Marcus Botacin, Hojjat Aghakhani, Stefano Ortolani, Christopher Kruegel, Giovanni Vigna, Daniela Oliveira, Paulo Lício de Geus, André Grégio:
One Size Does Not Fit All: A Longitudinal Analysis of Brazilian Financial Malware. ACM Trans. Priv. Secur. 24(2): 11:1-11:31 (2021) - [c211]Chad Spensky, Aravind Machiry, Nilo Redini, Colin Unger, Graham Foster, Evan Blasband, Hamed Okhravi, Christopher Kruegel, Giovanni Vigna:
Conware: Automated Modeling of Hardware Peripherals. AsiaCCS 2021: 95-109 - [c210]Dongyu Meng, Michele Guerriero, Aravind Machiry, Hojjat Aghakhani, Priyanka Bose, Andrea Continella, Christopher Kruegel, Giovanni Vigna:
Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms. AsiaCCS 2021: 731-743 - [c209]Davide Quarta, Michele Ianni, Aravind Machiry, Yanick Fratantonio, Eric Gustafson, Davide Balzarotti, Martina Lindorfer, Giovanni Vigna, Christopher Kruegel:
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone. Checkmate@CCS 2021: 43-57 - [c208]Chad Spensky, Aravind Machiry, Nathan Burow, Hamed Okhravi, Rick Housley, Zhongshu Gu, Hani Jamjoom, Christopher Kruegel, Giovanni Vigna:
Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses. DSN 2021: 400-412 - [c207]Hojjat Aghakhani, Dongyu Meng, Yu-Xiang Wang, Christopher Kruegel, Giovanni Vigna:
Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability. EuroS&P 2021: 159-178 - [c206]Nicola Ruaro, Kyle Zeng, Lukas Dresel, Mario Polino, Tiffany Bao, Andrea Continella, Stefano Zanero, Christopher Kruegel, Giovanni Vigna:
SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning. RAID 2021: 456-468 - [c205]Nilo Redini, Andrea Continella, Dipanjan Das, Giulio De Pasquale, Noah Spahn, Aravind Machiry, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices. SP 2021: 484-500 - [c204]Christopher Salls, Chani Jindal, Jake Corina, Christopher Kruegel, Giovanni Vigna:
Token-Level Fuzzing. USENIX Security Symposium 2021: 2795-2809 - [c203]Chinmay Garg, Aravind Machiry, Andrea Continella, Christopher Kruegel, Giovanni Vigna:
Toward a secure crowdsourced location tracking system. WISEC 2021: 311-322 - [e5]Yongdae Kim, Jong Kim, Giovanni Vigna, Elaine Shi:
CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021. ACM 2021, ISBN 978-1-4503-8454-4 [contents] - [i12]Priyanka Bose, Dipanjan Das, Yanju Chen, Yu Feng, Christopher Kruegel, Giovanni Vigna:
SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds. CoRR abs/2104.08638 (2021) - [i11]Chinmay Garg, Aravind Machiry, Andrea Continella, Christopher Kruegel, Giovanni Vigna:
Toward a Secure Crowdsourced Location Tracking System. CoRR abs/2106.00217 (2021) - [i10]Dipanjan Das, Priyanka Bose, Nicola Ruaro, Christopher Kruegel, Giovanni Vigna:
Understanding Security Issues in the NFT Ecosystem. CoRR abs/2111.08893 (2021) - 2020
- [c202]Fabio Gritti, Lorenzo Fontana, Eric Gustafson, Fabio Pagani, Andrea Continella, Christopher Kruegel, Giovanni Vigna:
SYMBION: Interleaving Symbolic with Concrete Execution. CNS 2020: 1-10 - [c201]Christopher Salls, Aravind Machiry, Adam Doupé, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
Exploring Abstraction Functions in Fuzzing. CNS 2020: 1-9 - [c200]Chad Spensky, Aravind Machiry, Marcel Busch, Kevin Leach, Rick Housley, Christopher Kruegel, Giovanni Vigna:
TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems. CNS 2020: 1-9 - [c199]Marcus Botacin, Giovanni Bertão, Paulo L. de Geus, André Grégio, Christopher Kruegel, Giovanni Vigna:
On the Security of Application Installers and Online Software Repositories. DIMVA 2020: 192-214 - [c198]Hojjat Aghakhani, Fabio Gritti, Francesco Mecca, Martina Lindorfer, Stefano Ortolani, Davide Balzarotti, Giovanni Vigna, Christopher Kruegel:
When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features. NDSS 2020 - [c197]Takeshi Takahashi, Christopher Kruegel, Giovanni Vigna, Katsunari Yoshioka, Daisuke Inoue:
Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs? RAID 2020: 93-106 - [c196]Nilo Redini, Aravind Machiry, Ruoyu Wang, Chad Spensky, Andrea Continella, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware. SP 2020: 1544-1561 - [c195]Aravind Machiry, Nilo Redini, Eric Camellini, Christopher Kruegel, Giovanni Vigna:
SPIDER: Enabling Fast Patch Propagation In Related Software Repositories. SP 2020: 1562-1579 - [c194]Abraham A. Clements, Eric Gustafson, Tobias Scharnowski, Paul Grosen, David Fritz, Christopher Kruegel, Giovanni Vigna, Saurabh Bagchi, Mathias Payer:
HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation. USENIX Security Symposium 2020: 1201-1218 - [c193]Iskander Sánchez-Rola, Davide Balzarotti, Christopher Kruegel, Giovanni Vigna, Igor Santos:
Dirty Clicks: A Study of the Usability and Security Implications of Click-related Behaviors on the Web. WWW 2020: 395-406 - [e4]Jay Ligatti, Xinming Ou, Jonathan Katz, Giovanni Vigna:
CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020. ACM 2020, ISBN 978-1-4503-7089-9 [contents] - [i9]Hojjat Aghakhani, Dongyu Meng, Yu-Xiang Wang, Christopher Kruegel, Giovanni Vigna:
Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability. CoRR abs/2005.00191 (2020) - [i8]Hojjat Aghakhani, Thorsten Eisenhofer, Lea Schönherr, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna:
VENOMAVE: Clean-Label Poisoning Against Speech Recognition. CoRR abs/2010.10682 (2020)
2010 – 2019
- 2019
- [c192]Christophe Hauser, Jayakrishna Menon, Yan Shoshitaishvili, Ruoyu Wang, Giovanni Vigna, Christopher Kruegel:
Sleak: automating address space layout derandomization. ACSAC 2019: 190-202 - [c191]Chani Jindal, Christopher Salls, Hojjat Aghakhani, Keith Long, Christopher Kruegel, Giovanni Vigna:
Neurlux: dynamic malware analysis without feature engineering. ACSAC 2019: 444-455 - [c190]Ronny Chevalier, Stefano Cristalli, Christophe Hauser, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, Danilo Bruschi, Andrea Lanzi:
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images. CODASPY 2019: 315-325 - [c189]Nilo Redini, Ruoyu Wang, Aravind Machiry, Yan Shoshitaishvili, Giovanni Vigna, Christopher Kruegel:
BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation. DIMVA 2019: 482-501 - [c188]Dokyung Song, Felicitas Hetzelt, Dipanjan Das, Chad Spensky, Yeoul Na, Stijn Volckaert, Giovanni Vigna, Christopher Kruegel, Jean-Pierre Seifert, Michael Franz:
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary. NDSS 2019 - [c187]Eric Gustafson, Marius Muench, Chad Spensky, Nilo Redini, Aravind Machiry, Yanick Fratantonio, Davide Balzarotti, Aurélien Francillon, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna:
Toward the Analysis of Embedded Firmware through Automated Re-hosting. RAID 2019: 135-150 - [c186]Shirin Nilizadeh, Hojjat Aghakhani, Eric Gustafson, Christopher Kruegel, Giovanni Vigna:
Lightning Talk - Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis. WWW (Companion Volume) 2019: 1288-1289 - [c185]Shirin Nilizadeh, Hojjat Aghakhani, Eric Gustafson, Christopher Kruegel, Giovanni Vigna:
Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis. WWW 2019: 3108-3115 - [i7]Ronny Chevalier, Stefano Cristalli, Christophe Hauser, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, Danilo Bruschi, Andrea Lanzi:
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images. CoRR abs/1903.12505 (2019) - [i6]Chani Jindal, Christopher Salls, Hojjat Aghakhani, Keith Long, Christopher Kruegel, Giovanni Vigna:
Neurlux: Dynamic Malware Analysis Without Feature Engineering. CoRR abs/1910.11376 (2019) - 2018
- [j23]Yan Shoshitaishvili, Antonio Bianchi, Kevin Borgolte, Amat Cama, Jacopo Corbetta, Francesco Disperati, Andrew Dutcher, John Grosen, Paul Grosen, Aravind Machiry, Christopher Salls, Nick Stephens, Ruoyu Wang, Giovanni Vigna:
Mechanical Phish: Resilient Autonomous Hacking. IEEE Secur. Priv. 16(2): 12-22 (2018) - [c184]Aravind Machiry, Nilo Redini, Eric Gustafson, Yanick Fratantonio, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna:
Using Loops For Malware Classification Resilient to Feature-unaware Perturbations. ACSAC 2018: 112-123 - [c183]Kevin Borgolte, Tobias Fiebig, Shuang Hao, Christopher Kruegel, Giovanni Vigna:
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates. ANRW 2018: 4 - [c182]Radhesh Krishnan Konoth, Emanuele Vineti, Veelasha Moonsamy, Martina Lindorfer, Christopher Kruegel, Herbert Bos, Giovanni Vigna:
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense. CCS 2018: 1714-1730 - [c181]Victor van der Veen, Martina Lindorfer, Yanick Fratantonio, Harikrishnan Padmanabha Pillai, Giovanni Vigna, Christopher Kruegel, Herbert Bos, Kaveh Razavi:
GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM. DIMVA 2018: 92-113 - [c180]Mai ElSherief, Shirin Nilizadeh, Dana Nguyen, Giovanni Vigna, Elizabeth M. Belding:
Peer to Peer Hate: Hate Speech Instigators and Their Targets. ICWSM 2018: 52-61 - [c179]Antonio Bianchi, Yanick Fratantonio, Aravind Machiry, Christopher Kruegel, Giovanni Vigna, Simon Pak Ho Chung, Wenke Lee:
Broken Fingers: On the Usage of the Fingerprint API in Android. NDSS 2018 - [c178]Kevin Borgolte, Tobias Fiebig, Shuang Hao, Christopher Kruegel, Giovanni Vigna:
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates. NDSS 2018 - [c177]Tobias Fiebig, Kevin Borgolte, Shuang Hao, Christopher Kruegel, Giovanni Vigna, Anja Feldmann:
In rDNS We Trust: Revisiting a Common Data-Source's Reliability. PAM 2018: 131-145 - [c176]Sai Prashanth Chandramouli, Pierre-Marie Bajan, Christopher Kruegel, Giovanni Vigna, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Measuring E-mail header injections on the world wide web. SAC 2018: 1647-1656 - [c175]Hojjat Aghakhani, Aravind Machiry, Shirin Nilizadeh, Christopher Kruegel, Giovanni Vigna:
Detecting Deceptive Reviews Using Generative Adversarial Networks. IEEE Symposium on Security and Privacy Workshops 2018: 89-95 - [c174]Kevin Borgolte, Shuang Hao, Tobias Fiebig, Giovanni Vigna:
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones. IEEE Symposium on Security and Privacy 2018: 770-784 - [c173]Moritz Eckert, Antonio Bianchi, Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security. USENIX Security Symposium 2018: 99-116 - [c172]Wei Meng, Chenxiong Qian, Shuang Hao, Kevin Borgolte, Giovanni Vigna, Christopher Kruegel, Wenke Lee:
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks. USENIX Security Symposium 2018: 393-410 - [i5]Mai ElSherief, Shirin Nilizadeh, Dana Nguyen, Giovanni Vigna, Elizabeth M. Belding:
Peer to Peer Hate: Hate Speech Instigators and Their Targets. CoRR abs/1804.04649 (2018) - [i4]Hojjat Aghakhani, Aravind Machiry, Shirin Nilizadeh, Christopher Kruegel, Giovanni Vigna:
Detecting Deceptive Reviews using Generative Adversarial Networks. CoRR abs/1805.10364 (2018) - 2017
- [j22]Ali Zand, Gaspar Modelo-Howard, Alok Tongaonkar, Sung-Ju Lee, Christopher Kruegel, Giovanni Vigna:
Demystifying DDoS as a Service. IEEE Commun. Mag. 55(7): 14-21 (2017) - [j21]Vasilios Mavroudis, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, Giovanni Vigna:
On the Privacy and Security of the Ultrasound Ecosystem. Proc. Priv. Enhancing Technol. 2017(2): 95-112 (2017) - [j20]Manuel Egele, Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna:
Towards Detecting Compromised Accounts on Social Networks. IEEE Trans. Dependable Secur. Comput. 14(4): 447-460 (2017) - [c171]Antonio Bianchi, Eric Gustafson, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:
Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information. ACSAC 2017: 16-27 - [c170]Christopher Salls, Yan Shoshitaishvili, Nick Stephens, Christopher Kruegel, Giovanni Vigna:
Piston: Uncooperative Remote Runtime Patching. ACSAC 2017: 141-153 - [c169]Yan Shoshitaishvili, Michael Weissbacher, Lukas Dresel, Christopher Salls, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna:
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance. CCS 2017: 347-362 - [c168]Cheng Huang, Shuang Hao, Luca Invernizzi, Jiayong Liu, Yong Fang, Christopher Kruegel, Giovanni Vigna:
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions. AsiaCCS 2017: 494-505 - [c167]Shirin Nilizadeh, Francois Labreche, Alireza Sedighian, Ali Zand, José M. Fernandez, Christopher Kruegel, Gianluca Stringhini, Giovanni Vigna:
POISED: Spotting Twitter Spam Off the Beaten Paths. CCS 2017: 1159-1174 - [c166]Jake Corina, Aravind Machiry, Christopher Salls, Yan Shoshitaishvili, Shuang Hao, Christopher Kruegel, Giovanni Vigna:
DIFUZE: Interface Aware Fuzzing for Kernel Drivers. CCS 2017: 2123-2138 - [c165]Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, David Brumley:
How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games. CSF 2017: 7-21 - [c164]Andrea Continella, Yanick Fratantonio, Martina Lindorfer, Alessandro Puccetti, Ali Zand, Christopher Kruegel, Giovanni Vigna:
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis. NDSS 2017 - [c163]Aravind Machiry, Eric Gustafson, Chad Spensky, Christopher Salls, Nick Stephens, Ruoyu Wang, Antonio Bianchi, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna:
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments. NDSS 2017 - [c162]Ruoyu Wang, Yan Shoshitaishvili, Antonio Bianchi, Aravind Machiry, John Grosen, Paul Grosen, Christopher Kruegel, Giovanni Vigna:
Ramblr: Making Reassembly Great Again. NDSS 2017 - [c161]Tobias Fiebig, Kevin Borgolte, Shuang Hao, Christopher Kruegel, Giovanni Vigna:
Something from Nothing (There): Collecting Global IPv6 Datasets from DNS. PAM 2017: 30-43 - [c160]Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
BootStomp: On the Security of Bootloaders in Mobile Devices. USENIX Security Symposium 2017: 781-798 - [c159]Aravind Machiry, Chad Spensky, Jake Corina, Nick Stephens, Christopher Kruegel, Giovanni Vigna:
DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers. USENIX Security Symposium 2017: 1007-1024 - [c158]Erik Trickel, Francesco Disperati, Eric Gustafson, Faezeh Kalantari, Mike Mabey, Naveen Tiwari, Yeganeh Safaei, Adam Doupé, Giovanni Vigna:
Shell We Play A Game? CTF-as-a-service for Security Education. ASE @ USENIX Security Symposium 2017 - [i3]Yan Shoshitaishvili, Michael Weissbacher, Lukas Dresel, Christopher Salls, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna:
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance. CoRR abs/1708.02749 (2017) - [i2]Shirin Nilizadeh, Francois Labreche, Alireza Sedighian, Ali Zand, José M. Fernandez, Christopher Kruegel, Gianluca Stringhini, Giovanni Vigna:
POISED: Spotting Twitter Spam Off the Beaten Paths. CoRR abs/1708.09058 (2017) - 2016
- [c157]Giovanni Vigna:
Binary Analysis for Autonomous Hacking: Invited Abstract. AsiaCCS 2016: 473 - [c156]Victor van der Veen, Yanick Fratantonio, Martina Lindorfer, Daniel Gruss, Clémentine Maurice, Giovanni Vigna, Herbert Bos, Kaveh Razavi, Cristiano Giuffrida:
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. CCS 2016: 1675-1689 - [c155]Vitor Monte Afonso, Paulo L. de Geus, Antonio Bianchi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna, Adam Doupé, Mario Polino:
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy. NDSS 2016 - [c154]Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
Driller: Augmenting Fuzzing Through Selective Symbolic Execution. NDSS 2016 - [c153]Marius Muench, Fabio Pagani, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna, Davide Balzarotti:
Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory. RAID 2016: 24-48 - [c152]Yan Shoshitaishvili, Ruoyu Wang, Christopher Salls, Nick Stephens, Mario Polino, Andrew Dutcher, John Grosen, Siji Feng, Christophe Hauser, Christopher Krügel, Giovanni Vigna:
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis. IEEE Symposium on Security and Privacy 2016: 138-157 - [c151]Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
TriggerScope: Towards Detecting Logic Bombs in Android Applications. IEEE Symposium on Security and Privacy 2016: 377-396 - 2015
- [j19]Jelena Mirkovic, Melissa Dark, Wenliang Du, Giovanni Vigna, Tamara Denning:
Evaluating Cybersecurity Education Interventions: Three Case Studies. IEEE Secur. Priv. 13(3): 63-69 (2015) - [j18]Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
Portrait of a Privacy Invasion. Proc. Priv. Enhancing Technol. 2015(1): 41-60 (2015) - [c150]Ali Zand, Amir Houmansadr, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel:
Know Your Achilles' Heel: Automatic Detection of Network Critical Services. ACSAC 2015: 41-50 - [c149]Simone Mutti, Yanick Fratantonio, Antonio Bianchi, Luca Invernizzi, Jacopo Corbetta, Dhilung Kirat, Christopher Kruegel, Giovanni Vigna:
BareDroid: Large-Scale Analysis of Android Apps on Real Devices. ACSAC 2015: 71-80 - [c148]Luca Falsina, Yanick Fratantonio, Stefano Zanero, Christopher Kruegel, Giovanni Vigna, Federico Maggi:
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications. ACSAC 2015: 201-210 - [c147]Antonio Bianchi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:
NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android. SPSM@CCS 2015: 27-38 - [c146]Dhilung Kirat, Giovanni Vigna:
MalGene: Automatic Extraction of Malware Analysis Evasion Signature. CCS 2015: 769-780 - [c145]Shuang Hao, Kevin Borgolte, Nick Nikiforakis, Gianluca Stringhini, Manuel Egele, Michael Eubanks, Brian Krebs, Giovanni Vigna:
Drops for Stuff: An Analysis of Reshipping Mule Scams. CCS 2015: 1081-1092 - [c144]Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna:
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users. DIMVA 2015: 282-303 - [c143]Benjamin Caillat, Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Prison: Tracking Process Interactions to Contain Malware. HPCC/CSS/ICESS 2015: 1282-1291 - [c142]Yinzhi Cao, Yanick Fratantonio, Antonio Bianchi, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Yan Chen:
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework. NDSS 2015 - [c141]Yan Shoshitaishvili, Ruoyu Wang, Christophe Hauser, Christopher Kruegel, Giovanni Vigna:
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. NDSS 2015 - [c140]Yanick Fratantonio, Aravind Machiry, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
CLAPP: characterizing loops in Android applications (invited talk). DeMobile@SIGSOFT FSE 2015: 33-34 - [c139]Yanick Fratantonio, Aravind Machiry, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
CLAPP: characterizing loops in Android applications. ESEC/SIGSOFT FSE 2015: 687-697 - [c138]Antonio Bianchi, Jacopo Corbetta, Luca Invernizzi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:
What the App is That? Deception and Countermeasures in the Android User Interface. IEEE Symposium on Security and Privacy 2015: 931-948 - [c137]Gianluca Stringhini, Pierre Mourlanne, Grégoire Jacob, Manuel Egele, Christopher Kruegel, Giovanni Vigna:
EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services. USENIX Security Symposium 2015: 563-578 - [c136]Kevin Borgolte, Christopher Kruegel, Giovanni Vigna:
Meerkat: Detecting Website Defacements through Image-based Object Recognition. USENIX Security Symposium 2015: 595-610 - [c135]Alessandro Di Federico, Amat Cama, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
How the ELF Ruined Christmas. USENIX Security Symposium 2015: 643-658 - [c134]Michael Weissbacher, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities. USENIX Security Symposium 2015: 737-752 - [c133]Kurt Thomas, Danny Yuxing Huang, David Y. Wang, Elie Bursztein, Chris Grier, Tom Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, Giovanni Vigna:
Framing Dependencies Introduced by Underground Commoditization. WEIS 2015 - [i1]Manuel Egele, Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna:
Towards Detecting Compromised Accounts on Social Networks. CoRR abs/1509.03531 (2015) - 2014
- [j17]Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
On the Workings and Current Practices of Web-Based Device Fingerprinting. IEEE Secur. Priv. 12(3): 28-36 (2014) - [c132]Gianluca Stringhini, Oliver Hohlfeld, Christopher Kruegel, Giovanni Vigna:
The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape. AsiaCCS 2014: 353-364 - [c131]Giancarlo De Maio, Alexandros Kapravelos, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
PExy: The Other Side of Exploit Kits. DIMVA 2014: 132-151 - [c130]Apostolis Zarras, Alexandros Kapravelos, Gianluca Stringhini, Thorsten Holz, Christopher Kruegel, Giovanni Vigna:
The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements. Internet Measurement Conference 2014: 373-380 - [c129]Ali Zand, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel:
Rippler: Delay injection for service dependency detection. INFOCOM 2014: 2157-2165 - [c128]Luca Invernizzi, Stanislav Miskovic, Ruben Torres, Christopher Kruegel, Sabyasachi Saha, Giovanni Vigna, Sung-Ju Lee, Marco Mellia:
Nazca: Detecting Malware Distribution in Large-Scale Networks. NDSS 2014 - [c127]Sebastian Poeplau, Yanick Fratantonio, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications. NDSS 2014 - [c126]Jacopo Corbetta, Luca Invernizzi, Christopher Krügel, Giovanni Vigna:
Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection. RAID 2014: 130-149 - [c125]Yinzhi Cao, Yan Shoshitaishvili, Kevin Borgolte, Christopher Krügel, Giovanni Vigna, Yan Chen:
Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel. RAID 2014: 276-298 - [c124]Yan Shoshitaishvili, Luca Invernizzi, Adam Doupé, Giovanni Vigna:
Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security. SAC 2014: 1649-1656 - [c123]Ali Zand, Giovanni Vigna, Xifeng Yan, Christopher Kruegel:
Extracting probable command and control signatures for detecting botnets. SAC 2014: 1657-1662 - [c122]Jane Iedemska, Gianluca Stringhini, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
The Tricks of the Trade: What Makes Spam Campaigns Successful? IEEE Symposium on Security and Privacy Workshops 2014: 77-83 - [c121]Dhilung Kirat, Giovanni Vigna, Christopher Kruegel:
BareCloud: Bare-metal Analysis-based Evasive Malware Detection. USENIX Security Symposium 2014: 287-301 - [c120]Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson:
Hulk: Eliciting Malicious Behavior in Browser Extensions. USENIX Security Symposium 2014: 641-654 - [c119]Giovanni Vigna, Kevin Borgolte, Jacopo Corbetta, Adam Doupé, Yanick Fratantonio, Luca Invernizzi, Dhilung Kirat, Yan Shoshitaishvili:
Ten Years of iCTF: The Good, The Bad, and The Ugly. 3GSE 2014 - [c118]Nick Nikiforakis, Federico Maggi, Gianluca Stringhini, M. Zubair Rafique, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna, Stefano Zanero:
Stranger danger: exploring the ecosystem of ad-based URL shortening services. WWW 2014: 51-62 - [c117]Kevin Borgolte, Christopher Kruegel, Giovanni Vigna:
Relevant change detection: a framework for the precise extraction of modified and novel web-based content as a filtering technique for analysis engines. WWW (Companion Volume) 2014: 595-598 - 2013
- [c116]Luca Invernizzi, Christopher Kruegel, Giovanni Vigna:
Message in a bottle: sailing past censorship. ACSAC 2013: 39-48 - [c115]Dhilung Kirat, Lakshmanan Nataraj, Giovanni Vigna, B. S. Manjunath:
SigMal: a static signal processing based malware triage. ACSAC 2013: 89-98 - [c114]Kevin Borgolte, Christopher Kruegel, Giovanni Vigna:
Delta: automatic identification of unknown web-based infection campaigns. CCS 2013: 109-120 - [c113]Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna:
Shady paths: leveraging surfing crowds to detect malicious web pages. CCS 2013: 133-144 - [c112]Adam Doupé, Weidong Cui, Mariusz H. Jakubowski, Marcus Peinado, Christopher Kruegel, Giovanni Vigna:
deDacota: toward preventing server-side XSS via automatic code and data separation. CCS 2013: 1205-1216 - [c111]Kyriakos G. Vamvoudakis, João P. Hespanha, Richard A. Kemmerer, Giovanni Vigna:
Formulating Cyber-Security as Convex Optimization Problems. CPSW@CISS 2013: 85-100 - [c110]Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, Ben Y. Zhao:
Follow the green: growth and dynamics in twitter follower markets. Internet Measurement Conference 2013: 163-176 - [c109]Manuel Egele, Gianluca Stringhini, Christopher Krügel, Giovanni Vigna:
COMPA: Detecting Compromised Accounts on Social Networks. NDSS 2013 - [c108]Christoph Egger, Johannes Schlumberger, Christopher Kruegel, Giovanni Vigna:
Practical Attacks against the I2P Network. RAID 2013: 432-451 - [c107]Pierre Payet, Adam Doupé, Christopher Kruegel, Giovanni Vigna:
EARs in the wild: large-scale analysis of execution after redirect vulnerabilities. SAC 2013: 1792-1799 - [c106]Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting. IEEE Symposium on Security and Privacy 2013: 541-555 - [c105]Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna:
Revolver: An Automated Approach to the Detection of Evasive Web-based Malware. USENIX Security Symposium 2013: 637-652 - [c104]Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services. USENIX Security Symposium 2013: 687-702 - [c103]Federico Maggi, Alessandro Frossi, Stefano Zanero, Gianluca Stringhini, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna:
Two years of short URLs internet measurement: security threats and countermeasures. WWW 2013: 861-872 - 2012
- [j16]Gianluca Stringhini, Manuel Egele, Christopher Kruegel, Giovanni Vigna:
Poultry markets: on the underground economy of twitter followers. Comput. Commun. Rev. 42(4): 527-532 (2012) - [c102]Johannes Schlumberger, Christopher Kruegel, Giovanni Vigna:
Jarhead analysis and detection of malicious Java applets. ACSAC 2012: 249-257 - [c101]Antonio Bianchi, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
Blacksheep: detecting compromised hosts in homogeneous crowds. CCS 2012: 341-352 - [c100]Nick Nikiforakis, Luca Invernizzi, Alexandros Kapravelos, Steven Van Acker, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
You are what you include: large-scale evaluation of remote javascript inclusions. CCS 2012: 736-747 - [c99]Florian Tegeler, Xiaoming Fu, Giovanni Vigna, Christopher Kruegel:
BotFinder: finding bots in network traffic without deep packet inspection. CoNEXT 2012: 349-360 - [c98]Grégoire Jacob, Paolo Milani Comparetti, Matthias Neugschwandtner, Christopher Kruegel, Giovanni Vigna:
A Static, Packer-Agnostic Filter to Detect Similar Malware Samples. DIMVA 2012: 102-122 - [c97]André Ricardo Abed Grégio, Paulo Lício de Geus, Christopher Kruegel, Giovanni Vigna:
Tracking Memory Writes for Malware Classification and Code Reuse Identification. DIMVA 2012: 134-143 - [c96]Timon Van Overveldt, Christopher Kruegel, Giovanni Vigna:
FlashDetect: ActionScript 3 Malware Detection. RAID 2012: 274-293 - [c95]Giovanni Vigna:
Malware Riding Badware: Challenges in Analyzing (Malicious/Benign) Web Applications. RV 2012: 183 - [c94]Luca Invernizzi, Paolo Milani Comparetti, Stefano Benvenuti, Christopher Kruegel, Marco Cova, Giovanni Vigna:
EvilSeed: A Guided Approach to Finding Malicious Web Pages. IEEE Symposium on Security and Privacy 2012: 428-442 - [c93]Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna:
B@bel: Leveraging Email Delivery for Spam Mitigation. USENIX Security Symposium 2012: 16-32 - [c92]Grégoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
PUBCRAWL: Protecting Users and Businesses from CRAWLers. USENIX Security Symposium 2012: 507-522 - [c91]Adam Doupé, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna:
Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner. USENIX Security Symposium 2012: 523-538 - [c90]Gianluca Stringhini, Manuel Egele, Christopher Kruegel, Giovanni Vigna:
Poultry markets: on the underground economy of twitter followers. WOSN 2012: 1-6 - 2011
- [j15]Giovanni Vigna:
The 2010 International Capture the Flag Competition. IEEE Secur. Priv. 9(1): 12-14 (2011) - [j14]Brett Stone-Gross, Marco Cova, Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Analysis of a Botnet Takeover. IEEE Secur. Priv. 9(1): 64-72 (2011) - [c89]Adam Doupé, Manuel Egele, Benjamin Caillat, Gianluca Stringhini, Gorkem Yakin, Ali Zand, Ludovico Cavedon, Giovanni Vigna:
Hit 'em where it hurts: a live security exercise on cyber situational awareness. ACSAC 2011: 51-61 - [c88]Casey Cipriano, Ali Zand, Amir Houmansadr, Christopher Kruegel, Giovanni Vigna:
Nexat: a history-based approach to predict attacker actions. ACSAC 2011: 383-392 - [c87]Dhilung Kirat, Giovanni Vigna, Christopher Kruegel:
BareBox: efficient malware analysis on bare-metal. ACSAC 2011: 403-412 - [c86]Adam Doupé, Bryce Boe, Christopher Kruegel, Giovanni Vigna:
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities. CCS 2011: 251-262 - [c85]Alexandros Kapravelos, Marco Cova, Christopher Kruegel, Giovanni Vigna:
Escape from Monkey Island: Evading High-Interaction Honeyclients. DIMVA 2011: 124-143 - [c84]Greg Banks, Aristide Fattori, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper). DIMVA 2011: 184-193 - [c83]Martin Szydlowski, Manuel Egele, Christopher Kruegel, Giovanni Vigna:
Challenges for Dynamic Analysis of iOS Applications. iNetSeC 2011: 65-77 - [c82]Brett Stone-Gross, Ryan Stevens, Apostolis Zarras, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Understanding fraudulent activities in online ad exchanges. Internet Measurement Conference 2011: 279-294 - [c81]Brett Stone-Gross, Marco Cova, Christopher Kruegel, Giovanni Vigna:
Peering through the iframe. INFOCOM 2011: 411-415 - [c80]Brett Stone-Gross, Thorsten Holz, Gianluca Stringhini, Giovanni Vigna:
The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns. LEET 2011 - [c79]Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna:
PiOS: Detecting Privacy Leaks in iOS Applications. NDSS 2011 - [c78]Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Dymo: Tracking Dynamic Code Identity. RAID 2011: 21-40 - [c77]Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:
Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode. RAID 2011: 61-80 - [c76]Ludovico Cavedon, Luca Foschini, Giovanni Vigna:
Getting the Face Behind the Squares: Reconstructing Pixelized Video Streams. WOOT 2011: 37-45 - [c75]Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna:
BOTMAGNIFIER: Locating Spambots on the Internet. USENIX Security Symposium 2011 - [c74]Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald, Giovanni Vigna:
The Underground Economy of Fake Antivirus Software. WEIS (Springer Volume) 2011: 55-78 - [c73]Davide Canali, Marco Cova, Giovanni Vigna, Christopher Kruegel:
Prophiler: a fast filter for the large-scale detection of malicious web pages. WWW 2011: 197-206 - 2010
- [j13]Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna:
An Experience in Testing the Security of Real-World Electronic Voting Systems. IEEE Trans. Software Eng. 36(4): 453-473 (2010) - [c72]Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna:
Detecting spammers on social networks. ACSAC 2010: 1-9 - [c71]Giovanni Vigna:
Network intrusion detection: dead or alive? ACSAC 2010: 117-126 - [c70]Adam Doupé, Marco Cova, Giovanni Vigna:
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners. DIMVA 2010: 111-131 - [c69]Nicholas Childers, Bryce Boe, Lorenzo Cavallaro, Ludovico Cavedon, Marco Cova, Manuel Egele, Giovanni Vigna:
Organizing Large Scale Hacking Competitions. DIMVA 2010: 132-152 - [c68]Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna:
Are BGP Routers Open to Attack? An Experiment. iNetSec 2010: 88-103 - [c67]Davide Balzarotti, Marco Cova, Christoph Karlberger, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
Efficient Detection of Split Personalities in Malware. NDSS 2010 - [c66]William K. Robertson, Federico Maggi, Christopher Kruegel, Giovanni Vigna:
Effective Anomaly Detection with Scarce Training Data. NDSS 2010 - [c65]Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna:
Toward Automated Detection of Logic Vulnerabilities in Web Applications. USENIX Security Symposium 2010: 143-160 - [c64]Marco Cova, Christopher Krügel, Giovanni Vigna:
Detection and analysis of drive-by-download attacks and malicious JavaScript code. WWW 2010: 281-290
2000 – 2009
- 2009
- [j12]Engin Kirda, Nenad Jovanovic, Christopher Kruegel, Giovanni Vigna:
Client-side cross-site scripting protection. Comput. Secur. 28(7): 592-604 (2009) - [j11]Giovanni Vigna, Fredrik Valeur, Davide Balzarotti, William K. Robertson, Christopher Kruegel, Engin Kirda:
Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries. J. Comput. Secur. 17(3): 305-329 (2009) - [c63]Sean Ford, Marco Cova, Christopher Kruegel, Giovanni Vigna:
Analyzing and Detecting Malicious Flash Advertisements. ACSAC 2009: 363-372 - [c62]Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Your botnet is my botnet: analysis of a botnet takeover. CCS 2009: 635-647 - [c61]Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda:
Automated Spyware Collection and Analysis. ISC 2009: 202-217 - [c60]Federico Maggi, William K. Robertson, Christopher Krügel, Giovanni Vigna:
Protecting a Moving Target: Addressing Web Application Concept Drift. RAID 2009: 21-40 - [c59]William K. Robertson, Giovanni Vigna:
Static Enforcement of Web Application Integrity Through Strong Typing. USENIX Security Symposium 2009: 283-298 - 2008
- [c58]Luca Foschini, Ashish V. Thapliyal, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna:
A Parallel Architecture for Stateful, High-Speed Intrusion Detection. ICISS 2008: 203-220 - [c57]Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna:
Are your votes really counted?: testing the security of real-world electronic voting systems. ISSTA 2008: 237-248 - [c56]Davide Balzarotti, Marco Cova, Giovanni Vigna:
ClearShot: Eavesdropping on Keyboard Input from Video. SP 2008: 170-183 - [c55]Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. SP 2008: 387-401 - [c54]Marco Cova, Christopher Kruegel, Giovanni Vigna:
There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. WOOT 2008 - 2007
- [j10]Patrick Klinkoff, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
Extending .NET security to unmanaged code. Int. J. Inf. Sec. 6(6): 417-428 (2007) - [j9]André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer:
Using a virtual security testbed for digital forensic reconstruction. J. Comput. Virol. 2(4): 275-289 (2007) - [c53]Christopher Kruegel, Davide Balzarotti, William K. Robertson, Giovanni Vigna:
Improving Signature Testing through Dynamic Data Flow Analysis. ACSAC 2007: 53-63 - [c52]Matthew Van Gundy, Hao Chen, Zhendong Su, Giovanni Vigna:
Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms. ACSAC 2007: 74-85 - [c51]Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Giovanni Vigna:
Multi-module vulnerability analysis of web-based applications. CCS 2007: 25-35 - [c50]Antonio Carzaniga, Gian Pietro Picco, Giovanni Vigna:
Is Code Still Moving Around? Looking Back at a Decade of Code Mobility. ICSE Companion 2007: 9-20 - [c49]Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Krügel, Giovanni Vigna:
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. NDSS 2007 - [c48]Darren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer:
Exploiting Execution Context for the Detection of Anomalous System Calls. RAID 2007: 1-20 - [c47]Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna:
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications. RAID 2007: 63-86 - [c46]Matthew Van Gundy, Davide Balzarotti, Giovanni Vigna:
Catch Me, If You Can: Evading Network Signatures with Web-based Polymorphic Worms. WOOT 2007 - [p3]Marco Cova, Viktoria Felmetsger, Giovanni Vigna:
Vulnerability Analysis of Web-based Applications. Test and Analysis of Web Services 2007: 363-394 - [p2]Giovanni Vigna:
Static Disassembly and Code Analysis. Malware Detection 2007: 19-41 - 2006
- [j8]Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel:
Anomalous system call detection. ACM Trans. Inf. Syst. Secur. 9(1): 61-93 (2006) - [c45]Collin Mulliner, Giovanni Vigna:
Vulnerability Analysis of MMS User Agents. ACSAC 2006: 77-88 - [c44]Marco Cova, Viktoria Felmetsger, Greg Banks, Giovanni Vigna:
Static Detection of Vulnerabilities in x86 Executables. ACSAC 2006: 269-278 - [c43]Collin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee:
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. DIMVA 2006: 91-108 - [c42]André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer:
Digital Forensic Reconstruction and the Virtual Security Testbed ViSe. DIMVA 2006: 144-163 - [c41]Patrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna:
Extending .NET Security to Unmanaged Code. ISC 2006: 1-16 - [c40]Greg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna:
SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. ISC 2006: 343-358 - [c39]William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer:
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. NDSS 2006 - [c38]André Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer:
Using Hidden Markov Models to Evaluate the Risks of Intrusions. RAID 2006: 145-164 - [c37]Engin Kirda, Christopher Krügel, Giovanni Vigna, Nenad Jovanovic:
Noxes: a client-side solution for mitigating cross-site scripting attacks. SAC 2006: 330-337 - [c36]Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Engin Kirda:
An anomaly-driven reverse proxy for web applications. SAC 2006: 361-368 - 2005
- [b1]Christopher Kruegel, Fredrik Valeur, Giovanni Vigna:
Intrusion Detection and Correlation - Challenges and Solutions. Advances in Information Security 14, Springer 2005, ISBN 978-0-387-23398-7, pp. 1-118 - [j7]Christopher Krügel, Giovanni Vigna, William K. Robertson:
A multi-model approach to the detection of web-based attacks. Comput. Networks 48(5): 717-738 (2005) - [j6]Richard A. Kemmerer, Giovanni Vigna:
Hi-DRA: Intrusion Detection for Internet Security. Proc. IEEE 93(10): 1848-1857 (2005) - [c35]Fredrik Valeur, Darren Mutz, Giovanni Vigna:
A Learning-Based Approach to the Detection of SQL Attacks. DIMVA 2005: 123-140 - [c34]Oystein Hallaraker, Giovanni Vigna:
Detecting Malicious JavaScript Code in Mozilla. ICECCS 2005: 85-94 - [c33]Viktoria Felmetsger, Giovanni Vigna:
Exploiting OS-Level Mechanisms to Implement Mobile Code Security. ICECCS 2005: 234-243 - [c32]Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna:
Polymorphic Worm Detection Using Structural Information of Executables. RAID 2005: 207-226 - [c31]Christopher Kruegel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna:
Automating Mimicry Attacks Using Static Binary Analysis. USENIX Security Symposium 2005 - 2004
- [j5]Christopher Kruegel, William K. Robertson, Giovanni Vigna:
Using Alert Verification to Identify Successful Intrusion Attempts. Prax. Inf.verarb. Kommun. 27(4): 219-227 (2004) - [j4]Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer:
A Comprehensive Approach to Intrusion Detection Alert Correlation. IEEE Trans. Dependable Secur. Comput. 1(3): 146-169 (2004) - [c30]Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, Elizabeth M. Belding-Royer, Richard A. Kemmerer:
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks. ACSAC 2004: 16-27 - [c29]Christopher Krügel, William K. Robertson, Giovanni Vigna:
Detecting Kernel-Level Rootkits Through Binary Analysis. ACSAC 2004: 91-100 - [c28]Jingyu Zhou, Giovanni Vigna:
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing. ACSAC 2004: 168-178 - [c27]Giovanni Vigna, William K. Robertson, Davide Balzarotti:
Testing network-based intrusion detection signatures using mutant exploits. CCS 2004: 21-30 - [c26]Giovanni Vigna:
Mobile Agents: Ten Reasons For Failure. Mobile Data Management 2004: 298-299 - [c25]Christopher Krügel, William K. Robertson, Fredrik Valeur, Giovanni Vigna:
Static Disassembly of Obfuscated Binaries. USENIX Security Symposium 2004: 255-270 - 2003
- [c24]Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer:
A Stateful Intrusion Detection System for World-Wide Web Servers. ACSAC 2003: 34-43 - [c23]Darren Mutz, Giovanni Vigna, Richard A. Kemmerer:
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. ACSAC 2003: 374-383 - [c22]Christopher Krügel, Giovanni Vigna:
Anomaly detection of web-based attacks. CCS 2003: 251-261 - [c21]Christopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna:
On the Detection of Anomalous System Call Arguments. ESORICS 2003: 326-343 - [c20]Giovanni Vigna:
A Topological Characterization of TCP/IP Security. FME 2003: 914-939 - [c19]Richard A. Kemmerer, Giovanni Vigna:
Internet Security and Intrusion Detection. ICSE 2003: 748-749 - [c18]Giovanni Vigna:
Teaching Network Security Through Live Exercises. World Conference on Information Security Education 2003: 3-18 - [c17]Giovanni Vigna, Fredrik Valeur, Richard A. Kemmerer:
Designing and implementing a family of intrusion detection systems. ESEC / SIGSOFT FSE 2003: 88-97 - [c16]Sunil Soman, Chandra Krintz, Giovanni Vigna:
Detecting Malicious Java Code Using Virtual Machine Auditing. USENIX Security Symposium 2003 - [e3]Giovanni Vigna, Erland Jonsson, Christopher Krügel:
Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings. Lecture Notes in Computer Science 2820, Springer 2003, ISBN 3-540-40878-9 [contents] - 2002
- [j3]Steven T. Eckmann, Giovanni Vigna, Richard A. Kemmerer:
STATL: An Attack Language for State-Based Intrusion Detection. J. Comput. Secur. 10(1/2): 71-104 (2002) - [c15]Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richard A. Kemmerer:
Composable Tools For Network Discovery and Security Analysis. ACSAC 2002: 14-24 - [c14]Vishal Mittal, Giovanni Vigna:
Sensor-based intrusion detection for intra-domain distance-vector routing. CCS 2002: 127-137 - [c13]Giovanni Vigna, Andrew Mitchel:
Mnemosyne: Designing and Implementing Network Short-Term Memory. ICECCS 2002: 91-100 - [c12]Giovanni Vigna, Bryan Cassell, Dave Fayram:
An Intrusion Detection System for Aglets. Mobile Agents 2002: 64-77 - [c11]Christopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer:
Stateful Intrusion Detection for High-Speed Networks. S&P 2002: 285-293 - [e2]Andreas Wespi, Giovanni Vigna, Luca Deri:
Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings. Lecture Notes in Computer Science 2516, Springer 2002, ISBN 3-540-00020-8 [contents] - 2001
- [c10]Sebastian Fischmeister, Giovanni Vigna, Richard A. Kemmerer:
Evaluating the Security of Three Java-Based Mobile Agent Systems. Mobile Agents 2001: 31-41 - [c9]Giovanni Vigna, Richard A. Kemmerer, Per Blix:
Designing a Web of Highly-Configurable Intrusion Detection Sensors. Recent Advances in Intrusion Detection 2001: 69-84 - [p1]André L. M. dos Santos, Giovanni Vigna, Richard A. Kemmerer:
Security Testing of an Online Banking Service. E-Commerce Security and Privacy 2001: 3-15
1990 – 1999
- 1999
- [j2]Giovanni Vigna, Richard A. Kemmerer:
NetSTAT: A Network-based Intrusion Detection System. J. Comput. Secur. 7(1): 37-71 (1999) - 1998
- [j1]Alfonso Fuggetta, Gian Pietro Picco, Giovanni Vigna:
Understanding Code Mobility. IEEE Trans. Software Eng. 24(5): 342-361 (1998) - [c8]Giovanni Vigna, Richard A. Kemmerer:
NetSTAT: A Network-Based Intrusion Detection Approach. ACSAC 1998: 25-34 - [c7]Francesco Coda, Carlo Ghezzi, Giovanni Vigna, Franca Garzotto:
Towards a Software Engineering Approach to Web Site Development. IWSSD 1998: 8-17 - [c6]Giovanni Vigna:
Cryptographic Traces for Mobile Agents. Mobile Agents and Security 1998: 137-153 - [e1]Giovanni Vigna:
Mobile Agents and Security. Lecture Notes in Computer Science 1419, Springer 1998, ISBN 3-540-64792-9 [contents] - 1997
- [c5]Antonio Carzaniga, Gian Pietro Picco, Giovanni Vigna:
Designing Distributed Applications with Mobile Code Paradigms. ICSE 1997: 22-32 - [c4]Carlo Ghezzi, Giovanni Vigna:
Mobile Code Paradigms and Technologies: A Case Study. Mobile Agents 1997: 39-49 - [c3]Carlo Ghezzi, Giovanni Vigna:
Software Engineering Issues for Network Computing. Requirements Targeting Software and Systems Engineering 1997: 155-177 - 1996
- [c2]Gianpaolo Cugola, Carlo Ghezzi, Gian Pietro Picco, Giovanni Vigna:
Analyzing Mobile Code Languages. Mobile Object Systems 1996: 93-110 - 1994
- [c1]Antonio Carzaniga, Gian Pietro Picco, Giovanni Vigna:
Designing and Implementing Inter-Client Communication in the O2 Object-Oriented Database Management System. ISOOMS 1994: 53-64
Coauthor Index
aka: Christopher Kruegel
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint