What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Giovanni Vigna
Google Scholar
151
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
A Large-Scale Measurement Study of the PROXY Protocol and its Security Implications.
Stijn Pletinckx
Christopher Kruegel
Giovanni Vigna
2025
conf/ndss
MALintent: Coverage Guided Intent Fuzzing Framework for Android.
Ammar Askar
Fabian Fleischer
Christopher Kruegel
Giovanni Vigna
Taesoo Kim
2025
conf/eurosp
Beneath the Surface: An Analysis of OEM Customizations on the Android TLS Protocol Stack.
Vinuri Bandara
Stijn Pletinckx
Ilya Grishchenko
Christopher Kruegel
Giovanni Vigna
Juan Tapiador
Narseo Vallina-Rodriguez
2025
conf/uss
Approve Once, Regret Forever: On the Exploitation of Ethereum's Approve-TransferFrom Ecosystem.
Nicola Ruaro
Fabio Gritti
Dongyu Meng
Robert McLaughlin
Ilya Grishchenko
Christopher Kruegel
Giovanni Vigna
2024
conf/uss
GuideEnricher: Protecting the Anonymity of Ethereum Mixing Service Users with Deep Reinforcement Learning.
Ravindu De Silva
Wenbo Guo
Nicola Ruaro
Ilya Grishchenko
Christopher Kruegel
Giovanni Vigna
2024
conf/uss
Remote Keylogging Attacks in Multi-user VR Applications.
Zihao Su
Kunlin Cai
Reuben Beeler
Lukas Dresel
Allan Garcia
Ilya Grishchenko
Yuan Tian
Christopher Kruegel
Giovanni Vigna
2024
conf/uss
Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services.
Wil Gibbs
Arvind S. Raj
Jayakrishna Menon Vadayath
Hui Jun Tay
Justin Miller
Akshay Ajayan
Zion Leonahenahe Basque
Audrey Dutcher
Fangzhou Dong
Xavier J. Maso
Giovanni Vigna
Christopher Kruegel
Adam Doupé
Yan Shoshitaishvili
Ruoyu Wang
2024
conf/uss
ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning.
Giulio De Pasquale
Ilya Grishchenko
Riccardo Iesari
Gabriel Pizarro
Lorenzo Cavallaro
Christopher Kruegel
Giovanni Vigna
2024
conf/fc
The Power of Default: Measuring the Effect of Slippage Tolerance in Decentralized Exchanges.
Nir Chemaya
Dingyue Liu
Robert McLaughlin
Nicola Ruaro
Christopher Kruegel
Giovanni Vigna
2024
conf/sp
TrojanPuzzle: Covertly Poisoning Code-Suggestion Models.
Hojjat Aghakhani
Wei Dai
Andre Manoel
Xavier Fernandes
Anant Kharkar
Christopher Kruegel
Giovanni Vigna
David Evans
Ben Zorn
Robert Sim
2024
conf/ndss
Not your Type! Detecting Storage Collision Vulnerabilities in Ethereum Smart Contracts.
Nicola Ruaro
Fabio Gritti
Robert McLaughlin
Ilya Grishchenko
Christopher Kruegel
Giovanni Vigna
2024
conf/acsac
DEEPCAPA: Identifying Malicious Capabilities in Windows Malware.
Saastha Vasan
Hojjat Aghakhani
Stefano Ortolani
Roman Vasilenko
Ilya Grishchenko
Christopher Kruegel
Giovanni Vigna
2023
conf/uss
Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart Contracts.
Fabio Gritti
Nicola Ruaro
Robert McLaughlin
Priyanka Bose
Dipanjan Das
Ilya Grishchenko
Christopher Kruegel
Giovanni Vigna
2023
conf/uss
A Large Scale Study of the Ethereum Arbitrage Ecosystem.
Robert McLaughlin
Christopher Kruegel
Giovanni Vigna
2023
conf/uss
ACTOR: Action-Guided Kernel Fuzzing.
Marius Fleischer
Dipanjan Das
Priyanka Bose
Weiheng Bai
Kangjie Lu
Mathias Payer
Christopher Kruegel
Giovanni Vigna
2023
conf/sp
Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities.
Erik Trickel
Fabio Pagani
Chang Zhu
Lukas Dresel
Giovanni Vigna
Christopher Kruegel
Ruoyu Wang
Tiffany Bao
Yan Shoshitaishvili
Adam Doupé
2023
conf/sp
TEEzz: Fuzzing Trusted Applications on COTS Android Devices.
Marcel Busch
Aravind Machiry
Chad Spensky
Giovanni Vigna
Christopher Kruegel
Mathias Payer
2023
conf/eurosp
Certifiably Vulnerable: Using Certificate Transparency Logs for Target Reconnaissance.
Stijn Pletinckx
Thanh-Dat Nguyen
Tobias Fiebig
Christopher Kruegel
Giovanni Vigna
2022
conf/ccs
Understanding Security Issues in the NFT Ecosystem.
Dipanjan Das
Priyanka Bose
Nicola Ruaro
Christopher Kruegel
Giovanni Vigna
2022
conf/uss
Regulator: Dynamic Analysis to Detect ReDoS.
Robert McLaughlin
Fabio Pagani
Noah Spahn
Christopher Kruegel
Giovanni Vigna
2022
conf/uss
Decomperson: How Humans Decompile and What We Can Learn From It.
Kevin Burk
Fabio Pagani
Christopher Kruegel
Giovanni Vigna
2022
conf/uss
Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing.
Tobias Scharnowski
Nils Bars
Moritz Schloegel
Eric Gustafson
Marius Muench
Giovanni Vigna
Christopher Kruegel
Thorsten Holz
Ali Abbasi
2022
conf/sp
HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images.
Fabio Gritti
Fabio Pagani
Ilya Grishchenko
Lukas Dresel
Nilo Redini
Christopher Kruegel
Giovanni Vigna
2022
conf/sp
DEEPCASE: Semi-Supervised Contextual Analysis of Security Events.
Thijs van Ede
Hojjat Aghakhani
Noah Spahn
Riccardo Bortolameotti
Marco Cova
Andrea Continella
Maarten van Steen
Andreas Peter
Christopher Kruegel
Giovanni Vigna
2022
conf/sp
SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds.
Priyanka Bose
Dipanjan Das
Yanju Chen
Yu Feng
Christopher Kruegel
Giovanni Vigna
2022
conf/sp
SYMBEXCEL: Automated Analysis and Understanding of Malicious Excel 4.0 Macros.
Nicola Ruaro
Fabio Pagani
Stefano Ortolani
Christopher Kruegel
Giovanni Vigna
2022
conf/acsac
POPKORN: Popping Windows Kernel Drivers At Scale.
Rajat Gupta
Lukas Patrick Dresel
Noah Spahn
Giovanni Vigna
Christopher Kruegel
Taesoo Kim
2021
conf/ccs
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone.
Davide Quarta
Michele Ianni
Aravind Machiry
Yanick Fratantonio
Eric Gustafson
Davide Balzarotti
Martina Lindorfer
Giovanni Vigna
Christopher Kruegel
2021
conf/uss
Token-Level Fuzzing.
Christopher Salls
Chani Jindal
Jake Corina
Christopher Kruegel
Giovanni Vigna
2021
conf/sp
Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices.
Nilo Redini
Andrea Continella
Dipanjan Das
Giulio De Pasquale
Noah Spahn
Aravind Machiry
Antonio Bianchi
Christopher Kruegel
Giovanni Vigna
2021
conf/eurosp
Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability.
Hojjat Aghakhani
Dongyu Meng
Yu-Xiang Wang
Christopher Kruegel
Giovanni Vigna
2021
conf/asiaccs
Conware: Automated Modeling of Hardware Peripherals.
Chad Spensky
Aravind Machiry
Nilo Redini
Colin Unger
Graham Foster
Evan Blasband
Hamed Okhravi
Christopher Kruegel
Giovanni Vigna
2021
conf/asiaccs
Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms.
Dongyu Meng
Michele Guerriero
Aravind Machiry
Hojjat Aghakhani
Priyanka Bose
Andrea Continella
Christopher Kruegel
Giovanni Vigna
2021
conf/dsn
Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses.
Chad Spensky
Aravind Machiry
Nathan Burow
Hamed Okhravi
Rick Housley
Zhongshu Gu
Hani Jamjoom
Christopher Kruegel
Giovanni Vigna
2021
conf/wisec
Toward a secure crowdsourced location tracking system.
Chinmay Garg
Aravind Machiry
Andrea Continella
Christopher Kruegel
Giovanni Vigna
2020
conf/uss
HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation.
Abraham A. Clements
Eric Gustafson
Tobias Scharnowski
Paul Grosen
David Fritz
Christopher Kruegel
Giovanni Vigna
Saurabh Bagchi
Mathias Payer
2020
conf/sp
SPIDER: Enabling Fast Patch Propagation In Related Software Repositories.
Aravind Machiry
Nilo Redini
Eric Camellini
Christopher Kruegel
Giovanni Vigna
2020
conf/sp
Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware.
Nilo Redini
Aravind Machiry
Ruoyu Wang
Chad Spensky
Andrea Continella
Yan Shoshitaishvili
Christopher Kruegel
Giovanni Vigna
2020
conf/cns
TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems.
Chad Spensky
Aravind Machiry
Marcel Busch
Kevin Leach
Rick Housley
Christopher Kruegel
Giovanni Vigna
2020
conf/cns
SYMBION: Interleaving Symbolic with Concrete Execution.
Fabio Gritti
Lorenzo Fontana
Eric Gustafson
Fabio Pagani
Andrea Continella
Christopher Kruegel
Giovanni Vigna
2020
conf/cns
Exploring Abstraction Functions in Fuzzing.
Christopher Salls
Aravind Machiry
Adam Doupé
Yan Shoshitaishvili
Christopher Kruegel
Giovanni Vigna
2020
conf/ndss
When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features.
Hojjat Aghakhani
Fabio Gritti
Francesco Mecca
Martina Lindorfer
Stefano Ortolani
Davide Balzarotti
Giovanni Vigna
Christopher Kruegel
2019
conf/ndss
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary.
Dokyung Song
Felicitas Hetzelt
Dipanjan Das
Chad Spensky
Yeoul Na
Stijn Volckaert
Giovanni Vigna
Christopher Kruegel
Jean-Pierre Seifert
Michael Franz
2019
conf/acsac
Neurlux: dynamic malware analysis without feature engineering.
Chani Jindal
Christopher Salls
Hojjat Aghakhani
Keith Long
Christopher Kruegel
Giovanni Vigna
2019
conf/acsac
Sleak: automating address space layout derandomization.
Christophe Hauser
Jayakrishna Menon
Yan Shoshitaishvili
Ruoyu Wang
Giovanni Vigna
Christopher Kruegel
2018
conf/ccs
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense.
Radhesh Krishnan Konoth
Emanuele Vineti
Veelasha Moonsamy
Martina Lindorfer
Christopher Kruegel
Herbert Bos
Giovanni Vigna
2018
conf/uss
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.
Wei Meng
Chenxiong Qian
Shuang Hao
Kevin Borgolte
Giovanni Vigna
Christopher Kruegel
Wenke Lee
2018
conf/uss
HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security.
Moritz Eckert
Antonio Bianchi
Ruoyu Wang
Yan Shoshitaishvili
Christopher Kruegel
Giovanni Vigna
2018
conf/sp
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones.
Kevin Borgolte
Shuang Hao
Tobias Fiebig
Giovanni Vigna
2018
conf/sp
Detecting Deceptive Reviews Using Generative Adversarial Networks.
Hojjat Aghakhani
Aravind Machiry
Shirin Nilizadeh
Christopher Kruegel
Giovanni Vigna
2018
conf/ndss
Broken Fingers: On the Usage of the Fingerprint API in Android.
Antonio Bianchi
Yanick Fratantonio
Aravind Machiry
Christopher Kruegel
Giovanni Vigna
Simon Pak Ho Chung
Wenke Lee
2018
conf/ndss
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates.
Kevin Borgolte
Tobias Fiebig
Shuang Hao
Christopher Kruegel
Giovanni Vigna
2018
conf/acsac
Using Loops For Malware Classification Resilient to Feature-unaware Perturbations.
Aravind Machiry
Nilo Redini
Eric Gustafson
Yanick Fratantonio
Yung Ryn Choe
Christopher Kruegel
Giovanni Vigna
2017
journals/popets
On the Privacy and Security of the Ultrasound Ecosystem.
Vasilios Mavroudis
Shuang Hao
Yanick Fratantonio
Federico Maggi
Christopher Kruegel
Giovanni Vigna
2017
conf/ccs
POISED: Spotting Twitter Spam Off the Beaten Paths.
Shirin Nilizadeh
Francois Labreche
Alireza Sedighian
Ali Zand
José M. Fernandez
Christopher Kruegel
Gianluca Stringhini
Giovanni Vigna
2017
conf/ccs
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions.
Cheng Huang
Shuang Hao
Luca Invernizzi
Jiayong Liu
Yong Fang
Christopher Kruegel
Giovanni Vigna
2017
conf/ccs
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance.
Yan Shoshitaishvili
Michael Weissbacher
Lukas Dresel
Christopher Salls
Ruoyu Wang
Christopher Kruegel
Giovanni Vigna
2017
conf/ccs
DIFUZE: Interface Aware Fuzzing for Kernel Drivers.
Jake Corina
Aravind Machiry
Christopher Salls
Yan Shoshitaishvili
Shuang Hao
Christopher Kruegel
Giovanni Vigna
2017
conf/uss
Shell We Play A Game? CTF-as-a-service for Security Education.
Erik Trickel
Francesco Disperati
Eric Gustafson
Faezeh Kalantari
Mike Mabey
Naveen Tiwari
Yeganeh Safaei
Adam Doupé
Giovanni Vigna
2017
conf/uss
BootStomp: On the Security of Bootloaders in Mobile Devices.
Nilo Redini
Aravind Machiry
Dipanjan Das
Yanick Fratantonio
Antonio Bianchi
Eric Gustafson
Yan Shoshitaishvili
Christopher Kruegel
Giovanni Vigna
2017
conf/uss
DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers.
Aravind Machiry
Chad Spensky
Jake Corina
Nick Stephens
Christopher Kruegel
Giovanni Vigna
2017
conf/ndss
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.
Andrea Continella
Yanick Fratantonio
Martina Lindorfer
Alessandro Puccetti
Ali Zand
Christopher Kruegel
Giovanni Vigna
2017
conf/ndss
Ramblr: Making Reassembly Great Again.
Ruoyu Wang
Yan Shoshitaishvili
Antonio Bianchi
Aravind Machiry
John Grosen
Paul Grosen
Christopher Kruegel
Giovanni Vigna
2017
conf/ndss
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
Aravind Machiry
Eric Gustafson
Chad Spensky
Christopher Salls
Nick Stephens
Ruoyu Wang
Antonio Bianchi
Yung Ryn Choe
Christopher Kruegel
Giovanni Vigna
2017
conf/acsac
Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information.
Antonio Bianchi
Eric Gustafson
Yanick Fratantonio
Christopher Kruegel
Giovanni Vigna
2017
conf/acsac
Piston: Uncooperative Remote Runtime Patching.
Christopher Salls
Yan Shoshitaishvili
Nick Stephens
Christopher Kruegel
Giovanni Vigna
2016
conf/ccs
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms.
Victor van der Veen
Yanick Fratantonio
Martina Lindorfer
Daniel Gruss
Clémentine Maurice
Giovanni Vigna
Herbert Bos
Kaveh Razavi
Cristiano Giuffrida
2016
conf/ccs
Binary Analysis for Autonomous Hacking: Invited Abstract.
Giovanni Vigna
2016
conf/sp
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis.
Yan Shoshitaishvili
Ruoyu Wang
Christopher Salls
Nick Stephens
Mario Polino
Andrew Dutcher
John Grosen
Siji Feng
Christophe Hauser
Christopher Krügel
Giovanni Vigna
2016
conf/sp
TriggerScope: Towards Detecting Logic Bombs in Android Applications.
Yanick Fratantonio
Antonio Bianchi
William K. Robertson
Engin Kirda
Christopher Kruegel
Giovanni Vigna
2016
conf/ndss
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.
Vitor Monte Afonso
Paulo L. de Geus
Antonio Bianchi
Yanick Fratantonio
Christopher Kruegel
Giovanni Vigna
Adam Doupé
Mario Polino
2016
conf/ndss
Driller: Augmenting Fuzzing Through Selective Symbolic Execution.
Nick Stephens
John Grosen
Christopher Salls
Andrew Dutcher
Ruoyu Wang
Jacopo Corbetta
Yan Shoshitaishvili
Christopher Kruegel
Giovanni Vigna
2015
journals/popets
Portrait of a Privacy Invasion.
Yan Shoshitaishvili
Christopher Kruegel
Giovanni Vigna
2015
conf/ccs
MalGene: Automatic Extraction of Malware Analysis Evasion Signature.
Dhilung Kirat
Giovanni Vigna
2015
conf/ccs
NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android.
Antonio Bianchi
Yanick Fratantonio
Christopher Kruegel
Giovanni Vigna
2015
conf/ccs
Drops for Stuff: An Analysis of Reshipping Mule Scams.
Shuang Hao
Kevin Borgolte
Nick Nikiforakis
Gianluca Stringhini
Manuel Egele
Michael Eubanks
Brian Krebs
Giovanni Vigna
2015
conf/uss
Meerkat: Detecting Website Defacements through Image-based Object Recognition.
Kevin Borgolte
Christopher Kruegel
Giovanni Vigna
2015
conf/uss
How the ELF Ruined Christmas.
Alessandro Di Federico
Amat Cama
Yan Shoshitaishvili
Christopher Kruegel
Giovanni Vigna
2015
conf/uss
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities.
Michael Weissbacher
William K. Robertson
Engin Kirda
Christopher Kruegel
Giovanni Vigna
2015
conf/uss
EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services.
Gianluca Stringhini
Pierre Mourlanne
Grégoire Jacob
Manuel Egele
Christopher Kruegel
Giovanni Vigna
2015
conf/sp
What the App is That? Deception and Countermeasures in the Android User Interface.
Antonio Bianchi
Jacopo Corbetta
Luca Invernizzi
Yanick Fratantonio
Christopher Kruegel
Giovanni Vigna
2015
conf/ndss
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Yinzhi Cao
Yanick Fratantonio
Antonio Bianchi
Manuel Egele
Christopher Kruegel
Giovanni Vigna
Yan Chen
2015
conf/ndss
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.
Yan Shoshitaishvili
Ruoyu Wang
Christophe Hauser
Christopher Kruegel
Giovanni Vigna
2015
conf/acsac
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications.
Luca Falsina
Yanick Fratantonio
Stefano Zanero
Christopher Kruegel
Giovanni Vigna
Federico Maggi
2015
conf/acsac
BareDroid: Large-Scale Analysis of Android Apps on Real Devices.
Simone Mutti
Yanick Fratantonio
Antonio Bianchi
Luca Invernizzi
Jacopo Corbetta
Dhilung Kirat
Christopher Kruegel
Giovanni Vigna
2015
conf/acsac
Know Your Achilles' Heel: Automatic Detection of Network Critical Services.
Ali Zand
Amir Houmansadr
Giovanni Vigna
Richard A. Kemmerer
Christopher Kruegel
2014
conf/ccs
The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape.
Gianluca Stringhini
Oliver Hohlfeld
Christopher Kruegel
Giovanni Vigna
2014
conf/uss
Hulk: Eliciting Malicious Behavior in Browser Extensions.
Alexandros Kapravelos
Chris Grier
Neha Chachra
Christopher Kruegel
Giovanni Vigna
Vern Paxson
2014
conf/uss
Ten Years of iCTF: The Good, The Bad, and The Ugly.
Giovanni Vigna
Kevin Borgolte
Jacopo Corbetta
Adam Doupé
Yanick Fratantonio
Luca Invernizzi
Dhilung Kirat
Yan Shoshitaishvili
2014
conf/uss
BareCloud: Bare-metal Analysis-based Evasive Malware Detection.
Dhilung Kirat
Giovanni Vigna
Christopher Kruegel
2014
conf/sp
The Tricks of the Trade: What Makes Spam Campaigns Successful?
Jane Iedemska
Gianluca Stringhini
Richard A. Kemmerer
Christopher Kruegel
Giovanni Vigna
2014
conf/ndss
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications.
Sebastian Poeplau
Yanick Fratantonio
Antonio Bianchi
Christopher Kruegel
Giovanni Vigna
2014
conf/ndss
Nazca: Detecting Malware Distribution in Large-Scale Networks.
Luca Invernizzi
Stanislav Miskovic
Ruben Torres
Christopher Kruegel
Sabyasachi Saha
Giovanni Vigna
Sung-Ju Lee
Marco Mellia
2013
conf/ccs
Delta: automatic identification of unknown web-based infection campaigns.
Kevin Borgolte
Christopher Kruegel
Giovanni Vigna
2013
conf/ccs
Shady paths: leveraging surfing crowds to detect malicious web pages.
Gianluca Stringhini
Christopher Kruegel
Giovanni Vigna
2013
conf/ccs
deDacota: toward preventing server-side XSS via automatic code and data separation.
Adam Doupé
Weidong Cui
Mariusz H. Jakubowski
Marcus Peinado
Christopher Kruegel
Giovanni Vigna
2013
conf/uss
Revolver: An Automated Approach to the Detection of Evasive Web-based Malware.
Alexandros Kapravelos
Yan Shoshitaishvili
Marco Cova
Christopher Kruegel
Giovanni Vigna
2013
conf/uss
Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services.
Ruoyu Wang
Yan Shoshitaishvili
Christopher Kruegel
Giovanni Vigna
2013
conf/sp
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting.
Nick Nikiforakis
Alexandros Kapravelos
Wouter Joosen
Christopher Kruegel
Frank Piessens
Giovanni Vigna
2013
conf/ndss
COMPA: Detecting Compromised Accounts on Social Networks.
Manuel Egele
Gianluca Stringhini
Christopher Krügel
Giovanni Vigna
2013
conf/acsac
Message in a bottle: sailing past censorship.
Luca Invernizzi
Christopher Kruegel
Giovanni Vigna
2013
conf/acsac
SigMal: a static signal processing based malware triage.
Dhilung Kirat
Lakshmanan Nataraj
Giovanni Vigna
B. S. Manjunath
2012
conf/ccs
Blacksheep: detecting compromised hosts in homogeneous crowds.
Antonio Bianchi
Yan Shoshitaishvili
Christopher Kruegel
Giovanni Vigna
2012
conf/ccs
You are what you include: large-scale evaluation of remote javascript inclusions.
Nick Nikiforakis
Luca Invernizzi
Alexandros Kapravelos
Steven Van Acker
Wouter Joosen
Christopher Kruegel
Frank Piessens
Giovanni Vigna
2012
conf/uss
B@bel: Leveraging Email Delivery for Spam Mitigation.
Gianluca Stringhini
Manuel Egele
Apostolis Zarras
Thorsten Holz
Christopher Kruegel
Giovanni Vigna
2012
conf/uss
Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner.
Adam Doupé
Ludovico Cavedon
Christopher Kruegel
Giovanni Vigna
2012
conf/uss
PUBCRAWL: Protecting Users and Businesses from CRAWLers.
Grégoire Jacob
Engin Kirda
Christopher Kruegel
Giovanni Vigna
2012
conf/sp
EvilSeed: A Guided Approach to Finding Malicious Web Pages.
Luca Invernizzi
Paolo Milani Comparetti
Stefano Benvenuti
Christopher Kruegel
Marco Cova
Giovanni Vigna
2012
conf/acsac
Jarhead analysis and detection of malicious Java applets.
Johannes Schlumberger
Christopher Kruegel
Giovanni Vigna
2011
conf/ccs
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities.
Adam Doupé
Bryce Boe
Christopher Kruegel
Giovanni Vigna
2011
conf/uss
BOTMAGNIFIER: Locating Spambots on the Internet.
Gianluca Stringhini
Thorsten Holz
Brett Stone-Gross
Christopher Kruegel
Giovanni Vigna
2011
conf/uss
Getting the Face Behind the Squares: Reconstructing Pixelized Video Streams.
Ludovico Cavedon
Luca Foschini
Giovanni Vigna
2011
conf/ndss
PiOS: Detecting Privacy Leaks in iOS Applications.
Manuel Egele
Christopher Kruegel
Engin Kirda
Giovanni Vigna
2011
conf/acsac
BareBox: efficient malware analysis on bare-metal.
Dhilung Kirat
Giovanni Vigna
Christopher Kruegel
2011
conf/acsac
Hit 'em where it hurts: a live security exercise on cyber situational awareness.
Adam Doupé
Manuel Egele
Benjamin Caillat
Gianluca Stringhini
Gorkem Yakin
Ali Zand
Ludovico Cavedon
Giovanni Vigna
2011
conf/acsac
Nexat: a history-based approach to predict attacker actions.
Casey Cipriano
Ali Zand
Amir Houmansadr
Christopher Kruegel
Giovanni Vigna
2010
conf/uss
Toward Automated Detection of Logic Vulnerabilities in Web Applications.
Viktoria Felmetsger
Ludovico Cavedon
Christopher Kruegel
Giovanni Vigna
2010
conf/ndss
Efficient Detection of Split Personalities in Malware.
Davide Balzarotti
Marco Cova
Christoph Karlberger
Engin Kirda
Christopher Kruegel
Giovanni Vigna
2010
conf/ndss
Effective Anomaly Detection with Scarce Training Data.
William K. Robertson
Federico Maggi
Christopher Kruegel
Giovanni Vigna
2010
conf/acsac
Network intrusion detection: dead or alive?
Giovanni Vigna
2010
conf/acsac
Detecting spammers on social networks.
Gianluca Stringhini
Christopher Kruegel
Giovanni Vigna
2009
journals/compsec
Client-side cross-site scripting protection.
Engin Kirda
Nenad Jovanovic
Christopher Kruegel
Giovanni Vigna
2009
conf/ccs
Your botnet is my botnet: analysis of a botnet takeover.
Brett Stone-Gross
Marco Cova
Lorenzo Cavallaro
Bob Gilbert
Martin Szydlowski
Richard A. Kemmerer
Christopher Kruegel
Giovanni Vigna
2009
conf/uss
Static Enforcement of Web Application Integrity Through Strong Typing.
William K. Robertson
Giovanni Vigna
2009
conf/acsac
Analyzing and Detecting Malicious Flash Advertisements.
Sean Ford
Marco Cova
Christopher Kruegel
Giovanni Vigna
2008
conf/uss
There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits.
Marco Cova
Christopher Kruegel
Giovanni Vigna
2008
conf/sp
ClearShot: Eavesdropping on Keyboard Input from Video.
Davide Balzarotti
Marco Cova
Giovanni Vigna
2008
conf/sp
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications.
Davide Balzarotti
Marco Cova
Viktoria Felmetsger
Nenad Jovanovic
Engin Kirda
Christopher Kruegel
Giovanni Vigna
2008
conf/iciss
A Parallel Architecture for Stateful, High-Speed Intrusion Detection.
Luca Foschini
Ashish V. Thapliyal
Lorenzo Cavallaro
Christopher Kruegel
Giovanni Vigna
2007
conf/ccs
Multi-module vulnerability analysis of web-based applications.
Davide Balzarotti
Marco Cova
Viktoria Felmetsger
Giovanni Vigna
2007
conf/ndss
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis.
Philipp Vogt
Florian Nentwich
Nenad Jovanovic
Engin Kirda
Christopher Krügel
Giovanni Vigna
2007
conf/acsac
Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms.
Matthew Van Gundy
Hao Chen
Zhendong Su
Giovanni Vigna
2007
conf/acsac
Improving Signature Testing through Dynamic Data Flow Analysis.
Christopher Kruegel
Davide Balzarotti
William K. Robertson
Giovanni Vigna
2006
conf/ndss
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks.
William K. Robertson
Giovanni Vigna
Christopher Krügel
Richard A. Kemmerer
2006
conf/acsac
Static Detection of Vulnerabilities in x86 Executables.
Marco Cova
Viktoria Felmetsger
Greg Banks
Giovanni Vigna
2006
conf/acsac
Vulnerability Analysis of MMS User Agents.
Collin Mulliner
Giovanni Vigna
2005
conf/uss
Automating Mimicry Attacks Using Static Binary Analysis.
Christopher Kruegel
Engin Kirda
Darren Mutz
William K. Robertson
Giovanni Vigna
2004
conf/ccs
Testing network-based intrusion detection signatures using mutant exploits.
Giovanni Vigna
William K. Robertson
Davide Balzarotti
2004
conf/uss
Static Disassembly of Obfuscated Binaries.
Christopher Krügel
William K. Robertson
Fredrik Valeur
Giovanni Vigna
2004
conf/acsac
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing.
Jingyu Zhou
Giovanni Vigna
2004
conf/acsac
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks.
Giovanni Vigna
Sumit Gwalani
Kavitha Srinivasan
Elizabeth M. Belding-Royer
Richard A. Kemmerer
2004
conf/acsac
Detecting Kernel-Level Rootkits Through Binary Analysis.
Christopher Krügel
William K. Robertson
Giovanni Vigna
2003
conf/ccs
Anomaly detection of web-based attacks.
Christopher Krügel
Giovanni Vigna
2003
conf/uss
Detecting Malicious Java Code Using Virtual Machine Auditing.
Sunil Soman
Chandra Krintz
Giovanni Vigna
2003
conf/esorics
On the Detection of Anomalous System Call Arguments.
Christopher Krügel
Darren Mutz
Fredrik Valeur
Giovanni Vigna
2003
conf/acsac
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems.
Darren Mutz
Giovanni Vigna
Richard A. Kemmerer
2003
conf/acsac
A Stateful Intrusion Detection System for World-Wide Web Servers.
Giovanni Vigna
William K. Robertson
Vishal Kher
Richard A. Kemmerer
2002
conf/ccs
Sensor-based intrusion detection for intra-domain distance-vector routing.
Vishal Mittal
Giovanni Vigna
2002
conf/sp
Stateful Intrusion Detection for High-Speed Networks.
Christopher Krügel
Fredrik Valeur
Giovanni Vigna
Richard A. Kemmerer
2002
conf/acsac
Composable Tools For Network Discovery and Security Analysis.
Giovanni Vigna
Fredrik Valeur
Jingyu Zhou
Richard A. Kemmerer
1998
conf/acsac
NetSTAT: A Network-Based Intrusion Detection Approach.
Giovanni Vigna
Richard A. Kemmerer
Coauthors
Abraham A. Clements
(1)
Adam Doupé
(10)
Akshay Ajayan
(1)
Alessandro Di Federico
(1)
Alessandro Puccetti
(1)
Alexandros Kapravelos
(4)
Ali Abbasi
(1)
Ali Zand
(5)
Alireza Sedighian
(1)
Allan Garcia
(1)
Amat Cama
(1)
Amir Houmansadr
(2)
Ammar Askar
(1)
Anant Kharkar
(1)
Andre Manoel
(1)
Andrea Continella
(7)
Andreas Peter
(1)
Andrew Dutcher
(2)
Antonio Bianchi
(15)
Apostolis Zarras
(1)
Aravind Machiry
(19)
Arvind S. Raj
(1)
Ashish V. Thapliyal
(1)
Audrey Dutcher
(1)
B. S. Manjunath
(1)
Ben Zorn
(1)
Benjamin Caillat
(1)
Bob Gilbert
(1)
Brett Stone-Gross
(2)
Brian Krebs
(1)
Bryce Boe
(1)
Casey Cipriano
(1)
Chad Spensky
(8)
Chandra Krintz
(1)
Chang Zhu
(1)
Chani Jindal
(2)
Cheng Huang
(1)
Chenxiong Qian
(1)
Chinmay Garg
(1)
Chris Grier
(1)
Christoph Karlberger
(1)
Christophe Hauser
(3)
Christopher Kruegel
(116)
Christopher Krügel
(9)
Christopher Salls
(9)
Clémentine Maurice
(1)
Colin Unger
(1)
Collin Mulliner
(1)
Cristiano Giuffrida
(1)
Daniel Gruss
(1)
Darren Mutz
(3)
David Evans
(1)
David Fritz
(1)
Davide Balzarotti
(8)
Davide Quarta
(1)
Dhilung Kirat
(6)
Dingyue Liu
(1)
Dipanjan Das
(7)
Dokyung Song
(1)
Dongyu Meng
(3)
Elizabeth M. Belding-Royer
(1)
Emanuele Vineti
(1)
Engin Kirda
(9)
Eric Camellini
(1)
Eric Gustafson
(9)
Erik Trickel
(2)
Evan Blasband
(1)
Fabian Fleischer
(1)
Fabio Gritti
(6)
Fabio Pagani
(6)
Faezeh Kalantari
(1)
Fangzhou Dong
(1)
Federico Maggi
(3)
Felicitas Hetzelt
(1)
Florian Nentwich
(1)
Francesco Disperati
(1)
Francesco Mecca
(1)
Francois Labreche
(1)
Frank Piessens
(2)
Fredrik Valeur
(4)
Gabriel Pizarro
(1)
Gianluca Stringhini
(11)
Giovanni Vigna
(151)
Giulio De Pasquale
(2)
Gorkem Yakin
(1)
Graham Foster
(1)
Greg Banks
(1)
Grégoire Jacob
(2)
Hamed Okhravi
(2)
Hani Jamjoom
(1)
Hao Chen
(1)
Herbert Bos
(2)
Hojjat Aghakhani
(8)
Hui Jun Tay
(1)
Ilya Grishchenko
(9)
Jacopo Corbetta
(4)
Jake Corina
(3)
Jane Iedemska
(1)
Jayakrishna Menon
(1)
Jayakrishna Menon Vadayath
(1)
Jean-Pierre Seifert
(1)
Jiayong Liu
(1)
Jingyu Zhou
(2)
Johannes Schlumberger
(1)
John Grosen
(3)
José M. Fernandez
(1)
Juan Tapiador
(1)
Justin Miller
(1)
Kangjie Lu
(1)
Kaveh Razavi
(1)
Kavitha Srinivasan
(1)
Keith Long
(1)
Kevin Borgolte
(7)
Kevin Burk
(1)
Kevin Leach
(1)
Kunlin Cai
(1)
Lakshmanan Nataraj
(1)
Lorenzo Cavallaro
(3)
Lorenzo Fontana
(1)
Luca Falsina
(1)
Luca Foschini
(2)
Luca Invernizzi
(8)
Ludovico Cavedon
(4)
Lukas Dresel
(4)
Lukas Patrick Dresel
(1)
Maarten van Steen
(1)
Manuel Egele
(7)
Marcel Busch
(2)
Marco Cova
(11)
Marco Mellia
(1)
Marcus Peinado
(1)
Mario Polino
(2)
Marius Fleischer
(1)
Marius Muench
(1)
Mariusz H. Jakubowski
(1)
Martin Szydlowski
(1)
Martina Lindorfer
(5)
Mathias Payer
(3)
Matthew Van Gundy
(1)
Michael Eubanks
(1)
Michael Franz
(1)
Michael Weissbacher
(2)
Michele Guerriero
(1)
Michele Ianni
(1)
Mike Mabey
(1)
Moritz Eckert
(1)
Moritz Schloegel
(1)
Narseo Vallina-Rodriguez
(1)
Nathan Burow
(1)
Naveen Tiwari
(1)
Neha Chachra
(1)
Nenad Jovanovic
(3)
Nick Nikiforakis
(3)
Nick Stephens
(5)
Nicola Ruaro
(7)
Nilo Redini
(7)
Nils Bars
(1)
Nir Chemaya
(1)
Noah Spahn
(4)
Oliver Hohlfeld
(1)
Paolo Milani Comparetti
(1)
Paul Grosen
(2)
Paulo L. de Geus
(1)
Philipp Vogt
(1)
Pierre Mourlanne
(1)
Priyanka Bose
(5)
Radhesh Krishnan Konoth
(1)
Rajat Gupta
(1)
Ravindu De Silva
(1)
Reuben Beeler
(1)
Riccardo Bortolameotti
(1)
Riccardo Iesari
(1)
Richard A. Kemmerer
(10)
Rick Housley
(2)
Robert McLaughlin
(6)
Robert Sim
(1)
Roman Vasilenko
(1)
Ruben Torres
(1)
Ruoyu Wang
(12)
Saastha Vasan
(1)
Sabyasachi Saha
(1)
Saurabh Bagchi
(1)
Sean Ford
(1)
Sebastian Poeplau
(1)
Shirin Nilizadeh
(2)
Shuang Hao
(7)
Siji Feng
(1)
Simon Pak Ho Chung
(1)
Simone Mutti
(1)
Stanislav Miskovic
(1)
Stefano Benvenuti
(1)
Stefano Ortolani
(3)
Stefano Zanero
(1)
Steven Van Acker
(1)
Stijn Pletinckx
(3)
Stijn Volckaert
(1)
Sumit Gwalani
(1)
Sung-Ju Lee
(1)
Sunil Soman
(1)
Taesoo Kim
(2)
Thanh-Dat Nguyen
(1)
Thijs van Ede
(1)
Thorsten Holz
(3)
Tiffany Bao
(1)
Tobias Fiebig
(3)
Tobias Scharnowski
(2)
Vasilios Mavroudis
(1)
Veelasha Moonsamy
(1)
Vern Paxson
(1)
Victor van der Veen
(1)
Viktoria Felmetsger
(4)
Vinuri Bandara
(1)
Vishal Kher
(1)
Vishal Mittal
(1)
Vitor Monte Afonso
(1)
Wei Dai
(1)
Wei Meng
(1)
Weidong Cui
(1)
Weiheng Bai
(1)
Wenbo Guo
(1)
Wenke Lee
(2)
Wil Gibbs
(1)
William K. Robertson
(11)
Wouter Joosen
(2)
Xavier Fernandes
(1)
Xavier J. Maso
(1)
Yan Chen
(1)
Yan Shoshitaishvili
(20)
Yanick Fratantonio
(17)
Yanju Chen
(1)
Yeganeh Safaei
(1)
Yeoul Na
(1)
Yinzhi Cao
(1)
Yong Fang
(1)
Yu Feng
(1)
Yu-Xiang Wang
(1)
Yuan Tian
(1)
Yung Ryn Choe
(2)
Zhendong Su
(1)
Zhongshu Gu
(1)
Zihao Su
(1)
Zion Leonahenahe Basque
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to