dblp.uni-trier.dewww.uni-trier.de

Christopher Krügel

Christopher Kruegel

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
63 Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel: Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008
62EEBrett Stone-Gross, David Sigal, Rob Cohn, John Morse, Kevin C. Almeroth, Christopher Kruegel: VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges. DIMVA 2008: 44-63
61EELuca Foschini, Ashish V. Thapliyal, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna: A Parallel Architecture for Stateful, High-Speed Intrusion Detection. ICISS 2008: 203-220
60EEDavide Balzarotti, Marco Cova, Viktoria Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna: Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. IEEE Symposium on Security and Privacy 2008: 387-401
59EEMihai Christodorescu, Somesh Jha, Christopher Kruegel: Mining specifications of malicious behavior. ISEC 2008: 5-14
58EEGeorg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel: 08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008
57EEGeorg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov: 08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008
56EELothar Braun, Falko Dressler, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Tobias Limmer, Konrad Rieck, James P. G. Sterbenz: 08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective. Network Attack Detection and Defense 2008
55EEMarc Dacier, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, James P. G. Sterbenz: 8102 Working Group -- Attack Taxonomy. Network Attack Detection and Defense 2008
54EESean McAllister, Engin Kirda, Christopher Kruegel: Leveraging User Interactions for In-Depth Testing of Web Applications. RAID 2008: 191-210
53EEMarco Cova, Christopher Kruegel, Giovanni Vigna: There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. WOOT 2008
2007
52 Christopher Krügel, Richard Lippmann, Andrew Clark: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings Springer 2007
51EEHeng Yin, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda: Panorama: capturing system-wide information flow for malware detection and analysis. ACM Conference on Computer and Communications Security 2007: 116-127
50EEMartin Szydlowski, Christopher Kruegel, Engin Kirda: Secure Input for Web Applications. ACSAC 2007: 375-384
49EEAndreas Moser, Christopher Kruegel, Engin Kirda: Limits of Static Analysis for Malware Detection. ACSAC 2007: 421-430
48EEChristopher Kruegel, Davide Balzarotti, William K. Robertson, Giovanni Vigna: Improving Signature Testing through Dynamic Data Flow Analysis. ACSAC 2007: 53-63
47EEChristian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel: On the Effectiveness of Techniques to Detect Phishing Sites. DIMVA 2007: 20-39
46EEMihai Christodorescu, Somesh Jha, Christopher Kruegel: Mining specifications of malicious behavior. ESEC/SIGSOFT FSE 2007: 5-14
45EEAndreas Moser, Christopher Krügel, Engin Kirda: Exploring Multiple Execution Paths for Malware Analysis. IEEE Symposium on Security and Privacy 2007: 231-245
44EEThomas Raffetseder, Christopher Krügel, Engin Kirda: Detecting System Emulators. ISC 2007: 1-18
43EEPhilipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Krügel, Giovanni Vigna: Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. NDSS 2007
42EEManuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, Dawn Xiaodong Song: Dynamic Spyware Analysis. USENIX Annual Technical Conference 2007: 233-246
41EEPatrick Klinkoff, Engin Kirda, Christopher Kruegel, Giovanni Vigna: Extending .NET security to unmanaged code. Int. J. Inf. Sec. 6(6): 417-428 (2007)
2006
40 Diego Zamboni, Christopher Krügel: Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings Springer 2006
39EEManuel Egele, Martin Szydlowski, Engin Kirda, Christopher Krügel: Using Static Program Analysis to Aid Intrusion Detection. DIMVA 2006: 17-36
38EENenad Jovanovic, Christopher Krügel, Engin Kirda: Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). IEEE Symposium on Security and Privacy 2006: 258-263
37EEPatrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna: Extending .NET Security to Unmanaged Code. ISC 2006: 1-16
36EEWilliam K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer: Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. NDSS 2006
35EENenad Jovanovic, Christopher Kruegel, Engin Kirda: Precise alias analysis for static detection of web application vulnerabilities. PLAS 2006: 27-36
34EEEngin Kirda, Christopher Krügel, Giovanni Vigna, Nenad Jovanovic: Noxes: a client-side solution for mitigating cross-site scripting attacks. SAC 2006: 330-337
33EEFredrik Valeur, Giovanni Vigna, Christopher Krügel, Engin Kirda: An anomaly-driven reverse proxy for web applications. SAC 2006: 361-368
32EEStefan Kals, Engin Kirda, Christopher Krügel, Nenad Jovanovic: SecuBat: a web vulnerability scanner. WWW 2006: 247-256
31EEDarren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel: Anomalous system call detection. ACM Trans. Inf. Syst. Secur. 9(1): 61-93 (2006)
30EEEngin Kirda, Christopher Krügel: Protecting Users against Phishing Attacks. Comput. J. 49(5): 554-561 (2006)
29EEUlrich Bayer, Andreas Moser, Christopher Krügel, Engin Kirda: Dynamic Analysis of Malicious Code. Journal in Computer Virology 2(1): 67-77 (2006)
2005
28 Klaus Julisch, Christopher Krügel: Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings Springer 2005
27EEEngin Kirda, Christopher Krügel: Protecting Users Against Phishing Attacks with AntiPhish. COMPSAC (1) 2005: 517-524
26EEChristopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna: Polymorphic Worm Detection Using Structural Information of Executables. RAID 2005: 207-226
25 Christopher Krügel: Network Security and Secure Applications. The Industrial Information Technology Handbook 2005: 1-13
24EEChristopher Krügel, Giovanni Vigna, William K. Robertson: A multi-model approach to the detection of web-based attacks. Computer Networks 48(5): 717-738 (2005)
2004
23EEChristopher Krügel, William K. Robertson, Giovanni Vigna: Detecting Kernel-Level Rootkits Through Binary Analysis. ACSAC 2004: 91-100
22 Christopher Krügel, William K. Robertson: Alert Verification Determining the Success of Intrusion Attempts. DIMVA 2004: 25-38
21EEChristopher Krügel, William K. Robertson, Fredrik Valeur, Giovanni Vigna: Static Disassembly of Obfuscated Binaries. USENIX Security Symposium 2004: 255-270
20EEFredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer: A Comprehensive Approach to Intrusion Detection Alert Correlation. IEEE Trans. Dependable Sec. Comput. 1(3): 146-169 (2004)
2003
19 Giovanni Vigna, Erland Jonsson, Christopher Krügel: Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings Springer 2003
18EEChristopher Krügel, Giovanni Vigna: Anomaly detection of web-based attacks. ACM Conference on Computer and Communications Security 2003: 251-261
17EEChristopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur: Bayesian Event Classification for Intrusion Detection. ACSAC 2003: 14-23
16EEChristopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna: On the Detection of Anomalous System Call Arguments. ESORICS 2003: 326-343
15EEEngin Kirda, Clemens Kerer, Christopher Krügel, Roman Kurmanowytsch: Web Service Engineering with DIWE. EUROMICRO 2003: 283-290
14EEWilliam K. Robertson, Christopher Krügel, Darren Mutz, Fredrik Valeur: Run-time Detection of Heap-based Overflows. LISA 2003: 51-60
13EEChristopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur: Topology-Based Detection of Anomalous BGP Messages. RAID 2003: 17-35
12EEChristopher Krügel, Thomas Toth: Using Decision Trees to Improve Signature-Based Intrusion Detection. RAID 2003: 173-191
2002
11EEThomas Toth, Christopher Krügel: Evaluating the Impact of Automated Intrusion Response Mechanisms. ACSAC 2002: 301-310
10EEChristopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer: Stateful Intrusion Detection for High-Speed Networks. IEEE Symposium on Security and Privacy 2002: 285-
9EEPascal Fenkam, Harald Gall, Mehdi Jazayeri, Christopher Krügel: DPS : An Architectural Style for Development of Secure Software. InfraSec 2002: 180-198
8EEChristopher Krügel, Thomas Toth: Distributed Pattern Detection for Intrusion Detection. NDSS 2002
7EEClemens Kerer, Engin Kirda, Christopher Krügel: XGuide - A Practical Guide to XML-Based Web Engineering. NETWORKING Workshops 2002: 104-117
6EEThomas Toth, Christopher Krügel: Accurate Buffer Overflow Detection via Abstract Payload Execution. RAID 2002: 274-291
5EEChristopher Krügel, Thomas Toth, Engin Kirda: Service specific anomaly detection for network intrusion detection. SAC 2002: 201-208
2001
4EEChristopher Krügel, Thomas Toth, Clemens Kerer: Decentralized Event Correlation for Intrusion Detection. ICISC 2001: 114-131
3 Christopher Krügel, Thomas Toth, Engin Kirda: SPARTA, a Mobile Agent Based Instrusion Detection System. Network Security 2001: 187-200
2EEEngin Kirda, Clemens Kerer, Mehdi Jazayeri, Christopher Krügel: Supporting Multi-Device Enabled Web Services: Challenges and Open Problems. WETICE 2001: 49-54
1999
1 Wolfgang Kastner, Christopher Krügel, Heinrich Reiter: Jini-ein guter Geist für die Gebäudesystemtechnik. Java-Informations-Tage 1999: 213-222

Coauthor Index

1Kevin C. Almeroth [62]
2Davide Balzarotti [48] [60]
3Ulrich Bayer [29]
4Lothar Braun [56]
5Georg Carle [57] [58] [63]
6Lorenzo Cavallaro [61]
7Mihai Christodorescu [46] [59]
8Andrew Clark [52]
9Rob Cohn [62]
10Marco Cova [53] [60]
11Marc Dacier [55]
12Hervé Debar [55]
13Falko Dressler [56] [57] [58] [63]
14Manuel Egele [39] [42] [51]
15Viktoria Felmetsger [60]
16Pascal Fenkam [9]
17Luca Foschini [61]
18Harald Gall [9]
19Thorsten Holz [55] [56]
20Mehdi Jazayeri [2] [9]
21Somesh Jha [46] [59]
22Erland Jonsson [19]
23Nenad Jovanovic [32] [34] [35] [38] [43] [60]
24Klaus Julisch [28]
25Stefan Kals [32]
26Wolfgang Kastner [1]
27Richard A. Kemmerer [10] [20] [36] [57] [58] [63]
28Clemens Kerer [2] [4] [7] [15]
29Engin Kirda [2] [3] [5] [7] [15] [26] [27] [29] [30] [32] [33] [34] [35] [37] [38] [39] [41] [42] [43] [44] [45] [47] [49] [50] [51] [54] [55] [56] [60]
30Patrick Klinkoff [37] [41]
31Jan Kohlrausch [55] [56]
32Hartmut König [57] [58] [63]
33Roman Kurmanowytsch [15]
34Pavel Laskov [57]
35Tobias Limmer [56]
36Richard Lippmann [52]
37Christian Ludl [47]
38Sean McAllister [47] [54]
39John Morse [62]
40Andreas Moser [29] [45] [49]
41Darren Mutz [13] [14] [16] [17] [26] [31]
42Florian Nentwich [43]
43Thomas Raffetseder [44]
44Heinrich Reiter [1]
45Konrad Rieck [55] [56]
46William K. Robertson [13] [14] [17] [21] [22] [23] [24] [26] [36] [48]
47David Sigal [62]
48Dawn Xiaodong Song [42] [51]
49James P. G. Sterbenz [55] [56]
50Brett Stone-Gross [62]
51Martin Szydlowski [39] [50]
52Ashish V. Thapliyal [61]
53Thomas Toth [3] [4] [5] [6] [8] [11] [12]
54Fredrik Valeur [10] [13] [14] [16] [17] [20] [21] [31] [33]
55Giovanni Vigna [10] [16] [18] [19] [20] [21] [23] [24] [26] [31] [33] [34] [36] [37] [41] [43] [48] [53] [60] [61]
56Philipp Vogt [43]
57Heng Yin [42] [51]
58Diego Zamboni [40]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)