| 2008 |
| 66 | EE | Luca Foschini,
Ashish V. Thapliyal,
Lorenzo Cavallaro,
Christopher Kruegel,
Giovanni Vigna:
A Parallel Architecture for Stateful, High-Speed Intrusion Detection.
ICISS 2008: 203-220 |
| 65 | EE | Davide Balzarotti,
Marco Cova,
Giovanni Vigna:
ClearShot: Eavesdropping on Keyboard Input from Video.
IEEE Symposium on Security and Privacy 2008: 170-183 |
| 64 | EE | Davide Balzarotti,
Marco Cova,
Viktoria Felmetsger,
Nenad Jovanovic,
Engin Kirda,
Christopher Kruegel,
Giovanni Vigna:
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications.
IEEE Symposium on Security and Privacy 2008: 387-401 |
| 63 | EE | Davide Balzarotti,
Greg Banks,
Marco Cova,
Viktoria Felmetsger,
Richard A. Kemmerer,
William K. Robertson,
Fredrik Valeur,
Giovanni Vigna:
Are your votes really counted?: testing the security of real-world electronic voting systems.
ISSTA 2008: 237-248 |
| 62 | EE | Marco Cova,
Christopher Kruegel,
Giovanni Vigna:
There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits.
WOOT 2008 |
| 2007 |
| 61 | EE | Davide Balzarotti,
Marco Cova,
Viktoria Felmetsger,
Giovanni Vigna:
Multi-module vulnerability analysis of web-based applications.
ACM Conference on Computer and Communications Security 2007: 25-35 |
| 60 | EE | Christopher Kruegel,
Davide Balzarotti,
William K. Robertson,
Giovanni Vigna:
Improving Signature Testing through Dynamic Data Flow Analysis.
ACSAC 2007: 53-63 |
| 59 | EE | Matthew Van Gundy,
Hao Chen,
Zhendong Su,
Giovanni Vigna:
Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms.
ACSAC 2007: 74-85 |
| 58 | EE | Antonio Carzaniga,
Gian Pietro Picco,
Giovanni Vigna:
Is Code Still Moving Around? Looking Back at a Decade of Code Mobility.
ICSE Companion 2007: 9-20 |
| 57 | EE | Philipp Vogt,
Florian Nentwich,
Nenad Jovanovic,
Engin Kirda,
Christopher Krügel,
Giovanni Vigna:
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis.
NDSS 2007 |
| 56 | EE | Darren Mutz,
William K. Robertson,
Giovanni Vigna,
Richard A. Kemmerer:
Exploiting Execution Context for the Detection of Anomalous System Calls.
RAID 2007: 1-20 |
| 55 | EE | Marco Cova,
Davide Balzarotti,
Viktoria Felmetsger,
Giovanni Vigna:
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications.
RAID 2007: 63-86 |
| 54 | EE | Marco Cova,
Viktoria Felmetsger,
Giovanni Vigna:
Vulnerability Analysis of Web-based Applications.
Test and Analysis of Web Services 2007: 363-394 |
| 53 | EE | Patrick Klinkoff,
Engin Kirda,
Christopher Kruegel,
Giovanni Vigna:
Extending .NET security to unmanaged code.
Int. J. Inf. Sec. 6(6): 417-428 (2007) |
| 52 | EE | André Årnes,
Paul Haas,
Giovanni Vigna,
Richard A. Kemmerer:
Using a virtual security testbed for digital forensic reconstruction.
Journal in Computer Virology 2(4): 275-289 (2007) |
| 2006 |
| 51 | EE | Marco Cova,
Viktoria Felmetsger,
Greg Banks,
Giovanni Vigna:
Static Detection of Vulnerabilities in x86 Executables.
ACSAC 2006: 269-278 |
| 50 | EE | Collin Mulliner,
Giovanni Vigna:
Vulnerability Analysis of MMS User Agents.
ACSAC 2006: 77-88 |
| 49 | EE | André Årnes,
Paul Haas,
Giovanni Vigna,
Richard A. Kemmerer:
Digital Forensic Reconstruction and the Virtual Security Testbed ViSe.
DIMVA 2006: 144-163 |
| 48 | EE | Collin Mulliner,
Giovanni Vigna,
David Dagon,
Wenke Lee:
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones.
DIMVA 2006: 91-108 |
| 47 | EE | Patrick Klinkoff,
Christopher Krügel,
Engin Kirda,
Giovanni Vigna:
Extending .NET Security to Unmanaged Code.
ISC 2006: 1-16 |
| 46 | EE | Greg Banks,
Marco Cova,
Viktoria Felmetsger,
Kevin C. Almeroth,
Richard A. Kemmerer,
Giovanni Vigna:
SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr.
ISC 2006: 343-358 |
| 45 | EE | William K. Robertson,
Giovanni Vigna,
Christopher Krügel,
Richard A. Kemmerer:
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks.
NDSS 2006 |
| 44 | EE | André Årnes,
Fredrik Valeur,
Giovanni Vigna,
Richard A. Kemmerer:
Using Hidden Markov Models to Evaluate the Risks of Intrusions.
RAID 2006: 145-164 |
| 43 | EE | Engin Kirda,
Christopher Krügel,
Giovanni Vigna,
Nenad Jovanovic:
Noxes: a client-side solution for mitigating cross-site scripting attacks.
SAC 2006: 330-337 |
| 42 | EE | Fredrik Valeur,
Giovanni Vigna,
Christopher Krügel,
Engin Kirda:
An anomaly-driven reverse proxy for web applications.
SAC 2006: 361-368 |
| 41 | EE | Darren Mutz,
Fredrik Valeur,
Giovanni Vigna,
Christopher Krügel:
Anomalous system call detection.
ACM Trans. Inf. Syst. Secur. 9(1): 61-93 (2006) |
| 2005 |
| 40 | EE | Fredrik Valeur,
Darren Mutz,
Giovanni Vigna:
A Learning-Based Approach to the Detection of SQL Attacks.
DIMVA 2005: 123-140 |
| 39 | EE | Viktoria Felmetsger,
Giovanni Vigna:
Exploiting OS-Level Mechanisms to Implement Mobile Code Security.
ICECCS 2005: 234-243 |
| 38 | EE | Oystein Hallaraker,
Giovanni Vigna:
Detecting Malicious JavaScript Code in Mozilla.
ICECCS 2005: 85-94 |
| 37 | EE | Christopher Krügel,
Engin Kirda,
Darren Mutz,
William K. Robertson,
Giovanni Vigna:
Polymorphic Worm Detection Using Structural Information of Executables.
RAID 2005: 207-226 |
| 36 | EE | Christopher Krügel,
Giovanni Vigna,
William K. Robertson:
A multi-model approach to the detection of web-based attacks.
Computer Networks 48(5): 717-738 (2005) |
| 2004 |
| 35 | EE | Giovanni Vigna,
William K. Robertson,
Davide Balzarotti:
Testing network-based intrusion detection signatures using mutant exploits.
ACM Conference on Computer and Communications Security 2004: 21-30 |
| 34 | EE | Giovanni Vigna,
Sumit Gwalani,
Kavitha Srinivasan,
Elizabeth M. Belding-Royer,
Richard A. Kemmerer:
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks.
ACSAC 2004: 16-27 |
| 33 | EE | Jingyu Zhou,
Giovanni Vigna:
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing.
ACSAC 2004: 168-178 |
| 32 | EE | Christopher Krügel,
William K. Robertson,
Giovanni Vigna:
Detecting Kernel-Level Rootkits Through Binary Analysis.
ACSAC 2004: 91-100 |
| 31 | EE | Giovanni Vigna:
Mobile Agents: Ten Reasons For Failure.
Mobile Data Management 2004: 298-299 |
| 30 | EE | Christopher Krügel,
William K. Robertson,
Fredrik Valeur,
Giovanni Vigna:
Static Disassembly of Obfuscated Binaries.
USENIX Security Symposium 2004: 255-270 |
| 29 | EE | Fredrik Valeur,
Giovanni Vigna,
Christopher Krügel,
Richard A. Kemmerer:
A Comprehensive Approach to Intrusion Detection Alert Correlation.
IEEE Trans. Dependable Sec. Comput. 1(3): 146-169 (2004) |
| 2003 |
| 28 | | Giovanni Vigna,
Erland Jonsson,
Christopher Krügel:
Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings
Springer 2003 |
| 27 | EE | Christopher Krügel,
Giovanni Vigna:
Anomaly detection of web-based attacks.
ACM Conference on Computer and Communications Security 2003: 251-261 |
| 26 | EE | Giovanni Vigna,
William K. Robertson,
Vishal Kher,
Richard A. Kemmerer:
A Stateful Intrusion Detection System for World-Wide Web Servers.
ACSAC 2003: 34-45 |
| 25 | EE | Darren Mutz,
Giovanni Vigna,
Richard A. Kemmerer:
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems.
ACSAC 2003: 374-383 |
| 24 | EE | Giovanni Vigna,
Fredrik Valeur,
Richard A. Kemmerer:
Designing and implementing a family of intrusion detection systems.
ESEC / SIGSOFT FSE 2003: 88-97 |
| 23 | EE | Christopher Krügel,
Darren Mutz,
Fredrik Valeur,
Giovanni Vigna:
On the Detection of Anomalous System Call Arguments.
ESORICS 2003: 326-343 |
| 22 | EE | Giovanni Vigna:
A Topological Characterization of TCP/IP Security.
FME 2003: 914-939 |
| 21 | EE | Richard A. Kemmerer,
Giovanni Vigna:
Internet Security and Intrusion Detection.
ICSE 2003: 748-749 |
| 20 | | Giovanni Vigna:
Teaching Network Security Through Live Exercises.
World Conference on Information Security Education 2003: 3-18 |
| 2002 |
| 19 | | Andreas Wespi,
Giovanni Vigna,
Luca Deri:
Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings
Springer 2002 |
| 18 | EE | Vishal Mittal,
Giovanni Vigna:
Sensor-based intrusion detection for intra-domain distance-vector routing.
ACM Conference on Computer and Communications Security 2002: 127-137 |
| 17 | EE | Giovanni Vigna,
Fredrik Valeur,
Jingyu Zhou,
Richard A. Kemmerer:
Composable Tools For Network Discovery and Security Analysis.
ACSAC 2002: 14-24 |
| 16 | EE | Giovanni Vigna,
Andrew Mitchel:
Mnemosyne: Designing and Implementing Network Short-Term Memory.
ICECCS 2002: 91-100 |
| 15 | EE | Christopher Krügel,
Fredrik Valeur,
Giovanni Vigna,
Richard A. Kemmerer:
Stateful Intrusion Detection for High-Speed Networks.
IEEE Symposium on Security and Privacy 2002: 285- |
| 14 | EE | Giovanni Vigna,
Bryan Cassell,
Dave Fayram:
An Intrusion Detection System for Aglets.
Mobile Agents 2002: 64-77 |
| 13 | | Steve T. Eckmann,
Giovanni Vigna,
Richard A. Kemmerer:
STATL: An Attack Language for State-Based Intrusion Detection.
Journal of Computer Security 10(1/2): 71-104 (2002) |
| 2001 |
| 12 | EE | Sebastian Fischmeister,
Giovanni Vigna,
Richard A. Kemmerer:
Evaluating the Security of Three Java-Based Mobile Agent Systems.
Mobile Agents 2001: 31-41 |
| 11 | EE | Giovanni Vigna,
Richard A. Kemmerer,
Per Blix:
Designing a Web of Highly-Configurable Intrusion Detection Sensors.
Recent Advances in Intrusion Detection 2001: 69-84 |
| 1999 |
| 10 | | Giovanni Vigna,
Richard A. Kemmerer:
NetSTAT: A Network-based Intrusion Detection System.
Journal of Computer Security 7(1): (1999) |
| 1998 |
| 9 | | Giovanni Vigna:
Mobile Agents and Security
Springer 1998 |
| 8 | EE | Giovanni Vigna,
Richard A. Kemmerer:
NetSTAT: A Network-Based Intrusion Detection Approach.
ACSAC 1998: 25- |
| 7 | EE | Giovanni Vigna:
Cryptographic Traces for Mobile Agents.
Mobile Agents and Security 1998: 137-153 |
| 6 | EE | Alfonso Fuggetta,
Gian Pietro Picco,
Giovanni Vigna:
Understanding Code Mobility.
IEEE Trans. Software Eng. 24(5): 342-361 (1998) |
| 1997 |
| 5 | EE | Antonio Carzaniga,
Gian Pietro Picco,
Giovanni Vigna:
Designing Distributed Applications with Mobile Code Paradigms.
ICSE 1997: 22-32 |
| 4 | | Carlo Ghezzi,
Giovanni Vigna:
Mobile Code Paradigms and Technologies: A Case Study.
Mobile Agents 1997: 39-49 |
| 3 | | Carlo Ghezzi,
Giovanni Vigna:
Software Engineering Issues for Network Computing.
Requirements Targeting Software and Systems Engineering 1997: 155-177 |
| 1996 |
| 2 | | Gianpaolo Cugola,
Carlo Ghezzi,
Gian Pietro Picco,
Giovanni Vigna:
Analyzing Mobile Code Languages.
Mobile Object Systems 1996: 93-110 |
| 1994 |
| 1 | | Antonio Carzaniga,
Gian Pietro Picco,
Giovanni Vigna:
Designing and Implementing Inter-Client Communication in the O2 Object-Oriented Database Management System.
ISOOMS 1994: 53-64 |