2008 | ||
---|---|---|
66 | EE | Luca Foschini, Ashish V. Thapliyal, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna: A Parallel Architecture for Stateful, High-Speed Intrusion Detection. ICISS 2008: 203-220 |
65 | EE | Davide Balzarotti, Marco Cova, Giovanni Vigna: ClearShot: Eavesdropping on Keyboard Input from Video. IEEE Symposium on Security and Privacy 2008: 170-183 |
64 | EE | Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna: Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. IEEE Symposium on Security and Privacy 2008: 387-401 |
63 | EE | Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna: Are your votes really counted?: testing the security of real-world electronic voting systems. ISSTA 2008: 237-248 |
62 | EE | Marco Cova, Christopher Kruegel, Giovanni Vigna: There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. WOOT 2008 |
2007 | ||
61 | EE | Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Giovanni Vigna: Multi-module vulnerability analysis of web-based applications. ACM Conference on Computer and Communications Security 2007: 25-35 |
60 | EE | Christopher Kruegel, Davide Balzarotti, William K. Robertson, Giovanni Vigna: Improving Signature Testing through Dynamic Data Flow Analysis. ACSAC 2007: 53-63 |
59 | EE | Matthew Van Gundy, Hao Chen, Zhendong Su, Giovanni Vigna: Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms. ACSAC 2007: 74-85 |
58 | EE | Antonio Carzaniga, Gian Pietro Picco, Giovanni Vigna: Is Code Still Moving Around? Looking Back at a Decade of Code Mobility. ICSE Companion 2007: 9-20 |
57 | EE | Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Krügel, Giovanni Vigna: Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. NDSS 2007 |
56 | EE | Darren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer: Exploiting Execution Context for the Detection of Anomalous System Calls. RAID 2007: 1-20 |
55 | EE | Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna: Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications. RAID 2007: 63-86 |
54 | EE | Marco Cova, Viktoria Felmetsger, Giovanni Vigna: Vulnerability Analysis of Web-based Applications. Test and Analysis of Web Services 2007: 363-394 |
53 | EE | Patrick Klinkoff, Engin Kirda, Christopher Kruegel, Giovanni Vigna: Extending .NET security to unmanaged code. Int. J. Inf. Sec. 6(6): 417-428 (2007) |
52 | EE | André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer: Using a virtual security testbed for digital forensic reconstruction. Journal in Computer Virology 2(4): 275-289 (2007) |
2006 | ||
51 | EE | Marco Cova, Viktoria Felmetsger, Greg Banks, Giovanni Vigna: Static Detection of Vulnerabilities in x86 Executables. ACSAC 2006: 269-278 |
50 | EE | Collin Mulliner, Giovanni Vigna: Vulnerability Analysis of MMS User Agents. ACSAC 2006: 77-88 |
49 | EE | André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer: Digital Forensic Reconstruction and the Virtual Security Testbed ViSe. DIMVA 2006: 144-163 |
48 | EE | Collin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee: Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. DIMVA 2006: 91-108 |
47 | EE | Patrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna: Extending .NET Security to Unmanaged Code. ISC 2006: 1-16 |
46 | EE | Greg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna: SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. ISC 2006: 343-358 |
45 | EE | William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer: Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. NDSS 2006 |
44 | EE | André Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer: Using Hidden Markov Models to Evaluate the Risks of Intrusions. RAID 2006: 145-164 |
43 | EE | Engin Kirda, Christopher Krügel, Giovanni Vigna, Nenad Jovanovic: Noxes: a client-side solution for mitigating cross-site scripting attacks. SAC 2006: 330-337 |
42 | EE | Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Engin Kirda: An anomaly-driven reverse proxy for web applications. SAC 2006: 361-368 |
41 | EE | Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel: Anomalous system call detection. ACM Trans. Inf. Syst. Secur. 9(1): 61-93 (2006) |
2005 | ||
40 | EE | Fredrik Valeur, Darren Mutz, Giovanni Vigna: A Learning-Based Approach to the Detection of SQL Attacks. DIMVA 2005: 123-140 |
39 | EE | Viktoria Felmetsger, Giovanni Vigna: Exploiting OS-Level Mechanisms to Implement Mobile Code Security. ICECCS 2005: 234-243 |
38 | EE | Oystein Hallaraker, Giovanni Vigna: Detecting Malicious JavaScript Code in Mozilla. ICECCS 2005: 85-94 |
37 | EE | Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna: Polymorphic Worm Detection Using Structural Information of Executables. RAID 2005: 207-226 |
36 | EE | Christopher Krügel, Giovanni Vigna, William K. Robertson: A multi-model approach to the detection of web-based attacks. Computer Networks 48(5): 717-738 (2005) |
2004 | ||
35 | EE | Giovanni Vigna, William K. Robertson, Davide Balzarotti: Testing network-based intrusion detection signatures using mutant exploits. ACM Conference on Computer and Communications Security 2004: 21-30 |
34 | EE | Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, Elizabeth M. Belding-Royer, Richard A. Kemmerer: An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks. ACSAC 2004: 16-27 |
33 | EE | Jingyu Zhou, Giovanni Vigna: Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing. ACSAC 2004: 168-178 |
32 | EE | Christopher Krügel, William K. Robertson, Giovanni Vigna: Detecting Kernel-Level Rootkits Through Binary Analysis. ACSAC 2004: 91-100 |
31 | EE | Giovanni Vigna: Mobile Agents: Ten Reasons For Failure. Mobile Data Management 2004: 298-299 |
30 | EE | Christopher Krügel, William K. Robertson, Fredrik Valeur, Giovanni Vigna: Static Disassembly of Obfuscated Binaries. USENIX Security Symposium 2004: 255-270 |
29 | EE | Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer: A Comprehensive Approach to Intrusion Detection Alert Correlation. IEEE Trans. Dependable Sec. Comput. 1(3): 146-169 (2004) |
2003 | ||
28 | Giovanni Vigna, Erland Jonsson, Christopher Krügel: Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings Springer 2003 | |
27 | EE | Christopher Krügel, Giovanni Vigna: Anomaly detection of web-based attacks. ACM Conference on Computer and Communications Security 2003: 251-261 |
26 | EE | Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer: A Stateful Intrusion Detection System for World-Wide Web Servers. ACSAC 2003: 34-45 |
25 | EE | Darren Mutz, Giovanni Vigna, Richard A. Kemmerer: An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. ACSAC 2003: 374-383 |
24 | EE | Giovanni Vigna, Fredrik Valeur, Richard A. Kemmerer: Designing and implementing a family of intrusion detection systems. ESEC / SIGSOFT FSE 2003: 88-97 |
23 | EE | Christopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna: On the Detection of Anomalous System Call Arguments. ESORICS 2003: 326-343 |
22 | EE | Giovanni Vigna: A Topological Characterization of TCP/IP Security. FME 2003: 914-939 |
21 | EE | Richard A. Kemmerer, Giovanni Vigna: Internet Security and Intrusion Detection. ICSE 2003: 748-749 |
20 | Giovanni Vigna: Teaching Network Security Through Live Exercises. World Conference on Information Security Education 2003: 3-18 | |
2002 | ||
19 | Andreas Wespi, Giovanni Vigna, Luca Deri: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings Springer 2002 | |
18 | EE | Vishal Mittal, Giovanni Vigna: Sensor-based intrusion detection for intra-domain distance-vector routing. ACM Conference on Computer and Communications Security 2002: 127-137 |
17 | EE | Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richard A. Kemmerer: Composable Tools For Network Discovery and Security Analysis. ACSAC 2002: 14-24 |
16 | EE | Giovanni Vigna, Andrew Mitchel: Mnemosyne: Designing and Implementing Network Short-Term Memory. ICECCS 2002: 91-100 |
15 | EE | Christopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer: Stateful Intrusion Detection for High-Speed Networks. IEEE Symposium on Security and Privacy 2002: 285- |
14 | EE | Giovanni Vigna, Bryan Cassell, Dave Fayram: An Intrusion Detection System for Aglets. Mobile Agents 2002: 64-77 |
13 | Steve T. Eckmann, Giovanni Vigna, Richard A. Kemmerer: STATL: An Attack Language for State-Based Intrusion Detection. Journal of Computer Security 10(1/2): 71-104 (2002) | |
2001 | ||
12 | EE | Sebastian Fischmeister, Giovanni Vigna, Richard A. Kemmerer: Evaluating the Security of Three Java-Based Mobile Agent Systems. Mobile Agents 2001: 31-41 |
11 | EE | Giovanni Vigna, Richard A. Kemmerer, Per Blix: Designing a Web of Highly-Configurable Intrusion Detection Sensors. Recent Advances in Intrusion Detection 2001: 69-84 |
1999 | ||
10 | Giovanni Vigna, Richard A. Kemmerer: NetSTAT: A Network-based Intrusion Detection System. Journal of Computer Security 7(1): (1999) | |
1998 | ||
9 | Giovanni Vigna: Mobile Agents and Security Springer 1998 | |
8 | EE | Giovanni Vigna, Richard A. Kemmerer: NetSTAT: A Network-Based Intrusion Detection Approach. ACSAC 1998: 25- |
7 | EE | Giovanni Vigna: Cryptographic Traces for Mobile Agents. Mobile Agents and Security 1998: 137-153 |
6 | EE | Alfonso Fuggetta, Gian Pietro Picco, Giovanni Vigna: Understanding Code Mobility. IEEE Trans. Software Eng. 24(5): 342-361 (1998) |
1997 | ||
5 | EE | Antonio Carzaniga, Gian Pietro Picco, Giovanni Vigna: Designing Distributed Applications with Mobile Code Paradigms. ICSE 1997: 22-32 |
4 | Carlo Ghezzi, Giovanni Vigna: Mobile Code Paradigms and Technologies: A Case Study. Mobile Agents 1997: 39-49 | |
3 | Carlo Ghezzi, Giovanni Vigna: Software Engineering Issues for Network Computing. Requirements Targeting Software and Systems Engineering 1997: 155-177 | |
1996 | ||
2 | Gianpaolo Cugola, Carlo Ghezzi, Gian Pietro Picco, Giovanni Vigna: Analyzing Mobile Code Languages. Mobile Object Systems 1996: 93-110 | |
1994 | ||
1 | Antonio Carzaniga, Gian Pietro Picco, Giovanni Vigna: Designing and Implementing Inter-Client Communication in the O2 Object-Oriented Database Management System. ISOOMS 1994: 53-64 |