dblp.uni-trier.dewww.uni-trier.de

Giovanni Vigna

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
66EELuca Foschini, Ashish V. Thapliyal, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna: A Parallel Architecture for Stateful, High-Speed Intrusion Detection. ICISS 2008: 203-220
65EEDavide Balzarotti, Marco Cova, Giovanni Vigna: ClearShot: Eavesdropping on Keyboard Input from Video. IEEE Symposium on Security and Privacy 2008: 170-183
64EEDavide Balzarotti, Marco Cova, Viktoria Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna: Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. IEEE Symposium on Security and Privacy 2008: 387-401
63EEDavide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna: Are your votes really counted?: testing the security of real-world electronic voting systems. ISSTA 2008: 237-248
62EEMarco Cova, Christopher Kruegel, Giovanni Vigna: There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. WOOT 2008
2007
61EEDavide Balzarotti, Marco Cova, Viktoria Felmetsger, Giovanni Vigna: Multi-module vulnerability analysis of web-based applications. ACM Conference on Computer and Communications Security 2007: 25-35
60EEChristopher Kruegel, Davide Balzarotti, William K. Robertson, Giovanni Vigna: Improving Signature Testing through Dynamic Data Flow Analysis. ACSAC 2007: 53-63
59EEMatthew Van Gundy, Hao Chen, Zhendong Su, Giovanni Vigna: Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms. ACSAC 2007: 74-85
58EEAntonio Carzaniga, Gian Pietro Picco, Giovanni Vigna: Is Code Still Moving Around? Looking Back at a Decade of Code Mobility. ICSE Companion 2007: 9-20
57EEPhilipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Krügel, Giovanni Vigna: Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. NDSS 2007
56EEDarren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer: Exploiting Execution Context for the Detection of Anomalous System Calls. RAID 2007: 1-20
55EEMarco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna: Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications. RAID 2007: 63-86
54EEMarco Cova, Viktoria Felmetsger, Giovanni Vigna: Vulnerability Analysis of Web-based Applications. Test and Analysis of Web Services 2007: 363-394
53EEPatrick Klinkoff, Engin Kirda, Christopher Kruegel, Giovanni Vigna: Extending .NET security to unmanaged code. Int. J. Inf. Sec. 6(6): 417-428 (2007)
52EEAndré Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer: Using a virtual security testbed for digital forensic reconstruction. Journal in Computer Virology 2(4): 275-289 (2007)
2006
51EEMarco Cova, Viktoria Felmetsger, Greg Banks, Giovanni Vigna: Static Detection of Vulnerabilities in x86 Executables. ACSAC 2006: 269-278
50EECollin Mulliner, Giovanni Vigna: Vulnerability Analysis of MMS User Agents. ACSAC 2006: 77-88
49EEAndré Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer: Digital Forensic Reconstruction and the Virtual Security Testbed ViSe. DIMVA 2006: 144-163
48EECollin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee: Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. DIMVA 2006: 91-108
47EEPatrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna: Extending .NET Security to Unmanaged Code. ISC 2006: 1-16
46EEGreg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna: SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. ISC 2006: 343-358
45EEWilliam K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer: Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. NDSS 2006
44EEAndré Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer: Using Hidden Markov Models to Evaluate the Risks of Intrusions. RAID 2006: 145-164
43EEEngin Kirda, Christopher Krügel, Giovanni Vigna, Nenad Jovanovic: Noxes: a client-side solution for mitigating cross-site scripting attacks. SAC 2006: 330-337
42EEFredrik Valeur, Giovanni Vigna, Christopher Krügel, Engin Kirda: An anomaly-driven reverse proxy for web applications. SAC 2006: 361-368
41EEDarren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel: Anomalous system call detection. ACM Trans. Inf. Syst. Secur. 9(1): 61-93 (2006)
2005
40EEFredrik Valeur, Darren Mutz, Giovanni Vigna: A Learning-Based Approach to the Detection of SQL Attacks. DIMVA 2005: 123-140
39EEViktoria Felmetsger, Giovanni Vigna: Exploiting OS-Level Mechanisms to Implement Mobile Code Security. ICECCS 2005: 234-243
38EEOystein Hallaraker, Giovanni Vigna: Detecting Malicious JavaScript Code in Mozilla. ICECCS 2005: 85-94
37EEChristopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna: Polymorphic Worm Detection Using Structural Information of Executables. RAID 2005: 207-226
36EEChristopher Krügel, Giovanni Vigna, William K. Robertson: A multi-model approach to the detection of web-based attacks. Computer Networks 48(5): 717-738 (2005)
2004
35EEGiovanni Vigna, William K. Robertson, Davide Balzarotti: Testing network-based intrusion detection signatures using mutant exploits. ACM Conference on Computer and Communications Security 2004: 21-30
34EEGiovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, Elizabeth M. Belding-Royer, Richard A. Kemmerer: An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks. ACSAC 2004: 16-27
33EEJingyu Zhou, Giovanni Vigna: Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing. ACSAC 2004: 168-178
32EEChristopher Krügel, William K. Robertson, Giovanni Vigna: Detecting Kernel-Level Rootkits Through Binary Analysis. ACSAC 2004: 91-100
31EEGiovanni Vigna: Mobile Agents: Ten Reasons For Failure. Mobile Data Management 2004: 298-299
30EEChristopher Krügel, William K. Robertson, Fredrik Valeur, Giovanni Vigna: Static Disassembly of Obfuscated Binaries. USENIX Security Symposium 2004: 255-270
29EEFredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer: A Comprehensive Approach to Intrusion Detection Alert Correlation. IEEE Trans. Dependable Sec. Comput. 1(3): 146-169 (2004)
2003
28 Giovanni Vigna, Erland Jonsson, Christopher Krügel: Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings Springer 2003
27EEChristopher Krügel, Giovanni Vigna: Anomaly detection of web-based attacks. ACM Conference on Computer and Communications Security 2003: 251-261
26EEGiovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer: A Stateful Intrusion Detection System for World-Wide Web Servers. ACSAC 2003: 34-45
25EEDarren Mutz, Giovanni Vigna, Richard A. Kemmerer: An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. ACSAC 2003: 374-383
24EEGiovanni Vigna, Fredrik Valeur, Richard A. Kemmerer: Designing and implementing a family of intrusion detection systems. ESEC / SIGSOFT FSE 2003: 88-97
23EEChristopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna: On the Detection of Anomalous System Call Arguments. ESORICS 2003: 326-343
22EEGiovanni Vigna: A Topological Characterization of TCP/IP Security. FME 2003: 914-939
21EERichard A. Kemmerer, Giovanni Vigna: Internet Security and Intrusion Detection. ICSE 2003: 748-749
20 Giovanni Vigna: Teaching Network Security Through Live Exercises. World Conference on Information Security Education 2003: 3-18
2002
19 Andreas Wespi, Giovanni Vigna, Luca Deri: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings Springer 2002
18EEVishal Mittal, Giovanni Vigna: Sensor-based intrusion detection for intra-domain distance-vector routing. ACM Conference on Computer and Communications Security 2002: 127-137
17EEGiovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richard A. Kemmerer: Composable Tools For Network Discovery and Security Analysis. ACSAC 2002: 14-24
16EEGiovanni Vigna, Andrew Mitchel: Mnemosyne: Designing and Implementing Network Short-Term Memory. ICECCS 2002: 91-100
15EEChristopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer: Stateful Intrusion Detection for High-Speed Networks. IEEE Symposium on Security and Privacy 2002: 285-
14EEGiovanni Vigna, Bryan Cassell, Dave Fayram: An Intrusion Detection System for Aglets. Mobile Agents 2002: 64-77
13 Steve T. Eckmann, Giovanni Vigna, Richard A. Kemmerer: STATL: An Attack Language for State-Based Intrusion Detection. Journal of Computer Security 10(1/2): 71-104 (2002)
2001
12EESebastian Fischmeister, Giovanni Vigna, Richard A. Kemmerer: Evaluating the Security of Three Java-Based Mobile Agent Systems. Mobile Agents 2001: 31-41
11EEGiovanni Vigna, Richard A. Kemmerer, Per Blix: Designing a Web of Highly-Configurable Intrusion Detection Sensors. Recent Advances in Intrusion Detection 2001: 69-84
1999
10 Giovanni Vigna, Richard A. Kemmerer: NetSTAT: A Network-based Intrusion Detection System. Journal of Computer Security 7(1): (1999)
1998
9 Giovanni Vigna: Mobile Agents and Security Springer 1998
8EEGiovanni Vigna, Richard A. Kemmerer: NetSTAT: A Network-Based Intrusion Detection Approach. ACSAC 1998: 25-
7EEGiovanni Vigna: Cryptographic Traces for Mobile Agents. Mobile Agents and Security 1998: 137-153
6EEAlfonso Fuggetta, Gian Pietro Picco, Giovanni Vigna: Understanding Code Mobility. IEEE Trans. Software Eng. 24(5): 342-361 (1998)
1997
5EEAntonio Carzaniga, Gian Pietro Picco, Giovanni Vigna: Designing Distributed Applications with Mobile Code Paradigms. ICSE 1997: 22-32
4 Carlo Ghezzi, Giovanni Vigna: Mobile Code Paradigms and Technologies: A Case Study. Mobile Agents 1997: 39-49
3 Carlo Ghezzi, Giovanni Vigna: Software Engineering Issues for Network Computing. Requirements Targeting Software and Systems Engineering 1997: 155-177
1996
2 Gianpaolo Cugola, Carlo Ghezzi, Gian Pietro Picco, Giovanni Vigna: Analyzing Mobile Code Languages. Mobile Object Systems 1996: 93-110
1994
1 Antonio Carzaniga, Gian Pietro Picco, Giovanni Vigna: Designing and Implementing Inter-Client Communication in the O2 Object-Oriented Database Management System. ISOOMS 1994: 53-64

Coauthor Index

1Kevin C. Almeroth [46]
2André Årnes [44] [49] [52]
3Davide Balzarotti [35] [55] [60] [61] [63] [64] [65]
4Greg Banks [46] [51] [63]
5Elizabeth M. Belding-Royer (Elizabeth M. Belding) [34]
6Per Blix [11]
7Antonio Carzaniga [1] [5] [58]
8Bryan Cassell [14]
9Lorenzo Cavallaro [66]
10Hao Chen [59]
11Marco Cova [46] [51] [54] [55] [61] [62] [63] [64] [65]
12Gianpaolo Cugola [2]
13David Dagon [48]
14Luca Deri [19]
15Steve T. Eckmann [13]
16Dave Fayram [14]
17Viktoria Felmetsger [39] [46] [51] [54] [55] [61] [63] [64]
18Sebastian Fischmeister [12]
19Luca Foschini [66]
20Alfonso Fuggetta [6]
21Carlo Ghezzi [2] [3] [4]
22Matthew Van Gundy [59]
23Sumit Gwalani [34]
24Paul Haas [49] [52]
25Oystein Hallaraker [38]
26Erland Jonsson [28]
27Nenad Jovanovic [43] [57] [64]
28Richard A. Kemmerer [8] [10] [11] [12] [13] [15] [17] [21] [24] [25] [26] [29] [34] [44] [45] [46] [49] [52] [56] [63]
29Vishal Kher [26]
30Engin Kirda [37] [42] [43] [47] [53] [57] [64]
31Patrick Klinkoff [47] [53]
32Christopher Krügel (Christopher Kruegel) [15] [23] [27] [28] [29] [30] [32] [36] [37] [41] [42] [43] [45] [47] [53] [57] [60] [62] [64] [66]
33Wenke Lee [48]
34Andrew Mitchel [16]
35Vishal Mittal [18]
36Collin Mulliner [48] [50]
37Darren Mutz [23] [25] [37] [40] [41] [56]
38Florian Nentwich [57]
39Gian Pietro Picco [1] [2] [5] [6] [58]
40William K. Robertson [26] [30] [32] [35] [36] [37] [45] [56] [60] [63]
41Kavitha Srinivasan [34]
42Zhendong Su [59]
43Ashish V. Thapliyal [66]
44Fredrik Valeur [15] [17] [23] [24] [29] [30] [40] [41] [42] [44] [63]
45Philipp Vogt [57]
46Andreas Wespi [19]
47Jingyu Zhou [17] [33]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)