BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Croatia
1 × France
1 × Italy
1 × Portugal
1 × South Korea
1 × Spain
1 × Switzerland
1 × USA
Collaborated with:
E.Kirda G.Vigna M.Christodorescu U.Bayer S.Jha T.Toth A.Zand X.Yan P.Payet A.Doupé M.Egele L.Bilge N.Jovanovic F.Valeur Y.Fratantonio A.Machiry A.Bianchi M.Alkhalaf S.R.Choudhary M.Fazzini T.Bultan A.Orso D.Canali A.Lanzi D.Balzarotti
Talks about:
detect (4) analysi (3) captcha (2) anomali (2) specif (2) malwar (2) client (2) applic (2) side (2) web (2)

Person: Christopher Krügel

DBLP DBLP: Kr=uuml=gel:Christopher

Contributed to:

ESEC/FSE 20152015
SAC 20142014
SAC 20132013
ISSTA 20122012
SAC 20102010
ESEC/FSE 20072007
SAC 20062006
SAC 20022002

Wrote 11 papers:

ESEC-FSE-2015-FratantonioMBKV #android #named
CLAPP: characterizing loops in Android applications (YF, AM, AB, CK, GV), pp. 687–697.
SAC-2014-ZandVYK #detection
Extracting probable command and control signatures for detecting botnets (AZ, GV, XY, CK), pp. 1657–1662.
SAC-2013-PayetDKV #analysis #execution #scalability
EARs in the wild: large-scale analysis of execution after redirect vulnerabilities (PP, AD, CK, GV), pp. 1792–1799.
ISSTA-2012-AlkhalafCFBOK #analysis #consistency #difference #named #nondeterminism #string #validation
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies (MA, SRC, MF, TB, AO, CK), pp. 56–66.
ISSTA-2012-CanaliLBKCK #detection
A quantitative study of accuracy in system call-based malware detection (DC, AL, DB, CK, MC, EK), pp. 122–132.
SAC-2010-BayerKK #analysis #performance
Improving the efficiency of dynamic malware analysis (UB, EK, CK), pp. 1871–1878.
SAC-2010-EgeleBKK #web
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms (ME, LB, EK, CK), pp. 1865–1870.
ESEC-FSE-2007-ChristodorescuJK #behaviour #mining #specification
Mining specifications of malicious behavior (MC, SJ, CK), pp. 5–14.
SAC-2006-KirdaKVJ #named
Noxes: a client-side solution for mitigating cross-site scripting attacks (EK, CK, GV, NJ), pp. 330–337.
SAC-2006-ValeurVKK #web
An anomaly-driven reverse proxy for web applications (FV, GV, CK, EK), pp. 361–368.
SAC-2002-KrugelTK #detection #network
Service specific anomaly detection for network intrusion detection (CK, TT, EK), pp. 201–208.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.