Travelled to:
1 × Croatia
1 × France
1 × Italy
1 × Portugal
1 × South Korea
1 × Spain
1 × Switzerland
1 × USA
Collaborated with:
E.Kirda G.Vigna M.Christodorescu U.Bayer S.Jha T.Toth A.Zand X.Yan P.Payet A.Doupé M.Egele L.Bilge N.Jovanovic F.Valeur Y.Fratantonio A.Machiry A.Bianchi M.Alkhalaf S.R.Choudhary M.Fazzini T.Bultan A.Orso D.Canali A.Lanzi D.Balzarotti
Talks about:
detect (4) analysi (3) captcha (2) anomali (2) specif (2) malwar (2) client (2) applic (2) side (2) web (2)
Person: Christopher Krügel
DBLP: Kr=uuml=gel:Christopher
Contributed to:
Wrote 11 papers:
- ESEC-FSE-2015-FratantonioMBKV #android #named
- CLAPP: characterizing loops in Android applications (YF, AM, AB, CK, GV), pp. 687–697.
- SAC-2014-ZandVYK #detection
- Extracting probable command and control signatures for detecting botnets (AZ, GV, XY, CK), pp. 1657–1662.
- SAC-2013-PayetDKV #analysis #execution #scalability
- EARs in the wild: large-scale analysis of execution after redirect vulnerabilities (PP, AD, CK, GV), pp. 1792–1799.
- ISSTA-2012-AlkhalafCFBOK #analysis #consistency #difference #named #nondeterminism #string #validation
- ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies (MA, SRC, MF, TB, AO, CK), pp. 56–66.
- ISSTA-2012-CanaliLBKCK #detection
- A quantitative study of accuracy in system call-based malware detection (DC, AL, DB, CK, MC, EK), pp. 122–132.
- SAC-2010-BayerKK #analysis #performance
- Improving the efficiency of dynamic malware analysis (UB, EK, CK), pp. 1871–1878.
- SAC-2010-EgeleBKK #web
- CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms (ME, LB, EK, CK), pp. 1865–1870.
- ESEC-FSE-2007-ChristodorescuJK #behaviour #mining #specification
- Mining specifications of malicious behavior (MC, SJ, CK), pp. 5–14.
- SAC-2006-KirdaKVJ #named
- Noxes: a client-side solution for mitigating cross-site scripting attacks (EK, CK, GV, NJ), pp. 330–337.
- SAC-2006-ValeurVKK #web
- An anomaly-driven reverse proxy for web applications (FV, GV, CK, EK), pp. 361–368.
- SAC-2002-KrugelTK #detection #network
- Service specific anomaly detection for network intrusion detection (CK, TT, EK), pp. 201–208.