Christopher Kruegel [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis NDSS-2017 - california,usa
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments NDSS-2017 - california,usa
TALKING BEHIND YOUR BACK: ATTACKS AND COUNTERMEASURES OF ULTRASONIC CROSS-DEVICE TRACKING BlackHatEU-2016 - London,uk
Driller: Augmenting Fuzzing Through Selective Symbolic Execution NDSS-2016 - california,usa
Know Your Achilles' Heel: Automatic Detection of Network Critical Services ACSAC-2015 - los angeles,usa
BareDroid: Large-Scale Analysis of Android Apps on Real Devices ACSAC-2015 - los angeles,usa
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications ACSAC-2015 - los angeles,usa
EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services SecuritySymposium-2015 - washington,USA
Meerkat: Detecting Website Defacements through Image-based Object Recognition SecuritySymposium-2015 - washington,USA
How the ELF Ruined Christmas SecuritySymposium-2015 - washington,USA
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities SecuritySymposium-2015 - washington,USA
USING STATIC BINARY ANALYSIS TO FIND VULNERABILITIES AND BACKDOORS IN FIRMWARE BlackhatUS-2015 - Las vegas,usa
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users, Dimva-2015 - Milan,Italy
A Large-Scale Study of Mobile Web App Security MOST-2015 - San Jose,USA
Evasive Malware Exposed and Deconstructed RSAus-2015 - San Francisco,USA
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework NDSS-2015 - san diego,usa
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware NDSS-2015 - san diego,usa
Protecting Web-based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel Raid-2014 - gottenburg,sweden
Eyes of a Human, Eyes of a Program: Leveraging different views of the web for analysis and detection Raid-2014 - gottenburg,sweden
BareCloud: Bare-metal Analysis-based Evasive Malware Detection usenix-2014 - san diego,usa
Hulk: Eliciting Malicious Behavior in Browser Extensions usenix-2014 - san diego,usa
FULL SYSTEM EMULATION: ACHIEVING SUCCESSFUL AUTOMATED DYNAMIC ANALYSIS OF EVASIVE MALWARE BlackHatUS-2014 - las vegas,usa
PExy: The other side of Exploit Kits Dimva-2014 - London,UK
Keynote: Fighting Malicious Code - An Eternal Struggle asiaccs-2014 - kyoto,japan
The Harvester, the Botmaster, and the Spammer: On the Relations Between the Different Actors in the Spam Landscape asiaccs-2014 - kyoto,japan
The Tricks of the Trade: What Makes Spam Campaigns Successful? IWCC-2014 - san jose,usa
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications NDSS-2014 - San Diego,USA
Nazca: Detecting Malware Distribution in Large-Scale Networks NDSS-2014 - San Diego,USA
Message In A Bottle: Sailing Past Censorship ACSAC-2013 - New Orleans, USA
Understanding and Fighting Evasive Malware RSAeu-2013 - Europaplein, Amsterdam
Revolver: An Automated Approach to the Detection of Evasive Web-based Malware USENIX-2013 - Washington, D.C.
Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services USENIX-2013 - Washington, D.C.
B@bel: Leveraging Email Delivery for Spam Mitigation USENIX-2012 - Washington, D.C.
PUBCRAWL: Protecting Users and Businesses from CRAWLers USENIX-2012 - Washington, D.C.
Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner USENIX-2012 - Washington, D.C.
Escape from Monkey Island: Evading High-Interaction Honeyclients 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment-2012 - Heraklion, Crete, Greece
MISHIMA: Multilateration of Internet hosts hidden using malicious fast-flux agents (Short Paper) 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment-2012 - Heraklion, Crete, Greece
Message In A Bottle: Sailing Past Censorship Privacy Enhancing Technologies Symposium-2012 - Vigo, Spain
The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious Code Confrence-on-computer-communications-security-2011 - Chicago, USA
Fear the EAR: Discovering and Mitigating Execution After Redirect Vulnerabilities Confrence-on-computer-communications-security-2011 - Chicago, USA
Securing Web applications Confrence-on-computer-communications-security-2011 - Chicago, USA Security
Escape from Monkey Island: Evading High-Interaction Honeyclients dimva-2011 - Amsterdam,Netherkands
MISHIMA: Multilateration of Internet hosts hidden using malicious fast-flux agents (Short Paper) dimva-2011 - Amsterdam,Netherkands
Toward Automated Detection Of Logic Vulnerabilities In Web Applications 19th USENIX Security Symposium-2010 - Washington DC, USA Security Web
Effective And Efficient Malware Detection At The End Host 18th USENIX Security Symposium-2009 - Montreal, Canada Security Malware
Malware Analysis 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2009 - Boston, USA Security Analysis Malware
A View On Current Malware Behaviors 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2009 - Boston, USA Security Malware
There Is No Free Phish: An Analysis Of Free And Live Phishing Kits 2nd USENIX Workshop on Offensive Technologies-2008 - San Jose, USA Security Analysis Phishing
Behavior-Based Spyware Detection 15th USENIX Security Symposium-2006 - Vancouver, Canada Security
Automating Mimicry Attacks Using Static Binary Analysis 14th USENIX Security Symposium-2005 - Baltimore, USA Security Analysis
Static Disassembly Of Obfuscated Binaries 13th USENIX Security Symposium-2004 - San Diego, USA Security