Engin Kirda [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home ACMConference-2020 - Virtual, Virtual
Speculator: A Tool to Analyze Speculative Execution Attacks and Mitigations ACSAC2019-2019 - San Juan, Puerto Rico
USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks RAID2019-2019 - Beijing, China
Using AI to Detect Advanced Threats – Done Right CODASPY2019-2019 - Dallas, United States
Using AI to Detect Advanced Threats – Done Right CODASPY2019-2019 - Dallas, United States
ERASER: Your Data Won’t Be Back IEEEEuropeanSymposiumS&P-2018 - London, United Kingdom
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web NDSS-2017 - california,usa
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware USENIX-2016 - austin,usa
KEYNOTE 1: Dimva-2016 - Donostia-San Sebastián, Spain
CrossFire: An Analysis of Firefox Extension-Reuse Vulnterabilities NDSS-2016 - california,usa
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities SecuritySymposium-2015 - washington,USA
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks, Dimva-2015 - Milan,Italy
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users, Dimva-2015 - Milan,Italy
TrueClick: Automatically Distinguishing Trick Banners from Genuine Download Links ACSAC-2014 - new orleans,usa
A Look at Targeted Attacks Through the Lense of an NGO usenix-2014 - san diego,usa
VirtualSwindle: An Automated Attack Against In-App Billing on Android asiaccs-2014 - kyoto,japan
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks ACSAC-2013 - New Orleans, USA
PatchDroid: Scalable Third-Party Security Patches for Android Devices ACSAC-2013 - New Orleans, USA
PUBCRAWL: Protecting Users and Businesses from CRAWLers USENIX-2012 - Washington, D.C.
Reverse Social Engineering Attacks in Online Social Networks 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment-2012 - Heraklion, Crete, Greece
Opening Remarks 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats-2012 - San Francisco, USA Security
The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious Code Confrence-on-computer-communications-security-2011 - Chicago, USA
Reverse Social Engineering Attacks in Online Social Networks dimva-2011 - Amsterdam,Netherkands
Effective And Efficient Malware Detection At The End Host 18th USENIX Security Symposium-2009 - Montreal, Canada Security Malware
A View On Current Malware Behaviors 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2009 - Boston, USA Security Malware
Behavior-Based Spyware Detection 15th USENIX Security Symposium-2006 - Vancouver, Canada Security
Automating Mimicry Attacks Using Static Binary Analysis 14th USENIX Security Symposium-2005 - Baltimore, USA Security Analysis