Giovanni Vigna
Giovanni Vigna
UC Santa Barbara and Lastline, Inc.
Verified email at - Homepage
Cited by
Cited by
Understanding code mobility
A Fuggetta, GP Picco, G Vigna
IEEE Transactions on software engineering 24 (5), 342-361, 1998
Detecting spammers on social networks
G Stringhini, C Kruegel, G Vigna
Proceedings of the 26th annual computer security applications conference, 1-9, 2010
Anomaly detection of web-based attacks
C Kruegel, G Vigna
Proceedings of the 10th ACM conference on Computer and communications …, 2003
Your botnet is my botnet: analysis of a botnet takeover
B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, ...
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Detection and analysis of drive-by-download attacks and malicious JavaScript code
M Cova, C Kruegel, G Vigna
Proceedings of the 19th international conference on World wide web, 281-290, 2010
Comprehensive approach to intrusion detection alert correlation
F Valeur, G Vigna, C Kruegel, RA Kemmerer
IEEE Transactions on dependable and secure computing 1 (3), 146-169, 2004
PiOS: Detecting Privacy Leaks in iOS Applications.
M Egele, C Kruegel, E Kirda, G Vigna
NDSS, 177-183, 2011
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis.
P Vogt, F Nentwich, N Jovanovic, E Kirda, C Kruegel, G Vigna
NDSS 2007, 12, 2007
Intrusion detection: a brief history and overview
RA Kemmerer, G Vigna
Computer 35 (4), supl27-supl30, 2002
STATL: An attack language for state-based intrusion detection
ST Eckmann, G Vigna, RA Kemmerer
Journal of computer security 10 (1-2), 71-103, 2002
Driller: Augmenting Fuzzing Through Selective Symbolic Execution.
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
NDSS 16 (2016), 1-16, 2016
Sok:(state of) the art of war: Offensive techniques in binary analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
2016 IEEE Symposium on Security and Privacy (SP), 138-157, 2016
Polymorphic worm detection using structural information of executables
C Kruegel, E Kirda, D Mutz, W Robertson, G Vigna
International Workshop on Recent Advances in Intrusion Detection, 207-226, 2005
Designing distributed applications with mobile code paradigms
A Carzaniga, GP Picco, G Vigna
Proceedings of the 19th international conference on Software engineering, 22-32, 1997
Cookieless monster: Exploring the ecosystem of web-based device fingerprinting
N Nikiforakis, A Kapravelos, W Joosen, C Kruegel, F Piessens, G Vigna
2013 IEEE Symposium on Security and Privacy, 541-555, 2013
Saner: Composing static and dynamic analysis to validate sanitization in web applications
D Balzarotti, M Cova, V Felmetsger, N Jovanovic, E Kirda, C Kruegel, ...
2008 IEEE Symposium on Security and Privacy (sp 2008), 387-401, 2008
Noxes: a client-side solution for mitigating cross-site scripting attacks
E Kirda, C Kruegel, G Vigna, N Jovanovic
Proceedings of the 2006 ACM symposium on Applied computing, 330-337, 2006
NetSTAT: A network-based intrusion detection approach
G Vigna, RA Kemmerer
Proceedings 14th Annual Computer Security Applications Conference (Cat. No …, 1998
A learning-based approach to the detection of SQL attacks
F Valeur, D Mutz, G Vigna
International Conference on Detection of Intrusions and Malware, and …, 2005
Static disassembly of obfuscated binaries
C Kruegel, W Robertson, F Valeur, G Vigna
USENIX security Symposium 13, 18-18, 2004
The system can't perform the operation now. Try again later.
Articles 1–20