Manuel Egele
Manuel Egele
Email verificata su bu.edu - Home page
TitoloCitata daAnno
Panorama: capturing system-wide information flow for malware detection and analysis
H Yin, D Song, M Egele, C Kruegel, E Kirda
Proceedings of the 14th ACM conference on Computer and communications …, 2007
8582007
A survey on automated dynamic malware-analysis techniques and tools
M Egele, T Scholte, E Kirda, C Kruegel
ACM computing surveys (CSUR) 44 (2), 6, 2012
7192012
PiOS: Detecting Privacy Leaks in iOS Applications.
M Egele, C Kruegel, E Kirda, G Vigna
NDSS, 177-183, 2011
5592011
An empirical study of cryptographic misuse in android applications
M Egele, D Brumley, Y Fratantonio, C Kruegel
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2862013
Dynamic spyware analysis
M Egele, C Kruegel, E Kirda, H Yin, D Song
Advanced Computing Systems Professional and Technical Association, 2007
2802007
Compa: Detecting compromised accounts on social networks.
M Egele, G Stringhini, C Kruegel, G Vigna
NDSS, 2013
2322013
Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks
M Egele, P Wurzinger, C Kruegel, E Kirda
International Conference on Detection of Intrusions and Malware, and …, 2009
2202009
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
L Davi, A Dmitrienko, M Egele, T Fischer, T Holz, R Hund, S Nürnberger, ...
NDSS 26, 27-40, 2012
1622012
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel, G Vigna, Y Chen
NDSS, 2015
1482015
Follow the green: growth and dynamics in twitter follower markets
G Stringhini, G Wang, M Egele, C Kruegel, G Vigna, H Zheng, BY Zhao
Proceedings of the 2013 conference on Internet measurement conference, 163-176, 2013
1452013
A solution for the automated detection of clickjacking attacks
M Balduzzi, M Egele, E Kirda, D Balzarotti, C Kruegel
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
992010
Blanket execution: Dynamic similarity testing for program binaries and components
M Egele, M Woo, P Chapman, D Brumley
23rd {USENIX} Security Symposium ({USENIX} Security 14), 303-317, 2014
882014
Towards Automated Dynamic Analysis for Linux-based Embedded Firmware.
DD Chen, M Woo, D Brumley, M Egele
NDSS, 1-16, 2016
862016
Poultry markets: on the underground economy of twitter followers
G Stringhini, M Egele, C Kruegel, G Vigna
ACM SIGCOMM Computer Communication Review 42 (4), 527-532, 2012
812012
PayBreak: defense against cryptographic ransomware
E Kolodenker, W Koch, G Stringhini, M Egele
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
712017
Towards detecting compromised accounts on social networks
M Egele, G Stringhini, C Kruegel, G Vigna
IEEE Transactions on Dependable and Secure Computing 14 (4), 447-460, 2015
622015
Mitigating drive-by download attacks: Challenges and open problems
M Egele, E Kirda, C Kruegel
iNetSec 2009–Open Research Problems in Network Security, 52-62, 2009
572009
Organizing large scale hacking competitions
N Childers, B Boe, L Cavallaro, L Cavedon, M Cova, M Egele, G Vigna
International Conference on Detection of Intrusions and Malware, and …, 2010
482010
PoX: Protecting users from malicious Facebook applications
M Egele, A Moser, C Kruegel, E Kirda
Computer Communications 35 (12), 1507-1515, 2012
462012
{EVILCOHORT}: Detecting Communities of Malicious Accounts on Online Services
G Stringhini, P Mourlanne, G Jacob, M Egele, C Kruegel, G Vigna
24th {USENIX} Security Symposium ({USENIX} Security 15), 563-578, 2015
452015
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20