Scalable, behavior-based malware clustering U Bayer, P Milani Comparetti, C Hlauschek, C Kruegel, E Kirda Network and Distributed System Security Symposium (NDSS), 2009 | 997 | 2009 |
Effective and efficient malware detection at the end host C Kolbitsch, P Milani Comparetti, C Kruegel, E Kirda, X Zhou, XF Wang Proceedings of the 18th USENIX security symposium, 351-366, 2009 | 736 | 2009 |
Detecting environment-sensitive malware M Lindorfer, C Kolbitsch, P Milani Comparetti Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011 | 560 | 2011 |
Prospex: Protocol specification extraction P Milani Comparetti, G Wondracek, C Kruegel, E Kirda Security and Privacy, 2009 30th IEEE Symposium on, 110-125, 2009 | 443* | 2009 |
Automatic network protocol analysis G Wondracek, P Milani Comparetti, C Kruegel, E Kirda 15th Symposium on Network and Distributed System Security (NDSS), 2008 | 322 | 2008 |
EVILSEED: A Guided Approach to Finding Malicious Web Pages L Invernizzi, UC Santa Barbara, S Benvenuti, M Cova, ... Security and Privacy (SP), 2011 IEEE Symposium on, 2012 | 268 | 2012 |
Identifying dormant functionality in malware programs P Milani Comparetti, G Salvaneschi, E Kirda, C Kolbitsch, C Kruegel, ... Security and Privacy (SP), 2010 IEEE Symposium on, 61-76, 2010 | 166* | 2010 |
A static, packer-agnostic filter to detect similar malware samples G Jacob, M Neugschwandtner, P Milani Comparetti, C Kruegel, G Vigna Department of Computer Science University of California Santa Barbara …, 2010 | 112 | 2010 |
Lines of Malicious Code: Insights Into the Malicious Software Industry M Lindorfer, A Di Federico, F Maggi, P Milani Comparetti, S Zanero | 96 | 2012 |
The borg: Nanoprobing binaries for buffer overreads M Neugschwandtner, P Milani Comparetti, I Haller, H Bos Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 77 | 2015 |
FORECAST: skimming off the malware cream M Neugschwandtner, P Milani Comparetti, G Jacob, C Kruegel Proceedings of the 27th Annual Computer Security Applications Conference, 11-20, 2011 | 44 | 2011 |
Detecting malware's failover C&C strategies with squeeze M Neugschwandtner, P Milani Comparetti, C Platzer Proceedings of the 27th Annual Computer Security Applications Conference, 21-30, 2011 | 39 | 2011 |
dAnubis–dynamic device driver analysis based on virtual machine introspection M Neugschwandtner, C Platzer, P Milani Comparetti, U Bayer Detection of Intrusions and Malware, and Vulnerability Assessment, 41-60, 2010 | 30 | 2010 |
Methods and systems for reciprocal generation of watch-lists and malware signatures C Kolbitsch, PM Comparetti, L Cavedon US Patent 8,910,285, 2014 | 27 | 2014 |
Methods and systems for malware detection based on environment-dependent behavior C Kolbitsch, PM Comparetti, L Cavedon US Patent 9,361,459, 2016 | 17 | 2016 |
Lobotomy: An architecture for jit spraying mitigation M Jauernig, M Neugschwandtner, C Platzer, PM Comparetti 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 11 | 2014 |
ForeCast M Neugschwandtner, PM Comparetti, G Jacob, C Kruegel Proceedings of the 27th Annual Computer Security Applications Conference on …, 2011 | | 2011 |
dAnubis U Bayer, P Milani Comparetti, M Neugschwandtner, C Platzer DIMVA 2010, July 8-9, 2010, Paris, France, 2010 | | 2010 |
Reference clustering P Milani Comparetti | | 2010 |
Effective and Efficient Malware Detection at the End Host P Milani Comparetti, C Kolbitsch, E Kirda, C Krügel, Z Xiaoyong, ... usenix 2009, 2009 | | 2009 |