Publications


  • Detecting Kernel-Level Rootkits Through Binary Analysis. Christopher Kruegel, William Robertson, Giovanni Vigna. In Proceedings of the Annual Computer Security Applications Conference (ACSAC). .
  • Testing Network-based Intrusion Detection Signatures Using Mutant Exploits. Giovanni Vigna, Davide Balzarotti, William Robertson. In Proceedings of the ACM Conference on Computer and Communications Security (CCS). .
  • Static Disassembly of Obfuscated Binaries. Christopher Kruegel, William Robertson, Fredrik Valuer, Giovanni Vigna. In Proceedings of the USENIX Security Symposium. .
  • Using Alert Verification to Identify Successful Intrusion Attempts. Christopher Kruegel, Giovanni Vigna, William Robertson. In Journal of Practice in Information Processing and Communication 27 (4). .
  • Alert Verification: Determining the Success of Intrusion Attempts. Christopher Kruegel, William Robertson. In Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). .
  • A Stateful Intrusion Detection System for World-Wide Web Servers. Giovanni Vigna, William Robertson, Vishal Kher, Richard Kemmerer. In Proceedings of the Annual Computer Security Applications Conference (ACSAC). .
  • Run-time Detection of Heap-based Overflows. William Robertson, Christopher Kruegel, Darren Mutz, Fredrik Valeur. In Proceedings of the USENIX Large Installation System Administration Conference (LISA). .
  • Topology-based Detection of Anomalous BGP Messages. Christopher Kruegel, Darren Mutz, William Robertson, Fredrik Valuer. In Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID). .