Publications


  • Polymorphic Worm Detection Using Structural Information of Executables. Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, Giovanni Vigna. In Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID). .
  • A Multi-Model Approach to the Detection of Web-based Attacks. Christopher Kruegel, William Robertson, Giovanni Vigna. In Journal of Computers and Networks 48 (5). .
  • Automating Mimicry Attacks Using Static Binary Analysis. Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, Giovanni Vigna. In Proceedings of the USENIX Security Symposium. .
  • Reverse Engineering of Network Signatures. Darren Mutz, Christopher Kruegel, William Robertson, Giovanni Vigna, Richard Kemmerer. In Proceedings of the AusCERT Conference. .
  • Detecting Kernel-Level Rootkits Through Binary Analysis. Christopher Kruegel, William Robertson, Giovanni Vigna. In Proceedings of the Annual Computer Security Applications Conference (ACSAC). .
  • Testing Network-based Intrusion Detection Signatures Using Mutant Exploits. Giovanni Vigna, Davide Balzarotti, William Robertson. In Proceedings of the ACM Conference on Computer and Communications Security (CCS). .
  • Static Disassembly of Obfuscated Binaries. Christopher Kruegel, William Robertson, Fredrik Valuer, Giovanni Vigna. In Proceedings of the USENIX Security Symposium. .
  • Using Alert Verification to Identify Successful Intrusion Attempts. Christopher Kruegel, Giovanni Vigna, William Robertson. In Journal of Practice in Information Processing and Communication 27 (4). .
  • Alert Verification: Determining the Success of Intrusion Attempts. Christopher Kruegel, William Robertson. In Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). .
  • A Stateful Intrusion Detection System for World-Wide Web Servers. Giovanni Vigna, William Robertson, Vishal Kher, Richard Kemmerer. In Proceedings of the Annual Computer Security Applications Conference (ACSAC). .