| | Preview | Author(s) | Title | Type | Issue Date |
| 1 | | Quarta, Davide ; Ianni, Michele ; Machiry, Aravind ; Fratantonio, Yanick ; Gustafson, Eric ; Balzarotti, Davide ; Lindorfer, Martina ; Vigna, Giovanni ; Kruegel, Christopher | Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone | Konferenzbeitrag Inproceedings ![peer reviewed](/image/PeerReview_Icon.png) | 2021 |
| 2 | | Aghakhani, Hojjat ; Gritti, Fabio ; Mecca, Francesco ; Lindorfer, Martina ; Ortolani, Stefano ; Balzarotti, Davide ; Vigna, Giovanni ; Krügel, Christopher | When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features | Konferenzbeitrag Inproceedings ![peer reviewed](/image/PeerReview_Icon.png) | 2020 |
| 3 | | Konoth, Radhesh Krishnan ; Vineti, Emanuele ; Moonsamy, Veelasha ; Lindorfer, Martina ; Kruegel, Christopher ; Bos, Herbert ; Vigna, Giovanni | MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense | Konferenzbeitrag Inproceedings ![peer reviewed](/image/PeerReview_Icon.png) | 2018 |
| 4 | | van der Veen, Victor ; Lindorfer, Martina ; Fratantonio, Yanick ; Padmanabha Pillai, Harikrishnan ; Vigna, Giovanni ; Kruegel, Christopher ; Bos, Herbert ; Razavi, Kaveh | GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM | Konferenzbeitrag Inproceedings ![peer reviewed](/image/PeerReview_Icon.png) | 2018 |
| 5 | | Continella, Andrea ; Fratantonio, Yanick ; Lindorfer, Martina ; Puccetti, Alessandro ; Zand, Ali ; Kruegel, Christopher ; Vigna, Giovanni | Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis | Konferenzbeitrag Inproceedings ![peer reviewed](/image/PeerReview_Icon.png) | 2017 |
| 6 | | Invernizzi, Luca ; Benvenuti, Stefano ; Cova, Marco ; Milani Comparetti, Paolo ; Krügel, Christopher ; Vigna, Giovanni | EVILSEED: A Guided Approach to Finding Malicious Web Pages | Konferenzbeitrag Inproceedings ![peer reviewed](/image/PeerReview_Icon.png) | 2012 |
| 7 | | Jacob, Gregoire ; Milani Comparetti, Paolo ; Neugschwandtner, Matthias ; Krügel, Christopher ; Vigna, Giovanni | A Static, Packer-Agnostic Filter to Detect Similar Malware Sample | Konferenzbeitrag Inproceedings ![peer reviewed](/image/PeerReview_Icon.png) | 2012 |
| 8 | | Neugschwandtner, Matthias ; Comparetti, Paolo Milani ; Jacob, Gregoire ; Kruegel, Christopher | FORECAST | Konferenzbeitrag Inproceedings ![peer reviewed](/image/PeerReview_Icon.png) | 2011 |
| 9 | | Kolbitsch, Clemens ; Kirda, Engin ; Krügel, Christopher | The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious Code | Konferenzbeitrag Inproceedings ![peer reviewed](/image/PeerReview_Icon.png) | 2011 |
| 10 | | Szydlowski, Martin ; Zhao, Ben Y. ; Kirda, Engin ; Krügel, Christopher | BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients | Konferenzbeitrag Inproceedings ![peer reviewed](/image/PeerReview_Icon.png) | 2011 |
| 11 | | Balduzzi, Marco ; Egele, Manuel ; Balzarotti, Davide ; Kirda, Engin ; Krügel, Christopher | A solution for the automated detection of clickjacking attacks | Konferenzbeitrag Inproceedings ![peer reviewed](/image/PeerReview_Icon.png) | 2010 |
| 12 | | Kolbitsch, Clemens ; Krügel, Christopher ; Kirda, Engin | Extending Mondrian Memory Protection | Konferenzbeitrag Inproceedings ![peer reviewed](/image/PeerReview_Icon.png) | 2010 |
| 13 | | Balduzzi, Marco ; Platzer, Christian ; Holz, Thorsten ; Kirda, Engin ; Balzarotti, Davide ; Krügel, Christopher | Abusing Social Networks for Automated User Profiling | Konferenzbeitrag Inproceedings ![peer reviewed](/image/PeerReview_Icon.png) | 2010 |
| 14 | | Wondracek, Gilbert ; Holz, Thorsten ; Platzer, Christian ; Kirda, Engin ; Krügel, Christopher | Is the Internet for Porn? An Insight Into the Online Adult Industry | Konferenzbeitrag Inproceedings ![peer reviewed](/image/PeerReview_Icon.png) | 2010 |
| 15 | | Kolbitsch, Clemens ; Holz, Thorsten ; Krügel, Christopher ; Kirda, Engin | Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries | Konferenzbeitrag Inproceedings ![peer reviewed](/image/PeerReview_Icon.png) | 2010 |
| 16 | | Milani Comparetti, Paolo ; Salvaneschi, Guido ; Kirda, Engin ; Kolbitsch, Clemens ; Krügel, Christopher ; Zanero, Stefano | Identifying Dormant Functionality in Malware Programs | Konferenzbeitrag Inproceedings ![peer reviewed](/image/PeerReview_Icon.png) | 2010 |
| 17 | | Wondracek, Gilbert ; Holz, Thorsten ; Kirda, Engin ; Kruegel, Christopher | A Practical Attack to De-anonymize Social Network Users | Konferenzbeitrag Inproceedings ![peer reviewed](/image/PeerReview_Icon.png) | 2010 |
| 18 | | Stone-Gross, Brett ; Moser, Andreas ; Krügel, Christopher ; Kirda, Engin ; Almaroth, Kevin | FIRE: FInding Rogue nEtworks | Konferenzbeitrag Inproceedings ![peer reviewed](/image/PeerReview_Icon.png) | 2009 |
| 19 | | Wurzinger, Peter ; Bilge, Leyla ; Kirda, Engin ; Krügel, Christopher ; Holz, Thorsten ; Göbel, Jan | Automatically Generating Models for Botnet Detection | Konferenzbeitrag Inproceedings ![peer reviewed](/image/PeerReview_Icon.png) | 2009 |
| 20 | | Milani Comparetti, Paolo ; Kolbitsch, Clemens ; Kirda, Engin ; Krügel, Christopher ; Xiaoyong, Zhou ; Xiaofeng, Wang | Effective and Efficient Malware Detection at the End Host | Konferenzbeitrag Inproceedings ![peer reviewed](/image/PeerReview_Icon.png) | 2009 |