Wissenschaftliche Artikel

Mitterhofer, S. K., Krügel, C., Kirda, E., & Platzer, C. (2009). Server-Side Bot Detection in Massively Multiplayer Online Games. IEEE Security and Privacy, 7(3), 29–36. https://doi.org/10.1109/msp.2009.78 ( reposiTUm)
Klinkoff, P., Krügel, C., Kirda, E., & Vigna, G. (2007). Extending .NET Security to Unmanaged Code. International Journal of Information Security, 6(6), 417–428. http://hdl.handle.net/20.500.12708/169715 ( reposiTUm)
Kirda, E., & Krügel, C. (2006). Protecting Users Against Phishing Attacks with AntiPhish. The Computer Journal, 49(5). http://hdl.handle.net/20.500.12708/173448 ( reposiTUm)
Mutz, D., Valeur, F., Krügel, C., & Vigna, G. (2006). Anomalous System Call Detection. ACM Transactions on Information and System Security, 9(1). http://hdl.handle.net/20.500.12708/173447 ( reposiTUm)
Bayer, U., Moser, A., Krügel, C., & Kirda, E. (2006). Dynamic Analysis of Malicious Code. Journal in Computer Virology, 2(1). http://hdl.handle.net/20.500.12708/173446 ( reposiTUm)
Krügel, C., Vigna, G., & Robertson, W. (2005). A multi-model approach to the detection of web-based attacks. Computer Networks, 48(5), 717–738. http://hdl.handle.net/20.500.12708/173353 ( reposiTUm)

Beiträge in Tagungsbänden

Quarta, D., Ianni, M., Machiry, A., Fratantonio, Y., Gustafson, E., Balzarotti, D., Lindorfer, M., Vigna, G., & Kruegel, C. (2021). Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM’s TrustZone. In Proceedings of the 2021 Research on offensive and defensive techniques in the Context of Man At The End (MATE) Attacks. ACM, Austria. ACM. https://doi.org/10.1145/3465413.3488571 ( reposiTUm)
Aghakhani, H., Gritti, F., Mecca, F., Lindorfer, M., Ortolani, S., Balzarotti, D., Vigna, G., & Krügel, C. (2020). When Malware is Packin’ Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features. In Network and Distributed System Security Symposium (NDSS). Internet Society. http://hdl.handle.net/20.500.12708/58307 ( reposiTUm)
Konoth, R. K., Vineti, E., Moonsamy, V., Lindorfer, M., Kruegel, C., Bos, H., & Vigna, G. (2018). MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM. https://doi.org/10.1145/3243734.3243858 ( reposiTUm)
van der Veen, V., Lindorfer, M., Fratantonio, Y., Padmanabha Pillai, H., Vigna, G., Kruegel, C., Bos, H., & Razavi, K. (2018). GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM. In Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 92–113). Springer. https://doi.org/10.1007/978-3-319-93411-2_5 ( reposiTUm)
Continella, A., Fratantonio, Y., Lindorfer, M., Puccetti, A., Zand, A., Kruegel, C., & Vigna, G. (2017). Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis. In Proceedings 2017 Network and Distributed System Security Symposium. Internet Society. https://doi.org/10.14722/ndss.2017.23465 ( reposiTUm)
Invernizzi, L., Benvenuti, S., Cova, M., Milani Comparetti, P., Krügel, C., & Vigna, G. (2012). EVILSEED: A Guided Approach to Finding Malicious Web Pages. In Proceedings of the 2011 IEEE Symposium on Security and Privacy (pp. 428–442). http://hdl.handle.net/20.500.12708/54350 ( reposiTUm)
Jacob, G., Milani Comparetti, P., Neugschwandtner, M., Krügel, C., & Vigna, G. (2012). A Static, Packer-Agnostic Filter to Detect Similar Malware Sample. In Proceedings of the 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment. Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Germany, EU. Springer. http://hdl.handle.net/20.500.12708/54351 ( reposiTUm)
Neugschwandtner, M., Comparetti, P. M., Jacob, G., & Kruegel, C. (2011). FORECAST. In Proceedings of the 27th Annual Computer Security Applications Conference on - ACSAC ’11. Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. ACM. https://doi.org/10.1145/2076732.2076735 ( reposiTUm)
Kolbitsch, C., Kirda, E., & Krügel, C. (2011). The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious Code. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS). ACM Conference on Computer and Communications Security (CCS), Washington, USA, Non-EU. ACM. http://hdl.handle.net/20.500.12708/54011 ( reposiTUm)
Szydlowski, M., Zhao, B. Y., Kirda, E., & Krügel, C. (2011). BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients. In Proceedings of the 20th International Conference on Computer Communication Networks (ICCCN 2011) (p. 6). IEEE. http://hdl.handle.net/20.500.12708/53715 ( reposiTUm)
Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., & Krügel, C. (2010). Abusing Social Networks for Automated User Profiling. In Recent Advances in Intrusion Detection (RAID 2010) (p. 20). Springer. http://hdl.handle.net/20.500.12708/53362 ( reposiTUm)
Kolbitsch, C., Holz, T., Krügel, C., & Kirda, E. (2010). Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries. In 2010 IEEE Symposium on Security and Privacy (pp. 29–44). IEEE Computer Society. https://doi.org/10.1109/SP.2010.10 ( reposiTUm)
Kolbitsch, C., Krügel, C., & Kirda, E. (2010). Extending Mondrian Memory Protection. In IST-091 Information Assurance and Cyber Defence (p. 18). NATO Research and Technology Organization (NATO RTO). http://hdl.handle.net/20.500.12708/53348 ( reposiTUm)
Balduzzi, M., Egele, M., Balzarotti, D., Kirda, E., & Krügel, C. (2010). A solution for the automated detection of clickjacking attacks. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security - ASIACCS ’10. ACM Symposium on Information computer and Communication Security (AsiaCCS), Bejing, China, Non-EU. ACM. https://doi.org/10.1145/1755688.1755706 ( reposiTUm)
Wondracek, G., Holz, T., Platzer, C., Kirda, E., & Krügel, C. (2010). Is the Internet for Porn? An Insight Into the Online Adult Industry. In The Ninth Workshop on the Economics of Information Security (WEIS 2010) (p. 14). ACM Press. http://hdl.handle.net/20.500.12708/53357 ( reposiTUm)
Milani Comparetti, P., Salvaneschi, G., Kirda, E., Kolbitsch, C., Krügel, C., & Zanero, S. (2010). Identifying Dormant Functionality in Malware Programs. In Proceedings of the 2010 IEEE Symposium on Security and Privacy (pp. 61–76). IEEE Computer Society. http://hdl.handle.net/20.500.12708/53340 ( reposiTUm)
Wondracek, G., Holz, T., Kirda, E., & Kruegel, C. (2010). A Practical Attack to De-anonymize Social Network Users. In 2010 IEEE Symposium on Security and Privacy. IEEE, Austria. IEEE Computer Society. https://doi.org/10.1109/sp.2010.21 ( reposiTUm)
Milani Comparetti, P., Kolbitsch, C., Kirda, E., Krügel, C., Xiaoyong, Z., & Xiaofeng, W. (2009). Effective and Efficient Malware Detection at the End Host. In usenix 2009. Usenix Security Symposium, Baltimore, USA, Austria. http://hdl.handle.net/20.500.12708/52887 ( reposiTUm)
Stone-Gross, B., Moser, A., Krügel, C., Kirda, E., & Almaroth, K. (2009). FIRE: FInding Rogue nEtworks. In 25th Annual Computer Security Applications Conference (ACSAC). Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. http://hdl.handle.net/20.500.12708/52891 ( reposiTUm)
Wurzinger, P., Bilge, L., Kirda, E., Krügel, C., Holz, T., & Göbel, J. (2009). Automatically Generating Models for Botnet Detection. In 14th European Symposium on Research in Computer Security (ESORICS 2009). European Symposium on Research in Computer Security (ESORICS), Saint Malo, Brittany, France, EU. http://hdl.handle.net/20.500.12708/52890 ( reposiTUm)
Milani Comparetti, P., Wondracek, G., Krügel, C., & Kirda, E. (2009). Prospex: Protocol Specification Extraction. In Proceedings of the IEEE Symposium on Security and Privacy (pp. 110–125). IEEE. http://hdl.handle.net/20.500.12708/52878 ( reposiTUm)
Krügel, C., Platzer, C., Kirda, E., Ludl, C., & Wurzinger, P. (2009). SWAP: Mitigating XSS Attacks using a Reverse Proxy. In SESS proceedings. International Workshop on Software Engineering for Secure Systems (SESS), Minneapolis, USA, Non-EU. http://hdl.handle.net/20.500.12708/52880 ( reposiTUm)
Kirda, E., Egele, M., & Krügel, C. (2009). Removing Web Spam Links from Search Engine Results. In EICAR proceedings. Conference of the European Institute for Computer Antivirus Research (EICAR), Germany, EU. http://hdl.handle.net/20.500.12708/52881 ( reposiTUm)
Egele, M., Kirda, E., & Krügel, C. (2009). Mitigating Drive-by Download Attacks: Challenges and Open Problems. In Open Research Problems in Network Security Workshop. Open Research Problems in Network Security Workshop, Zurich, EU. http://hdl.handle.net/20.500.12708/52883 ( reposiTUm)
Wurzinger, P., Egele, M., Kirda, E., & Krügel, C. (2009). Defending Browsers against Drive-by Downloads: Mitigating Heap-spraying Code Injection Attacks. In Sixth Conference on Detection of Intrusions and Malware & Vulnerability Assessment. Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Germany, EU. http://hdl.handle.net/20.500.12708/52884 ( reposiTUm)
Bayer, U., Kirda, E., Krügel, C., Milani Comparetti, P., & Hlauschek, C. (2009). Scalable, Behavior-Based Malware Clustering. In 16th Annual Network and Distributed System Security Symposium (NDSS 2009). Network and Distributed System Security Symposium (NDSS), USA, Non-EU. NDSS Proceedings. http://hdl.handle.net/20.500.12708/52860 ( reposiTUm)
Starnberger, G., Krügel, C., & Kirda, E. (2008). Overbot - A botnet protocol based on Kademlia. In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SecureComm 2008) (pp. 1–9). ACM. http://hdl.handle.net/20.500.12708/52276 ( reposiTUm)
Christodorescu, M., Jha, S., & Krügel, C. (2007). Mining Specifications of Malicious Behavior. In Proceedings of the European Software Engineering Conference (ESEC) (pp. 1–10). http://hdl.handle.net/20.500.12708/52148 ( reposiTUm)
Rosiello, A., Krügel, C., Kirda, E., & Ferrandi, F. (2007). A Layout-Similarity-Based Approach for Detecting Phishing Pages. In Proceedings of the IEEE International Conference on Security and Privacy in Communication Networks (SecureComm) (pp. 1–10). http://hdl.handle.net/20.500.12708/52147 ( reposiTUm)
Karlberger, C., Bayler, G., Krügel, C., & Kirda, E. (2007). Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters. In Usenix Workshop on Offensive Technologies (WOOT) (pp. 1–7). http://hdl.handle.net/20.500.12708/52150 ( reposiTUm)
Raffetseder, T., Krügel, C., & Kirda, E. (2007). Detecting System Emulators. In Proceedings of the Information Security Conference (ISC ) (pp. 1–18). http://hdl.handle.net/20.500.12708/52149 ( reposiTUm)
Yin, H., Song, D., Egele, M., Krügel, C., & Kirda, E. (2007). Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS) (pp. 1–12). http://hdl.handle.net/20.500.12708/52151 ( reposiTUm)
Szydlowski, M., Krügel, C., & Kirda, E. (2007). Secure Input for Web Applications. In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC) (pp. 1–11). http://hdl.handle.net/20.500.12708/52152 ( reposiTUm)
Balzarotti, D., Robertson, W., Krügel, C., & Vigna, G. (2007). Improving Signature Testing Through Dynamic Data Flow Analysis. In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC) (pp. 22–32). http://hdl.handle.net/20.500.12708/52154 ( reposiTUm)
Moser, A., Krügel, C., & Kirda, E. (2007). Limits of Static Analysis for Malware Detection. In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC) (pp. 12–21). http://hdl.handle.net/20.500.12708/52153 ( reposiTUm)
Vogt, P., Nentwich, F., Jovanovic, N., Krügel, C., Kirda, E., & Vigna, G. (2007). Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In Proceedings of the Network and Distributed System Security Symposium (NDSS) (pp. 1–12). http://hdl.handle.net/20.500.12708/52142 ( reposiTUm)
Raffetseder, T., Kirda, E., & Krügel, C. (2007). Building Anti-Phishing Browser Plug-Ins: An Experience Report. In 3rd International Workshop on Software Engineering for Secure Systems (SESS) (pp. 1–7). IEEE Computer Society. http://hdl.handle.net/20.500.12708/52144 ( reposiTUm)
Ludl, C., McAllister, S., Kirda, E., & Krügel, C. (2007). On the Effectiveness of Techniques to Detect Phishing Sites. In Proceedings of the Detection of Intrusions and Malware and Vulnerability Assessment Conference (DIMVA) (pp. 1–20). http://hdl.handle.net/20.500.12708/52145 ( reposiTUm)
Moser, A., Krügel, C., & Kirda, E. (2007). Exploring Multiple Execution Paths for Malware Analysis. In Proceedings of the IEEE Symposium on Security and Privacy (pp. 1–15). http://hdl.handle.net/20.500.12708/52143 ( reposiTUm)
Egele, M., Krügel, C., Kirda, E., Yin, H., & Song, D. (2007). Dynamic Spyware Analysis. In Proceedings of the Usenix Annual Technical Conference (pp. 1–14). http://hdl.handle.net/20.500.12708/52146 ( reposiTUm)
Jovanovic, N., Krügel, C., & Kirda, E. (2006). Precise Alias Analysis for Static Detection of Web Application Vulnerabilities. In Proceedings of the 2006 Programming Languages and Analysis for Security Workshop (pp. 27–36). ACM Inc. http://hdl.handle.net/20.500.12708/51371 ( reposiTUm)
Jovanovic, N., Krügel, C., & Kirda, E. (2006). Pixy: A static Analysis Tool for Detecting web Application Vulnerabilities. In Proceedings of the 2006 IEEE Symposium on Security and Privacy (pp. 258–263). IEEE Inc. http://hdl.handle.net/20.500.12708/51372 ( reposiTUm)
Jovanovic, N., Kirda, E., & Krügel, C. (2006). Preventing Cross Site Request Forgery Attacks. In 2nd International Conference on Security and Privacy in Communication Networks & the Workshops. SecureComm 2006, Baltimore, MD, USA, Non-EU. IEEE. http://hdl.handle.net/20.500.12708/51397 ( reposiTUm)
Kirda, E., Krügel, C., Banks, G., Vigna, G., & Kemmerer, R. (2006). Bahavior-based Spyware Detection. In Proc. 15th USENIX Security Symposium (pp. 273–288). http://hdl.handle.net/20.500.12708/51798 ( reposiTUm)
Egele, M., Szydlowski, M., Kirda, E., & Krügel, C. (2006). Using Static Program Analysis to Aid Intrusion Detection. In Proc. Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Lecture Notes in Computer Science (pp. 17–37). Springer-Verlag. http://hdl.handle.net/20.500.12708/51697 ( reposiTUm)
Bayer, U., Krügel, C., & Kirda, E. (2006). TTAnalyze: A Tool for Analyzing Malware. In Proc. 15th Annual Conference of the European Institute for Computer Antivirus Research (EICAR) (pp. 180–192). http://hdl.handle.net/20.500.12708/51699 ( reposiTUm)
Kals, S., Kirda, E., Krügel, C., & Jovanovic, N. (2006). SecuBat: A Web Vulnerability Scanner. In Proc. 15th International World Wide Web Conference (WWW) (pp. 247–257). http://hdl.handle.net/20.500.12708/51698 ( reposiTUm)
Kirda, E., Krügel, C., Vigna, G., & Jovanovic, N. (2006). Noxes: A Client-Side Solution for Mitigating Cross Site Scripting Attacks. In Proc. 21st ACM Symposium on Applied Computing (SAC) (pp. 330–338). ACM Press. http://hdl.handle.net/20.500.12708/51700 ( reposiTUm)
Valeur, F., Vigna, G., Krügel, C., & Kirda, E. (2006). An Anomaly-driven Reverse Proxy for Web Applications. In Proc. 21st ACM Symposium on Applied Computing (SAC) (pp. 361–369). ACM Press. http://hdl.handle.net/20.500.12708/51701 ( reposiTUm)
Robertson, W., Vigna, G., Krügel, C., & Kemmerer, R. (2006). Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. In Proc. Network and Distributed System Security Symposium (NDSS) (pp. 31–46). Internet Society. http://hdl.handle.net/20.500.12708/51702 ( reposiTUm)
Klinkoff, P., Krügel, C., Kirda, E., & Vigna, G. (2006). Extending .NET Security to Unmanaged Code. In Proc. 9th Information Security Conference (ISC), Lecture Notes in Computer Science (pp. 1–16). Springer-Verlag. http://hdl.handle.net/20.500.12708/51696 ( reposiTUm)
Krügel, C., Kirda, E., Mutz, D., Robertson, W., & Vigna, G. (2005). Automating Mimicry Attacks Using Static Binary Analysis. In Proceedings of the 14th USENIX Security Symposium (pp. 161–176). USENIX Assoication. http://hdl.handle.net/20.500.12708/51049 ( reposiTUm)
Kirda, E., & Krügel, C. (2005). Protecting Users Against Phishing Attacks with AntiPhish. In Proceedings of the 29th Anual International Computer Software and Applications Conference (pp. 517–524). IEEE Computer Society. http://hdl.handle.net/20.500.12708/51050 ( reposiTUm)
Krügel, C., Kirda, E., Mutz, D., Robertson, W., & Vigna, G. (2005). Polymorphic Worm Detection Using Structural Information of Executables. In Proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID). RAID International Symposium on Recent Advances in Intrusion Detection 2002, USA, Non-EU. Springer-Verlag. http://hdl.handle.net/20.500.12708/51179 ( reposiTUm)
Mutz, D., Krügel, C., Robertson, W., Vigna, G., & Kemmerer, R. (2005). Reverse Engineering of Network Signatures. In Proceedings of the Information Technology Security Conference. AusCERT, Gold Coast, Australia, Non-EU. http://hdl.handle.net/20.500.12708/51184 ( reposiTUm)

Beiträge in Büchern

Vigna, G., & Krügel, C. (2005). Host-Based Intrusion Detection. In Handbook of Information Security (pp. 1–12). John Wiley and Sons. http://hdl.handle.net/20.500.12708/25363 ( reposiTUm)
Krügel, C. (2005). Internet Security. In The Industrial Communication Technology Handbook (pp. 1–14). CRC Press. http://hdl.handle.net/20.500.12708/25364 ( reposiTUm)

Bücher

Schildt, G.-H., Kahn, D., Krügel, C., & Mörz, C. (2005). Einführung in die Technische Informatik. Springer-Verlag. http://hdl.handle.net/20.500.12708/22288 ( reposiTUm)

Präsentationen

Krügel, C. (2006). Malicious Code Analysis. Talk at the Computer Science Colloquium, Carleton University, Ottawa, Canada, Non-EU. http://hdl.handle.net/20.500.12708/84563 ( reposiTUm)
Krügel, C. (2006). Vulnerabilities in Web Applications. TERENA Networking Conference, Italy, EU. http://hdl.handle.net/20.500.12708/84564 ( reposiTUm)
Krügel, C. (2006). Malicious Code Analysis. Habilitationskolloquium, Wien, Austria. http://hdl.handle.net/20.500.12708/84565 ( reposiTUm)
Krügel, C. (2005). Identification of Anomalous System Calls for Intrusion Detection. Informatik Kolloquium, TU Muenchen, Garching, Deutschland, Austria. http://hdl.handle.net/20.500.12708/84463 ( reposiTUm)
Krügel, C. (2005). Advanced Techniques for Malicious Code Detection. NATO ASI Workshop, Yerevan, Armenien, Non-EU. http://hdl.handle.net/20.500.12708/84464 ( reposiTUm)
Krügel, C. (2005). Intrusion Detection und Korrelation. FH Hagenberg, Hagenberg, Austria. http://hdl.handle.net/20.500.12708/84462 ( reposiTUm)
Krügel, C. (2005). Malicious Code Analysis: Detecting Metamorphic Worms. Informatik Kolloquium, TU Muenchen, Garching, Deutschland, Austria. http://hdl.handle.net/20.500.12708/84466 ( reposiTUm)
Krügel, C. (2005). Malicious Code Analysis: Detecting Metamorphic Worms. Technische Universität Berlin, Austria. http://hdl.handle.net/20.500.12708/84465 ( reposiTUm)
Krügel, C. (2005). Analysing and Detecting Malicious Code. Informatik Kolloquium, TU Muenchen, Garching, Deutschland, Austria. http://hdl.handle.net/20.500.12708/84467 ( reposiTUm)
Krügel, C. (2004). Identification of Anomalous System Calls for Intrusion Detection. Informatik Kolloquium, TU Muenchen, Garching, Deutschland, Austria. http://hdl.handle.net/20.500.12708/84347 ( reposiTUm)
Krügel, C. (1999). Benefits of Jini and EIB Connectivity. Jini Users Meeting, Zürich, Switzerland, Austria. http://hdl.handle.net/20.500.12708/84180 ( reposiTUm)

Hochschulschriften

Krügel, C. (2006). Malicious code analysis [Professorial Dissertation, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/180607 ( reposiTUm)
Kruegel, C. (2000). Jini connectivity for home and building automation : a case study for EIB [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/178118 ( reposiTUm)