追蹤
Giovanni Vigna
Giovanni Vigna
UC Santa Barbara and VMware
在 cs.ucsb.edu 的電子郵件地址已通過驗證 - 首頁
標題
引用次數
引用次數
年份
Understanding code mobility
A Fuggetta, GP Picco, G Vigna
IEEE Transactions on software engineering 24 (5), 342-361, 1998
19091998
Sok:(state of) the art of war: Offensive techniques in binary analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
2016 IEEE symposium on security and privacy (SP), 138-157, 2016
13842016
Driller: Augmenting Fuzzing Through Selective Symbolic Execution
N Stephens
Internetsociety, 2016
12322016
Detecting spammers on social networks
G Stringhini, C Kruegel, G Vigna
Proceedings of the 26th annual computer security applications conference, 1-9, 2010
11152010
Anomaly detection of web-based attacks
C Kruegel, G Vigna
Proceedings of the 10th ACM conference on Computer and communications …, 2003
10012003
Your botnet is my botnet: analysis of a botnet takeover
B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, ...
Proceedings of the 16th ACM conference on Computer and communications …, 2009
9952009
Detection and analysis of drive-by-download attacks and malicious JavaScript code
M Cova, C Kruegel, G Vigna
Proceedings of the 19th international conference on World wide web, 281-290, 2010
9402010
Cross site scripting prevention with dynamic data tainting and static analysis.
P Vogt, F Nentwich, N Jovanovic, E Kirda, C Kruegel, G Vigna
NDSS 2007, 12, 2007
8192007
Pios: Detecting privacy leaks in ios applications.
M Egele, C Kruegel, E Kirda, G Vigna
NDSS 2011, 18th, 2011
7642011
Comprehensive approach to intrusion detection alert correlation
F Valeur, G Vigna, C Kruegel, RA Kemmerer
IEEE Transactions on dependable and secure computing 1 (3), 146-169, 2004
7612004
Intrusion detection: a brief history and overview
RA Kemmerer, G Vigna
Computer 35 (4), supl27-supl30, 2002
7022002
Cookieless monster: Exploring the ecosystem of web-based device fingerprinting
N Nikiforakis, A Kapravelos, W Joosen, C Kruegel, F Piessens, G Vigna
2013 IEEE Symposium on Security and Privacy, 541-555, 2013
6702013
STATL: An attack language for state-based intrusion detection
ST Eckmann, G Vigna, RA Kemmerer
Journal of computer security 10 (1-2), 71-103, 2002
6172002
Polymorphic worm detection using structural information of executables
C Kruegel, E Kirda, D Mutz, W Robertson, G Vigna
Recent Advances in Intrusion Detection: 8th International Symposium, RAID …, 2006
5952006
Saner: Composing static and dynamic analysis to validate sanitization in web applications
D Balzarotti, M Cova, V Felmetsger, N Jovanovic, E Kirda, C Kruegel, ...
2008 IEEE Symposium on Security and Privacy (sp 2008), 387-401, 2008
5762008
Prophiler: a fast filter for the large-scale detection of malicious web pages
D Canali, M Cova, G Vigna, C Kruegel
Proceedings of the 20th international conference on World wide web, 197-206, 2011
5492011
Noxes: a client-side solution for mitigating cross-site scripting attacks
E Kirda, C Kruegel, G Vigna, N Jovanovic
Proceedings of the 2006 ACM symposium on Applied computing, 330-337, 2006
5192006
Designing distributed applications with mobile code paradigms
A Carzaniga, GP Picco, G Vigna
Proceedings of the 19th international conference on Software engineering, 22-32, 1997
5191997
Firmalice-automatic detection of authentication bypass vulnerabilities in binary firmware.
Y Shoshitaishvili, R Wang, C Hauser, C Kruegel, G Vigna
NDSS 1, 1-1, 2015
5182015
Static disassembly of obfuscated binaries
C Kruegel, W Robertson, F Valeur, G Vigna
USENIX security Symposium 13, 18-18, 2004
4912004
系統目前無法執行作業,請稍後再試。
文章 1–20