Seguir
Giovanni Vigna
Giovanni Vigna
UC Santa Barbara and VMware
Dirección de correo verificada de cs.ucsb.edu - Página principal
Título
Citado por
Citado por
Año
Understanding code mobility
A Fuggetta, GP Picco, G Vigna
IEEE Transactions on software engineering 24 (5), 342-361, 1998
19101998
Sok:(state of) the art of war: Offensive techniques in binary analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
2016 IEEE symposium on security and privacy (SP), 138-157, 2016
11902016
Driller: Augmenting fuzzing through selective symbolic execution.
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
NDSS 16 (2016), 1-16, 2016
11152016
Detecting spammers on social networks
G Stringhini, C Kruegel, G Vigna
Proceedings of the 26th annual computer security applications conference, 1-9, 2010
10932010
Anomaly detection of web-based attacks
C Kruegel, G Vigna
Proceedings of the 10th ACM conference on Computer and communications …, 2003
9892003
Your botnet is my botnet: analysis of a botnet takeover
B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, ...
Proceedings of the 16th ACM conference on Computer and communications …, 2009
9772009
Detection and analysis of drive-by-download attacks and malicious JavaScript code
M Cova, C Kruegel, G Vigna
Proceedings of the 19th international conference on World wide web, 281-290, 2010
9232010
Cross site scripting prevention with dynamic data tainting and static analysis.
P Vogt, F Nentwich, N Jovanovic, E Kirda, C Kruegel, G Vigna
NDSS 2007, 12, 2007
8052007
Pios: Detecting privacy leaks in ios applications.
M Egele, C Kruegel, E Kirda, G Vigna
NDSS, 177-183, 2011
7542011
Comprehensive approach to intrusion detection alert correlation
F Valeur, G Vigna, C Kruegel, RA Kemmerer
IEEE Transactions on dependable and secure computing 1 (3), 146-169, 2004
7442004
Intrusion detection: a brief history and overview
RA Kemmerer, G Vigna
Computer 35 (4), supl27-supl30, 2002
6842002
Cookieless monster: Exploring the ecosystem of web-based device fingerprinting
N Nikiforakis, A Kapravelos, W Joosen, C Kruegel, F Piessens, G Vigna
2013 IEEE Symposium on Security and Privacy, 541-555, 2013
6382013
STATL: An attack language for state-based intrusion detection
ST Eckmann, G Vigna, RA Kemmerer
Journal of computer security 10 (1-2), 71-103, 2002
6092002
Polymorphic worm detection using structural information of executables
C Kruegel, E Kirda, D Mutz, W Robertson, G Vigna
Recent Advances in Intrusion Detection: 8th International Symposium, RAID …, 2006
5832006
Saner: Composing static and dynamic analysis to validate sanitization in web applications
D Balzarotti, M Cova, V Felmetsger, N Jovanovic, E Kirda, C Kruegel, ...
2008 IEEE Symposium on Security and Privacy (sp 2008), 387-401, 2008
5562008
Prophiler: a fast filter for the large-scale detection of malicious web pages
D Canali, M Cova, G Vigna, C Kruegel
Proceedings of the 20th international conference on World wide web, 197-206, 2011
5422011
Designing distributed applications with mobile code paradigms
A Carzaniga, GP Picco, G Vigna
Proceedings of the 19th international conference on Software engineering, 22-32, 1997
5171997
Noxes: a client-side solution for mitigating cross-site scripting attacks
E Kirda, C Kruegel, G Vigna, N Jovanovic
Proceedings of the 2006 ACM symposium on Applied computing, 330-337, 2006
5122006
Static disassembly of obfuscated binaries
C Kruegel, W Robertson, F Valeur, G Vigna
USENIX security Symposium 13, 18-18, 2004
4792004
Firmalice-automatic detection of authentication bypass vulnerabilities in binary firmware.
Y Shoshitaishvili, R Wang, C Hauser, C Kruegel, G Vigna
NDSS 1, 1.1-8.1, 2015
4642015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20