Seguir
Manuel Egele
Manuel Egele
Dirección de correo verificada de bu.edu - Página principal
Título
Citado por
Citado por
Año
A survey on automated dynamic malware-analysis techniques and tools
M Egele, T Scholte, E Kirda, C Kruegel
ACM computing surveys (CSUR) 44 (2), 1-42, 2008
12662008
Panorama: capturing system-wide information flow for malware detection and analysis
H Yin, D Song, M Egele, C Kruegel, E Kirda
Proceedings of the 14th ACM conference on Computer and communications …, 2007
11282007
Pios: Detecting privacy leaks in ios applications.
M Egele, C Kruegel, E Kirda, G Vigna
NDSS 2011, 18th, 2011
7552011
An empirical study of cryptographic misuse in android applications
M Egele, D Brumley, Y Fratantonio, C Kruegel
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
6042013
Towards automated dynamic analysis for linux-based embedded firmware.
DD Chen, M Woo, D Brumley, M Egele
NDSS 1, 1-1, 2016
4612016
The art, science, and engineering of fuzzing: A survey
VJM Manès, HS Han, C Han, SK Cha, M Egele, EJ Schwartz, M Woo
IEEE Transactions on Software Engineering 47 (11), 2312-2331, 2019
4402019
Compa: Detecting compromised accounts on social networks.
M Egele, G Stringhini, C Kruegel, G Vigna
NDSS 13, 83-91, 2013
3772013
Paybreak: Defense against cryptographic ransomware
E Kolodenker, W Koch, G Stringhini, M Egele
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
2762017
Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks
M Egele, P Wurzinger, C Kruegel, E Kirda
Detection of Intrusions and Malware, and Vulnerability Assessment: 6th …, 2009
2632009
Blanket execution: Dynamic similarity testing for program binaries and components
M Egele, M Woo, P Chapman, D Brumley
23rd USENIX Security Symposium (USENIX Security 14), 303-317, 2014
2482014
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
L Davi, A Dmitrienko, M Egele, T Fischer, T Holz, R Hund, S Nürnberger, ...
NDSS 26, 27-40, 2012
2442012
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel, G Vigna, Y Chen
NDSS, 2015
2372015
Follow the green: growth and dynamics in twitter follower markets
G Stringhini, G Wang, M Egele, C Kruegel, G Vigna, H Zheng, BY Zhao
Proceedings of the 2013 conference on Internet measurement conference, 163-176, 2013
2342013
Towards detecting compromised accounts on social networks
M Egele, G Stringhini, C Kruegel, G Vigna
IEEE Transactions on Dependable and Secure Computing 14 (4), 447-460, 2015
2152015
Diagnosing performance variations in HPC applications using machine learning
O Tuncer, E Ates, Y Zhang, A Turk, J Brandt, VJ Leung, M Egele, ...
High Performance Computing: 32nd International Conference, ISC High …, 2017
1302017
Hardware performance counters can detect malware: Myth or fact?
B Zhou, A Gupta, R Jahanshahi, M Egele, A Joshi
Proceedings of the 2018 on Asia conference on computer and communications …, 2018
1252018
A solution for the automated detection of clickjacking attacks
M Balduzzi, M Egele, E Kirda, D Balzarotti, C Kruegel
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
1252010
Poultry markets: on the underground economy of twitter followers
G Stringhini, M Egele, C Kruegel, G Vigna
ACM SIGCOMM Computer Communication Review 42 (4), 527-532, 2012
1022012
{EVILCOHORT}: Detecting communities of malicious accounts on online services
G Stringhini, P Mourlanne, G Jacob, M Egele, C Kruegel, G Vigna
24th USENIX security symposium (USENIX security 15), 563-578, 2015
1012015
Emailprofiler: Spearphishing filtering with header and stylometric features of emails
S Duman, K Kalkan-Cakmakci, M Egele, W Robertson, E Kirda
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
892016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20