Seguir
Manuel Egele
Manuel Egele
Dirección de correo verificada de bu.edu - Página principal
Título
Citado por
Citado por
Año
A survey on automated dynamic malware-analysis techniques and tools
M Egele, T Scholte, E Kirda, C Kruegel
ACM computing surveys (CSUR) 44 (2), 1-42, 2008
13382008
Panorama: capturing system-wide information flow for malware detection and analysis
H Yin, D Song, M Egele, C Kruegel, E Kirda
Proceedings of the 14th ACM conference on Computer and communications …, 2007
11412007
Pios: Detecting privacy leaks in ios applications.
M Egele, C Kruegel, E Kirda, G Vigna
NDSS 2011, 18th, 2011
7662011
An empirical study of cryptographic misuse in android applications
M Egele, D Brumley, Y Fratantonio, C Kruegel
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
6342013
The art, science, and engineering of fuzzing: A survey
VJM Manès, HS Han, C Han, SK Cha, M Egele, EJ Schwartz, M Woo
IEEE Transactions on Software Engineering 47 (11), 2312-2331, 2019
5592019
Towards automated dynamic analysis for linux-based embedded firmware.
DD Chen, M Woo, D Brumley, M Egele
NDSS 1, 1.1-8.1, 2016
5182016
Compa: Detecting compromised accounts on social networks.
M Egele, G Stringhini, C Kruegel, G Vigna
NDSS 13, 83-91, 2013
3862013
Paybreak: Defense against cryptographic ransomware
E Kolodenker, W Koch, G Stringhini, M Egele
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
2962017
Blanket execution: Dynamic similarity testing for program binaries and components
M Egele, M Woo, P Chapman, D Brumley
23rd USENIX Security Symposium (USENIX Security 14), 303-317, 2014
2702014
Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks
M Egele, P Wurzinger, C Kruegel, E Kirda
Detection of Intrusions and Malware, and Vulnerability Assessment: 6th …, 2009
2682009
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel, G Vigna, Y Chen
NDSS, 2015
2492015
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
L Davi, A Dmitrienko, M Egele, T Fischer, T Holz, R Hund, S Nürnberger, ...
NDSS 26, 27-40, 2012
2492012
Follow the green: growth and dynamics in twitter follower markets
G Stringhini, G Wang, M Egele, C Kruegel, G Vigna, H Zheng, BY Zhao
Proceedings of the 2013 conference on Internet measurement conference, 163-176, 2013
2452013
Towards detecting compromised accounts on social networks
M Egele, G Stringhini, C Kruegel, G Vigna
IEEE Transactions on Dependable and Secure Computing 14 (4), 447-460, 2015
2242015
Hardware performance counters can detect malware: Myth or fact?
B Zhou, A Gupta, R Jahanshahi, M Egele, A Joshi
Proceedings of the 2018 on Asia conference on computer and communications …, 2018
1452018
Diagnosing performance variations in HPC applications using machine learning
O Tuncer, E Ates, Y Zhang, A Turk, J Brandt, VJ Leung, M Egele, ...
High Performance Computing: 32nd International Conference, ISC High …, 2017
1382017
A solution for the automated detection of clickjacking attacks
M Balduzzi, M Egele, E Kirda, D Balzarotti, C Kruegel
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
1282010
{EVILCOHORT}: Detecting communities of malicious accounts on online services
G Stringhini, P Mourlanne, G Jacob, M Egele, C Kruegel, G Vigna
24th USENIX security symposium (USENIX security 15), 563-578, 2015
1062015
Poultry markets: on the underground economy of twitter followers
G Stringhini, M Egele, C Kruegel, G Vigna
ACM SIGCOMM Computer Communication Review 42 (4), 527-532, 2012
1062012
Emailprofiler: Spearphishing filtering with header and stylometric features of emails
S Duman, K Kalkan-Cakmakci, M Egele, W Robertson, E Kirda
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
982016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20