| Sok:(state of) the art of war: Offensive techniques in binary analysis Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ... 2016 IEEE symposium on security and privacy (SP), 138-157, 2016 | 1629 | 2016 |
| A survey on automated dynamic malware-analysis techniques and tools M Egele, T Scholte, E Kirda, C Kruegel ACM computing surveys (CSUR) 44 (2), 1-42, 2008 | 1459 | 2008 |
| Driller: Augmenting fuzzing through selective symbolic execution. N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ... NDSS 16 (2016), 1-16, 2016 | 1385 | 2016 |
| Limits of static analysis for malware detection A Moser, C Kruegel, E Kirda Twenty-third annual computer security applications conference (ACSAC 2007 …, 2007 | 1374 | 2007 |
| Panorama: capturing system-wide information flow for malware detection and analysis H Yin, D Song, M Egele, C Kruegel, E Kirda Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 1156 | 2007 |
| Detecting spammers on social networks G Stringhini, C Kruegel, G Vigna Proceedings of the 26th annual computer security applications conference, 1-9, 2010 | 1155 | 2010 |
| Pixy: A static analysis tool for detecting web application vulnerabilities N Jovanovic, C Kruegel, E Kirda 2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-263, 2006 | 1102 | 2006 |
| Anomaly detection of web-based attacks C Kruegel, G Vigna Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 1039 | 2003 |
| Scalable, behavior-based malware clustering. U Bayer, PM Comparetti, C Hlauschek, C Kruegel, E Kirda NDSS 9, 8-11, 2009 | 1018 | 2009 |
| Your botnet is my botnet: analysis of a botnet takeover B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, ... Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 1003 | 2009 |
| Exposure: Finding malicious domains using passive DNS analysis. L Bilge, E Kirda, C Kruegel, M Balduzzi Ndss, 1-17, 2011 | 977 | 2011 |
| Detection and analysis of drive-by-download attacks and malicious JavaScript code M Cova, C Kruegel, G Vigna Proceedings of the 19th international conference on World wide web, 281-290, 2010 | 961 | 2010 |
| Exploring multiple execution paths for malware analysis A Moser, C Kruegel, E Kirda 2007 IEEE Symposium on Security and Privacy (SP'07), 231-245, 2007 | 857 | 2007 |
| Cross site scripting prevention with dynamic data tainting and static analysis. P Vogt, F Nentwich, N Jovanovic, E Kirda, C Kruegel, G Vigna NDSS 2007, 12, 2007 | 832 | 2007 |
| Pios: Detecting privacy leaks in ios applications. M Egele, C Kruegel, E Kirda, G Vigna NDSS 2011, 18th, 2011 | 781 | 2011 |
| Effective and efficient malware detection at the end host. C Kolbitsch, PM Comparetti, C Kruegel, E Kirda, X Zhou, XF Wang USENIX security symposium 4 (1), 351-366, 2009 | 765 | 2009 |
| Comprehensive approach to intrusion detection alert correlation F Valeur, G Vigna, C Kruegel, RA Kemmerer IEEE Transactions on dependable and secure computing 1 (3), 146-169, 2004 | 765 | 2004 |
| Cookieless monster: Exploring the ecosystem of web-based device fingerprinting N Nikiforakis, A Kapravelos, W Joosen, C Kruegel, F Piessens, G Vigna 2013 IEEE Symposium on Security and Privacy, 541-555, 2013 | 719 | 2013 |
| Mining specifications of malicious behavior M Christodorescu, S Jha, C Kruegel Proceedings of the the 6th joint meeting of the European software …, 2007 | 674 | 2007 |
| An empirical study of cryptographic misuse in android applications M Egele, D Brumley, Y Fratantonio, C Kruegel Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 673 | 2013 |