• Publications
  • Influence
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis
TLDR
We present a systematized binary analysis framework that implements a number of analysis techniques that have been proposed in the past, which allows other researchers to compose them and develop new approaches. Expand
  • 424
  • 62
  • PDF
Understanding Code Mobility
TLDR
This paper presents a conceptual framework for understanding code mobility. Expand
  • 934
  • 58
Driller: Augmenting Fuzzing Through Selective Symbolic Execution
TLDR
We present Driller, a hybrid vulnerability excavation tool which leverages fuzzing and selective concolic execution in a complementary manner, to find deeper bugs. Expand
  • 475
  • 56
  • PDF
Detection and analysis of drive-by-download attacks and malicious JavaScript code
TLDR
This paper presents a novel approach to the detection and analysis of malicious JavaScript code. Expand
  • 561
  • 54
  • PDF
Detecting spammers on social networks
TLDR
We analyze to which extent spam has entered social networks. Expand
  • 733
  • 53
  • PDF
Your botnet is my botnet: analysis of a botnet takeover
TLDR
We take control of the Torpig botnet and study its operations for ten days. Expand
  • 619
  • 47
  • PDF
Anomaly detection of web-based attacks
TLDR
We present an intrusion detection system that uses a number of different anomaly detection techniques to detect attacks against web servers and web-based applications. Expand
  • 625
  • 44
  • PDF
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting
TLDR
The web has become an essential part of our society and is currently the main medium of information delivery. Expand
  • 346
  • 39
  • PDF
Comprehensive approach to intrusion detection alert correlation
TLDR
Alert correlation is a process that analyzes the alerts produced by one or more intrusion detection systems and provides a more succinct and high-level view of occurring intrusions. Expand
  • 515
  • 35
  • PDF
COMPA: Detecting Compromised Accounts on Social Networks
TLDR
We propose a new detection and mitigation approach for malicious messages on social networks that can be used to detect fake and compromised accounts. Expand
  • 237
  • 35
  • PDF