Seguir
Giovanni Vigna
Giovanni Vigna
UC Santa Barbara and VMware
Dirección de correo verificada de cs.ucsb.edu - Página principal
Título
Citado por
Citado por
Año
Understanding code mobility
A Fuggetta, GP Picco, G Vigna
IEEE Transactions on software engineering 24 (5), 342-361, 1998
19041998
Sok:(state of) the art of war: Offensive techniques in binary analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
2016 IEEE symposium on security and privacy (SP), 138-157, 2016
12172016
Driller: Augmenting fuzzing through selective symbolic execution.
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
NDSS 16 (2016), 1-16, 2016
11332016
Detecting spammers on social networks
G Stringhini, C Kruegel, G Vigna
Proceedings of the 26th annual computer security applications conference, 1-9, 2010
10912010
Anomaly detection of web-based attacks
C Kruegel, G Vigna
Proceedings of the 10th ACM conference on Computer and communications …, 2003
9872003
Your botnet is my botnet: analysis of a botnet takeover
B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, ...
Proceedings of the 16th ACM conference on Computer and communications …, 2009
9812009
Detection and analysis of drive-by-download attacks and malicious JavaScript code
M Cova, C Kruegel, G Vigna
Proceedings of the 19th international conference on World wide web, 281-290, 2010
9242010
Cross site scripting prevention with dynamic data tainting and static analysis.
P Vogt, F Nentwich, N Jovanovic, E Kirda, C Kruegel, G Vigna
NDSS 2007, 12, 2007
8062007
Pios: Detecting privacy leaks in ios applications.
M Egele, C Kruegel, E Kirda, G Vigna
NDSS 2011, 18th, 2011
7552011
Comprehensive approach to intrusion detection alert correlation
F Valeur, G Vigna, C Kruegel, RA Kemmerer
IEEE Transactions on dependable and secure computing 1 (3), 146-169, 2004
7472004
Intrusion detection: a brief history and overview
RA Kemmerer, G Vigna
Computer 35 (4), supl27-supl30, 2002
6832002
Cookieless monster: Exploring the ecosystem of web-based device fingerprinting
N Nikiforakis, A Kapravelos, W Joosen, C Kruegel, F Piessens, G Vigna
2013 IEEE Symposium on Security and Privacy, 541-555, 2013
6392013
STATL: An attack language for state-based intrusion detection
ST Eckmann, G Vigna, RA Kemmerer
Journal of computer security 10 (1-2), 71-103, 2002
6112002
Polymorphic worm detection using structural information of executables
C Kruegel, E Kirda, D Mutz, W Robertson, G Vigna
Recent Advances in Intrusion Detection: 8th International Symposium, RAID …, 2006
5862006
Saner: Composing static and dynamic analysis to validate sanitization in web applications
D Balzarotti, M Cova, V Felmetsger, N Jovanovic, E Kirda, C Kruegel, ...
2008 IEEE Symposium on Security and Privacy (sp 2008), 387-401, 2008
5612008
Prophiler: a fast filter for the large-scale detection of malicious web pages
D Canali, M Cova, G Vigna, C Kruegel
Proceedings of the 20th international conference on World wide web, 197-206, 2011
5422011
Designing distributed applications with mobile code paradigms
A Carzaniga, GP Picco, G Vigna
Proceedings of the 19th international conference on Software engineering, 22-32, 1997
5181997
Noxes: a client-side solution for mitigating cross-site scripting attacks
E Kirda, C Kruegel, G Vigna, N Jovanovic
Proceedings of the 2006 ACM symposium on Applied computing, 330-337, 2006
5132006
Static disassembly of obfuscated binaries
C Kruegel, W Robertson, F Valeur, G Vigna
USENIX security Symposium 13, 18-18, 2004
4802004
Firmalice-automatic detection of authentication bypass vulnerabilities in binary firmware.
Y Shoshitaishvili, R Wang, C Hauser, C Kruegel, G Vigna
NDSS 1, 1-1, 2015
4772015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20