Publikationsliste für
Christopher Krügel
als Autorin / Autor bzw. wesentlich beteiligte Person
88 Datensätze (2002 - 2014)
Bücher und Buch-Herausgaben
Ch. Krügel, F. Valeur, G. Vigna:
"Intrusion Detection and Correlation - Challenges and Solutions";
Springer,
2004,
ISBN: 0-387-23398-9;
122 S.
G. Schildt, D. Kahn, Ch. Krügel, Ch. Mörz:
"Einführung in die Technische Informatik";
Springer-Verlag,
Wien,
2005,
ISBN: 3-211-24346-1.
Zeitschriftenartikel
U. Bayer, A. Moser, Ch. Krügel, E. Kirda:
"Dynamic Analysis of Malicious Code";
Journal in Computer Virology,
2
(2006),
1.
E. Kirda, Ch. Krügel:
"Protecting Users Against Phishing Attacks with AntiPhish";
Computer Journal,
49
(2006),
5.
P. Klinkoff, Ch. Krügel, E. Kirda, G. Vigna:
"Extending .NET Security to Unmanaged Code";
International Journal of Information Security,
6
(2007),
6;
S. 417
- 428.
Ch. Krügel, F. Valeur, G. Vigna:
"Using Alert Verification to Identify Successful Intrusion Attempts";
Praxis der Informationsverarbeitung und Kommunikation (PIK),
27
(2004),
4;
S. 220
- 228.
Ch. Krügel, G. Vigna, W. Robertson:
"A multi-model approach to the detection of web-based attacks";
Computer Networks,
48
(2005),
5;
S. 717
- 738.
Stefan Mitterhofer, Ch. Platzer, E. Kirda, Ch. Krügel:
"Server-Side Bot Detection in Massively Multiplayer Online Games";
IEEE Security & Privacy,
7
(2009),
3;
S. 29
- 36.
Zusätzliche Informationen
D. Mutz, F. Valeur, Ch. Krügel, G. Vigna:
"Anomalous System Call Detection";
ACM Transactions on Information and System Security,
9
(2006),
1.
F. Valeur, G. Vigna, Ch. Krügel, R. Kemmerer:
"A Comprehensive Approach to Intrusion Detection Alert Correlation";
IEEE Transactions on Dependable and Secure Computing,
1
(2004),
3;
S. 146
- 169.
Buchbeiträge
Ch. Krügel:
"Internet Security";
in: "The Industrial Communication Technology Handbook",
CRC Press,
2005,
ISBN: 0-8493-3077-7,
S. 1
- 14.
Ch. Krügel:
"Network Security and Secure Applications";
in: "The Industrial Information Technology Handbook",
CRC Press,
2004,
ISBN: 0-849-31985-4,
S. 3401
- 3413.
G. Vigna, Ch. Krügel:
"Host-Based Intrusion Detection";
in: "Handbook of Information Security",
John Wiley and Sons,
2005,
ISBN: 0-471-64833-7,
S. 1
- 12.
Beiträge in Tagungsbänden
M. Balduzzi, Ch. Platzer, T. Holz, E. Kirda, D. Balzarotti, Ch. Krügel:
"Abusing Social Networks for Automated User Profiling";
in: "Recent Advances in Intrusion Detection (RAID 2010)",
Springer,
2010,
ISBN: 978-3-642-15511-6,
20 S.
Zusätzliche Informationen
Vorträge und Posterpräsentationen (mit Tagungsband-Eintrag)
D. Balzarotti, W. Robertson, Ch. Krügel, G. Vigna:
"Improving Signature Testing Through Dynamic Data Flow Analysis";
Vortrag: Annual Computer Security Applications Conference (ACSAC),
Miami, USA;
10.12.2007; in: "Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)",
(2007),
S. 22
- 32.
U. Bayer, E. Kirda, Ch. Krügel, P. Milani Comparetti, C. Hlauschek:
"Scalable, Behavior-Based Malware Clustering";
Vortrag: Network and Distributed System Security Symposium (NDSS),
San Diego;
08.02.2009
- 11.02.2009; in: "16th Annual Network and Distributed System Security Symposium (NDSS 2009)",
NDSS Proceedings,
(2009).
Zusätzliche Informationen
U. Bayer, Ch. Krügel, E. Kirda:
"TTAnalyze: A Tool for Analyzing Malware";
Vortrag: Conference of the European Institute for Computer Antivirus Research (EICAR),
Germany;
30.04.2006
- 02.05.2006; in: "Proc. 15th Annual Conference of the European Institute for Computer Antivirus Research (EICAR)",
(2006),
S. 180
- 192.
M. Christodorescu, S. Jha, Ch. Krügel:
"Mining Specifications of Malicious Behavior";
Vortrag: European Software Engineering Conference (ESEC),
Dubrovnik, Kroatien;
03.09.2007; in: "Proceedings of the European Software Engineering Conference (ESEC)",
(2007),
S. 1
- 10.
M. Egele, E. Kirda, Ch. Krügel:
"Mitigating Drive-by Download Attacks: Challenges and Open Problems";
Vortrag: Open Research Problems in Network Security Workshop,
Zurich;
23.04.2009
- 24.04.2009; in: "Open Research Problems in Network Security Workshop",
(2009).
Zusätzliche Informationen
M. Egele, Ch. Krügel, E. Kirda, H. Yin, D. Song:
"Dynamic Spyware Analysis";
Vortrag: Usenix Annual Technical Conference (ATC),
Santa Clara, USA;
17.06.2007; in: "Proceedings of the Usenix Annual Technical Conference",
(2007),
S. 1
- 14.
M. Egele, M. Szydlowski, E. Kirda, Ch. Krügel:
"Using Static Program Analysis to Aid Intrusion Detection";
Vortrag: Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA),
Germany;
13.07.2006
- 14.07.2006; in: "Proc. Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Lecture Notes in Computer Science",
Springer-Verlag,
(2006),
S. 17
- 37.
P. Fenkam, C. Krügel, H. Gall, M. Jazayeri:
"DPS: An architectural Style for Development of Secure Software";
Vortrag: Infrastructure Security Conference (InfraSec),
Bristol, UK;
01.10.2002
- 03.10.2002; in: "Proceedings of the",
Springer Verlag,
(2002).
N. Jovanovic, E. Kirda, Ch. Krügel:
"Preventing Cross Site Request Forgery Attacks";
Vortrag: SecureComm 2006,
Baltimore, MD, USA;
28.08.2006
- 01.09.2006; in: "2nd International Conference on Security and Privacy in Communication Networks & the Workshops",
IEEE,
(2006).
Zusätzliche Informationen
N. Jovanovic, Ch. Krügel, E. Kirda:
"Pixy: A static Analysis Tool for Detecting web Application Vulnerabilities";
Vortrag: 2006 IEEE Symposium on Security and Privacy,
Berkeley/Oakland, Kalifornien, USA;
21.05.2006
- 24.05.2006; in: "Proceedings of the 2006 IEEE Symposium on Security and Privacy",
IEEE Inc.,
P2574
(2006),
ISBN: 0-7695-2574-1;
S. 258
- 263.
N. Jovanovic, Ch. Krügel, E. Kirda:
"Precise Alias Analysis for Static Detection of Web Application Vulnerabilities";
Vortrag: PLAS 2006,
Ottawwa, Kanada;
10.06.2006; in: "Proceedings of the 2006 Programming Languages and Analysis for Security Workshop",
ACM Inc.,
548064
(2006),
ISBN: 1-59593-374-3;
S. 27
- 36.
S. Kals, E. Kirda, Ch. Krügel, N. Jovanovic:
"SecuBat: A Web Vulnerability Scanner";
Vortrag: International World Wide Web Conference (WWW),
UK;
23.05.2006
- 26.05.2006; in: "Proc. 15th International World Wide Web Conference (WWW)",
(2006),
S. 247
- 257.
C. Karlberger, G. Bayler, Ch. Krügel, E. Kirda:
"Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters";
Vortrag: Usenix Workshop on Offensive Technologies (WOOT),
Boston, USA;
06.08.2007; in: "Usenix Workshop on Offensive Technologies (WOOT)",
(2007),
S. 1
- 7.
C. Kerer, E. Kirda, C. Krügel:
"XGuide - A Practical Guide to XML-based Web Engineering";
Vortrag: Web Engineering Workshop at the International Conference on Networking,
Pisa, Italy;
2002; in: "Proceedings of the Web Engineering Workshop, International Conference on Networking",
Lecture Notes in Computer Science, Springer Verlag,
Heidelberg, New York
(2002).
E. Kirda, M. Egele, Ch. Krügel:
"Removing Web Spam Links from Search Engine Results";
Poster: Conference of the European Institute for Computer Antivirus Research (EICAR),
Berlin;
11.05.2009
- 12.05.2009; in: "EICAR proceedings",
(2009).
Zusätzliche Informationen
E. Kirda, C. Kerer, C. Krügel, R. Kurmanowytsch:
"Web Service Engineering with DIWE";
Vortrag: Euromicro International Conference,
Antalya, Turkey;
01.09.2003
- 06.09.2003; in: "Proceedings of the 20th Euromicro Conference",
IEEE Computer Society,
(2003),
ISSN: 1089-6503;
S. 283
- 290.
E. Kirda, Ch. Krügel:
"Protecting Users Against Phishing Attacks with AntiPhish";
Vortrag: International Computer Software and Applications Conference (COMPSAC),
Edinburgh, Scotland (eingeladen);
26.07.2005
- 28.07.2005; in: "Proceedings of the 29th Anual International Computer Software and Applications Conference",
IEEE Computer Society,
(2005),
ISBN: 0-7695-2413-3;
S. 517
- 524.
E. Kirda, Ch. Krügel, G. Banks, G. Vigna, R. Kemmerer:
"Bahavior-based Spyware Detection";
Vortrag: Usenix Security Symposium,
Vancouver, Canada;
31.07.2006
- 04.08.2006; in: "Proc. 15th USENIX Security Symposium",
(2006),
ISBN: 1-931971-45-5;
S. 273
- 288.
E. Kirda, Ch. Krügel, G. Vigna, N. Jovanovic:
"Noxes: A Client-Side Solution for Mitigating Cross Site Scripting Attacks";
Vortrag: Symposium on Applied Computing (SAC),
France;
23.04.2006
- 27.04.2006; in: "Proc. 21st ACM Symposium on Applied Computing (SAC)",
ACM Press,
(2006),
S. 330
- 338.
P. Klinkoff, Ch. Krügel, E. Kirda, G. Vigna:
"Extending .NET Security to Unmanaged Code";
Vortrag: Information Security Conference (ISC),
Greece;
30.08.2006
- 02.09.2006; in: "Proc. 9th Information Security Conference (ISC), Lecture Notes in Computer Science",
Springer-Verlag,
(2006),
S. 1
- 16.
C. Krügel, T. Toth:
"Distributed Pattern Detection for Intrusion Detection";
Vortrag: Network and Distributed System Security Symposium (NDSS),
San Diego, CA, USA;
06.02.2002
- 08.02.2002; in: "Proceedings of Network and Distributed System Security Symposium (NDSS)",
(2002),
S. 51
- 63.
Zusätzliche Informationen
C. Krügel, T. Toth:
"Flexible, Mobile Agent Based Intrusion Detection for Dynamic Networks";
Vortrag: European Wireless,
Florence, Italy;
26.02.2002
- 28.02.2002; in: "European Wireless 2002",
(2002),
S. 581
- 587.
Zusätzliche Informationen
C. Krügel, T. Toth, E. Kirda:
"Service Specific Anomaly Detection for Network Intrusion Detection";
Vortrag: Symposium on Applied Computing (SAC),
Madrid, Spain;
11.03.2002
- 14.03.2002; in: "Symposium on Applied Computing",
(2002),
S. 244.
Zusätzliche Informationen
C. Krügel, F. Valeur et al.:
"Stateful Intrusion Detection for High-Speed Networks";
Vortrag: IEEE Symposium on Security and Privacy,
Oakland, California, USA;
12.05.2002
- 15.05.2002; in: "Proceedings of the 2002 IEEE Symposium on Security and Privacy",
(2002),
ISBN: 0-7695-1543-6;
S. 266
- 274.
Zusätzliche Informationen
Ch. Krügel, E. Kirda, D. Mutz, W. Robertson, G. Vigna:
"Automating Mimicry Attacks Using Static Binary Analysis";
Vortrag: Usenix Security Symposium,
Baltimore, USA (eingeladen);
31.07.2005
- 05.08.2005; in: "Proceedings of the 14th USENIX Security Symposium",
USENIX Assoication,
(2005),
ISBN: 1-931971-34-x;
S. 161
- 176.
Ch. Krügel, E. Kirda, D. Mutz, W. Robertson, G. Vigna:
"Polymorphic Worm Detection Using Structural Information of Executables";
Vortrag: RAID International Symposium on Recent Advances in Intrusion Detection 2002,
USA;
07.09.2005
- 09.09.2005; in: "Proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID)",
Springer-Verlag,
LNCS
(2005).
Ch. Krügel, W. Robertson:
"Alert Verification - Determining the Success of Intrusion Attempts";
Vortrag: Workshop on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA),
Dortmund, Germany;
06.07.2004
- 07.07.2004; in: "Proceedings of the Workshop on Detection of Intrusions and Malware and Vulnerability Assessment",
(2004),
ISBN: 3-88579-375-x;
S. 25
- 39.
Ch. Krügel, W. Robertson, F. Valeur, G. Vigna:
"Static Disassembly of Obfuscated Binaries";
Vortrag: Usenix Security Symposium,
San Diego, CA, USA;
09.08.2004
- 13.08.2004; in: "Proceedings of the 13th Usenix Security Symposium",
(2004),
1-931971-23-2;
S. 255
- 270.
Ch. Krügel, W. Robertson, G. Vigna:
"Detecting Kernel-Level Rootkits Through Binary Analysis";
Vortrag: Annual Computer Security Applications Conference (ACSAC),
Tucson, AZ, USA;
06.12.2004
- 10.12.2004; in: "Proceedings of the 20th Annual Computer Security Applications Conference",
(2004),
ISBN: 0-7695-2252-1;
S. 91
- 100.
C. Ludl, S. McAllister, E. Kirda, Ch. Krügel:
"On the Effectiveness of Techniques to Detect Phishing Sites";
Vortrag: Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA),
Luzern, Schweiz;
12.07.2007; in: "Proceedings of the Detection of Intrusions and Malware and Vulnerability Assessment Conference (DIMVA)",
(2007),
S. 1
- 20.
A. Moser, Ch. Krügel, E. Kirda:
"Exploring Multiple Execution Paths for Malware Analysis";
Vortrag: IEEE Symposium on Security and Privacy,
Oakland, USA;
20.05.2007; in: "Proceedings of the IEEE Symposium on Security and Privacy",
(2007),
S. 1
- 15.
A. Moser, Ch. Krügel, E. Kirda:
"Limits of Static Analysis for Malware Detection";
Vortrag: Annual Computer Security Applications Conference (ACSAC),
Miami, USA;
10.12.2007; in: "Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)",
(2007),
S. 12
- 21.
D. Mutz, Ch. Krügel, W. Robertson, G. Vigna, R. Kemmerer:
"Reverse Engineering of Network Signatures";
Vortrag: AusCERT,
Gold Coast, Australia;
22.05.2005
- 26.05.2005; in: "Proceedings of the Information Technology Security Conference",
(2005),
ISBN: 1-86499-799-0.
T. Raffetseder, E. Kirda, Ch. Krügel:
"Building Anti-Phishing Browser Plug-Ins: An Experience Report";
Vortrag: International Workshop on Software Engineering for Secure Systems (SESS),
Minneapolis, USA;
19.05.2007; in: "3rd International Workshop on Software Engineering for Secure Systems (SESS)",
IEEE Computer Society,
(2007),
ISBN: 978-0-7695-2830-4;
S. 1
- 7.
T. Raffetseder, Ch. Krügel, E. Kirda:
"Detecting System Emulators";
Vortrag: Information Security Conference (ISC),
Valparaiso, Chile;
09.10.2007; in: "Proceedings of the Information Security Conference (ISC )",
(2007),
S. 1
- 18.
W. Robertson, G. Vigna, Ch. Krügel, R. Kemmerer:
"Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks";
Vortrag: Network and Distributed System Security Symposium (NDSS),
USA;
02.02.2006
- 03.02.2006; in: "Proc. Network and Distributed System Security Symposium (NDSS)",
Internet Society,
(2006),
S. 31
- 46.
A. Rosiello, Ch. Krügel, E. Kirda, F. Ferrandi:
"A Layout-Similarity-Based Approach for Detecting Phishing Pages";
Vortrag: IEEE International Conference on Security and Privacy in Communication Networks (SecureComm),
Nizza, Frankreich;
17.09.2007; in: "Proceedings of the IEEE International Conference on Security and Privacy in Communication Networks (SecureComm)",
(2007),
S. 1
- 10.
M. Szydlowski, Ch. Krügel, E. Kirda:
"Secure Input for Web Applications";
Vortrag: Annual Computer Security Applications Conference (ACSAC),
Miami, USA;
10.12.2007; in: "Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)",
(2007),
S. 1
- 11.
M. Szydlowski, B. Zhao, E. Kirda, Ch. Krügel:
"BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients";
Vortrag: 20th International Conference on Computer Communication Networks (ICCCN 2011),
Maui, HI;
31.07.2011
- 04.08.2011; in: "Proceedings of the 20th International Conference on Computer Communication Networks (ICCCN 2011)",
IEEE,
(2011),
6 S.
Zusätzliche Informationen
T. Toth, C. Krügel:
"Accurate Buffer Overflow Detection via Abstract Payload Execution";
Vortrag: RAID International Symposium on Recent Advances in Intrusion Detection 2002,
Zürich, Switzerland;
16.10.2002
- 18.10.2002; in: "Recent Advances in Intrusion Detection",
Springer-Verlag Berlin Heidelberg,
(2002),
ISBN: 3-540-00020-8;
S. 274
- 291.
Zusätzliche Informationen
T. Toth, C. Krügel:
"Connection-history based anomaly detection";
Vortrag: Information Assurance Workshop,
West Point, New York, USA;
17.06.2002
- 19.06.2002; in: "Proceedings of the 3rd Annual IEEE Information Assurance Workshop",
(2002),
ISBN: 0-7803-9850-5;
S. 241
- 246.
Zusätzliche Informationen
T. Toth, C. Krügel:
"Evaluating the Impact of Automated Intrusion Response Mechanisms";
Vortrag: 18th Annual Computer Security Applications Conference,
Las Vegas, Nevada;
09.12.2002
- 13.12.2002; in: "Proceedings 18th Annual Computer Security Applications Conference",
(2002),
S. 301
- 310.
Zusätzliche Informationen
F. Valeur, G. Vigna, Ch. Krügel, E. Kirda:
"An Anomaly-driven Reverse Proxy for Web Applications";
Vortrag: Symposium on Applied Computing (SAC),
France;
23.04.2006
- 27.04.2006; in: "Proc. 21st ACM Symposium on Applied Computing (SAC)",
ACM Press,
(2006),
S. 361
- 369.
Ph. Vogt, F. Nentwich, N. Jovanovic, Ch. Krügel, E. Kirda, G. Vigna:
"Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis";
Vortrag: Network and Distributed System Security Symposium (NDSS),
San Diego, USA;
27.02.2007; in: "Proceedings of the Network and Distributed System Security Symposium (NDSS)",
(2007),
S. 1
- 12.
H. Yin, D. Song, M. Egele, Ch. Krügel, E. Kirda:
"Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis";
Vortrag: ACM Conference on Computer and Communications Security (CCS),
Washington, USA;
29.10.2007; in: "Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS)",
(2007),
S. 1
- 12.
Vorträge und Posterpräsentationen (ohne Tagungsband-Eintrag)
Ch. Krügel:
"Advanced Techniques for Malicious Code Detection";
Vortrag: NATO ASI Workshop,
Yerevan, Armenien (eingeladen);
04.10.2005.
Ch. Krügel:
"Analysing and Detecting Malicious Code";
Vortrag: Informatik Kolloquium,
Universität Mannheim, Deutschland (eingeladen);
13.12.2005.
Ch. Krügel:
"Identification of Anomalous System Calls for Intrusion Detection";
Vortrag: Informatik Kolloquium,
TU Muenchen, Garching, Deutschland (eingeladen);
09.12.2004.
Ch. Krügel:
"Identification of Anomalous System Calls for Intrusion Detection";
Vortrag: Informatik Kolloquium,
Universität Dortmund, Deutschland (eingeladen);
14.04.2005.
Ch. Krügel:
"Intrusion Detection und Korrelation";
Vortrag: FH Hagenberg,
Hagenberg (eingeladen);
15.03.2005.
Ch. Krügel:
"Malicious Code Analysis";
Vortrag: Talk at the Computer Science Colloquium, Carleton University,
Ottawa, Canada (eingeladen);
01.10.2006.
Ch. Krügel:
"Malicious Code Analysis";
Vortrag: Habilitationskolloquium,
Vienna, Austria;
01.09.2006.
Ch. Krügel:
"Malicious Code Analysis: Detecting Metamorphic Worms";
Vortrag: Technische Universität Berlin,
Berlin, Deutschland (eingeladen);
15.11.2005.
Ch. Krügel:
"Malicious Code Analysis: Detecting Metamorphic Worms";
Vortrag: Informatik Kolloquium,
Masaryk University, Bruenn (eingeladen);
29.11.2005.
Ch. Krügel:
"Vulnerabilities in Web Applications";
Vortrag: TERENA Networking Conference,
Italy (eingeladen);
01.05.2006.
Habilitationsschriften
Ch. Krügel:
"Malicious Code Analysis";
TU Wien / Fakultät für Informatik,
2006.
Dissertationen (eigene und begutachtete)
M. Egele:
"Protecting Web Clients from Internet Threats";
Betreuer/in(nen), Begutachter/in(nen): Ch. Krügel, E. Kirda;
Rechnergestützte Automation,
2011.
N. Jovanovic:
"Web Application Security";
Betreuer/in(nen), Begutachter/in(nen): Ch. Krügel, E. Kirda;
Institut für Rechnergestützte Automation und Institut für Informationssysteme AB Verteilte Systeme,
2007;
Rigorosum: 09.10.2007.
C. Kolbitsch:
"Behavior Based Malware Analysis and Detection";
Betreuer/in(nen), Begutachter/in(nen): Ch. Krügel, E. Kirda;
Rechnergestützte Automation,
2011.
C. Krügel:
"Network Alertness -- Towards an adaptive, collaborating Intrusion Detectcion";
Betreuer/in(nen), Begutachter/in(nen): M. Jazayeri, W. Kastner;
184,
2002.
M. Neugschwandtner:
"Mitigating malware communication infrastructures and exploitation techniques";
Betreuer/in(nen), Begutachter/in(nen): Ch. Krügel, E. Kirda;
Rechnergestützte Automation,
2014;
Rigorosum: 23.06.2014.
Diplom- und Master-Arbeiten (eigene und betreute)
U. Bayer:
"TTAnalyze - A Tool for Analyzing Malware";
Betreuer/in(nen): Ch. Krügel;
183,
2005.
G. Bayler:
"Penetrating Bayesian Spam Filters Using Redundancy in Natural Language";
Betreuer/in(nen): W. Kastner, Ch. Krügel, E. Kirda;
Institut für Rechnergestützte Automation AG Automatisierungssysteme u. 184-1,
2007.
M. Egele:
"Behavior-Based Spyware Detection Using Dynamic Taint Analysis";
Betreuer/in(nen): S. Dustdar, E. Kirda, Ch. Krügel;
Institut für Informationssysteme, AB Verteilte Systeme,
2006;
Abschlussprüfung: 03.10.2006.
Zusätzliche Informationen
S. Kals:
"SecuBat: A Web Vulnerability Scanner";
Betreuer/in(nen): Ch. Krügel, S. Dustdar, E. Kirda;
183/1,
2006.
P. Klinkoff:
"Extending .NET Security to Native Code";
Betreuer/in(nen): Ch. Krügel;
183/1,
2005.
C. Ludl:
"SWAP";
Betreuer/in(nen): E. Kirda, Ch. Krügel;
Institut für Informationssysteme, AB Verteilte Systeme u. E183,
2008.
Stefan Mitterhofer:
"Server-side bot detection for massively multiplayer online games";
Betreuer/in(nen): E. Kirda, Ch. Krügel, Ch. Platzer;
E183-1,
2009;
Abschlussprüfung: 28.07.2009.
Zusätzliche Informationen
F. Nentwich:
"Sicherheitsanalyse von Signatursoftware";
Betreuer/in(nen): Ch. Krügel, E. Kirda;
Institut für Rechnergestützte Automation AG Automatisierungssysteme u. 184-1,
2007.
M. Neugschwandtner:
"dAnubis - dynamic device driver analysis based on virtual machine introspection";
Betreuer/in(nen): W. Kastner, E. Kirda, Ch. Krügel, Ch. Platzer;
E183-1, Seclab Group,
2009;
Abschlussprüfung: 21.10.2009.
Zusätzliche Informationen
H. Petritsch:
"Understanding and Replaying Network Traffic in Windows XP for Dynamic Malware Analysis";
Betreuer/in(nen): Ch. Krügel, E. Kirda;
Institut für Rechnergestützte Automation AG Automatisierungssysteme u. 184-1,
2007.
A. Stamminger:
"Automated spyware collection and analysis";
Betreuer/in(nen): E. Kirda, Ch. Krügel;
Institut für Informationssysteme, AB Verteilte Systeme u. 183-1,
2007.
P. Vogt:
"Cross site scripting (XSS) attack prevention with dynamic data tainting on the client side";
Betreuer/in(nen): S. Dustdar, C. Krügel, E. Kirda;
Institut für Informationssysteme, AB Verteilte Systeme,
2006.
Ph. Vogt:
"Cross-Site Scripting (XSS) Attack Prevention with Dynamic Data Tainting on the Client Side";
Betreuer/in(nen): Ch. Krügel;
183/1,
2006.