TU Home
Diese Publikationsliste wurde automatisch aus den Publikationsdaten der TU Wien erstellt. Wenn Sie komplexere Suchabfragen vornehmen wollen, rufen Sie bitte die Seite "Publikationen der Fakultšt" direkt auf, oder verwenden Sie die globale Suchfunktion der Publikationsdatenbank der Technischen Universitšt Wien!


Publikationsdatenbank Home  

Publikationsliste für
Christopher Krügel
als Autorin / Autor bzw. wesentlich beteiligte Person

88 Datensätze (2002 - 2014)


Bücher und Buch-Herausgaben


Ch. Krügel, F. Valeur, G. Vigna:
"Intrusion Detection and Correlation - Challenges and Solutions";
Springer, 2004, ISBN: 0-387-23398-9; 122 S.

G. Schildt, D. Kahn, Ch. Krügel, Ch. Mörz:
"Einführung in die Technische Informatik";
Springer-Verlag, Wien, 2005, ISBN: 3-211-24346-1.


Zeitschriftenartikel


U. Bayer, A. Moser, Ch. Krügel, E. Kirda:
"Dynamic Analysis of Malicious Code";
Journal in Computer Virology, 2 (2006), 1.

E. Kirda, Ch. Krügel:
"Protecting Users Against Phishing Attacks with AntiPhish";
Computer Journal, 49 (2006), 5.

P. Klinkoff, Ch. Krügel, E. Kirda, G. Vigna:
"Extending .NET Security to Unmanaged Code";
International Journal of Information Security, 6 (2007), 6; S. 417 - 428.

Ch. Krügel, F. Valeur, G. Vigna:
"Using Alert Verification to Identify Successful Intrusion Attempts";
Praxis der Informationsverarbeitung und Kommunikation (PIK), 27 (2004), 4; S. 220 - 228.

Ch. Krügel, G. Vigna, W. Robertson:
"A multi-model approach to the detection of web-based attacks";
Computer Networks, 48 (2005), 5; S. 717 - 738.

Stefan Mitterhofer, Ch. Platzer, E. Kirda, Ch. Krügel:
"Server-Side Bot Detection in Massively Multiplayer Online Games";
IEEE Security & Privacy, 7 (2009), 3; S. 29 - 36.

Zusätzliche Informationen

D. Mutz, F. Valeur, Ch. Krügel, G. Vigna:
"Anomalous System Call Detection";
ACM Transactions on Information and System Security, 9 (2006), 1.

F. Valeur, G. Vigna, Ch. Krügel, R. Kemmerer:
"A Comprehensive Approach to Intrusion Detection Alert Correlation";
IEEE Transactions on Dependable and Secure Computing, 1 (2004), 3; S. 146 - 169.


Buchbeiträge


Ch. Krügel:
"Internet Security";
in: "The Industrial Communication Technology Handbook", CRC Press, 2005, ISBN: 0-8493-3077-7, S. 1 - 14.

Ch. Krügel:
"Network Security and Secure Applications";
in: "The Industrial Information Technology Handbook", CRC Press, 2004, ISBN: 0-849-31985-4, S. 3401 - 3413.

G. Vigna, Ch. Krügel:
"Host-Based Intrusion Detection";
in: "Handbook of Information Security", John Wiley and Sons, 2005, ISBN: 0-471-64833-7, S. 1 - 12.


Beiträge in Tagungsbänden


M. Balduzzi, Ch. Platzer, T. Holz, E. Kirda, D. Balzarotti, Ch. Krügel:
"Abusing Social Networks for Automated User Profiling";
in: "Recent Advances in Intrusion Detection (RAID 2010)", Springer, 2010, ISBN: 978-3-642-15511-6, 20 S.

Zusätzliche Informationen


Vorträge und Posterpräsentationen (mit Tagungsband-Eintrag)


D. Balzarotti, W. Robertson, Ch. Krügel, G. Vigna:
"Improving Signature Testing Through Dynamic Data Flow Analysis";
Vortrag: Annual Computer Security Applications Conference (ACSAC), Miami, USA; 10.12.2007; in: "Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)", (2007), S. 22 - 32.

U. Bayer, E. Kirda, Ch. Krügel, P. Milani Comparetti, C. Hlauschek:
"Scalable, Behavior-Based Malware Clustering";
Vortrag: Network and Distributed System Security Symposium (NDSS), San Diego; 08.02.2009 - 11.02.2009; in: "16th Annual Network and Distributed System Security Symposium (NDSS 2009)", NDSS Proceedings, (2009).

Zusätzliche Informationen

U. Bayer, Ch. Krügel, E. Kirda:
"TTAnalyze: A Tool for Analyzing Malware";
Vortrag: Conference of the European Institute for Computer Antivirus Research (EICAR), Germany; 30.04.2006 - 02.05.2006; in: "Proc. 15th Annual Conference of the European Institute for Computer Antivirus Research (EICAR)", (2006), S. 180 - 192.

M. Christodorescu, S. Jha, Ch. Krügel:
"Mining Specifications of Malicious Behavior";
Vortrag: European Software Engineering Conference (ESEC), Dubrovnik, Kroatien; 03.09.2007; in: "Proceedings of the European Software Engineering Conference (ESEC)", (2007), S. 1 - 10.

M. Egele, E. Kirda, Ch. Krügel:
"Mitigating Drive-by Download Attacks: Challenges and Open Problems";
Vortrag: Open Research Problems in Network Security Workshop, Zurich; 23.04.2009 - 24.04.2009; in: "Open Research Problems in Network Security Workshop", (2009).

Zusätzliche Informationen

M. Egele, Ch. Krügel, E. Kirda, H. Yin, D. Song:
"Dynamic Spyware Analysis";
Vortrag: Usenix Annual Technical Conference (ATC), Santa Clara, USA; 17.06.2007; in: "Proceedings of the Usenix Annual Technical Conference", (2007), S. 1 - 14.

M. Egele, M. Szydlowski, E. Kirda, Ch. Krügel:
"Using Static Program Analysis to Aid Intrusion Detection";
Vortrag: Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Germany; 13.07.2006 - 14.07.2006; in: "Proc. Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Lecture Notes in Computer Science", Springer-Verlag, (2006), S. 17 - 37.

P. Fenkam, C. Krügel, H. Gall, M. Jazayeri:
"DPS: An architectural Style for Development of Secure Software";
Vortrag: Infrastructure Security Conference (InfraSec), Bristol, UK; 01.10.2002 - 03.10.2002; in: "Proceedings of the", Springer Verlag, (2002).

N. Jovanovic, E. Kirda, Ch. Krügel:
"Preventing Cross Site Request Forgery Attacks";
Vortrag: SecureComm 2006, Baltimore, MD, USA; 28.08.2006 - 01.09.2006; in: "2nd International Conference on Security and Privacy in Communication Networks & the Workshops", IEEE, (2006).

Zusätzliche Informationen

N. Jovanovic, Ch. Krügel, E. Kirda:
"Pixy: A static Analysis Tool for Detecting web Application Vulnerabilities";
Vortrag: 2006 IEEE Symposium on Security and Privacy, Berkeley/Oakland, Kalifornien, USA; 21.05.2006 - 24.05.2006; in: "Proceedings of the 2006 IEEE Symposium on Security and Privacy", IEEE Inc., P2574 (2006), ISBN: 0-7695-2574-1; S. 258 - 263.

N. Jovanovic, Ch. Krügel, E. Kirda:
"Precise Alias Analysis for Static Detection of Web Application Vulnerabilities";
Vortrag: PLAS 2006, Ottawwa, Kanada; 10.06.2006; in: "Proceedings of the 2006 Programming Languages and Analysis for Security Workshop", ACM Inc., 548064 (2006), ISBN: 1-59593-374-3; S. 27 - 36.

S. Kals, E. Kirda, Ch. Krügel, N. Jovanovic:
"SecuBat: A Web Vulnerability Scanner";
Vortrag: International World Wide Web Conference (WWW), UK; 23.05.2006 - 26.05.2006; in: "Proc. 15th International World Wide Web Conference (WWW)", (2006), S. 247 - 257.

C. Karlberger, G. Bayler, Ch. Krügel, E. Kirda:
"Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters";
Vortrag: Usenix Workshop on Offensive Technologies (WOOT), Boston, USA; 06.08.2007; in: "Usenix Workshop on Offensive Technologies (WOOT)", (2007), S. 1 - 7.

C. Kerer, E. Kirda, C. Krügel:
"XGuide - A Practical Guide to XML-based Web Engineering";
Vortrag: Web Engineering Workshop at the International Conference on Networking, Pisa, Italy; 2002; in: "Proceedings of the Web Engineering Workshop, International Conference on Networking", Lecture Notes in Computer Science, Springer Verlag, Heidelberg, New York (2002).

E. Kirda, M. Egele, Ch. Krügel:
"Removing Web Spam Links from Search Engine Results";
Poster: Conference of the European Institute for Computer Antivirus Research (EICAR), Berlin; 11.05.2009 - 12.05.2009; in: "EICAR proceedings", (2009).

Zusätzliche Informationen

E. Kirda, C. Kerer, C. Krügel, R. Kurmanowytsch:
"Web Service Engineering with DIWE";
Vortrag: Euromicro International Conference, Antalya, Turkey; 01.09.2003 - 06.09.2003; in: "Proceedings of the 20th Euromicro Conference", IEEE Computer Society, (2003), ISSN: 1089-6503; S. 283 - 290.

E. Kirda, Ch. Krügel:
"Protecting Users Against Phishing Attacks with AntiPhish";
Vortrag: International Computer Software and Applications Conference (COMPSAC), Edinburgh, Scotland (eingeladen); 26.07.2005 - 28.07.2005; in: "Proceedings of the 29th Anual International Computer Software and Applications Conference", IEEE Computer Society, (2005), ISBN: 0-7695-2413-3; S. 517 - 524.

E. Kirda, Ch. Krügel, G. Banks, G. Vigna, R. Kemmerer:
"Bahavior-based Spyware Detection";
Vortrag: Usenix Security Symposium, Vancouver, Canada; 31.07.2006 - 04.08.2006; in: "Proc. 15th USENIX Security Symposium", (2006), ISBN: 1-931971-45-5; S. 273 - 288.

E. Kirda, Ch. Krügel, G. Vigna, N. Jovanovic:
"Noxes: A Client-Side Solution for Mitigating Cross Site Scripting Attacks";
Vortrag: Symposium on Applied Computing (SAC), France; 23.04.2006 - 27.04.2006; in: "Proc. 21st ACM Symposium on Applied Computing (SAC)", ACM Press, (2006), S. 330 - 338.

P. Klinkoff, Ch. Krügel, E. Kirda, G. Vigna:
"Extending .NET Security to Unmanaged Code";
Vortrag: Information Security Conference (ISC), Greece; 30.08.2006 - 02.09.2006; in: "Proc. 9th Information Security Conference (ISC), Lecture Notes in Computer Science", Springer-Verlag, (2006), S. 1 - 16.

C. Krügel, T. Toth:
"Distributed Pattern Detection for Intrusion Detection";
Vortrag: Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA; 06.02.2002 - 08.02.2002; in: "Proceedings of Network and Distributed System Security Symposium (NDSS)", (2002), S. 51 - 63.

Zusätzliche Informationen

C. Krügel, T. Toth:
"Flexible, Mobile Agent Based Intrusion Detection for Dynamic Networks";
Vortrag: European Wireless, Florence, Italy; 26.02.2002 - 28.02.2002; in: "European Wireless 2002", (2002), S. 581 - 587.

Zusätzliche Informationen

C. Krügel, T. Toth, E. Kirda:
"Service Specific Anomaly Detection for Network Intrusion Detection";
Vortrag: Symposium on Applied Computing (SAC), Madrid, Spain; 11.03.2002 - 14.03.2002; in: "Symposium on Applied Computing", (2002), S. 244.

Zusätzliche Informationen

C. Krügel, F. Valeur et al.:
"Stateful Intrusion Detection for High-Speed Networks";
Vortrag: IEEE Symposium on Security and Privacy, Oakland, California, USA; 12.05.2002 - 15.05.2002; in: "Proceedings of the 2002 IEEE Symposium on Security and Privacy", (2002), ISBN: 0-7695-1543-6; S. 266 - 274.

Zusätzliche Informationen

Ch. Krügel, E. Kirda, D. Mutz, W. Robertson, G. Vigna:
"Automating Mimicry Attacks Using Static Binary Analysis";
Vortrag: Usenix Security Symposium, Baltimore, USA (eingeladen); 31.07.2005 - 05.08.2005; in: "Proceedings of the 14th USENIX Security Symposium", USENIX Assoication, (2005), ISBN: 1-931971-34-x; S. 161 - 176.

Ch. Krügel, E. Kirda, D. Mutz, W. Robertson, G. Vigna:
"Polymorphic Worm Detection Using Structural Information of Executables";
Vortrag: RAID International Symposium on Recent Advances in Intrusion Detection 2002, USA; 07.09.2005 - 09.09.2005; in: "Proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID)", Springer-Verlag, LNCS (2005).

Ch. Krügel, W. Robertson:
"Alert Verification - Determining the Success of Intrusion Attempts";
Vortrag: Workshop on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Dortmund, Germany; 06.07.2004 - 07.07.2004; in: "Proceedings of the Workshop on Detection of Intrusions and Malware and Vulnerability Assessment", (2004), ISBN: 3-88579-375-x; S. 25 - 39.

Ch. Krügel, W. Robertson, F. Valeur, G. Vigna:
"Static Disassembly of Obfuscated Binaries";
Vortrag: Usenix Security Symposium, San Diego, CA, USA; 09.08.2004 - 13.08.2004; in: "Proceedings of the 13th Usenix Security Symposium", (2004), 1-931971-23-2; S. 255 - 270.

Ch. Krügel, W. Robertson, G. Vigna:
"Detecting Kernel-Level Rootkits Through Binary Analysis";
Vortrag: Annual Computer Security Applications Conference (ACSAC), Tucson, AZ, USA; 06.12.2004 - 10.12.2004; in: "Proceedings of the 20th Annual Computer Security Applications Conference", (2004), ISBN: 0-7695-2252-1; S. 91 - 100.

C. Ludl, S. McAllister, E. Kirda, Ch. Krügel:
"On the Effectiveness of Techniques to Detect Phishing Sites";
Vortrag: Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Luzern, Schweiz; 12.07.2007; in: "Proceedings of the Detection of Intrusions and Malware and Vulnerability Assessment Conference (DIMVA)", (2007), S. 1 - 20.

A. Moser, Ch. Krügel, E. Kirda:
"Exploring Multiple Execution Paths for Malware Analysis";
Vortrag: IEEE Symposium on Security and Privacy, Oakland, USA; 20.05.2007; in: "Proceedings of the IEEE Symposium on Security and Privacy", (2007), S. 1 - 15.

A. Moser, Ch. Krügel, E. Kirda:
"Limits of Static Analysis for Malware Detection";
Vortrag: Annual Computer Security Applications Conference (ACSAC), Miami, USA; 10.12.2007; in: "Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)", (2007), S. 12 - 21.

D. Mutz, Ch. Krügel, W. Robertson, G. Vigna, R. Kemmerer:
"Reverse Engineering of Network Signatures";
Vortrag: AusCERT, Gold Coast, Australia; 22.05.2005 - 26.05.2005; in: "Proceedings of the Information Technology Security Conference", (2005), ISBN: 1-86499-799-0.

T. Raffetseder, E. Kirda, Ch. Krügel:
"Building Anti-Phishing Browser Plug-Ins: An Experience Report";
Vortrag: International Workshop on Software Engineering for Secure Systems (SESS), Minneapolis, USA; 19.05.2007; in: "3rd International Workshop on Software Engineering for Secure Systems (SESS)", IEEE Computer Society, (2007), ISBN: 978-0-7695-2830-4; S. 1 - 7.

T. Raffetseder, Ch. Krügel, E. Kirda:
"Detecting System Emulators";
Vortrag: Information Security Conference (ISC), Valparaiso, Chile; 09.10.2007; in: "Proceedings of the Information Security Conference (ISC )", (2007), S. 1 - 18.

W. Robertson, G. Vigna, Ch. Krügel, R. Kemmerer:
"Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks";
Vortrag: Network and Distributed System Security Symposium (NDSS), USA; 02.02.2006 - 03.02.2006; in: "Proc. Network and Distributed System Security Symposium (NDSS)", Internet Society, (2006), S. 31 - 46.

A. Rosiello, Ch. Krügel, E. Kirda, F. Ferrandi:
"A Layout-Similarity-Based Approach for Detecting Phishing Pages";
Vortrag: IEEE International Conference on Security and Privacy in Communication Networks (SecureComm), Nizza, Frankreich; 17.09.2007; in: "Proceedings of the IEEE International Conference on Security and Privacy in Communication Networks (SecureComm)", (2007), S. 1 - 10.

M. Szydlowski, Ch. Krügel, E. Kirda:
"Secure Input for Web Applications";
Vortrag: Annual Computer Security Applications Conference (ACSAC), Miami, USA; 10.12.2007; in: "Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)", (2007), S. 1 - 11.

M. Szydlowski, B. Zhao, E. Kirda, Ch. Krügel:
"BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients";
Vortrag: 20th International Conference on Computer Communication Networks (ICCCN 2011), Maui, HI; 31.07.2011 - 04.08.2011; in: "Proceedings of the 20th International Conference on Computer Communication Networks (ICCCN 2011)", IEEE, (2011), 6 S.

Zusätzliche Informationen

T. Toth, C. Krügel:
"Accurate Buffer Overflow Detection via Abstract Payload Execution";
Vortrag: RAID International Symposium on Recent Advances in Intrusion Detection 2002, Zürich, Switzerland; 16.10.2002 - 18.10.2002; in: "Recent Advances in Intrusion Detection", Springer-Verlag Berlin Heidelberg, (2002), ISBN: 3-540-00020-8; S. 274 - 291.

Zusätzliche Informationen

T. Toth, C. Krügel:
"Connection-history based anomaly detection";
Vortrag: Information Assurance Workshop, West Point, New York, USA; 17.06.2002 - 19.06.2002; in: "Proceedings of the 3rd Annual IEEE Information Assurance Workshop", (2002), ISBN: 0-7803-9850-5; S. 241 - 246.

Zusätzliche Informationen

T. Toth, C. Krügel:
"Evaluating the Impact of Automated Intrusion Response Mechanisms";
Vortrag: 18th Annual Computer Security Applications Conference, Las Vegas, Nevada; 09.12.2002 - 13.12.2002; in: "Proceedings 18th Annual Computer Security Applications Conference", (2002), S. 301 - 310.

Zusätzliche Informationen

F. Valeur, G. Vigna, Ch. Krügel, E. Kirda:
"An Anomaly-driven Reverse Proxy for Web Applications";
Vortrag: Symposium on Applied Computing (SAC), France; 23.04.2006 - 27.04.2006; in: "Proc. 21st ACM Symposium on Applied Computing (SAC)", ACM Press, (2006), S. 361 - 369.

Ph. Vogt, F. Nentwich, N. Jovanovic, Ch. Krügel, E. Kirda, G. Vigna:
"Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis";
Vortrag: Network and Distributed System Security Symposium (NDSS), San Diego, USA; 27.02.2007; in: "Proceedings of the Network and Distributed System Security Symposium (NDSS)", (2007), S. 1 - 12.

H. Yin, D. Song, M. Egele, Ch. Krügel, E. Kirda:
"Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis";
Vortrag: ACM Conference on Computer and Communications Security (CCS), Washington, USA; 29.10.2007; in: "Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS)", (2007), S. 1 - 12.


Vorträge und Posterpräsentationen (ohne Tagungsband-Eintrag)


Ch. Krügel:
"Advanced Techniques for Malicious Code Detection";
Vortrag: NATO ASI Workshop, Yerevan, Armenien (eingeladen); 04.10.2005.

Ch. Krügel:
"Analysing and Detecting Malicious Code";
Vortrag: Informatik Kolloquium, Universität Mannheim, Deutschland (eingeladen); 13.12.2005.

Ch. Krügel:
"Identification of Anomalous System Calls for Intrusion Detection";
Vortrag: Informatik Kolloquium, TU Muenchen, Garching, Deutschland (eingeladen); 09.12.2004.

Ch. Krügel:
"Identification of Anomalous System Calls for Intrusion Detection";
Vortrag: Informatik Kolloquium, Universität Dortmund, Deutschland (eingeladen); 14.04.2005.

Ch. Krügel:
"Intrusion Detection und Korrelation";
Vortrag: FH Hagenberg, Hagenberg (eingeladen); 15.03.2005.

Ch. Krügel:
"Malicious Code Analysis";
Vortrag: Talk at the Computer Science Colloquium, Carleton University, Ottawa, Canada (eingeladen); 01.10.2006.

Ch. Krügel:
"Malicious Code Analysis";
Vortrag: Habilitationskolloquium, Vienna, Austria; 01.09.2006.

Ch. Krügel:
"Malicious Code Analysis: Detecting Metamorphic Worms";
Vortrag: Technische Universität Berlin, Berlin, Deutschland (eingeladen); 15.11.2005.

Ch. Krügel:
"Malicious Code Analysis: Detecting Metamorphic Worms";
Vortrag: Informatik Kolloquium, Masaryk University, Bruenn (eingeladen); 29.11.2005.

Ch. Krügel:
"Vulnerabilities in Web Applications";
Vortrag: TERENA Networking Conference, Italy (eingeladen); 01.05.2006.


Habilitationsschriften


Ch. Krügel:
"Malicious Code Analysis";
TU Wien / Fakultät für Informatik, 2006.


Dissertationen (eigene und begutachtete)


M. Egele:
"Protecting Web Clients from Internet Threats";
Betreuer/in(nen), Begutachter/in(nen): Ch. Krügel, E. Kirda; Rechnergestützte Automation, 2011.

N. Jovanovic:
"Web Application Security";
Betreuer/in(nen), Begutachter/in(nen): Ch. Krügel, E. Kirda; Institut für Rechnergestützte Automation und Institut für Informationssysteme AB Verteilte Systeme, 2007; Rigorosum: 09.10.2007.

C. Kolbitsch:
"Behavior Based Malware Analysis and Detection";
Betreuer/in(nen), Begutachter/in(nen): Ch. Krügel, E. Kirda; Rechnergestützte Automation, 2011.

C. Krügel:
"Network Alertness -- Towards an adaptive, collaborating Intrusion Detectcion";
Betreuer/in(nen), Begutachter/in(nen): M. Jazayeri, W. Kastner; 184, 2002.

M. Neugschwandtner:
"Mitigating malware communication infrastructures and exploitation techniques";
Betreuer/in(nen), Begutachter/in(nen): Ch. Krügel, E. Kirda; Rechnergestützte Automation, 2014; Rigorosum: 23.06.2014.


Diplom- und Master-Arbeiten (eigene und betreute)


U. Bayer:
"TTAnalyze - A Tool for Analyzing Malware";
Betreuer/in(nen): Ch. Krügel; 183, 2005.

G. Bayler:
"Penetrating Bayesian Spam Filters Using Redundancy in Natural Language";
Betreuer/in(nen): W. Kastner, Ch. Krügel, E. Kirda; Institut für Rechnergestützte Automation AG Automatisierungssysteme u. 184-1, 2007.

M. Egele:
"Behavior-Based Spyware Detection Using Dynamic Taint Analysis";
Betreuer/in(nen): S. Dustdar, E. Kirda, Ch. Krügel; Institut für Informationssysteme, AB Verteilte Systeme, 2006; Abschlussprüfung: 03.10.2006.

Zusätzliche Informationen

S. Kals:
"SecuBat: A Web Vulnerability Scanner";
Betreuer/in(nen): Ch. Krügel, S. Dustdar, E. Kirda; 183/1, 2006.

P. Klinkoff:
"Extending .NET Security to Native Code";
Betreuer/in(nen): Ch. Krügel; 183/1, 2005.

C. Ludl:
"SWAP";
Betreuer/in(nen): E. Kirda, Ch. Krügel; Institut für Informationssysteme, AB Verteilte Systeme u. E183, 2008.

Stefan Mitterhofer:
"Server-side bot detection for massively multiplayer online games";
Betreuer/in(nen): E. Kirda, Ch. Krügel, Ch. Platzer; E183-1, 2009; Abschlussprüfung: 28.07.2009.

Zusätzliche Informationen

F. Nentwich:
"Sicherheitsanalyse von Signatursoftware";
Betreuer/in(nen): Ch. Krügel, E. Kirda; Institut für Rechnergestützte Automation AG Automatisierungssysteme u. 184-1, 2007.

M. Neugschwandtner:
"dAnubis - dynamic device driver analysis based on virtual machine introspection";
Betreuer/in(nen): W. Kastner, E. Kirda, Ch. Krügel, Ch. Platzer; E183-1, Seclab Group, 2009; Abschlussprüfung: 21.10.2009.

Zusätzliche Informationen

H. Petritsch:
"Understanding and Replaying Network Traffic in Windows XP for Dynamic Malware Analysis";
Betreuer/in(nen): Ch. Krügel, E. Kirda; Institut für Rechnergestützte Automation AG Automatisierungssysteme u. 184-1, 2007.

A. Stamminger:
"Automated spyware collection and analysis";
Betreuer/in(nen): E. Kirda, Ch. Krügel; Institut für Informationssysteme, AB Verteilte Systeme u. 183-1, 2007.

P. Vogt:
"Cross site scripting (XSS) attack prevention with dynamic data tainting on the client side";
Betreuer/in(nen): S. Dustdar, C. Krügel, E. Kirda; Institut für Informationssysteme, AB Verteilte Systeme, 2006.

Ph. Vogt:
"Cross-Site Scripting (XSS) Attack Prevention with Dynamic Data Tainting on the Client Side";
Betreuer/in(nen): Ch. Krügel; 183/1, 2006.