BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications

Ahmet Talha Ozcan , Can Gemicioglu , Kaan Onarlioglu , Michael Weissbacher
financial cryptography 355 -369

7
2015
PoX: Protecting users from malicious Facebook applications

Manuel Egele , Andreas Moser , Christopher Kruegel , Engin Kirda
Computer Communications 35 ( 12) 1507 -1515

30
2012
Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices

Matthias Neugschwandtner , Collin Mulliner , William Robertson , Engin Kirda
Trust and Trustworthy Computing 60 -81

1
2016
Paying for Piracy? An Analysis of One-Click Hosters’ Controversial Reward Schemes

Tobias Lauinger , Engin Kirda , Pietro Michiardi
Research in Attacks, Intrusions, and Defenses 169 -189

8
2012
Ex-Ray: Detection of History-Leaking Browser Extensions

Michael Weissbacher , Enrico Mariconti , Guillermo Suarez-Tangil , Gianluca Stringhini
annual computer security applications conference 590 -602

11
2017
Abusing social networks for automated user profiling

Marco Balduzzi , Christian Platzer , Thorsten Holz , Engin Kirda
recent advances in intrusion detection 422 -441

242
2010
Client-side cross-site scripting protection

Engin Kirda , Nenad Jovanovic , Christopher Kruegel , Giovanni Vigna
Computers & Security 28 ( 7) 592 -604

58
2009
Have things changed now? An empirical study on input validation vulnerabilities in web applications

Theodoor Scholte , Davide Balzarotti , Engin Kirda
Computers & Security 31 ( 3) 344 -356

91
2012
Hypervisor-based malware protection with AccessMiner

Aristide Fattori , Andrea Lanzi , Davide Balzarotti , Engin Kirda
Computers & Security 52 33 -50

18
2015
SENTINEL: Securing Legacy Firefox Extensions

Kaan Onarlioglu , Ahmet Salih Buyukkayhan , William Robertson , Engin Kirda
Computers & Security 49 147 -161

10
2015
On the Effectiveness of Techniques to Detect Phishing Sites

Christian Ludl , Sean McAllister , Engin Kirda , Christopher Kruegel
Detection of Intrusions and Malware, and Vulnerability Assessment 20 -39

237
2007
Preventing Input Validation Vulnerabilities in Web Applications through Automated Type Analysis

Theodoor Scholte , William Robertson , Davide Balzarotti , Engin Kirda
computer software and applications conference 233 -243

42
2012
EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails

Sevtap Duman , Kubra Kalkan-Cakmakci , Manuel Egele , William Robertson
computer software and applications conference 1 408 -416

22
2016
Root Cause Analysis for Cybersecurity

Engin Kirda , Amin Kharraz
Auerbach Publications 81 -98

2017
Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries

Giovanni Vigna , Fredrik Valeur , Davide Balzarotti , William Robertson
Journal of Computer Security 17 ( 3) 305 -329

45
2009
Static analysis for detecting taint-style vulnerabilities in web applications

Nenad Jovanovic , Christopher Kruegel , Engin Kirda
Journal of Computer Security 18 ( 5) 861 -907

53
2010
From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop

Tobias Lauinger , Ahmet S. Buyukkayhan , Abdelberi Chaabane , William Robertson
internet measurement conference 322 -328

2
2018
How Tracking Companies Circumvented Ad Blockers Using WebSockets

Muhammad Ahmad Bashir , Sajjad Arshad , Engin Kirda , William Robertson
internet measurement conference 471 -477

17
2018
On the Effectiveness of Type-based Control Flow Integrity

Reza Mirzazade Farkhani , Saman Jafari , Sajjad Arshad , William Robertson
annual computer security applications conference 28 -39

5
2018
The power of procrastination

Clemens Kolbitsch , Engin Kirda , Christopher Kruegel
Proceedings of the 18th ACM conference on Computer and communications security - CCS '11 285 -296

85
2011