Detecting and preventing attacks against web applications

William Kim Robertson
University of California, Santa Barbara

11
2009
Static enforcement of web application integrity through strong typing

Giovanni Vigna , William Robertson
usenix security symposium 283 -298

70
2009
Alert Verification Determining the Success of Intrusion Attempts

Christopher Kruegel , William Robertson
DIMVA 25 -38

81
2004
Static disassembly of obfuscated binaries

Fredrik Valeur , Christopher Kruegel , Giovanni Vigna , William Robertson
usenix security symposium 18 -18

274
2004
Automating mimicry attacks using static binary analysis

Engin Kirda , Christopher Kruegel , Darren Mutz , Giovanni Vigna
usenix security symposium 11 -11

264
2005
ZigZag: automatically hardening web applications against client-side validation vulnerabilities

Engin Kirda , Michael Weissbacher , Christopher Kruegel , Giovanni Vigna
usenix security symposium 737 -752

14
2015
UNVEIL: a large-scale, automated approach to detecting ransomware

Engin Kirda , Sajjad Arshad , Amin Kharraz , Collin Mulliner
usenix security symposium 757 -772

168
2016
DARKDROID: Exposing the Dark Side of Android Marketplaces

Christopher Kruegel , Giovanni Vigna , Engin Kirda , William Robertson

2016
Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers

Tobias Lauinger , Kaan Onarlioglu , Abdelberi Chaabane , Ahmet Salih Buyukkayhan
usenix security symposium 865 -880

10
2017
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing

Engin Kirda , Michael Weissbacher , Manuel Egele , Sajjad Arshad
arXiv: Cryptography and Security

32
2020
DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis

Engin Kirda , Long Lu , Alejandro Mera , William Robertson
arXiv: Cryptography and Security

27
2020
What's in an Exploit? An Empirical Analysis of Reflected Server {XSS} Exploitation Techniques

Engin Kirda , Tobias Lauinger , Alina Oprea , Ahmet Salih Buyukkayhan
23rd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2020) 107 -120

2020
SoK: Enabling Security Analyses of Embedded Systems via Rehosting

Davide Balzarotti , Manuel Egele , Brendan Dolan-Gavitt , Tim Leek
computer and communications security

17
2021
Evaluating Synthetic Bugs

Joshua Bundt , Brendan Dolan-Gavitt , Tim Leek , Andrew Fasano
computer and communications security

2021
CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes

Patrick Carter , Collin Mulliner , Martina Lindorfer , William Robertson
Financial Cryptography and Data Security 231 -249

30
2017
BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications

Ahmet Talha Ozcan , Can Gemicioglu , Kaan Onarlioglu , Michael Weissbacher
financial cryptography 355 -369

7
2015
Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices

Matthias Neugschwandtner , Collin Mulliner , William Robertson , Engin Kirda
Trust and Trustworthy Computing 60 -81

1
2016
Exploiting execution context for the detection of anomalous system calls

Darren Mutz , William Robertson , Giovanni Vigna , Richard Kemmerer
recent advances in intrusion detection 1 -20

53
2007
Ex-Ray: Detection of History-Leaking Browser Extensions

Michael Weissbacher , Enrico Mariconti , Guillermo Suarez-Tangil , Gianluca Stringhini
annual computer security applications conference 590 -602

11
2017