Improving Signature Testing through Dynamic Data Flow Analysis

Christopher Kruegel , Davide Balzarotti , William Robertson , Giovanni Vigna
annual computer security applications conference 53 -63

7
2007
Eraser: Your Data Won't Be Back

Kaan Onarlioglu , William Robertson , Engin Kirda ,
ieee european symposium on security and privacy 153 -166

2018
It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains

Florian Quinkert , Tobias Lauinger , William Robertson , Engin Kirda
communications and networking symposium 259 -267

16
2019
Optical Delusions: A Study of Malicious QR Codes in the Wild

Amin Kharraz , Engin Kirda , William Robertson , Davide Balzarotti
dependable systems and networks 192 -203

26
2014
Speculator: a tool to analyze speculative execution attacks and mitigations

Andrea Mambretti , Matthias Neugschwandtner , Alessandro Sorniotti , Engin Kirda
annual computer security applications conference 747 -761

9
2019
WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration

Tobias Lauinger , Kaan Onarlioglu , Abdelberi Chaabane , William Robertson
internet measurement conference 247 -253

12
2016
On the misuse of graphical user interface elements to implement security controls

Collin Mulliner , William Robertson , Engin Kirda
it - Information Technology 59 ( 2) 59 -65

2017
Semi-automated discovery of server-based information oversharing vulnerabilities in Android applications

William Koch , Abdelberi Chaabane , Manuel Egele , William Robertson
international symposium on software testing and analysis 147 -157

4
2017
Topology-Based Detection of Anomalous BGP Messages

Christopher Kruegel , Darren Mutz , William Robertson , Fredrik Valeur
recent advances in intrusion detection 17 -35

89
2003
PatchDroid: scalable third-party security patches for Android devices

Collin Mulliner , Jon Oberheide , William Robertson , Engin Kirda
annual computer security applications conference 259 -268

39
2013
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks

Ting-Fang Yen , Alina Oprea , Kaan Onarlioglu , Todd Leetham
annual computer security applications conference 199 -208

341
2013
TrueClick: automatically distinguishing trick banners from genuine download links

Sevtap Duman , Kaan Onarlioglu , Ali Osman Ulusoy , William Robertson
annual computer security applications conference 456 -465

9
2014
Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces

Collin Mulliner , William Robertson , Engin Kirda
ieee symposium on security and privacy 149 -162

9
2014
TriggerScope: Towards Detecting Logic Bombs in Android Applications

Yanick Fratantonio , Antonio Bianchi , William Robertson , Engin Kirda
2016 IEEE Symposium on Security and Privacy (SP) 377 -396

186
2016
Surveylance: Automatically Detecting Online Survey Scams

Amin Kharraz , William Robertson , Engin Kirda
2018 IEEE Symposium on Security and Privacy (SP) 70 -86

22
2018
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks

Amin Kharraz , William Robertson , Davide Balzarotti , Leyla Bilge
Detection of Intrusions and Malware, and Vulnerability Assessment 3 -24

242
2015
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users

Yanick Fratantonio , Antonio Bianchi , William Robertson , Manuel Egele
Detection of Intrusions and Malware, and Vulnerability Assessment 282 -303

12
2015
Protecting a Moving Target: Addressing Web Application Concept Drift

Federico Maggi , William Robertson , Christopher Kruegel , Giovanni Vigna
recent advances in intrusion detection 21 -40

58
2009
A multi-model approach to the detection of web-based attacks

Christopher Kruegel , Giovanni Vigna , William Robertson
Computer Networks 48 ( 5) 717 -738

382
2005
HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing

William Blair , Andrea Mambretti , Sajjad Arshad , Michael Weissbacher
ACM Transactions on Privacy and Security 25 ( 4) 1 -35

1
2022