Christopher Krügel
Privatdoz. Dipl.-Ing. Dr.techn.
Research Areas
- Security, Intrusion Detection, Malware Detection, Operating Systems, Networks
Role
-
Affiliated
Automation Systems, E191-03
Projects
-
SECoverer - Finding Security Vulnerabilities in Web Applications
2008 – 2011 / SEC Consult Unternehmensberatung GmbH
Publications: 165278 / 52881 / 52884 / 53339 / 53348 -
Worldwide Observatory of Malicious Behaviors and Attack Threats
2008 – 2011 / European Commission
Publications: 165278 / 52860 / 52878 / 52880 / 52881 / 52884 / 52887 / 52890 / 52891 / 53339 / 53340 / 53341 / 53346 / 53348 / 53357 / 53360 / 53362 -
Pathfinder - Malicious Code Analysis and Detection
2007 – 2009 / Austrian Research Promotion Agency (FFG)
Publications: 52860 / 52890 -
Security Analysis SecComerce Software
2006 – 2008 / BAWAG/PSK Bank für Arbeit und Wirtschaft und Österreichische Postsparkasse Aktiengesellschaft -
Software Security through Binary Analysis
2005 – 2008 / Austrian Science Fund (FWF) -
Omnis - Security, Components and Infrastructure for Pervasive Environments
2005 – 2007 / Austrian Science Fund (FWF)
Publications: 169627 / 52019 / 53098 -
Maleware Detection
2005 – 2007 / Wirtschaftskammer Österreich -
Development of Solaris Baseline Security Software
2004 – 2005 / Jubilee Fund of the Austrian National Bank
Publications
2021
-
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone
/
Quarta, D., Ianni, M., Machiry, A., Fratantonio, Y., Gustafson, E., Balzarotti, D., Lindorfer, M., Vigna, G., & Kruegel, C. (2021). Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM’s TrustZone. In Proceedings of the 2021 Research on offensive and defensive techniques in the Context of Man At The End (MATE) Attacks. ACM, Austria. ACM. https://doi.org/10.1145/3465413.3488571
Project: IoTIO (2020–2025)
2020
- When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features / Aghakhani, H., Gritti, F., Mecca, F., Lindorfer, M., Ortolani, S., Balzarotti, D., Vigna, G., & Krügel, C. (2020). When Malware is Packin’ Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features. In Network and Distributed System Security Symposium (NDSS). Internet Society. http://hdl.handle.net/20.500.12708/58307
2018
- GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM / van der Veen, V., Lindorfer, M., Fratantonio, Y., Padmanabha Pillai, H., Vigna, G., Kruegel, C., Bos, H., & Razavi, K. (2018). GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM. In Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 92–113). Springer. https://doi.org/10.1007/978-3-319-93411-2_5
- MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense / Konoth, R. K., Vineti, E., Moonsamy, V., Lindorfer, M., Kruegel, C., Bos, H., & Vigna, G. (2018). MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM. https://doi.org/10.1145/3243734.3243858
2017
- Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis / Continella, A., Fratantonio, Y., Lindorfer, M., Puccetti, A., Zand, A., Kruegel, C., & Vigna, G. (2017). Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis. In Proceedings 2017 Network and Distributed System Security Symposium. Internet Society. https://doi.org/10.14722/ndss.2017.23465
2012
- EVILSEED: A Guided Approach to Finding Malicious Web Pages / Invernizzi, L., Benvenuti, S., Cova, M., Milani Comparetti, P., Krügel, C., & Vigna, G. (2012). EVILSEED: A Guided Approach to Finding Malicious Web Pages. In Proceedings of the 2011 IEEE Symposium on Security and Privacy (pp. 428–442). http://hdl.handle.net/20.500.12708/54350
- A Static, Packer-Agnostic Filter to Detect Similar Malware Sample / Jacob, G., Milani Comparetti, P., Neugschwandtner, M., Krügel, C., & Vigna, G. (2012). A Static, Packer-Agnostic Filter to Detect Similar Malware Sample. In Proceedings of the 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment. Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Germany, EU. Springer. http://hdl.handle.net/20.500.12708/54351
2011
- BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients / Szydlowski, M., Zhao, B. Y., Kirda, E., & Krügel, C. (2011). BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients. In Proceedings of the 20th International Conference on Computer Communication Networks (ICCCN 2011) (p. 6). IEEE. http://hdl.handle.net/20.500.12708/53715
-
The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious Code
/
Kolbitsch, C., Kirda, E., & Krügel, C. (2011). The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious Code. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS). ACM Conference on Computer and Communications Security (CCS), Washington, USA, Non-EU. ACM. http://hdl.handle.net/20.500.12708/54011
Projects: SysSec (2010–2014) / TRUDIE (2009–2012) - FORECAST / Neugschwandtner, M., Comparetti, P. M., Jacob, G., & Kruegel, C. (2011). FORECAST. In Proceedings of the 27th Annual Computer Security Applications Conference on - ACSAC ’11. Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. ACM. https://doi.org/10.1145/2076732.2076735
2010
-
Extending Mondrian Memory Protection
/
Kolbitsch, C., Krügel, C., & Kirda, E. (2010). Extending Mondrian Memory Protection. In IST-091 Information Assurance and Cyber Defence (p. 18). NATO Research and Technology Organization (NATO RTO). http://hdl.handle.net/20.500.12708/53348
Projects: SECoverer (2008–2011) / WOMBAT (2008–2011) -
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
/
Kolbitsch, C., Holz, T., Krügel, C., & Kirda, E. (2010). Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries. In 2010 IEEE Symposium on Security and Privacy (pp. 29–44). IEEE Computer Society. https://doi.org/10.1109/SP.2010.10
Project: WOMBAT (2008–2011) -
Is the Internet for Porn? An Insight Into the Online Adult Industry
/
Wondracek, G., Holz, T., Platzer, C., Kirda, E., & Krügel, C. (2010). Is the Internet for Porn? An Insight Into the Online Adult Industry. In The Ninth Workshop on the Economics of Information Security (WEIS 2010) (p. 14). ACM Press. http://hdl.handle.net/20.500.12708/53357
Project: WOMBAT (2008–2011) -
A Practical Attack to De-anonymize Social Network Users
/
Wondracek, G., Holz, T., Kirda, E., & Kruegel, C. (2010). A Practical Attack to De-anonymize Social Network Users. In 2010 IEEE Symposium on Security and Privacy. IEEE, Austria. IEEE Computer Society. https://doi.org/10.1109/sp.2010.21
Project: WOMBAT (2008–2011) -
Identifying Dormant Functionality in Malware Programs
/
Milani Comparetti, P., Salvaneschi, G., Kirda, E., Kolbitsch, C., Krügel, C., & Zanero, S. (2010). Identifying Dormant Functionality in Malware Programs. In Proceedings of the 2010 IEEE Symposium on Security and Privacy (pp. 61–76). IEEE Computer Society. http://hdl.handle.net/20.500.12708/53340
Project: WOMBAT (2008–2011) -
A solution for the automated detection of clickjacking attacks
/
Balduzzi, M., Egele, M., Balzarotti, D., Kirda, E., & Krügel, C. (2010). A solution for the automated detection of clickjacking attacks. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security - ASIACCS ’10. ACM Symposium on Information computer and Communication Security (AsiaCCS), Bejing, China, Non-EU. ACM. https://doi.org/10.1145/1755688.1755706
Projects: SECoverer (2008–2011) / WOMBAT (2008–2011) -
Abusing Social Networks for Automated User Profiling
/
Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., & Krügel, C. (2010). Abusing Social Networks for Automated User Profiling. In Recent Advances in Intrusion Detection (RAID 2010) (p. 20). Springer. http://hdl.handle.net/20.500.12708/53362
Project: WOMBAT (2008–2011)
2009
- Server-Side Bot Detection in Massively Multiplayer Online Games / Mitterhofer, S. K., Krügel, C., Kirda, E., & Platzer, C. (2009). Server-Side Bot Detection in Massively Multiplayer Online Games. IEEE Security and Privacy, 7(3), 29–36. https://doi.org/10.1109/msp.2009.78
-
SWAP: Mitigating XSS Attacks using a Reverse Proxy
/
Krügel, C., Platzer, C., Kirda, E., Ludl, C., & Wurzinger, P. (2009). SWAP: Mitigating XSS Attacks using a Reverse Proxy. In SESS proceedings. International Workshop on Software Engineering for Secure Systems (SESS), Minneapolis, USA, Non-EU. http://hdl.handle.net/20.500.12708/52880
Project: WOMBAT (2008–2011) - Mitigating Drive-by Download Attacks: Challenges and Open Problems / Egele, M., Kirda, E., & Krügel, C. (2009). Mitigating Drive-by Download Attacks: Challenges and Open Problems. In Open Research Problems in Network Security Workshop. Open Research Problems in Network Security Workshop, Zurich, EU. http://hdl.handle.net/20.500.12708/52883
-
Defending Browsers against Drive-by Downloads: Mitigating Heap-spraying Code Injection Attacks
/
Wurzinger, P., Egele, M., Kirda, E., & Krügel, C. (2009). Defending Browsers against Drive-by Downloads: Mitigating Heap-spraying Code Injection Attacks. In Sixth Conference on Detection of Intrusions and Malware & Vulnerability Assessment. Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Germany, EU. http://hdl.handle.net/20.500.12708/52884
Projects: SECoverer (2008–2011) / WOMBAT (2008–2011) -
Removing Web Spam Links from Search Engine Results
/
Kirda, E., Egele, M., & Krügel, C. (2009). Removing Web Spam Links from Search Engine Results. In EICAR proceedings. Conference of the European Institute for Computer Antivirus Research (EICAR), Germany, EU. http://hdl.handle.net/20.500.12708/52881
Projects: SECoverer (2008–2011) / WOMBAT (2008–2011) -
Scalable, Behavior-Based Malware Clustering
/
Bayer, U., Kirda, E., Krügel, C., Milani Comparetti, P., & Hlauschek, C. (2009). Scalable, Behavior-Based Malware Clustering. In 16th Annual Network and Distributed System Security Symposium (NDSS 2009). Network and Distributed System Security Symposium (NDSS), USA, Non-EU. NDSS Proceedings. http://hdl.handle.net/20.500.12708/52860
Projects: Pathfinder (2007–2009) / WOMBAT (2008–2011) -
Effective and Efficient Malware Detection at the End Host
/
Milani Comparetti, P., Kolbitsch, C., Kirda, E., Krügel, C., Xiaoyong, Z., & Xiaofeng, W. (2009). Effective and Efficient Malware Detection at the End Host. In usenix 2009. Usenix Security Symposium, Baltimore, USA, Austria. http://hdl.handle.net/20.500.12708/52887
Project: WOMBAT (2008–2011) -
FIRE: FInding Rogue nEtworks
/
Stone-Gross, B., Moser, A., Krügel, C., Kirda, E., & Almaroth, K. (2009). FIRE: FInding Rogue nEtworks. In 25th Annual Computer Security Applications Conference (ACSAC). Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. http://hdl.handle.net/20.500.12708/52891
Project: WOMBAT (2008–2011) -
Automatically Generating Models for Botnet Detection
/
Wurzinger, P., Bilge, L., Kirda, E., Krügel, C., Holz, T., & Göbel, J. (2009). Automatically Generating Models for Botnet Detection. In 14th European Symposium on Research in Computer Security (ESORICS 2009). European Symposium on Research in Computer Security (ESORICS), Saint Malo, Brittany, France, EU. http://hdl.handle.net/20.500.12708/52890
Projects: Pathfinder (2007–2009) / WOMBAT (2008–2011) -
Prospex: Protocol Specification Extraction
/
Milani Comparetti, P., Wondracek, G., Krügel, C., & Kirda, E. (2009). Prospex: Protocol Specification Extraction. In Proceedings of the IEEE Symposium on Security and Privacy (pp. 110–125). IEEE. http://hdl.handle.net/20.500.12708/52878
Project: WOMBAT (2008–2011)
2008
- Overbot - A botnet protocol based on Kademlia / Starnberger, G., Krügel, C., & Kirda, E. (2008). Overbot - A botnet protocol based on Kademlia. In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SecureComm 2008) (pp. 1–9). ACM. http://hdl.handle.net/20.500.12708/52276
2007
- Extending .NET Security to Unmanaged Code / Klinkoff, P., Krügel, C., Kirda, E., & Vigna, G. (2007). Extending .NET Security to Unmanaged Code. International Journal of Information Security, 6(6), 417–428. http://hdl.handle.net/20.500.12708/169715
- Limits of Static Analysis for Malware Detection / Moser, A., Krügel, C., & Kirda, E. (2007). Limits of Static Analysis for Malware Detection. In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC) (pp. 12–21). http://hdl.handle.net/20.500.12708/52153
- Exploring Multiple Execution Paths for Malware Analysis / Moser, A., Krügel, C., & Kirda, E. (2007). Exploring Multiple Execution Paths for Malware Analysis. In Proceedings of the IEEE Symposium on Security and Privacy (pp. 1–15). http://hdl.handle.net/20.500.12708/52143
- On the Effectiveness of Techniques to Detect Phishing Sites / Ludl, C., McAllister, S., Kirda, E., & Krügel, C. (2007). On the Effectiveness of Techniques to Detect Phishing Sites. In Proceedings of the Detection of Intrusions and Malware and Vulnerability Assessment Conference (DIMVA) (pp. 1–20). http://hdl.handle.net/20.500.12708/52145
- Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis / Yin, H., Song, D., Egele, M., Krügel, C., & Kirda, E. (2007). Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS) (pp. 1–12). http://hdl.handle.net/20.500.12708/52151
- Dynamic Spyware Analysis / Egele, M., Krügel, C., Kirda, E., Yin, H., & Song, D. (2007). Dynamic Spyware Analysis. In Proceedings of the Usenix Annual Technical Conference (pp. 1–14). http://hdl.handle.net/20.500.12708/52146
- Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters / Karlberger, C., Bayler, G., Krügel, C., & Kirda, E. (2007). Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters. In Usenix Workshop on Offensive Technologies (WOOT) (pp. 1–7). http://hdl.handle.net/20.500.12708/52150
- Improving Signature Testing Through Dynamic Data Flow Analysis / Balzarotti, D., Robertson, W., Krügel, C., & Vigna, G. (2007). Improving Signature Testing Through Dynamic Data Flow Analysis. In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC) (pp. 22–32). http://hdl.handle.net/20.500.12708/52154
- Secure Input for Web Applications / Szydlowski, M., Krügel, C., & Kirda, E. (2007). Secure Input for Web Applications. In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC) (pp. 1–11). http://hdl.handle.net/20.500.12708/52152
- Detecting System Emulators / Raffetseder, T., Krügel, C., & Kirda, E. (2007). Detecting System Emulators. In Proceedings of the Information Security Conference (ISC ) (pp. 1–18). http://hdl.handle.net/20.500.12708/52149
- Mining Specifications of Malicious Behavior / Christodorescu, M., Jha, S., & Krügel, C. (2007). Mining Specifications of Malicious Behavior. In Proceedings of the European Software Engineering Conference (ESEC) (pp. 1–10). http://hdl.handle.net/20.500.12708/52148
- A Layout-Similarity-Based Approach for Detecting Phishing Pages / Rosiello, A., Krügel, C., Kirda, E., & Ferrandi, F. (2007). A Layout-Similarity-Based Approach for Detecting Phishing Pages. In Proceedings of the IEEE International Conference on Security and Privacy in Communication Networks (SecureComm) (pp. 1–10). http://hdl.handle.net/20.500.12708/52147
- Building Anti-Phishing Browser Plug-Ins: An Experience Report / Raffetseder, T., Kirda, E., & Krügel, C. (2007). Building Anti-Phishing Browser Plug-Ins: An Experience Report. In 3rd International Workshop on Software Engineering for Secure Systems (SESS) (pp. 1–7). IEEE Computer Society. http://hdl.handle.net/20.500.12708/52144
- Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis / Vogt, P., Nentwich, F., Jovanovic, N., Krügel, C., Kirda, E., & Vigna, G. (2007). Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In Proceedings of the Network and Distributed System Security Symposium (NDSS) (pp. 1–12). http://hdl.handle.net/20.500.12708/52142
2006
- Protecting Users Against Phishing Attacks with AntiPhish / Kirda, E., & Krügel, C. (2006). Protecting Users Against Phishing Attacks with AntiPhish. The Computer Journal, 49(5). http://hdl.handle.net/20.500.12708/173448
- Dynamic Analysis of Malicious Code / Bayer, U., Moser, A., Krügel, C., & Kirda, E. (2006). Dynamic Analysis of Malicious Code. Journal in Computer Virology, 2(1). http://hdl.handle.net/20.500.12708/173446
- Using Static Program Analysis to Aid Intrusion Detection / Egele, M., Szydlowski, M., Kirda, E., & Krügel, C. (2006). Using Static Program Analysis to Aid Intrusion Detection. In Proc. Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Lecture Notes in Computer Science (pp. 17–37). Springer-Verlag. http://hdl.handle.net/20.500.12708/51697
- Malicious code analysis / Krügel, C. (2006). Malicious code analysis [Professorial Dissertation, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/180607
- Anomalous System Call Detection / Mutz, D., Valeur, F., Krügel, C., & Vigna, G. (2006). Anomalous System Call Detection. ACM Transactions on Information and System Security, 9(1). http://hdl.handle.net/20.500.12708/173447
- Malicious Code Analysis / Krügel, C. (2006). Malicious Code Analysis. Habilitationskolloquium, Wien, Austria. http://hdl.handle.net/20.500.12708/84565
- Vulnerabilities in Web Applications / Krügel, C. (2006). Vulnerabilities in Web Applications. TERENA Networking Conference, Italy, EU. http://hdl.handle.net/20.500.12708/84564
- Malicious Code Analysis / Krügel, C. (2006). Malicious Code Analysis. Talk at the Computer Science Colloquium, Carleton University, Ottawa, Canada, Non-EU. http://hdl.handle.net/20.500.12708/84563
- Bahavior-based Spyware Detection / Kirda, E., Krügel, C., Banks, G., Vigna, G., & Kemmerer, R. (2006). Bahavior-based Spyware Detection. In Proc. 15th USENIX Security Symposium (pp. 273–288). http://hdl.handle.net/20.500.12708/51798
- Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks / Robertson, W., Vigna, G., Krügel, C., & Kemmerer, R. (2006). Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. In Proc. Network and Distributed System Security Symposium (NDSS) (pp. 31–46). Internet Society. http://hdl.handle.net/20.500.12708/51702
- An Anomaly-driven Reverse Proxy for Web Applications / Valeur, F., Vigna, G., Krügel, C., & Kirda, E. (2006). An Anomaly-driven Reverse Proxy for Web Applications. In Proc. 21st ACM Symposium on Applied Computing (SAC) (pp. 361–369). ACM Press. http://hdl.handle.net/20.500.12708/51701
- Noxes: A Client-Side Solution for Mitigating Cross Site Scripting Attacks / Kirda, E., Krügel, C., Vigna, G., & Jovanovic, N. (2006). Noxes: A Client-Side Solution for Mitigating Cross Site Scripting Attacks. In Proc. 21st ACM Symposium on Applied Computing (SAC) (pp. 330–338). ACM Press. http://hdl.handle.net/20.500.12708/51700
- TTAnalyze: A Tool for Analyzing Malware / Bayer, U., Krügel, C., & Kirda, E. (2006). TTAnalyze: A Tool for Analyzing Malware. In Proc. 15th Annual Conference of the European Institute for Computer Antivirus Research (EICAR) (pp. 180–192). http://hdl.handle.net/20.500.12708/51699
- SecuBat: A Web Vulnerability Scanner / Kals, S., Kirda, E., Krügel, C., & Jovanovic, N. (2006). SecuBat: A Web Vulnerability Scanner. In Proc. 15th International World Wide Web Conference (WWW) (pp. 247–257). http://hdl.handle.net/20.500.12708/51698
- Extending .NET Security to Unmanaged Code / Klinkoff, P., Krügel, C., Kirda, E., & Vigna, G. (2006). Extending .NET Security to Unmanaged Code. In Proc. 9th Information Security Conference (ISC), Lecture Notes in Computer Science (pp. 1–16). Springer-Verlag. http://hdl.handle.net/20.500.12708/51696
- Preventing Cross Site Request Forgery Attacks / Jovanovic, N., Kirda, E., & Krügel, C. (2006). Preventing Cross Site Request Forgery Attacks. In 2nd International Conference on Security and Privacy in Communication Networks & the Workshops. SecureComm 2006, Baltimore, MD, USA, Non-EU. IEEE. http://hdl.handle.net/20.500.12708/51397
- Pixy: A static Analysis Tool for Detecting web Application Vulnerabilities / Jovanovic, N., Krügel, C., & Kirda, E. (2006). Pixy: A static Analysis Tool for Detecting web Application Vulnerabilities. In Proceedings of the 2006 IEEE Symposium on Security and Privacy (pp. 258–263). IEEE Inc. http://hdl.handle.net/20.500.12708/51372
- Precise Alias Analysis for Static Detection of Web Application Vulnerabilities / Jovanovic, N., Krügel, C., & Kirda, E. (2006). Precise Alias Analysis for Static Detection of Web Application Vulnerabilities. In Proceedings of the 2006 Programming Languages and Analysis for Security Workshop (pp. 27–36). ACM Inc. http://hdl.handle.net/20.500.12708/51371
2005
- A multi-model approach to the detection of web-based attacks / Krügel, C., Vigna, G., & Robertson, W. (2005). A multi-model approach to the detection of web-based attacks. Computer Networks, 48(5), 717–738. http://hdl.handle.net/20.500.12708/173353
- Internet Security / Krügel, C. (2005). Internet Security. In The Industrial Communication Technology Handbook (pp. 1–14). CRC Press. http://hdl.handle.net/20.500.12708/25364
- Host-Based Intrusion Detection / Vigna, G., & Krügel, C. (2005). Host-Based Intrusion Detection. In Handbook of Information Security (pp. 1–12). John Wiley and Sons. http://hdl.handle.net/20.500.12708/25363
- Analysing and Detecting Malicious Code / Krügel, C. (2005). Analysing and Detecting Malicious Code. Informatik Kolloquium, TU Muenchen, Garching, Deutschland, Austria. http://hdl.handle.net/20.500.12708/84467
- Malicious Code Analysis: Detecting Metamorphic Worms / Krügel, C. (2005). Malicious Code Analysis: Detecting Metamorphic Worms. Informatik Kolloquium, TU Muenchen, Garching, Deutschland, Austria. http://hdl.handle.net/20.500.12708/84466
- Malicious Code Analysis: Detecting Metamorphic Worms / Krügel, C. (2005). Malicious Code Analysis: Detecting Metamorphic Worms. Technische Universität Berlin, Austria. http://hdl.handle.net/20.500.12708/84465
- Advanced Techniques for Malicious Code Detection / Krügel, C. (2005). Advanced Techniques for Malicious Code Detection. NATO ASI Workshop, Yerevan, Armenien, Non-EU. http://hdl.handle.net/20.500.12708/84464
- Identification of Anomalous System Calls for Intrusion Detection / Krügel, C. (2005). Identification of Anomalous System Calls for Intrusion Detection. Informatik Kolloquium, TU Muenchen, Garching, Deutschland, Austria. http://hdl.handle.net/20.500.12708/84463
- Intrusion Detection und Korrelation / Krügel, C. (2005). Intrusion Detection und Korrelation. FH Hagenberg, Hagenberg, Austria. http://hdl.handle.net/20.500.12708/84462
- Reverse Engineering of Network Signatures / Mutz, D., Krügel, C., Robertson, W., Vigna, G., & Kemmerer, R. (2005). Reverse Engineering of Network Signatures. In Proceedings of the Information Technology Security Conference. AusCERT, Gold Coast, Australia, Non-EU. http://hdl.handle.net/20.500.12708/51184
- Polymorphic Worm Detection Using Structural Information of Executables / Krügel, C., Kirda, E., Mutz, D., Robertson, W., & Vigna, G. (2005). Polymorphic Worm Detection Using Structural Information of Executables. In Proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID). RAID International Symposium on Recent Advances in Intrusion Detection 2002, USA, Non-EU. Springer-Verlag. http://hdl.handle.net/20.500.12708/51179
- Protecting Users Against Phishing Attacks with AntiPhish / Kirda, E., & Krügel, C. (2005). Protecting Users Against Phishing Attacks with AntiPhish. In Proceedings of the 29th Anual International Computer Software and Applications Conference (pp. 517–524). IEEE Computer Society. http://hdl.handle.net/20.500.12708/51050
- Automating Mimicry Attacks Using Static Binary Analysis / Krügel, C., Kirda, E., Mutz, D., Robertson, W., & Vigna, G. (2005). Automating Mimicry Attacks Using Static Binary Analysis. In Proceedings of the 14th USENIX Security Symposium (pp. 161–176). USENIX Assoication. http://hdl.handle.net/20.500.12708/51049
- Einführung in die Technische Informatik / Schildt, G.-H., Kahn, D., Krügel, C., & Mörz, C. (2005). Einführung in die Technische Informatik. Springer-Verlag. http://hdl.handle.net/20.500.12708/22288
2004
- Identification of Anomalous System Calls for Intrusion Detection / Krügel, C. (2004). Identification of Anomalous System Calls for Intrusion Detection. Informatik Kolloquium, TU Muenchen, Garching, Deutschland, Austria. http://hdl.handle.net/20.500.12708/84347
Supervisions
- ZigZag : hardening web applications against CSV attacks / Weissbacher, M. (2014). ZigZag : hardening web applications against CSV attacks [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/158708
-
Behavior based malware analysis and detection
/
Kolbitsch, C. (2011). Behavior based malware analysis and detection [Dissertation, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-40527
Download: PDF (2.7 MB) -
Protecting web clients from internet threats
/
Egele, M. (2011). Protecting web clients from internet threats [Dissertation, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-42020
Download: PDF (1.13 MB) - Smart fuzzing / Raffetseder, T. (2010). Smart fuzzing [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/161537
-
Threats to privacy sensitive data
/
Wondracek, G. (2009). Threats to privacy sensitive data [Dissertation, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-30048
Download: PDF (1.73 MB) - Server-side bot detection for massively multiplayer online games / Mitterhofer, S. (2009). Server-side bot detection for massively multiplayer online games [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/186092
- On the detection of cheating on private BitTorrent trackers / Amanshauser, M. (2009). On the detection of cheating on private BitTorrent trackers [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/184318
-
Extending Mondrian memory protection
/
Kolbitsch, C. (2008). Extending Mondrian memory protection [Master Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-28701
Download: PDF (1.02 MB) -
In-depth security testing of Web applications
/
McAllister, S. (2008). In-depth security testing of Web applications [Master Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-22837
Download: PDF (528 KB) - SWAP : a proxy-based solution for mitigating XSS attacks / Ludl, C. (2008). SWAP : a proxy-based solution for mitigating XSS attacks [Master Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/178373
-
Understanding and replaying network traffic in Windows XP for dynamic malware analysis
/
Petritsch, H. (2007). Understanding and replaying network traffic in Windows XP for dynamic malware analysis [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-96942
Download: PDF (449 KB) -
Access control policy editor and analyzer for policies on a business level
/
Preiss, F.-S. (2007). Access control policy editor and analyzer for policies on a business level [Master Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-17537
Download: PDF (1.78 MB) -
Penetrating Bayesian spam filters using redundancy in natural language
/
Bayler, G. M. (2007). Penetrating Bayesian spam filters using redundancy in natural language [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-13945
Download: PDF (559 KB) -
Secure input for web applications
/
Szydlowski, M. (2007). Secure input for web applications [Master Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-14245
Download: PDF (2.94 MB) -
Web application security
/
Jovanovic, N. (2007). Web application security [Dissertation, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-16505
Download: PDF (811 KB) - Automated spyware collection and analysis / Stamminger, A. (2007). Automated spyware collection and analysis [Master Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/184129
- Cross site scripting (XSS) attack prevention with dynamic data tainting on the client side / Vogt, P. (2006). Cross site scripting (XSS) attack prevention with dynamic data tainting on the client side [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/186910
- SecuBat : a web vulnerability scanner / Kals, S. (2006). SecuBat : a web vulnerability scanner [Master Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/185521
- Behavior-based spyware detection using dynamic taint analysis / Egele, M. (2006). Behavior-based spyware detection using dynamic taint analysis [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/184414
-
TTAnalyze : a tool for analyzing malware
/
Bayer, U. (2005). TTAnalyze : a tool for analyzing malware [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-17334
Download: PDF (369 KB) - Extending .Net security to native code / Klinkoff, P. (2005). Extending .Net security to native code [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/179943
- Erstellung von Sicherheitsvorgaben für einen Secure Viewer und dessen Evaluierung nach Common Criteria / Aichinger, T. (2002). Erstellung von Sicherheitsvorgaben für einen Secure Viewer und dessen Evaluierung nach Common Criteria [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/178847
Awards
-
Wirtschaftskammerpreis
2005 / Wirtschaftskammern / Austria -
EIB Scientific Award for Excellent Diploma Thesis
2000 / Germany
And more…
Soon, this page will include additional information such as reference projects, activities as journal reviewer and editor, memberships in councils and committees, and other research activities.
Until then, please visit Christopher Krügel’s research profile in TISS .