Christopher Krügel
Privatdoz. Dipl.-Ing. Dr.techn.
Research Areas
- Security, Intrusion Detection, Malware Detection, Operating Systems, Networks
Role
-
Affilliated
Automation Systems, E191-03
Projects
-
SECoverer - Finding Security Vulnerabilities in Web Applications
2008 – 2011 / SEC Consult Unternehmensberatung GmbH -
Worldwide Observatory of Malicious Behaviors and Attack Threats
2008 – 2011 / European Commission -
Pathfinder - Malicious Code Analysis and Detection
2007 – 2009 / Austrian Research Promotion Agency (FFG) -
Security Analysis SecComerce Software
2006 – 2008 / BAWAG/PSK Bank für Arbeit und Wirtschaft und Österreichische Postsparkasse Aktiengesellschaft -
Software Security through Binary Analysis
2005 – 2008 / Austrian Science Fund (FWF) -
Omnis - Security, Components and Infrastructure for Pervasive Environments
2005 – 2007 / Austrian Science Fund (FWF) -
Maleware Detection
2005 – 2007 / Wirtschaftskammer Österreich -
Development of Solaris Baseline Security Software
2004 – 2005 / Jubilee Fund of the Austrian National Bank
Publications
2011
- BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients / M. Szydlowski, B. Zhao, E. Kirda, Ch. Krügel / Talk: 20th International Conference on Computer Communication Networks (ICCCN 2011), Maui, HI; 2011-07-31 - 2011-08-04; in: "Proceedings of the 20th International Conference on Computer Communication Networks (ICCCN 2011)", IEEE, (2011), 6 pages
2010
- Abusing Social Networks for Automated User Profiling / M. Balduzzi, Ch. Platzer, T. Holz, E. Kirda, D. Balzarotti, Ch. Krügel / in: "Recent Advances in Intrusion Detection (RAID 2010)", Springer, 2010, ISBN: 978-3-642-15511-6, 20 pages
2009
- Removing Web Spam Links from Search Engine Results / E. Kirda, M. Egele, Ch. Krügel / Poster: Conference of the European Institute for Computer Antivirus Research (EICAR), Berlin; 2009-05-11 - 2009-05-12; in: "EICAR proceedings", (2009)
- Mitigating Drive-by Download Attacks: Challenges and Open Problems / M. Egele, E. Kirda, Ch. Krügel / Talk: Open Research Problems in Network Security Workshop, Zurich; 2009-04-23 - 2009-04-24; in: "Open Research Problems in Network Security Workshop", (2009)
- Scalable, Behavior-Based Malware Clustering / U. Bayer, E. Kirda, Ch. Krügel, P. Milani Comparetti, C. Hlauschek / Talk: Network and Distributed System Security Symposium (NDSS), San Diego; 2009-02-08 - 2009-02-11; in: "16th Annual Network and Distributed System Security Symposium (NDSS 2009)", NDSS Proceedings, (2009)
- Server-Side Bot Detection in Massively Multiplayer Online Games / Stefan Mitterhofer, Ch. Platzer, E. Kirda, Ch. Krügel / IEEE Security & Privacy, 7 (2009), 3; 29 - 36
2007
- Improving Signature Testing Through Dynamic Data Flow Analysis / D. Balzarotti, W. Robertson, Ch. Krügel, G. Vigna / Talk: Annual Computer Security Applications Conference (ACSAC), Miami, USA; 2007-12-10; in: "Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)", (2007), 22 - 32
- Secure Input for Web Applications / M. Szydlowski, Ch. Krügel, E. Kirda / Talk: Annual Computer Security Applications Conference (ACSAC), Miami, USA; 2007-12-10; in: "Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)", (2007), 1 - 11
- Limits of Static Analysis for Malware Detection / A. Moser, Ch. Krügel, E. Kirda / Talk: Annual Computer Security Applications Conference (ACSAC), Miami, USA; 2007-12-10; in: "Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)", (2007), 12 - 21
- Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis / H. Yin, D. Song, M. Egele, Ch. Krügel, E. Kirda / Talk: ACM Conference on Computer and Communications Security (CCS), Washington, USA; 2007-10-29; in: "Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS)", (2007), 1 - 12
- Detecting System Emulators / T. Raffetseder, Ch. Krügel, E. Kirda / Talk: Information Security Conference (ISC), Valparaiso, Chile; 2007-10-09; in: "Proceedings of the Information Security Conference (ISC )", (2007), 1 - 18
- A Layout-Similarity-Based Approach for Detecting Phishing Pages / A. Rosiello, Ch. Krügel, E. Kirda, F. Ferrandi / Talk: IEEE International Conference on Security and Privacy in Communication Networks (SecureComm), Nizza, Frankreich; 2007-09-17; in: "Proceedings of the IEEE International Conference on Security and Privacy in Communication Networks (SecureComm)", (2007), 1 - 10
- Mining Specifications of Malicious Behavior / M. Christodorescu, S. Jha, Ch. Krügel / Talk: European Software Engineering Conference (ESEC), Dubrovnik, Kroatien; 2007-09-03; in: "Proceedings of the European Software Engineering Conference (ESEC)", (2007), 1 - 10
- Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters / C. Karlberger, G. Bayler, Ch. Krügel, E. Kirda / Talk: Usenix Workshop on Offensive Technologies (WOOT), Boston, USA; 2007-08-06; in: "Usenix Workshop on Offensive Technologies (WOOT)", (2007), 1 - 7
- On the Effectiveness of Techniques to Detect Phishing Sites / C. Ludl, S. McAllister, E. Kirda, Ch. Krügel / Talk: Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Luzern, Schweiz; 2007-07-12; in: "Proceedings of the Detection of Intrusions and Malware and Vulnerability Assessment Conference (DIMVA)", (2007), 1 - 20
- Dynamic Spyware Analysis / M. Egele, Ch. Krügel, E. Kirda, H. Yin, D. Song / Talk: Usenix Annual Technical Conference (ATC), Santa Clara, USA; 2007-06-17; in: "Proceedings of the Usenix Annual Technical Conference", (2007), 1 - 14
- Exploring Multiple Execution Paths for Malware Analysis / A. Moser, Ch. Krügel, E. Kirda / Talk: IEEE Symposium on Security and Privacy, Oakland, USA; 2007-05-20; in: "Proceedings of the IEEE Symposium on Security and Privacy", (2007), 1 - 15
- Building Anti-Phishing Browser Plug-Ins: An Experience Report / T. Raffetseder, E. Kirda, Ch. Krügel / Talk: International Workshop on Software Engineering for Secure Systems (SESS), Minneapolis, USA; 2007-05-19; in: "3rd International Workshop on Software Engineering for Secure Systems (SESS)", IEEE Computer Society, (2007), ISBN: 978-0-7695-2830-4; 1 - 7
- Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis / Ph. Vogt, F. Nentwich, N. Jovanovic, Ch. Krügel, E. Kirda, G. Vigna / Talk: Network and Distributed System Security Symposium (NDSS), San Diego, USA; 2007-02-27; in: "Proceedings of the Network and Distributed System Security Symposium (NDSS)", (2007), 1 - 12
- Extending .NET Security to Unmanaged Code / P. Klinkoff, Ch. Krügel, E. Kirda, G. Vigna / International Journal of Information Security, 6 (2007), 6; 417 - 428
2006
- Malicious Code Analysis / Ch. Krügel / Talk: Talk at the Computer Science Colloquium, Carleton University, Ottawa, Canada (invited); 2006-10-01
- Malicious Code Analysis / Ch. Krügel / Talk: Habilitationskolloquium, Vienna, Austria; 2006-09-01
- Extending .NET Security to Unmanaged Code / P. Klinkoff, Ch. Krügel, E. Kirda, G. Vigna / Talk: Information Security Conference (ISC), Greece; 2006-08-30 - 2006-09-02; in: "Proc. 9th Information Security Conference (ISC), Lecture Notes in Computer Science", Springer-Verlag, (2006), 1 - 16
- Preventing Cross Site Request Forgery Attacks / N. Jovanovic, E. Kirda, Ch. Krügel / Talk: SecureComm 2006, Baltimore, MD, USA; 2006-08-28 - 2006-09-01; in: "2nd International Conference on Security and Privacy in Communication Networks & the Workshops", IEEE, (2006)
- Bahavior-based Spyware Detection / E. Kirda, Ch. Krügel, G. Banks, G. Vigna, R. Kemmerer / Talk: Usenix Security Symposium, Vancouver, Canada; 2006-07-31 - 2006-08-04; in: "Proc. 15th USENIX Security Symposium", (2006), ISBN: 1-931971-45-5; 273 - 288
- Using Static Program Analysis to Aid Intrusion Detection / M. Egele, M. Szydlowski, E. Kirda, Ch. Krügel / Talk: Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Germany; 2006-07-13 - 2006-07-14; in: "Proc. Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Lecture Notes in Computer Science", Springer-Verlag, (2006), 17 - 37
- Precise Alias Analysis for Static Detection of Web Application Vulnerabilities / N. Jovanovic, Ch. Krügel, E. Kirda / Talk: PLAS 2006, Ottawwa, Kanada; 2006-06-10; in: "Proceedings of the 2006 Programming Languages and Analysis for Security Workshop", ACM Inc., 548064 (2006), ISBN: 1-59593-374-3; 27 - 36
- SecuBat: A Web Vulnerability Scanner / S. Kals, E. Kirda, Ch. Krügel, N. Jovanovic / Talk: International World Wide Web Conference (WWW), UK; 2006-05-23 - 2006-05-26; in: "Proc. 15th International World Wide Web Conference (WWW)", (2006), 247 - 257
- Pixy: A static Analysis Tool for Detecting web Application Vulnerabilities / N. Jovanovic, Ch. Krügel, E. Kirda / Talk: 2006 IEEE Symposium on Security and Privacy, Berkeley/Oakland, Kalifornien, USA; 2006-05-21 - 2006-05-24; in: "Proceedings of the 2006 IEEE Symposium on Security and Privacy", IEEE Inc., P2574 (2006), ISBN: 0-7695-2574-1; 258 - 263
- Vulnerabilities in Web Applications / Ch. Krügel / Talk: TERENA Networking Conference, Italy (invited); 2006-05-01
- TTAnalyze: A Tool for Analyzing Malware / U. Bayer, Ch. Krügel, E. Kirda / Talk: Conference of the European Institute for Computer Antivirus Research (EICAR), Germany; 2006-04-30 - 2006-05-02; in: "Proc. 15th Annual Conference of the European Institute for Computer Antivirus Research (EICAR)", (2006), 180 - 192
- An Anomaly-driven Reverse Proxy for Web Applications / F. Valeur, G. Vigna, Ch. Krügel, E. Kirda / Talk: Symposium on Applied Computing (SAC), France; 2006-04-23 - 2006-04-27; in: "Proc. 21st ACM Symposium on Applied Computing (SAC)", ACM Press, (2006), 361 - 369
- Noxes: A Client-Side Solution for Mitigating Cross Site Scripting Attacks / E. Kirda, Ch. Krügel, G. Vigna, N. Jovanovic / Talk: Symposium on Applied Computing (SAC), France; 2006-04-23 - 2006-04-27; in: "Proc. 21st ACM Symposium on Applied Computing (SAC)", ACM Press, (2006), 330 - 338
- Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks / W. Robertson, G. Vigna, Ch. Krügel, R. Kemmerer / Talk: Network and Distributed System Security Symposium (NDSS), USA; 2006-02-02 - 2006-02-03; in: "Proc. Network and Distributed System Security Symposium (NDSS)", Internet Society, (2006), 31 - 46
- Anomalous System Call Detection / D. Mutz, F. Valeur, Ch. Krügel, G. Vigna / ACM Transactions on Information and System Security, 9 (2006), 1
- Protecting Users Against Phishing Attacks with AntiPhish / E. Kirda, Ch. Krügel / Computer Journal, 49 (2006), 5
- Dynamic Analysis of Malicious Code / U. Bayer, A. Moser, Ch. Krügel, E. Kirda / Journal in Computer Virology, 2 (2006), 1
- Malicious Code Analysis / Habilitation Thesis by Ch. Krügel / TU Wien / Fakultät für Informatik, 2006
2005
- Analysing and Detecting Malicious Code / Ch. Krügel / Talk: Informatik Kolloquium, Universität Mannheim, Deutschland (invited); 2005-12-13
- Malicious Code Analysis: Detecting Metamorphic Worms / Ch. Krügel / Talk: Informatik Kolloquium, Masaryk University, Bruenn (invited); 2005-11-29
- Malicious Code Analysis: Detecting Metamorphic Worms / Ch. Krügel / Talk: Technische Universität Berlin, Berlin, Deutschland (invited); 2005-11-15
- Advanced Techniques for Malicious Code Detection / Ch. Krügel / Talk: NATO ASI Workshop, Yerevan, Armenien (invited); 2005-10-04
- Polymorphic Worm Detection Using Structural Information of Executables / Ch. Krügel, E. Kirda, D. Mutz, W. Robertson, G. Vigna / Talk: RAID International Symposium on Recent Advances in Intrusion Detection 2002, USA; 2005-09-07 - 2005-09-09; in: "Proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID)", Springer-Verlag, LNCS (2005)
- Automating Mimicry Attacks Using Static Binary Analysis / Ch. Krügel, E. Kirda, D. Mutz, W. Robertson, G. Vigna / Talk: Usenix Security Symposium, Baltimore, USA (invited); 2005-07-31 - 2005-08-05; in: "Proceedings of the 14th USENIX Security Symposium", USENIX Assoication, (2005), ISBN: 1-931971-34-x; 161 - 176
- Protecting Users Against Phishing Attacks with AntiPhish / E. Kirda, Ch. Krügel / Talk: International Computer Software and Applications Conference (COMPSAC), Edinburgh, Scotland (invited); 2005-07-26 - 2005-07-28; in: "Proceedings of the 29th Anual International Computer Software and Applications Conference", IEEE Computer Society, (2005), ISBN: 0-7695-2413-3; 517 - 524
- Reverse Engineering of Network Signatures / D. Mutz, Ch. Krügel, W. Robertson, G. Vigna, R. Kemmerer / Talk: AusCERT, Gold Coast, Australia; 2005-05-22 - 2005-05-26; in: "Proceedings of the Information Technology Security Conference", (2005), ISBN: 1-86499-799-0
- Identification of Anomalous System Calls for Intrusion Detection / Ch. Krügel / Talk: Informatik Kolloquium, Universität Dortmund, Deutschland (invited); 2005-04-14
- Intrusion Detection und Korrelation / Ch. Krügel / Talk: FH Hagenberg, Hagenberg (invited); 2005-03-15
- Einführung in die Technische Informatik / G. Schildt, D. Kahn, Ch. Krügel, Ch. Mörz / Springer-Verlag, Wien, 2005, ISBN: 3-211-24346-1
- Host-Based Intrusion Detection / G. Vigna, Ch. Krügel / in: "Handbook of Information Security", John Wiley and Sons, 2005, ISBN: 0-471-64833-7, 1 - 12
- Internet Security / Ch. Krügel / in: "The Industrial Communication Technology Handbook", CRC Press, 2005, ISBN: 0-8493-3077-7, 1 - 14
- A multi-model approach to the detection of web-based attacks / Ch. Krügel, G. Vigna, W. Robertson / Computer Networks, 48 (2005), 5; 717 - 738
2004
- Identification of Anomalous System Calls for Intrusion Detection / Ch. Krügel / Talk: Informatik Kolloquium, TU Muenchen, Garching, Deutschland (invited); 2004-12-09
- Detecting Kernel-Level Rootkits Through Binary Analysis / Ch. Krügel, W. Robertson, G. Vigna / Talk: Annual Computer Security Applications Conference (ACSAC), Tucson, AZ, USA; 2004-12-06 - 2004-12-10; in: "Proceedings of the 20th Annual Computer Security Applications Conference", (2004), ISBN: 0-7695-2252-1; 91 - 100
- Static Disassembly of Obfuscated Binaries / Ch. Krügel, W. Robertson, F. Valeur, G. Vigna / Talk: Usenix Security Symposium, San Diego, CA, USA; 2004-08-09 - 2004-08-13; in: "Proceedings of the 13th Usenix Security Symposium", (2004), 1-931971-23-2; 255 - 270
- Alert Verification - Determining the Success of Intrusion Attempts / Ch. Krügel, W. Robertson / Talk: Workshop on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Dortmund, Germany; 2004-07-06 - 2004-07-07; in: "Proceedings of the Workshop on Detection of Intrusions and Malware and Vulnerability Assessment", (2004), ISBN: 3-88579-375-x; 25 - 39
- Intrusion Detection and Correlation - Challenges and Solutions / Ch. Krügel, F. Valeur, G. Vigna / Springer, 2004, ISBN: 0-387-23398-9; 122 pages
- Network Security and Secure Applications / Ch. Krügel / in: "The Industrial Information Technology Handbook", CRC Press, 2004, ISBN: 0-849-31985-4, 3401 - 3413
- Using Alert Verification to Identify Successful Intrusion Attempts / Ch. Krügel, F. Valeur, G. Vigna / Praxis der Informationsverarbeitung und Kommunikation (PIK), 27 (2004), 4; 220 - 228
- A Comprehensive Approach to Intrusion Detection Alert Correlation / F. Valeur, G. Vigna, Ch. Krügel, R. Kemmerer / IEEE Transactions on Dependable and Secure Computing, 1 (2004), 3; 146 - 169
2003
- Web Service Engineering with DIWE / E. Kirda, C. Kerer, C. Krügel, R. Kurmanowytsch / Talk: Euromicro International Conference, Antalya, Turkey; 2003-09-01 - 2003-09-06; in: "Proceedings of the 20th Euromicro Conference", IEEE Computer Society, (2003), ISSN: 1089-6503; 283 - 290
2002
- Evaluating the Impact of Automated Intrusion Response Mechanisms / T. Toth, C. Krügel / Talk: 18th Annual Computer Security Applications Conference, Las Vegas, Nevada; 2002-12-09 - 2002-12-13; in: "Proceedings 18th Annual Computer Security Applications Conference", (2002), 301 - 310
- Accurate Buffer Overflow Detection via Abstract Payload Execution / T. Toth, C. Krügel / Talk: RAID International Symposium on Recent Advances in Intrusion Detection 2002, Zürich, Switzerland; 2002-10-16 - 2002-10-18; in: "Recent Advances in Intrusion Detection", Springer-Verlag Berlin Heidelberg, (2002), ISBN: 3-540-00020-8; 274 - 291
- DPS: An architectural Style for Development of Secure Software / P. Fenkam, C. Krügel, H. Gall, M. Jazayeri / Talk: Infrastructure Security Conference (InfraSec), Bristol, UK; 2002-10-01 - 2002-10-03; in: "Proceedings of the", Springer Verlag, (2002)
- Connection-history based anomaly detection / T. Toth, C. Krügel / Talk: Information Assurance Workshop, West Point, New York, USA; 2002-06-17 - 2002-06-19; in: "Proceedings of the 3rd Annual IEEE Information Assurance Workshop", (2002), ISBN: 0-7803-9850-5; 241 - 246
- Stateful Intrusion Detection for High-Speed Networks / C. Krügel, F. Valeur et al. / Talk: IEEE Symposium on Security and Privacy, Oakland, California, USA; 2002-05-12 - 2002-05-15; in: "Proceedings of the 2002 IEEE Symposium on Security and Privacy", (2002), ISBN: 0-7695-1543-6; 266 - 274
- Service Specific Anomaly Detection for Network Intrusion Detection / C. Krügel, T. Toth, E. Kirda / Talk: Symposium on Applied Computing (SAC), Madrid, Spain; 2002-03-11 - 2002-03-14; in: "Symposium on Applied Computing", (2002), 244
- Flexible, Mobile Agent Based Intrusion Detection for Dynamic Networks / C. Krügel, T. Toth / Talk: European Wireless, Florence, Italy; 2002-02-26 - 2002-02-28; in: "European Wireless 2002", (2002), 581 - 587
- Distributed Pattern Detection for Intrusion Detection / C. Krügel, T. Toth / Talk: Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA; 2002-02-06 - 2002-02-08; in: "Proceedings of Network and Distributed System Security Symposium (NDSS)", (2002), 51 - 63
- Network Alertness -- Towards an adaptive, collaborating Intrusion Detectcion / Doctoral Thesis by C. Krügel / Supervisor, Reviewer: M. Jazayeri, W. Kastner; 184, 2002
- XGuide - A Practical Guide to XML-based Web Engineering / C. Kerer, E. Kirda, C. Krügel / Talk: Web Engineering Workshop at the International Conference on Networking, Pisa, Italy; 2002; in: "Proceedings of the Web Engineering Workshop, International Conference on Networking", Lecture Notes in Computer Science, Springer Verlag, Heidelberg, New York (2002)
Supervisions
- Mitigating malware communication infrastructures and exploitation techniques / Doctoral Thesis by M. Neugschwandtner / Supervisor, Reviewer: Ch. Krügel, E. Kirda; Rechnergestützte Automation, 2014; oral examination: 2014-06-23
- Protecting Web Clients from Internet Threats / Doctoral Thesis by M. Egele / Supervisor, Reviewer: Ch. Krügel, E. Kirda; Rechnergestützte Automation, 2011
- Behavior Based Malware Analysis and Detection / Doctoral Thesis by C. Kolbitsch / Supervisor, Reviewer: Ch. Krügel, E. Kirda; Rechnergestützte Automation, 2011
- dAnubis - dynamic device driver analysis based on virtual machine introspection / Master Thesis by M. Neugschwandtner / Supervisor: W. Kastner, E. Kirda, Ch. Krügel, Ch. Platzer; E183-1, Seclab Group, 2009; final examination: 2009-10-21
- Server-side bot detection for massively multiplayer online games / Master Thesis by Stefan Mitterhofer / Supervisor: E. Kirda, Ch. Krügel, Ch. Platzer; E183-1, 2009; final examination: 2009-07-28
- SWAP / Master Thesis by C. Ludl / Supervisor: E. Kirda, Ch. Krügel; Institut für Informationssysteme, AB Verteilte Systeme u. E183, 2008
- Web Application Security / Doctoral Thesis by N. Jovanovic / Supervisor, Reviewer: Ch. Krügel, E. Kirda; Institut für Rechnergestützte Automation und Institut für Informationssysteme AB Verteilte Systeme, 2007; oral examination: 2007-10-09
- Automated spyware collection and analysis / Master Thesis by A. Stamminger / Supervisor: E. Kirda, Ch. Krügel; Institut für Informationssysteme, AB Verteilte Systeme u. 183-1, 2007
- Understanding and Replaying Network Traffic in Windows XP for Dynamic Malware Analysis / Master Thesis by H. Petritsch / Supervisor: Ch. Krügel, E. Kirda; Institut für Rechnergestützte Automation AG Automatisierungssysteme u. 184-1, 2007
- Sicherheitsanalyse von Signatursoftware / Master Thesis by F. Nentwich / Supervisor: Ch. Krügel, E. Kirda; Institut für Rechnergestützte Automation AG Automatisierungssysteme u. 184-1, 2007
- Penetrating Bayesian Spam Filters Using Redundancy in Natural Language / Master Thesis by G. Bayler / Supervisor: W. Kastner, Ch. Krügel, E. Kirda; Institut für Rechnergestützte Automation AG Automatisierungssysteme u. 184-1, 2007
- Behavior-Based Spyware Detection Using Dynamic Taint Analysis / Master Thesis by M. Egele / Supervisor: S. Dustdar, E. Kirda, Ch. Krügel; Institut für Informationssysteme, AB Verteilte Systeme, 2006; final examination: 2006-10-03
- SecuBat: A Web Vulnerability Scanner / Master Thesis by S. Kals / Supervisor: Ch. Krügel, S. Dustdar, E. Kirda; 183/1, 2006
- Cross site scripting (XSS) attack prevention with dynamic data tainting on the client side / Master Thesis by P. Vogt / Supervisor: S. Dustdar, C. Krügel, E. Kirda; Institut für Informationssysteme, AB Verteilte Systeme, 2006
- Cross-Site Scripting (XSS) Attack Prevention with Dynamic Data Tainting on the Client Side / Master Thesis by Ph. Vogt / Supervisor: Ch. Krügel; 183/1, 2006
- Extending .NET Security to Native Code / Master Thesis by P. Klinkoff / Supervisor: Ch. Krügel; 183/1, 2005
- TTAnalyze - A Tool for Analyzing Malware / Master Thesis by U. Bayer / Supervisor: Ch. Krügel; 183, 2005
Awards
-
Wirtschaftskammerpreis
2005 / Wirtschaftskammern / Austria -
EIB Scientific Award for Excellent Diploma Thesis
2000 / Germany
And more…
Soon, this page will include additional information such as reference projects, activities as journal reviewer and editor, memberships in councils and committees, and other research activities.
Until then, please visit Christopher Krügel’s research profile in TISS .