Engin Kirda
Privatdoz. Dipl.-Ing. Dr.techn.
Research Areas
- Security, World Wide Web
Role
-
Affiliated
Distributed Systems, E194-02
Projects
-
Pseudonymization of Information for Privacy in e-Health
2008 – 2012 / Austrian Research Promotion Agency (FFG)
Publication: 52619 -
Pathfinder - Malicious Code Analysis and Detection
2007 – 2009 / Austrian Research Promotion Agency (FFG)
Publications: 52860 / 52890 -
Security Analysis SecComerce Software
2006 – 2008 / BAWAG/PSK Bank für Arbeit und Wirtschaft und Österreichische Postsparkasse Aktiengesellschaft -
Omnis - Security, Components and Infrastructure for Pervasive Environments
2005 – 2007 / Austrian Science Fund (FWF)
Publications: 169627 / 52019 / 53098
Publications
2016
- CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes / Carter, P., Mulliner, C., Lindorfer, M., Robertson, W., & Kirda, E. (2016). CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes. In Financial Cryptography and Data Security (pp. 231–249). Springer. https://doi.org/10.1007/978-3-662-54970-4_13
2011
- BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients / Szydlowski, M., Zhao, B. Y., Kirda, E., & Krügel, C. (2011). BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients. In Proceedings of the 20th International Conference on Computer Communication Networks (ICCCN 2011) (p. 6). IEEE. http://hdl.handle.net/20.500.12708/53715
-
The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious Code
/
Kolbitsch, C., Kirda, E., & Krügel, C. (2011). The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious Code. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS). ACM Conference on Computer and Communications Security (CCS), Washington, USA, Non-EU. ACM. http://hdl.handle.net/20.500.12708/54011
Projects: SysSec (2010–2014) / TRUDIE (2009–2012)
2010
- Exploiting diverse observation perspectives to get insights on the malware landscape / Leita, C., Bayer, U., & Kirda, E. (2010). Exploiting diverse observation perspectives to get insights on the malware landscape. In Proceedings of the 40th Dependable Systems & Networks Conference (DSN) (pp. 393–402). IEEE Computer Society. http://hdl.handle.net/20.500.12708/53347
-
Extending Mondrian Memory Protection
/
Kolbitsch, C., Krügel, C., & Kirda, E. (2010). Extending Mondrian Memory Protection. In IST-091 Information Assurance and Cyber Defence (p. 18). NATO Research and Technology Organization (NATO RTO). http://hdl.handle.net/20.500.12708/53348
Projects: SECoverer (2008–2011) / WOMBAT (2008–2011) -
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
/
Kolbitsch, C., Holz, T., Krügel, C., & Kirda, E. (2010). Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries. In 2010 IEEE Symposium on Security and Privacy (pp. 29–44). IEEE Computer Society. https://doi.org/10.1109/SP.2010.10
Project: WOMBAT (2008–2011) -
Is the Internet for Porn? An Insight Into the Online Adult Industry
/
Wondracek, G., Holz, T., Platzer, C., Kirda, E., & Krügel, C. (2010). Is the Internet for Porn? An Insight Into the Online Adult Industry. In The Ninth Workshop on the Economics of Information Security (WEIS 2010) (p. 14). ACM Press. http://hdl.handle.net/20.500.12708/53357
Project: WOMBAT (2008–2011) -
A Practical Attack to De-anonymize Social Network Users
/
Wondracek, G., Holz, T., Kirda, E., & Kruegel, C. (2010). A Practical Attack to De-anonymize Social Network Users. In 2010 IEEE Symposium on Security and Privacy. IEEE, Austria. IEEE Computer Society. https://doi.org/10.1109/sp.2010.21
Project: WOMBAT (2008–2011) -
Identifying Dormant Functionality in Malware Programs
/
Milani Comparetti, P., Salvaneschi, G., Kirda, E., Kolbitsch, C., Krügel, C., & Zanero, S. (2010). Identifying Dormant Functionality in Malware Programs. In Proceedings of the 2010 IEEE Symposium on Security and Privacy (pp. 61–76). IEEE Computer Society. http://hdl.handle.net/20.500.12708/53340
Project: WOMBAT (2008–2011) -
A solution for the automated detection of clickjacking attacks
/
Balduzzi, M., Egele, M., Balzarotti, D., Kirda, E., & Krügel, C. (2010). A solution for the automated detection of clickjacking attacks. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security - ASIACCS ’10. ACM Symposium on Information computer and Communication Security (AsiaCCS), Bejing, China, Non-EU. ACM. https://doi.org/10.1145/1755688.1755706
Projects: SECoverer (2008–2011) / WOMBAT (2008–2011) -
Abusing Social Networks for Automated User Profiling
/
Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., & Krügel, C. (2010). Abusing Social Networks for Automated User Profiling. In Recent Advances in Intrusion Detection (RAID 2010) (p. 20). Springer. http://hdl.handle.net/20.500.12708/53362
Project: WOMBAT (2008–2011)
2009
- Server-Side Bot Detection in Massively Multiplayer Online Games / Mitterhofer, S. K., Krügel, C., Kirda, E., & Platzer, C. (2009). Server-Side Bot Detection in Massively Multiplayer Online Games. IEEE Security and Privacy, 7(3), 29–36. https://doi.org/10.1109/msp.2009.78
-
SWAP: Mitigating XSS Attacks using a Reverse Proxy
/
Krügel, C., Platzer, C., Kirda, E., Ludl, C., & Wurzinger, P. (2009). SWAP: Mitigating XSS Attacks using a Reverse Proxy. In SESS proceedings. International Workshop on Software Engineering for Secure Systems (SESS), Minneapolis, USA, Non-EU. http://hdl.handle.net/20.500.12708/52880
Project: WOMBAT (2008–2011) - Mitigating Drive-by Download Attacks: Challenges and Open Problems / Egele, M., Kirda, E., & Krügel, C. (2009). Mitigating Drive-by Download Attacks: Challenges and Open Problems. In Open Research Problems in Network Security Workshop. Open Research Problems in Network Security Workshop, Zurich, EU. http://hdl.handle.net/20.500.12708/52883
-
Defending Browsers against Drive-by Downloads: Mitigating Heap-spraying Code Injection Attacks
/
Wurzinger, P., Egele, M., Kirda, E., & Krügel, C. (2009). Defending Browsers against Drive-by Downloads: Mitigating Heap-spraying Code Injection Attacks. In Sixth Conference on Detection of Intrusions and Malware & Vulnerability Assessment. Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Germany, EU. http://hdl.handle.net/20.500.12708/52884
Projects: SECoverer (2008–2011) / WOMBAT (2008–2011) -
Removing Web Spam Links from Search Engine Results
/
Kirda, E., Egele, M., & Krügel, C. (2009). Removing Web Spam Links from Search Engine Results. In EICAR proceedings. Conference of the European Institute for Computer Antivirus Research (EICAR), Germany, EU. http://hdl.handle.net/20.500.12708/52881
Projects: SECoverer (2008–2011) / WOMBAT (2008–2011) -
Scalable, Behavior-Based Malware Clustering
/
Bayer, U., Kirda, E., Krügel, C., Milani Comparetti, P., & Hlauschek, C. (2009). Scalable, Behavior-Based Malware Clustering. In 16th Annual Network and Distributed System Security Symposium (NDSS 2009). Network and Distributed System Security Symposium (NDSS), USA, Non-EU. NDSS Proceedings. http://hdl.handle.net/20.500.12708/52860
Projects: Pathfinder (2007–2009) / WOMBAT (2008–2011) -
Effective and Efficient Malware Detection at the End Host
/
Milani Comparetti, P., Kolbitsch, C., Kirda, E., Krügel, C., Xiaoyong, Z., & Xiaofeng, W. (2009). Effective and Efficient Malware Detection at the End Host. In usenix 2009. Usenix Security Symposium, Baltimore, USA, Austria. http://hdl.handle.net/20.500.12708/52887
Project: WOMBAT (2008–2011) -
FIRE: FInding Rogue nEtworks
/
Stone-Gross, B., Moser, A., Krügel, C., Kirda, E., & Almaroth, K. (2009). FIRE: FInding Rogue nEtworks. In 25th Annual Computer Security Applications Conference (ACSAC). Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. http://hdl.handle.net/20.500.12708/52891
Project: WOMBAT (2008–2011) -
Automatically Generating Models for Botnet Detection
/
Wurzinger, P., Bilge, L., Kirda, E., Krügel, C., Holz, T., & Göbel, J. (2009). Automatically Generating Models for Botnet Detection. In 14th European Symposium on Research in Computer Security (ESORICS 2009). European Symposium on Research in Computer Security (ESORICS), Saint Malo, Brittany, France, EU. http://hdl.handle.net/20.500.12708/52890
Projects: Pathfinder (2007–2009) / WOMBAT (2008–2011) -
Prospex: Protocol Specification Extraction
/
Milani Comparetti, P., Wondracek, G., Krügel, C., & Kirda, E. (2009). Prospex: Protocol Specification Extraction. In Proceedings of the IEEE Symposium on Security and Privacy (pp. 110–125). IEEE. http://hdl.handle.net/20.500.12708/52878
Project: WOMBAT (2008–2011)
2008
- Overbot - A botnet protocol based on Kademlia / Starnberger, G., Krügel, C., & Kirda, E. (2008). Overbot - A botnet protocol based on Kademlia. In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SecureComm 2008) (pp. 1–9). ACM. http://hdl.handle.net/20.500.12708/52276
2007
- Extending .NET Security to Unmanaged Code / Klinkoff, P., Krügel, C., Kirda, E., & Vigna, G. (2007). Extending .NET Security to Unmanaged Code. International Journal of Information Security, 6(6), 417–428. http://hdl.handle.net/20.500.12708/169715
- Limits of Static Analysis for Malware Detection / Moser, A., Krügel, C., & Kirda, E. (2007). Limits of Static Analysis for Malware Detection. In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC) (pp. 12–21). http://hdl.handle.net/20.500.12708/52153
- Exploring Multiple Execution Paths for Malware Analysis / Moser, A., Krügel, C., & Kirda, E. (2007). Exploring Multiple Execution Paths for Malware Analysis. In Proceedings of the IEEE Symposium on Security and Privacy (pp. 1–15). http://hdl.handle.net/20.500.12708/52143
- On the Effectiveness of Techniques to Detect Phishing Sites / Ludl, C., McAllister, S., Kirda, E., & Krügel, C. (2007). On the Effectiveness of Techniques to Detect Phishing Sites. In Proceedings of the Detection of Intrusions and Malware and Vulnerability Assessment Conference (DIMVA) (pp. 1–20). http://hdl.handle.net/20.500.12708/52145
- Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis / Yin, H., Song, D., Egele, M., Krügel, C., & Kirda, E. (2007). Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS) (pp. 1–12). http://hdl.handle.net/20.500.12708/52151
- Dynamic Spyware Analysis / Egele, M., Krügel, C., Kirda, E., Yin, H., & Song, D. (2007). Dynamic Spyware Analysis. In Proceedings of the Usenix Annual Technical Conference (pp. 1–14). http://hdl.handle.net/20.500.12708/52146
- Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters / Karlberger, C., Bayler, G., Krügel, C., & Kirda, E. (2007). Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters. In Usenix Workshop on Offensive Technologies (WOOT) (pp. 1–7). http://hdl.handle.net/20.500.12708/52150
- Secure Input for Web Applications / Szydlowski, M., Krügel, C., & Kirda, E. (2007). Secure Input for Web Applications. In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC) (pp. 1–11). http://hdl.handle.net/20.500.12708/52152
- Detecting System Emulators / Raffetseder, T., Krügel, C., & Kirda, E. (2007). Detecting System Emulators. In Proceedings of the Information Security Conference (ISC ) (pp. 1–18). http://hdl.handle.net/20.500.12708/52149
- A Layout-Similarity-Based Approach for Detecting Phishing Pages / Rosiello, A., Krügel, C., Kirda, E., & Ferrandi, F. (2007). A Layout-Similarity-Based Approach for Detecting Phishing Pages. In Proceedings of the IEEE International Conference on Security and Privacy in Communication Networks (SecureComm) (pp. 1–10). http://hdl.handle.net/20.500.12708/52147
- Building Anti-Phishing Browser Plug-Ins: An Experience Report / Raffetseder, T., Kirda, E., & Krügel, C. (2007). Building Anti-Phishing Browser Plug-Ins: An Experience Report. In 3rd International Workshop on Software Engineering for Secure Systems (SESS) (pp. 1–7). IEEE Computer Society. http://hdl.handle.net/20.500.12708/52144
- Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis / Vogt, P., Nentwich, F., Jovanovic, N., Krügel, C., Kirda, E., & Vigna, G. (2007). Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In Proceedings of the Network and Distributed System Security Symposium (NDSS) (pp. 1–12). http://hdl.handle.net/20.500.12708/52142
2006
- Protecting Users Against Phishing Attacks with AntiPhish / Kirda, E., & Krügel, C. (2006). Protecting Users Against Phishing Attacks with AntiPhish. The Computer Journal, 49(5). http://hdl.handle.net/20.500.12708/173448
- Dynamic Analysis of Malicious Code / Bayer, U., Moser, A., Krügel, C., & Kirda, E. (2006). Dynamic Analysis of Malicious Code. Journal in Computer Virology, 2(1). http://hdl.handle.net/20.500.12708/173446
- Using Static Program Analysis to Aid Intrusion Detection / Egele, M., Szydlowski, M., Kirda, E., & Krügel, C. (2006). Using Static Program Analysis to Aid Intrusion Detection. In Proc. Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Lecture Notes in Computer Science (pp. 17–37). Springer-Verlag. http://hdl.handle.net/20.500.12708/51697
- Bahavior-based Spyware Detection / Kirda, E., Krügel, C., Banks, G., Vigna, G., & Kemmerer, R. (2006). Bahavior-based Spyware Detection. In Proc. 15th USENIX Security Symposium (pp. 273–288). http://hdl.handle.net/20.500.12708/51798
- An Anomaly-driven Reverse Proxy for Web Applications / Valeur, F., Vigna, G., Krügel, C., & Kirda, E. (2006). An Anomaly-driven Reverse Proxy for Web Applications. In Proc. 21st ACM Symposium on Applied Computing (SAC) (pp. 361–369). ACM Press. http://hdl.handle.net/20.500.12708/51701
- Noxes: A Client-Side Solution for Mitigating Cross Site Scripting Attacks / Kirda, E., Krügel, C., Vigna, G., & Jovanovic, N. (2006). Noxes: A Client-Side Solution for Mitigating Cross Site Scripting Attacks. In Proc. 21st ACM Symposium on Applied Computing (SAC) (pp. 330–338). ACM Press. http://hdl.handle.net/20.500.12708/51700
- TTAnalyze: A Tool for Analyzing Malware / Bayer, U., Krügel, C., & Kirda, E. (2006). TTAnalyze: A Tool for Analyzing Malware. In Proc. 15th Annual Conference of the European Institute for Computer Antivirus Research (EICAR) (pp. 180–192). http://hdl.handle.net/20.500.12708/51699
- SecuBat: A Web Vulnerability Scanner / Kals, S., Kirda, E., Krügel, C., & Jovanovic, N. (2006). SecuBat: A Web Vulnerability Scanner. In Proc. 15th International World Wide Web Conference (WWW) (pp. 247–257). http://hdl.handle.net/20.500.12708/51698
- Extending .NET Security to Unmanaged Code / Klinkoff, P., Krügel, C., Kirda, E., & Vigna, G. (2006). Extending .NET Security to Unmanaged Code. In Proc. 9th Information Security Conference (ISC), Lecture Notes in Computer Science (pp. 1–16). Springer-Verlag. http://hdl.handle.net/20.500.12708/51696
- Preventing Cross Site Request Forgery Attacks / Jovanovic, N., Kirda, E., & Krügel, C. (2006). Preventing Cross Site Request Forgery Attacks. In 2nd International Conference on Security and Privacy in Communication Networks & the Workshops. SecureComm 2006, Baltimore, MD, USA, Non-EU. IEEE. http://hdl.handle.net/20.500.12708/51397
- Pixy: A static Analysis Tool for Detecting web Application Vulnerabilities / Jovanovic, N., Krügel, C., & Kirda, E. (2006). Pixy: A static Analysis Tool for Detecting web Application Vulnerabilities. In Proceedings of the 2006 IEEE Symposium on Security and Privacy (pp. 258–263). IEEE Inc. http://hdl.handle.net/20.500.12708/51372
- Precise Alias Analysis for Static Detection of Web Application Vulnerabilities / Jovanovic, N., Krügel, C., & Kirda, E. (2006). Precise Alias Analysis for Static Detection of Web Application Vulnerabilities. In Proceedings of the 2006 Programming Languages and Analysis for Security Workshop (pp. 27–36). ACM Inc. http://hdl.handle.net/20.500.12708/51371
2005
- ShareMe: Running a Distributed Systems Lab for 600 Students With Three Faculty Members / Kerer, C., Reif, G., Gschwind, T., Kirda, E., Kurmanowytsch, R., & Paralic, M. (2005). ShareMe: Running a Distributed Systems Lab for 600 Students With Three Faculty Members. IEEE Transactions on Education, 48(3), 430–437. http://hdl.handle.net/20.500.12708/173329
- Polymorphic Worm Detection Using Structural Information of Executables / Krügel, C., Kirda, E., Mutz, D., Robertson, W., & Vigna, G. (2005). Polymorphic Worm Detection Using Structural Information of Executables. In Proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID). RAID International Symposium on Recent Advances in Intrusion Detection 2002, USA, Non-EU. Springer-Verlag. http://hdl.handle.net/20.500.12708/51179
- Protecting Users Against Phishing Attacks with AntiPhish / Kirda, E., & Krügel, C. (2005). Protecting Users Against Phishing Attacks with AntiPhish. In Proceedings of the 29th Anual International Computer Software and Applications Conference (pp. 517–524). IEEE Computer Society. http://hdl.handle.net/20.500.12708/51050
- Automating Mimicry Attacks Using Static Binary Analysis / Krügel, C., Kirda, E., Mutz, D., Robertson, W., & Vigna, G. (2005). Automating Mimicry Attacks Using Static Binary Analysis. In Proceedings of the 14th USENIX Security Symposium (pp. 161–176). USENIX Assoication. http://hdl.handle.net/20.500.12708/51049
2003
- Integrating Publish/Subscribe into a Mobile Teamwork Support Platform / Sagar, N., Fenkam, P., Veith, H., Gall, H., Kirda, E., & Jha, S. (2003). Integrating Publish/Subscribe into a Mobile Teamwork Support Platform. In Proceedings of the 15th International Conference on Software Engineering and Knowledge Engineering (pp. 510–517). http://hdl.handle.net/20.500.12708/50936
2002
-
Engineering device-independent web services
/
Kirda, E. (2002). Engineering device-independent web services [Dissertation, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-11454
Download: PDF (1.79 MB)
Supervisions
2015
-
Malware through the looking glass : malware analysis in an evolving threat landscape
/
Lindorfer, M. (2015). Malware through the looking glass : malware analysis in an evolving threat landscape [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2015.35065
Download: PDF (2.89 MB)
2014
- ZigZag : hardening web applications against CSV attacks / Weissbacher, M. (2014). ZigZag : hardening web applications against CSV attacks [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/158708
2011
-
Detecting environment-sensitive malware
/
Lindorfer, M. (2011). Detecting environment-sensitive malware [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-40430
Download: PDF (1.06 MB) -
Behavior based malware analysis and detection
/
Kolbitsch, C. (2011). Behavior based malware analysis and detection [Dissertation, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-40527
Download: PDF (2.7 MB) -
Protecting web clients from internet threats
/
Egele, M. (2011). Protecting web clients from internet threats [Dissertation, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-42020
Download: PDF (1.13 MB) - Trading dependability, performance, and security in first-price sealed-bid online auctions with temporal decoupling / Starnberger, G. (2011). Trading dependability, performance, and security in first-price sealed-bid online auctions with temporal decoupling [Dissertation, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/159935
2010
-
Visualizing the malicious threat landscape
/
Lukavsky, F. (2010). Visualizing the malicious threat landscape [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-32251
Download: PDF (7.6 MB) - Smart fuzzing / Raffetseder, T. (2010). Smart fuzzing [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/161537
2009
-
Large-scale dynamic malware analysis
/
Bayer, U. (2009). Large-scale dynamic malware analysis [Dissertation, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-30033
Download: PDF (876 KB) -
Threats to privacy sensitive data
/
Wondracek, G. (2009). Threats to privacy sensitive data [Dissertation, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-30048
Download: PDF (1.73 MB) - Server-side bot detection for massively multiplayer online games / Mitterhofer, S. (2009). Server-side bot detection for massively multiplayer online games [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/186092
2008
-
Java-based filesystem for a commercial database system
/
Daubner, M. (2008). Java-based filesystem for a commercial database system [Master Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-16005
Download: PDF (778 KB) -
Extending Mondrian memory protection
/
Kolbitsch, C. (2008). Extending Mondrian memory protection [Master Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-28701
Download: PDF (1.02 MB) -
In-depth security testing of Web applications
/
McAllister, S. (2008). In-depth security testing of Web applications [Master Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-22837
Download: PDF (528 KB) - SWAP : a proxy-based solution for mitigating XSS attacks / Ludl, C. (2008). SWAP : a proxy-based solution for mitigating XSS attacks [Master Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/178373
2007
-
Understanding and replaying network traffic in Windows XP for dynamic malware analysis
/
Petritsch, H. (2007). Understanding and replaying network traffic in Windows XP for dynamic malware analysis [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-96942
Download: PDF (449 KB) -
Penetrating Bayesian spam filters using redundancy in natural language
/
Bayler, G. M. (2007). Penetrating Bayesian spam filters using redundancy in natural language [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-13945
Download: PDF (559 KB) -
Secure input for web applications
/
Szydlowski, M. (2007). Secure input for web applications [Master Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-14245
Download: PDF (2.94 MB) - Automated spyware collection and analysis / Stamminger, A. (2007). Automated spyware collection and analysis [Master Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/184129
2006
- Cross site scripting (XSS) attack prevention with dynamic data tainting on the client side / Vogt, P. (2006). Cross site scripting (XSS) attack prevention with dynamic data tainting on the client side [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/186910
- FOXY : a proxy for mobile web access / Moser, V. (2006). FOXY : a proxy for mobile web access [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/186856
- SecuBat : a web vulnerability scanner / Kals, S. (2006). SecuBat : a web vulnerability scanner [Master Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/185521
- Behavior-based spyware detection using dynamic taint analysis / Egele, M. (2006). Behavior-based spyware detection using dynamic taint analysis [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/184414
2005
-
TTAnalyze : a tool for analyzing malware
/
Bayer, U. (2005). TTAnalyze : a tool for analyzing malware [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-17334
Download: PDF (369 KB) - Extending .Net security to native code / Klinkoff, P. (2005). Extending .Net security to native code [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/179943
2004
-
A survey of WLAN security with focus on HotSpot and enterprise environments
/
Froihofer, L. (2004). A survey of WLAN security with focus on HotSpot and enterprise environments [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-12101
Download: PDF (1.65 MB)