A survey on automated dynamic malware-analysis techniques and tools M Egele, T Scholte, E Kirda, C Kruegel ACM computing surveys (CSUR) 44 (2), 1-42, 2008 | 1281 | 2008 |
Panorama: capturing system-wide information flow for malware detection and analysis H Yin, D Song, M Egele, C Kruegel, E Kirda Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 1124 | 2007 |
Pios: Detecting privacy leaks in ios applications. M Egele, C Kruegel, E Kirda, G Vigna NDSS 2011, 18th, 2011 | 754 | 2011 |
An empirical study of cryptographic misuse in android applications M Egele, D Brumley, Y Fratantonio, C Kruegel Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 610 | 2013 |
Towards automated dynamic analysis for linux-based embedded firmware. DD Chen, M Woo, D Brumley, M Egele NDSS 1, 1.1-8.1, 2016 | 471 | 2016 |
The art, science, and engineering of fuzzing: A survey VJM Manès, HS Han, C Han, SK Cha, M Egele, EJ Schwartz, M Woo IEEE Transactions on Software Engineering 47 (11), 2312-2331, 2019 | 463 | 2019 |
Compa: Detecting compromised accounts on social networks. M Egele, G Stringhini, C Kruegel, G Vigna NDSS 13, 83-91, 2013 | 378 | 2013 |
Paybreak: Defense against cryptographic ransomware E Kolodenker, W Koch, G Stringhini, M Egele Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 278 | 2017 |
Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks M Egele, P Wurzinger, C Kruegel, E Kirda Detection of Intrusions and Malware, and Vulnerability Assessment: 6th …, 2009 | 264 | 2009 |
Blanket execution: Dynamic similarity testing for program binaries and components M Egele, M Woo, P Chapman, D Brumley 23rd USENIX Security Symposium (USENIX Security 14), 303-317, 2014 | 254 | 2014 |
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones. L Davi, A Dmitrienko, M Egele, T Fischer, T Holz, R Hund, S Nürnberger, ... NDSS 26, 27-40, 2012 | 248 | 2012 |
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework. Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel, G Vigna, Y Chen NDSS, 2015 | 238 | 2015 |
Follow the green: growth and dynamics in twitter follower markets G Stringhini, G Wang, M Egele, C Kruegel, G Vigna, H Zheng, BY Zhao Proceedings of the 2013 conference on Internet measurement conference, 163-176, 2013 | 236 | 2013 |
Towards detecting compromised accounts on social networks M Egele, G Stringhini, C Kruegel, G Vigna IEEE Transactions on Dependable and Secure Computing 14 (4), 447-460, 2015 | 214 | 2015 |
Diagnosing performance variations in HPC applications using machine learning O Tuncer, E Ates, Y Zhang, A Turk, J Brandt, VJ Leung, M Egele, ... High Performance Computing: 32nd International Conference, ISC High …, 2017 | 133 | 2017 |
Hardware performance counters can detect malware: Myth or fact? B Zhou, A Gupta, R Jahanshahi, M Egele, A Joshi Proceedings of the 2018 on Asia conference on computer and communications …, 2018 | 130 | 2018 |
A solution for the automated detection of clickjacking attacks M Balduzzi, M Egele, E Kirda, D Balzarotti, C Kruegel Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010 | 126 | 2010 |
{EVILCOHORT}: Detecting communities of malicious accounts on online services G Stringhini, P Mourlanne, G Jacob, M Egele, C Kruegel, G Vigna 24th USENIX security symposium (USENIX security 15), 563-578, 2015 | 104 | 2015 |
Poultry markets: on the underground economy of twitter followers G Stringhini, M Egele, C Kruegel, G Vigna ACM SIGCOMM Computer Communication Review 42 (4), 527-532, 2012 | 104 | 2012 |
Emailprofiler: Spearphishing filtering with header and stylometric features of emails S Duman, K Kalkan-Cakmakci, M Egele, W Robertson, E Kirda 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016 | 91 | 2016 |