Static disassembly of obfuscated binaries C Kruegel, W Robertson, F Valeur, G Vigna USENIX security Symposium 13, 18-18, 2004 | 691* | 2004 |
Cutting the gordian knot: A look under the hood of ransomware attacks A Kharraz, W Robertson, D Balzarotti, L Bilge, E Kirda Detection of Intrusions and Malware, and Vulnerability Assessment: 12th …, 2015 | 618 | 2015 |
Polymorphic worm detection using structural information of executables C Kruegel, E Kirda, D Mutz, W Robertson, G Vigna Recent Advances in Intrusion Detection: 8th International Symposium, RAID …, 2006 | 595 | 2006 |
Bayesian event classification for intrusion detection C Kruegel, D Mutz, W Robertson, F Valeur 19th Annual Computer Security Applications Conference, 2003. Proceedings., 14-23, 2003 | 567 | 2003 |
{UNVEIL}: A {Large-Scale}, automated approach to detecting ransomware A Kharaz, S Arshad, C Mulliner, W Robertson, E Kirda 25th USENIX security symposium (USENIX Security 16), 757-772, 2016 | 552 | 2016 |
Lava: Large-scale automated vulnerability addition B Dolan-Gavitt, P Hulin, E Kirda, T Leek, A Mambretti, W Robertson, ... 2016 IEEE symposium on security and privacy (SP), 110-121, 2016 | 432 | 2016 |
Disclosure: detecting botnet command and control servers through large-scale netflow analysis L Bilge, D Balzarotti, W Robertson, E Kirda, C Kruegel Proceedings of the 28th Annual Computer Security Applications Conference …, 2012 | 407 | 2012 |
Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks TF Yen, A Oprea, K Onarlioglu, T Leetham, W Robertson, A Juels, E Kirda Proceedings of the 29th annual computer security applications conference …, 2013 | 406 | 2013 |
A multi-model approach to the detection of web-based attacks C Kruegel, G Vigna, W Robertson Computer Networks 48 (5), 717-738, 2005 | 392 | 2005 |
Detecting kernel-level rootkits through binary analysis C Kruegel, W Robertson, G Vigna 20th Annual Computer Security Applications Conference, 91-100, 2004 | 352 | 2004 |
Testing network-based intrusion detection signatures using mutant exploits G Vigna, W Robertson, D Balzarotti Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 282 | 2004 |
Automating mimicry attacks using static binary analysis C Kruegel, E Kirda, D Mutz, W Robertson, G Vigna USENIX Security Symposium 14, 11-11, 2005 | 278 | 2005 |
Using generalization and characterization techniques in the anomaly-based detection of web attacks W Robertson, G Vigna, C Kruegel, RA Kemmerer NDSS, 2006 | 234 | 2006 |
Triggerscope: Towards detecting logic bombs in android applications Y Fratantonio, A Bianchi, W Robertson, E Kirda, C Kruegel, G Vigna 2016 IEEE symposium on security and privacy (SP), 377-396, 2016 | 226 | 2016 |
Thou shalt not depend on me: Analysing the use of outdated javascript libraries on the web T Lauinger, A Chaabane, S Arshad, W Robertson, C Wilson, E Kirda arXiv preprint arXiv:1811.00918, 2018 | 220 | 2018 |
A stateful intrusion detection system for world-wide web servers G Vigna, W Robertson, V Kher, RA Kemmerer 19th Annual Computer Security Applications Conference, 2003. Proceedings., 34-43, 2003 | 206 | 2003 |
Tracing information flows between ad exchanges using retargeted ads MA Bashir, S Arshad, W Robertson, C Wilson 25th USENIX Security Symposium (USENIX Security 16), 481-496, 2016 | 156 | 2016 |
Alert verification determining the success of intrusion attempts C Kruegel, W Robertson Detection of intrusions and malware & vulnerability assessment, GI SIG SIDAR …, 2004 | 147 | 2004 |
Topology-based detection of anomalous BGP messages C Kruegel, D Mutz, W Robertson, F Valeur Recent Advances in Intrusion Detection: 6th International Symposium, RAID …, 2003 | 134 | 2003 |
Run-time Detection of Heap-based Overflows. WK Robertson, C Kruegel, D Mutz, F Valeur LISA 3, 51-60, 2003 | 132 | 2003 |