scispace - formally typeset
C

Christopher Kruegel

Researcher at University of California, Santa Barbara

Publications -  275
Citations -  30943

Christopher Kruegel is an academic researcher from University of California, Santa Barbara. The author has contributed to research in topics: Malware & Web application. The author has an hindex of 90, co-authored 275 publications receiving 27894 citations. Previous affiliations of Christopher Kruegel include University of Vienna & Institut Eurécom.

Papers
More filters
Proceedings ArticleDOI

Limits of Static Analysis for Malware Detection

TL;DR: A binary obfuscation scheme that relies on opaque constants, which are primitives that allow us to load a constant into a register such that an analysis tool cannot determine its value, demonstrates that static analysis techniques alone might no longer be sufficient to identify malware.
Proceedings ArticleDOI

Detecting spammers on social networks

TL;DR: The results show that it is possible to automatically identify the accounts used by spammers, and the analysis was used for take-down efforts in a real-world social network.
Journal ArticleDOI

A survey on automated dynamic malware-analysis techniques and tools

TL;DR: An overview of techniques based on dynamic analysis that are used to analyze potentially malicious samples and analysis programs that employ these techniques to assist human analysts in assessing whether a given sample deserves closer manual inspection due to its unknown malicious behavior is provided.
Proceedings ArticleDOI

Panorama: capturing system-wide information flow for malware detection and analysis

TL;DR: This work proposes a system, Panorama, to detect and analyze malware by capturing malicious information access and processing behavior, which separates these malicious applications from benign software.
Proceedings ArticleDOI

Driller: Augmenting Fuzzing Through Selective Symbolic Execution.

TL;DR: Driller is presented, a hybrid vulnerability excavation tool which leverages fuzzing and selective concolic execution in a complementary manner, to find deeper bugs and mitigate their weaknesses, avoiding the path explosion inherent in concolic analysis and the incompleteness of fuzzing.