Christopher Kruegel
University of California, Santa Barbara
H-index: 115
North America-United States
Top articles of Christopher Kruegel
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Columbus: Android app testing through systematic callback exploration | Priyanka Bose Dipanjan Das Saastha Vasan Sebastiano Mariani Ilya Grishchenko | 2023/5/14 | |
The Power of Default: Measuring the Effect of Slippage Tolerance in Decentralized Exchanges | Available at SSRN 4585229 | Nir Chemaya Dingyue Liu Robert McLaughlin Nicola Ruaro Christopher Kruegel | 2023/9/20 |
Confusum contractum: confused deputy vulnerabilities in ethereum smart contracts | Fabio Gritti Nicola Ruaro Robert McLaughlin Priyanka Bose Dipanjan Das | 2023 | |
Venomave: Targeted poisoning against speech recognition | Conference on Secure and Trustworthy Machine Learning (SaTML) | Hojjat Aghakhani Lea Schönherr Thorsten Eisenhofer Dorothea Kolossa Thorsten Holz | 2023 |
Exploiting Unfair Advantages: Investigating Opportunistic Trading in the NFT Market | arXiv preprint arXiv:2310.06844 | Priyanka Bose Dipanjan Das Fabio Gritti Nicola Ruaro Christopher Kruegel | 2023/9/5 |
{ACTOR}:{Action-Guided} Kernel Fuzzing | Marius Fleischer Dipanjan Das Priyanka Bose Weiheng Bai Kangjie Lu | 2023 | |
Unveiling the Risks of NFT Promotion Scams | arXiv preprint arXiv:2301.09806 | Sayak Saha Roy Dipanjan Das Priyanka Bose Christopher Kruegel Giovanni Vigna | 2023/1/24 |
Certifiably vulnerable: Using certificate transparency logs for target reconnaissance | Stijn Pletinckx Thanh-Dat Nguyen Tobias Fiebig Christopher Kruegel Giovanni Vigna | 2023/7/3 | |
A large scale study of the ethereum arbitrage ecosystem | Robert McLaughlin Christopher Kruegel Giovanni Vigna | 2023 | |
Trojanpuzzle: Covertly poisoning code-suggestion models | arXiv preprint arXiv:2301.02344 | Hojjat Aghakhani Wei Dai Andre Manoel Xavier Fernandes Anant Kharkar | 2023/1/6 |
Toss a fault to your witcher: Applying grey-box coverage-guided mutational fuzzing to detect sql and command injection vulnerabilities | Erik Trickel Fabio Pagani Chang Zhu Lukas Dresel Giovanni Vigna | 2023/5/21 | |
angr: A Powerful and User-friendly Binary Analysis Platform | Yan Shoshitaishvili Ruoyu Wang Audrey Dutcher Christopher Kruegel Giovanni Vigna | 2023 | |
Teezz: Fuzzing trusted applications on cots android devices | Marcel Busch Aravind Machiry Chad Spensky Giovanni Vigna Christopher Kruegel | 2023/5/21 | |
Container Orchestration Honeypot: Observing Attacks in the Wild | Noah Spahn Nils Hanke Thorsten Holz Christopher Kruegel Giovanni Vigna | 2023/10/16 | |
Street Rep: A Privacy-Preserving Reputation Aggregation System | Cryptology ePrint Archive | Christophe Hauser Shirin Nilizadeh Yan Shoshitaishvili Ni Trieu Srivatsan Ravi | 2023 |
Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images | Eric Gustafson Paul Grosen Nilo Redini Saagar Jha Andrea Continella | 2023/10/16 | |
Sailfish: Vetting smart contract state-inconsistency bugs in seconds | Priyanka Bose Dipanjan Das Yanju Chen Yu Feng Christopher Kruegel | 2022/5/22 | |
Hybrid Pruning: Towards Precise Pointer and Taint Analysis | Dipanjan Das Priyanka Bose Aravind Machiry Sebastiano Mariani Yan Shoshitaishvili | 2022/6/24 | |
Decomperson: How humans decompile and what we can learn from it | Kevin Burk Fabio Pagani Christopher Kruegel Giovanni Vigna | 2022 | |
Looking for Signals: A Systems Security Perspective | Christopher Kruegel | 2022/6/23 |