Christopher Krügel
#136,088
Most Influential Person Now
Christopher Krügel's AcademicInfluence.com Rankings
Christopher Krügelcomputer-science Degrees
Computer Science
#6249
World Rank
#6590
Historical Rank
Network Security
#7
World Rank
#7
Historical Rank
Data Mining
#140
World Rank
#140
Historical Rank
Machine Learning
#1962
World Rank
#1988
Historical Rank

Download Badge
Computer Science
Christopher Krügel's Degrees
- PhD Computer Science Saarland University
- Masters Computer Science Saarland University
- Bachelors Computer Science Saarland University
Similar Degrees You Can Earn
Why Is Christopher Krügel Influential?
(Suggest an Edit or Addition)Christopher Krügel's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Detecting spammers on social networks (2010) (893)
- Limits of Static Analysis for Malware Detection (2007) (859)
- A survey on automated dynamic malware-analysis techniques and tools (2012) (833)
- Panorama: capturing system-wide information flow for malware detection and analysis (2007) (792)
- Driller: Augmenting Fuzzing Through Selective Symbolic Execution (2016) (750)
- Pixy: a static analysis tool for detecting Web application vulnerabilities (2006) (732)
- Scalable, Behavior-Based Malware Clustering (2009) (715)
- SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016) (698)
- Your botnet is my botnet: analysis of a botnet takeover (2009) (696)
- Anomaly detection of web-based attacks (2003) (692)
- Detection and analysis of drive-by-download attacks and malicious JavaScript code (2010) (650)
- EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis (2011) (584)
- Exploring Multiple Execution Paths for Malware Analysis (2007) (575)
- Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis (2007) (567)
- PiOS: Detecting Privacy Leaks in iOS Applications (2011) (555)
- Comprehensive approach to intrusion detection alert correlation (2004) (554)
- Effective and Efficient Malware Detection at the End Host (2009) (524)
- Bayesian event classification for intrusion detection (2003) (431)
- Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting (2013) (418)
- Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications (2008) (415)
- Polymorphic Worm Detection Using Structural Information of Executables (2005) (413)
- A Practical Attack to De-anonymize Social Network Users (2010) (387)
- Service specific anomaly detection for network intrusion detection (2002) (384)
- Noxes: a client-side solution for mitigating cross-site scripting attacks (2006) (352)
- Static Disassembly of Obfuscated Binaries (2004) (336)
- Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware (2015) (312)
- Dynamic Analysis of Malicious Code (2006) (309)
- Anomalous system call detection (2006) (296)
- Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications (2014) (294)
- You are what you include: large-scale evaluation of remote javascript inclusions (2012) (288)
- Stateful intrusion detection for high-speed network's (2002) (285)
- COMPA: Detecting Compromised Accounts on Social Networks (2013) (281)
- A multi-model approach to the detection of web-based attacks (2005) (279)
- Prospex: Protocol Specification Extraction (2009) (278)
- Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis (2012) (277)
- Mining specifications of malicious behavior (2008) (270)
- Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains (2014) (270)
- SecuBat: a web vulnerability scanner (2006) (263)
- Dynamic Spyware Analysis (2007) (255)
- Behavior-based Spyware Detection (2006) (251)
- Detecting System Emulators (2007) (237)
- On the Detection of Anomalous System Call Arguments (2003) (229)
- Automatic Network Protocol Analysis (2008) (229)
- Using Decision Trees to Improve Signature-Based Intrusion Detection (2003) (216)
- Automating Mimicry Attacks Using Static Binary Analysis (2005) (215)
- Efficient Detection of Split Personalities in Malware (2010) (212)
- BareCloud: Bare-metal Analysis-based Evasive Malware Detection (2014) (205)
- AccessMiner: using system-centric models for malware protection (2010) (204)
- Detecting kernel-level rootkits through binary analysis (2004) (200)
- Preventing Cross Site Request Forgery Attacks (2006) (195)
- Toward Automated Detection of Logic Vulnerabilities in Web Applications (2010) (194)
- On the Effectiveness of Techniques to Detect Phishing Sites (2007) (192)
- Automatically Generating Models for Botnet Detection (2009) (190)
- Intrusion Detection and Correlation - Challenges and Solutions (2004) (189)
- Accurate Buffer Overflow Detection via Abstract Payload Execution (2002) (187)
- Precise alias analysis for static detection of web application vulnerabilities (2006) (186)
- BotFinder: finding bots in network traffic without deep packet inspection (2012) (185)
- Abusing Social Networks for Automated User Profiling (2010) (181)
- Mining specifications of malicious behavior (2007) (180)
- Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks (2009) (179)
- EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework (2015) (179)
- Follow the green: growth and dynamics in twitter follower markets (2013) (177)
- Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks (2006) (175)
- EvilSeed: A Guided Approach to Finding Malicious Web Pages (2012) (173)
- Evaluating the impact of automated intrusion response mechanisms (2002) (172)
- Visual-similarity-based phishing detection (2008) (169)
- Protecting users against phishing attacks with AntiPhish (2005) (168)
- What the App is That? Deception and Countermeasures in the Android User Interface (2015) (150)
- A quantitative study of accuracy in system call-based malware detection (2012) (148)
- A layout-similarity-based approach for detecting phishing pages (2007) (148)
- Revolver: An Automated Approach to the Detection of Evasive Web-based Malware (2013) (145)
- Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner (2012) (140)
- The Underground Economy of Fake Antivirus Software (2011) (139)
- Nazca: Detecting Malware Distribution in Large-Scale Networks (2014) (130)
- Hulk: Eliciting Malicious Behavior in Browser Extensions (2014) (130)
- TriggerScope: Towards Detecting Logic Bombs in Android Applications (2016) (126)
- Shady paths: leveraging surfing crowds to detect malicious web pages (2013) (126)
- The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements (2014) (122)
- Preserving Location Privacy in Geosocial Applications (2014) (121)
- Understanding fraudulent activities in online ad exchanges (2011) (120)
- SWAP: Mitigating XSS attacks using a reverse proxy (2009) (119)
- JACKSTRAWS: Picking Command and Control Connections from Bot Traffic (2011) (117)
- Silverline: toward data confidentiality in storage-intensive cloud applications (2011) (117)
- Identifying Dormant Functionality in Malware Programs (2010) (116)
- Decentralized Event Correlation for Intrusion Detection (2001) (115)
- DIFUZE: Interface Aware Fuzzing for Kernel Drivers (2017) (114)
- Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries (2010) (114)
- FIRE: FInding Rogue nEtworks (2009) (113)
- MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense (2018) (112)
- Topology-Based Detection of Anomalous BGP Messages (2003) (109)
- Protecting Users against Phishing Attacks (2006) (108)
- The power of procrastination: detection and mitigation of execution-stalling malicious code (2011) (107)
- Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy (2016) (106)
- Alert Verification Determining the Success of Intrusion Attempts (2004) (105)
- Framing Dependencies Introduced by Underground Commoditization (2015) (105)
- Ramblr: Making Reassembly Great Again (2017) (100)
- Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis (2017) (98)
- There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits (2008) (97)
- Analyzing and Detecting Malicious Flash Advertisements (2009) (97)
- Analysis of a Botnet Takeover (2011) (96)
- BareBox: efficient malware analysis on bare-metal (2011) (93)
- Improving the efficiency of dynamic malware analysis (2010) (91)
- Run-time Detection of Heap-based Overflows (2003) (91)
- A solution for the automated detection of clickjacking attacks (2010) (86)
- Client-side cross-site scripting protection (2009) (86)
- Poultry markets: on the underground economy of twitter followers (2012) (84)
- Protecting a Moving Target: Addressing Web Application Concept Drift (2009) (81)
- BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments (2017) (81)
- Leveraging User Interactions for In-Depth Testing of Web Applications (2008) (78)
- DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers (2017) (78)
- Overbot: a botnet protocol based on Kademlia (2008) (77)
- A Static, Packer-Agnostic Filter to Detect Similar Malware Samples (2012) (74)
- EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services (2015) (73)
- PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary (2019) (67)
- Static analysis for detecting taint-style vulnerabilities in web applications (2010) (66)
- Delta: automatic identification of unknown web-based infection campaigns (2013) (66)
- Is the Internet for Porn? An Insight Into the Online Adult Industry (2010) (64)
- Toward the Analysis of Embedded Firmware through Automated Re-hosting (2019) (63)
- Applying Mobile Agent Technology to Intrusion Detection (2001) (62)
- deDacota: toward preventing server-side XSS via automatic code and data separation (2013) (62)
- BareDroid: Large-Scale Analysis of Android Apps on Real Devices (2015) (61)
- Fear the EAR: discovering and mitigating execution after redirect vulnerabilities (2011) (61)
- Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries (2009) (57)
- Challenges for Dynamic Analysis of iOS Applications (2011) (56)
- Meerkat: Detecting Website Defacements through Image-based Object Recognition (2015) (55)
- GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM (2018) (55)
- PUBCRAWL: Protecting Users and Businesses from CRAWLers (2012) (54)
- Stranger danger: exploring the ecosystem of ad-based URL shortening services (2014) (54)
- Mitigating Drive-By Download Attacks: Challenges and Open Problems (2009) (53)
- Two years of short URLs internet measurement: security threats and countermeasures (2013) (53)
- Using Alert Verification to Identify Successful Intrusion Attempts (2004) (52)
- Detecting Deceptive Reviews Using Generative Adversarial Networks (2018) (50)
- PoX: Protecting users from malicious Facebook applications (2011) (50)
- Escape from Monkey Island: Evading High-Interaction Honeyclients (2011) (48)
- POISED: Spotting Twitter Spam Off the Beaten Paths (2017) (47)
- Effective Anomaly Detection with Scarce Training Data (2010) (47)
- BOTMAGNIFIER: Locating Spambots on the Internet (2011) (46)
- Distributed Pattern Detection for Intrusion Detection (2002) (45)
- Flexible, Mobile Agent Based Intrusion Detection for Dynamic Networks (2001) (44)
- The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape (2014) (44)
- B@bel: Leveraging Email Delivery for Spam Mitigation (2012) (44)
- NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android (2015) (43)
- Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services (2013) (42)
- Message in a bottle: sailing past censorship (2013) (42)
- BootStomp: On the Security of Bootloaders in Mobile Devices (2017) (41)
- Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance (2017) (40)
- Blacksheep: detecting compromised hosts in homogeneous crowds (2012) (40)
- Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates (2018) (40)
- Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters (2007) (39)
- SPARTA, a Mobile Agent Based Instrusion Detection System (2001) (38)
- On the Privacy and Security of the Ultrasound Ecosystem (2017) (37)
- CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms (2010) (36)
- Practical Attacks against the I2P Network (2013) (35)
- CLAPP: characterizing loops in Android applications (2015) (35)
- Something from Nothing (There): Collecting Global IPv6 Datasets from DNS (2017) (35)
- FORECAST: skimming off the malware cream (2011) (35)
- PExy: The Other Side of Exploit Kits (2014) (34)
- Secure Input for Web Applications (2007) (34)
- HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security (2018) (34)
- An anomaly-driven reverse proxy for web applications (2006) (33)
- Extracting probable command and control signatures for detecting botnets (2014) (33)
- PeerPress: utilizing enemies' P2P strength against them (2012) (31)
- Nexat: a history-based approach to predict attacker actions (2011) (31)
- A Parallel Architecture for Stateful, High-Speed Intrusion Detection (2008) (31)
- Jarhead analysis and detection of malicious Java applets (2012) (31)
- Building Anti-Phishing Browser Plug-Ins: An Experience Report (2007) (30)
- Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting (2013) (30)
- Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications (2015) (30)
- FlashDetect: ActionScript 3 Malware Detection (2012) (29)
- ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies (2012) (28)
- Peering through the iframe (2011) (25)
- Rippler: Delay injection for service dependency detection (2014) (24)
- Broken Fingers: On the Usage of the Fingerprint API in Android (2018) (24)
- Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode (2011) (22)
- BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation (2019) (22)
- Detecting social cliques for automated privacy control in online social networks (2012) (20)
- Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel (2014) (20)
- Using Static Program Analysis to Aid Intrusion Detection (2006) (20)
- ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities (2015) (19)
- How the ELF Ruined Christmas (2015) (19)
- Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks (2018) (19)
- Using Loops For Malware Classification Resilient to Feature-unaware Perturbations (2018) (18)
- On the Workings and Current Practices of Web-Based Device Fingerprinting (2014) (17)
- In rDNS We Trust: Revisiting a Common Data-Source's Reliability (2018) (17)
- The Tricks of the Trade: What Makes Spam Campaigns Successful? (2014) (17)
- On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users (2015) (16)
- Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions (2017) (16)
- Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis (2019) (15)
- Portrait of a Privacy Invasion (2015) (15)
- Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information (2017) (15)
- Extending .NET security to unmanaged code (2006) (14)
- How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games (2017) (12)
- Automated Spyware Collection and Analysis (2009) (12)
- Tracking Memory Writes for Malware Classification and Code Reuse Identification (2012) (12)
- Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory (2016) (11)
- Relevant change detection: a framework for the precise extraction of modified and novel web-based content as a filtering technique for analysis engines (2014) (11)
- Measuring E-mail header injections on the world wide web (2018) (10)
- VENOMAVE: Clean-Label Poisoning Against Speech Recognition (2020) (10)
- Supporting multi-device enabled Web services: challenges and open problems (2001) (10)
- Improving Signature Testing through Dynamic Data Flow Analysis (2007) (9)
- EARs in the wild: large-scale analysis of execution after redirect vulnerabilities (2013) (8)
- Demystifying DDoS as a Service (2017) (8)
- Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection (2014) (8)
- Dymo: Tracking Dynamic Code Identity (2011) (7)
- Network attack detection and defense – Manifesto of the Dagstuhl Perspective Workshop, March 2nd–6th, 2008 (2009) (6)
- Behavioral and Structural Properties of Malicious Code (2007) (6)
- DPS : An Architectural Style for Development of Secure Software (2002) (6)
- On the Security of Application Installers and Online Software Repositories (2020) (5)
- XGuide - A Practical Guide to XML-Based Web Engineering (2002) (5)
- Jini Connectivity for EIB Home and Building Networks : From Design to Implementation (1999) (5)
- Web service engineering with DIWE (2003) (5)
- Are BGP Routers Open to Attack? An Experiment (2010) (5)
- Prison: Tracking Process Interactions to Contain Malware (2015) (4)
- Piston: Uncooperative Remote Runtime Patching (2017) (4)
- Know Your Achilles' Heel: Automatic Detection of Network Critical Services (2015) (4)
- VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges (2008) (4)
- MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper) (2011) (3)
- 08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense (2008) (3)
- CLAPP: characterizing loops in Android applications (invited talk) (2015) (3)
- TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems (2020) (2)
- SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning (2021) (2)
- Fighting Malicious Software (2012) (1)
- Lightning Talk - Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis (2019) (1)
- BootKeeper: Validating Software Integrity Properties on Boot Firmware Images (2019) (1)
- Fighting malicious code: an eternal struggle (2014) (1)
- BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients (2011) (1)
- Network Security and Secure Applications (2005) (1)
- 08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective (2008) (0)
- Behavior Based Malware Analysis and Detection (2011) (0)
- Decomperson: How Humans Decompile and What We Can Learn From It (2022) (0)
- 08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense (2008) (0)
- Making browser extensions secure (2011) (0)
- 8102 Working Group -- Attack Taxonomy (2008) (0)
This paper list is powered by the following services: