Clemens Kolbitsch
Clemens Kolbitsch
Lastline, Inc., formerly PhD student at Vienna University of Technology, Vienna, Austria
Bestätigte E-Mail-Adresse bei iseclab.org - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Effective and efficient malware detection at the end host.
C Kolbitsch, PM Comparetti, C Kruegel, E Kirda, X Zhou, XF Wang
USENIX security symposium 4 (1), 351-366, 2009
5482009
Detecting environment-sensitive malware
M Lindorfer, C Kolbitsch, PM Comparetti
International Workshop on Recent Advances in Intrusion Detection, 338-357, 2011
3212011
Rozzle: De-cloaking internet malware
C Kolbitsch, B Livshits, B Zorn, C Seifert
2012 IEEE Symposium on Security and Privacy, 443-457, 2012
2052012
Hulk: Eliciting malicious behavior in browser extensions
A Kapravelos, C Grier, N Chachra, C Kruegel, G Vigna, V Paxson
23rd {USENIX} Security Symposium ({USENIX} Security 14), 641-654, 2014
1292014
Identifying dormant functionality in malware programs
PM Comparetti, G Salvaneschi, E Kirda, C Kolbitsch, C Kruegel, S Zanero
2010 IEEE Symposium on Security and Privacy, 61-76, 2010
1192010
Inspector gadget: Automated extraction of proprietary gadgets from malware binaries
C Kolbitsch, T Holz, C Kruegel, E Kirda
2010 IEEE Symposium on Security and Privacy, 29-44, 2010
1152010
The power of procrastination: detection and mitigation of execution-stalling malicious code
C Kolbitsch, E Kirda, C Kruegel
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1132011
Removing web spam links from search engine results
M Egele, C Kolbitsch, C Platzer
Journal in Computer Virology 7 (1), 51-62, 2011
522011
Stateful fuzzing of wireless device drivers in an emulated environment
S Keil, C Kolbitsch
Black Hat Japan, 2007
172007
Methods and systems for malware detection based on environment-dependent behavior
C Kolbitsch, PM Comparetti, L Cavedon
US Patent 9,361,459, 2016
142016
Execution of multiple execution paths
B Livshits, BG Zorn, C Seifert, C Kolbitsch
US Patent 9,038,185, 2015
142015
Methods and systems for reciprocal generation of watch-lists and malware signatures
C Kolbitsch, PM Comparetti, L Cavedon
US Patent 8,910,285, 2014
122014
Methods and systems for maintaining a sandbox for use in malware detection
R Vasilenko, C Kolbitsch
US Patent 10,474,819, 2019
102019
" Offizielle" elektronische Version der Publikation (entsprechend ihrem Digital Object Identifier-DOI)
E Kozeschnik, J Svoboda, R Radis, FD Fischer
Modelling and Simulation in Materials Science and Engineering 18 (015011), 1-19, 2010
92010
Methods and systems for malware host correlation
C Kolbitsch, R Vasilenko
US Patent App. 14/947,397, 2017
62017
Kernel-mode exploits primer
S Keil, C Kolbitsch
International Secure Systems Lab (isecLAB), Tech. Rep, 2007
42007
Rozzle: De-cloaking Internet Malware
C Seifert, B Zorn, B Livshits, C Kolbitsch
2012 IEEE Symposium on Security and Privacy, 443-457, 2012
2012
Extending Mondrian Memory Protection
C Kolbitsch, C Kruegel, E Kirda
VIENNA UNIV OF TECHNOLOGY (AUSTRIA), 2010
2010
Beiträge in Tagungsbänden
M Lindorfer, B Miller, M Neugschwandtner, C Platzer
Beiträge in Tagungsbänden
PM Comparetti, G Salvaneschi, E Kirda, C Kolbitsch, C Krügel, S Zanero
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20