Effective and efficient malware detection at the end host. C Kolbitsch, PM Comparetti, C Kruegel, E Kirda, X Zhou, XF Wang USENIX security symposium 4 (1), 351-366, 2009 | 730 | 2009 |
Detecting environment-sensitive malware M Lindorfer, C Kolbitsch, P Milani Comparetti Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011 | 554 | 2011 |
Rozzle: De-cloaking internet malware C Kolbitsch, B Livshits, B Zorn, C Seifert 2012 IEEE Symposium on Security and Privacy, 443-457, 2012 | 259 | 2012 |
The power of procrastination: detection and mitigation of execution-stalling malicious code C Kolbitsch, E Kirda, C Kruegel Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 164 | 2011 |
Identifying dormant functionality in malware programs PM Comparetti, G Salvaneschi, E Kirda, C Kolbitsch, C Kruegel, S Zanero 2010 IEEE Symposium on Security and Privacy, 61-76, 2010 | 164 | 2010 |
Inspector gadget: Automated extraction of proprietary gadgets from malware binaries C Kolbitsch, T Holz, C Kruegel, E Kirda 2010 IEEE Symposium on Security and Privacy, 29-44, 2010 | 150 | 2010 |
Removing web spam links from search engine results M Egele, C Kolbitsch, C Platzer Journal in Computer Virology 7, 51-62, 2011 | 76 | 2011 |
Stateful fuzzing of wireless device drivers in an emulated environment S Keil, C Kolbitsch Black Hat Japan, 2007 | 29 | 2007 |
Methods and systems for maintaining a sandbox for use in malware detection R Vasilenko, C Kolbitsch US Patent 10,474,819, 2019 | 27 | 2019 |
Methods and systems for malware host correlation C Kolbitsch, R Vasilenko US Patent App. 14/947,397, 2017 | 27 | 2017 |
Methods and systems for reciprocal generation of watch-lists and malware signatures C Kolbitsch, PM Comparetti, L Cavedon US Patent 8,910,285, 2014 | 27 | 2014 |
Execution of multiple execution paths B Livshits, BG Zorn, C Seifert, C Kolbitsch US Patent 9,038,185, 2015 | 20 | 2015 |
Methods and systems for malware detection based on environment-dependent behavior C Kolbitsch, PM Comparetti, L Cavedon US Patent 9,361,459, 2016 | 19 | 2016 |
Kernel-mode exploits primer S Keil, C Kolbitsch International Secure Systems Lab (isecLAB), Tech. Rep, 2007 | 4 | 2007 |
The power of procrastination C Kolbitsch, E Kirda, C Kruegel Proceedings of the 18th ACM conference on Computer and communications security, 2011 | 2 | 2011 |
Methods and systems for malware host correlation C Kolbitsch, R Vasilenko US Patent App. 16/986,021, 2020 | 1 | 2020 |
Extending mondrian memory protection C Kolbitsch, C Kruegel, E Kirda na, 2008 | 1 | 2008 |
Preventing activation of malware by exhibiting sandbox behavior in a non-sandbox environment RB Patil, KB Chaudhari, C Kolbitsch, LV Gunda, V Kulkarni US Patent App. 17/825,684, 2023 | | 2023 |
Rozzle: De-cloaking Internet Malware C Seifert, B Zorn, B Livshits, C Kolbitsch 2012 IEEE Symposium on Security and Privacy, 443-457, 2012 | | 2012 |
Behavior based malware analysis and detection C Kolbitsch Technische Universität Wien, 2011 | | 2011 |