wkr

Publications

Conference

  • WHOIS Lost in Translation: (Mis)Understanding Internet Domain Name Expiration and Re-Registration. T. Lauinger, K. Onarlioglu, A. Chaabane, W. Robertson, E. Kirda. To appear in Proceedings of the ACM Internet Measurement Conference (IMC), Santa Monica, CA, USA, November 2016.
  • Identifying Extension-based Ad Injection via Fine-grained Web Content Provenance. S. Arshad, A. Kharraz, W. Robertson. To appear in Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), Paris, FR, September 2016.
  • Trellis: Privilege Separation for Multi-User Applications Made Easy. A. Mambretti, K. Onarlioglu, C. Mulliner, W. Robertson, E. Kirda, F. Maggi, S. Zanero. To appear in Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), Paris, FR, September 2016.
  • Tracing Information Flows Between Ad Exchanges Using Retargeted Ads. M. Bashir, S. Arshad, W. Robertson, C. Wilson. To appear in Proceedings of the USENIX Security Symposium, Austin, TX, USA, August 2016.
  • UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware. A. Kharraz, S. Arshad, C. Mulliner, W. Robertson, E. Kirda. To appear in Proceedings of the USENIX Security Symposium, Austin, TX, USA, August 2016.
  • Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices. M. Neugschwandtner, C. Mulliner, W. Robertson, E. Kirda. To appear in Proceedings of the International Conference on Trust & Trustworthy Computing (TRUST), Vienna, AT, August 2016.
  • EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails. S. Duman, K. Kalkan, M. Egele, W. Robertson, E. Kirda. In Proceedings of the IEEE Computer Society International Conference on Computers, Software & Applications (COMPSAC), Atlanta, GA, USA, June 2016.
    PDF
  • Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems. K. Onarlioglu, W. Robertson, E. Kirda. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Toulouse, France, June 2016.
    PDF
  • Towards Detecting Logic Bombs in Android Applications. Y. Fratantonio, A. Bianchi, W. Robertson, C. Kruegel, E. Kirda, G. Vigna. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland), San Jose, CA, USA, May 2016.
    PDF
  • LAVA: Large-scale Automated Vulnerability Addition. B. Dolan-Gavitt, P. Hulin, E. Kirda, T. Leek, A. Mambretti, W. Robertson, F. Ulrich, R. Whelan. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland), San Jose, CA, USA, May 2016.
    PDF
  • CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes. P. Carter, C. Mulliner, M. Lindorfer, W. Robertson, E. Kirda. In Proceedings of the International Conference on Financial Cryptography and Data Security (FC), Barbados, February 2016.
    PDF
  • Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions. S. Arshad, A. Kharraz, W. Robertson. In Proceedings of the International Conference on Financial Cryptography and Data Security (FC), Barbados, February 2016.
    PDF
  • CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities. A. Buyukkayhan, K. Onarlioglu, W. Robertson, E. Kirda. In Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 2016.
    PDF
  • ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities. M. Weissbacher, W. Robertson, E. Kirda, C. Kruegel, G. Vigna. In Proceedings of the USENIX Security Symposium, Washington DC, USA, August 2015.
    PDF
  • On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users. Y. Fratantonio, A. Bianchi, W. Robertson, M. Egele, E. Kirda, C. Kruegel, G. Vigna. In Proceedings of the International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Milan, IT, July 2015.
    PDF
  • Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. A. Kharraz, W. Robertson, D. Balzarotti, L. Bilge, E. Kirda. In Proceedings of the International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Milan, IT, July 2015.
    PDF
  • BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications. A. Ozcan, C. Gemicioglu, K. Onarlioglu, M. Weissbacher, C. Mulliner, W. Robertson, E. Kirda. In Proceedings of the International Conference on Financial Cryptography and Data Security (FC), Isla Verde, PR, USA, January 2015.
    PDF
  • TrueClick: Automatically Distinguishing Trick Banners from Genuine Download Links. S. Duman, K. Onarlioglu, A. Ulosoy, W. Robertson, E. Kirda. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), New Orleans, LA, USA, December 2014.
    PDF
  • Why is CSP Failing? Trends and Challenges in CSP Adoption. M. Weissbacher, T. Lauinger, W. Robertson. In Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), Gothenburg, SE, September 2014.
    PDF
  • Optical Delusions: A Study of Malicious QR Codes in the Wild. A. Kharraz, E. Kirda, W. Robertson, D. Balzarotti, A. Francillon. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Atlanta, GA, USA, June 2014.
    PDF
  • VirtualSwindle: An Automated Attack Against In-App Billing on Android. C. Mulliner, W. Robertson, E. Kirda. In Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS), Kyoto, JP, June 2014.
    PDF
  • Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces. C. Mulliner, W. Robertson, E. Kirda. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland), San Jose, CA, USA, May 2014.
    PDF
  • Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks. T. Yen, A. Oprea, K. Onarlioglu, T. Leetham, W. Robertson, A. Juels, E. Kirda. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), New Orleans, LA, USA, December 2013.
    PDF
  • PatchDroid: Scalable Third-Party Patches for Android Devices. C. Mulliner, J. Oberheide, W. Robertson, E. Kirda. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), New Orleans, LA, USA, December 2013.
    PDF
  • Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters. T. Lauinger, K. Onarlioglu, A. Chaabane, E. Kirda, W. Robertson, M. Kaafar. In Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), Amsterdam, The Netherlands, October 2013.
    PDF
  • Securing Legacy Firefox Extensions with Sentinel. K. Onarlioglu, M. Battal, W. Robertson, E. Kirda. In Proceedings of the International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Berlin, DE, July 2013.
    PDF
  • PrivExec: Private Execution as an Operating System Service. K. Onarlioglu, C. Mulliner, W. Robertson, E. Kirda. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland), San Francisco, CA, USA, May 2013.
    PDF
  • A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication. A. Cassola, W. Robertson, E. Kirda, G. Noubir. In Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 2013.
    PDF
  • TRESOR-HUNT: Attacking CPU-Bound Encryption. E. Blass, W. Robertson. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Orlando, FL, USA, December 2012.
    PDF
  • DISCLOSURE: Detecting Botnet Command and Control Servers Through Large-Scale NetFlow Analysis. L. Bilge, D. Balzarotti, W. Robertson, E. Kirda, C. Kruegel. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Orlando, FL, USA, December 2012.
    PDF
  • Preventing Input Validation Vulnerabilities in Web Applications through Automated Type Analysis. T. Scholte, W. Robertson, D. Balzarotti, E. Kirda. In Proceedings of the IEEE Computer Software and Applications Conference, Izmir, Turkey, July 2012.
    PDF
  • An Empirical Analysis of Input Validation Mechanisms in Web Applications and Languages. T. Scholte, W. Robertson, D. Balzarotti, E. Kirda. In Proceedings of the ACM Symposium on Applied Computing, Trento, Italy, March 2012.
    PDF
  • Effective Anomaly Detection with Scarce Training Data. W. Robertson, F. Maggi, C. Kruegel, G. Vigna. In Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 2010.
    PDF
  • Protecting a Moving Target: Addressing Web Application Concept Drift. F. Maggi, W. Robertson, C. Kruegel, G. Vigna. In Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), Saint-Malo, Brittany, France, September 2009.
    PDF
  • Static Enforcement of Web Application Integrity Through Strong Typing. W. Robertson, G. Vigna. In Proceedings of the USENIX Security Symposium, Montreal, Quebec, Canada, August 2009.
    PDFSlides
  • Are Your Votes Really Counted? Testing the Security of Real-world Voting Systems. D. Balzarotti, G. Banks, M. Cova, V. Felmetsger, W. Robertson, F. Valeur, G. Vigna, R. Kemmerer. In Proceedings of the International Symposium on Software Testing and Analysis (ISSTA), Seattle, WA, USA, July 2008.
    PDF
  • Improving Signature Testing Through Dynamic Data Flow Analysis. D. Balzarotti, W. Robertson, C. Kruegel, G. Vigna. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Miami Beach, FL, USA, December 2007.
    PDF
  • Exploiting Execution Context for the Detection of Anomalous System Calls. D. Mutz, W. Robertson, G. Vigna, R. Kemmerer. In Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), Gold Coast, Queensland, Australia, September 2007.
    PDF
  • Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. W. Robertson, G. Vigna, C. Kruegel, R. Kemmerer. In Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 2006.
    PDFSlides
  • Polymorphic Worm Detection Using Structural Information of Executables. C. Kruegel, E. Kirda, D. Mutz, W. Robertson, G. Vigna. In Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), Seattle, WA, USA, September 2005.
    PDF
  • Automating Mimicry Attacks Using Static Binary Analysis. C. Kruegel, E. Kirda, D. Mutz, W. Robertson, G. Vigna. In Proceedings of the USENIX Security Symposium, Baltimore, MD, USA, July 2005.
    PDF
  • Reverse Engineering of Network Signatures. D. Mutz, C. Kruegel, W. Robertson, G. Vigna, R. Kemmerer. In Proceedings of the Annual Asia Pacific Information Technology Security Conference (AusCERT), Gold Coast, Queensland, Australia, May 2005.
    PDF
  • Detecting Kernel-Level Rootkits Through Binary Analysis. C. Kruegel, W. Robertson, G. Vigna. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Tuscon, AZ, USA, December 2004.
    PDF
  • Testing Network-based Intrusion Detection Signatures Using Mutant Exploits. G. Vigna, D. Balzarotti, W. Robertson. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Washington DC, USA, October 2004.
    PDF
  • Static Disassembly of Obfuscated Binaries. C. Kruegel, W. Robertson, F. Valeur, G. Vigna. In Proceedings of the USENIX Security Symposium, San Diego, CA, USA, August 2004.
    PDF
  • Bayesian Event Classification for Intrusion Detection. C. Kruegel, D. Mutz, W. Robertson, F. Valeur. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Las Vegas, NV, USA, December 2003.
    PDF
  • A Stateful Intrusion Detection System for World-Wide Web Servers. G. Vigna, W. Robertson, V. Kher, R. Kemmerer. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Las Vegas, NV, USA, December 2003.
    PDFSlides
  • Run-time Detection of Heap-based Overflows. W. Robertson, C. Kruegel, D. Mutz, F. Valeur. In Proceedings of the USENIX Large Installations Systems Administration Conference (LISA), San Diego, CA, USA, October 2003.
    PDFSlides
  • Topology-based Detection of Anomalous BGP Messages. C. Kruegel, D. Mutz, W. Robertson, F. Valeur. In Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), Pittsburgh, PA, USA, September 2003.
    PDF

Journal

Workshop

  • Alert Verification: Determining the Success of Intrusion Attempts. C. Kruegel, W. Robertson. In Proceedings of the Workshop on the Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Dortmund, North Rhine-Westphalia, Germany, July 2004.
    PDF

Thesis

  • Detecting and Preventing Attacks Against Web Applications. W. Robertson. UC Santa Barbara, June 2009.
    PDF