logo EDITE Engin KIRDA
Identité
Engin KIRDA
État académique
Thèse soutenue le 2002-01-01
Titulaire d'une HDR (ou équivalent) 2007-01-01
Laboratoire: personnel permanent
Direction de thèses (depuis 2007)
0
Voisinage
Ellipse bleue: doctorant, ellipse jaune: docteur, rectangle vert: permanent, rectangle jaune: HDR. Trait vert: encadrant de thèse, trait bleu: directeur de thèse, pointillé: jury d'évaluation à mi-parcours ou jury de thèse.
Productions scientifiques
Conference:Balduzzi-26/03/2012
A security analysis of amazon's elastic compute cloud service
A security analysis of amazon's elastic compute cloud service, SAC@SAC 2012, 11th edition of the Computer Security track at the 27th ACM Symposium on Applied Computing, March 26-30, 2012, Trento, Italy 26/03/2012
http://dx.doi.org/10.1007/978-3-642-22424-9_4
Reverse social engineering attacks in online social networks
Reverse social engineering attacks in online social networks, DIMVA 2011, 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 7-8th, 2011 Amsterdam, The Netherlands / Also published in "Lecture Notes in Computer Science", Vol 6739/2011 07/07/2011
Conference:Balduzzi-06/02/2011
EXPOSURE : Finding malicious domains using passive DNS analysis
EXPOSURE : Finding malicious domains using passive DNS analysis, NDSS'11, 18th Annual Network & Distributed System Security Symposium, 6-9 February 2011, San Diego, CA, USA 06/02/2011
http://dx.doi.org/10.1007/978-3-642-15512-3_22
Abusing social networks for automated user profiling
Abusing social networks for automated user profiling, RAID'2010, 13th International Symposium on Recent Advances in Intrusion Detection, September 15-17, 2010, Ottawa, Canada / Also published in "LNCS", Volume 6307/2010 15/09/2010
http://dx.doi.org/10.1007/978-88-470-1818-1_13
A summary of two practical attacks against social networks
A summary of two practical attacks against social networks, ITWDC'11, 21st International Tyrrhenian Workshop on Digital Communications: Trustworthy Internet, September 6-8, 2010, Island of Ponza, Italy / Also published as chapter book 13 of "Trustworthy internet", Springer, ISBN: 978-8847018174 06/09/2010
http://dx.doi.org/10.1145/1755688.1755706
A solution for the automated detection of clickjacking attacks
A solution for the automated detection of clickjacking attacks, AsiaCCS 2010, 5th Symposium on Information Computer and Communications Security, April 13-16, 2010, Beijing, China 13/04/2010
Conference:Bilge-06/02/2011
EXPOSURE : Finding malicious domains using passive DNS analysis
EXPOSURE : Finding malicious domains using passive DNS analysis, NDSS'11, 18th Annual Network & Distributed System Security Symposium, 6-9 February 2011, San Diego, CA, USA 06/02/2011
http://dx.doi.org/10.1145/1920261.1920269
G-Free : defeating return-oriented programming through gadget-less binaries
G-Free : defeating return-oriented programming through gadget-less binaries, ACSAC'10, Annual Computer Security Applications Conference, December 6-10, 2010, Austin, Texas, USA 06/12/2010
http://dx.doi.org/10.1145/1774088.1774483
CAPTCHA smuggling : Hijacking web browsing sessions to create CAPTCHA farms
CAPTCHA smuggling : Hijacking web browsing sessions to create CAPTCHA farms, SAC 2010, 25th ACM Symposium On Applied Computing, March 22-26, 2010, Sierre, Switzerland 22/03/2010
http://dx.doi.org/10.1007/978-3-642-04444-1
Automatically generating models for botnet detection
Automatically generating models for botnet detection, ESORICS 2009, 14th European Symposium on Research in Computer Security, September 21-23, 2009, Saint-Malo, France / Also published as Springer "Lecture Notes in Computer Science", Volume 5789/2009 19/09/2009
http://dx.doi.org/10.1145/1526709.1526784
All your contacts are belong to us : automated identity theft attacks on social networks
All your contacts are belong to us : automated identity theft attacks on social networks, WWW'09, 18th International World Wide Web Conference, April 20-24, Madrid, Spain 20/04/2009
http://dx.doi.org/10.1007/978-1-4419-0140-8_6
Assessing cybercrime through the eyes of the WOMBAT
Assessing cybercrime through the eyes of the WOMBAT, Book chapter N 6 in "Cyber Situational Awareness : Issues and Research", Springer International Series on Advances in Information Security, Part 3, 2009. ISBN: 98-1-4419-0139-2 01/11/2009
http://dx.doi.org/10.1109/WISTDCS.2008.8
The leurre.com project: collecting internet threats information using a worldwide distributed honeynet
The leurre.com project: collecting internet threats information using a worldwide distributed honeynet, WISTDCS'08, 1st WOMBAT Workshop, April 21st-22nd, 2008, Amsterdam, The Netherlands 21/04/2008