Number of items: 45.
Conference or Workshop Item (A Paper)
Acar, Yasemin and Backes, Michael and Bugiel, Sven and Fahl, Sascha and McDaniel, Patrick and Smith, Matthew
(2016)
SoK: Lessons Learned From Android Security Research For Appified Software Platforms.
Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle and Stransky, Christian
(2016)
You Get Where You're Looking For: The Impact Of Information Sources On Code Security.
Backes, Michael and Berrang, Pascal and Goga, Oana and Gummadi, Krishna P. and Manoharan, Praveen
(2016)
On Profile Linkability despite Anonymity in Social Media Systems.
Backes, Michael and Berrang, Pascal and Hecksteden, Anne and Humbert, Mathias and Keller, Andreas and Meyer, Tim
(2016)
Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles.
Backes, Michael and Berrang, Pascal and Humbert, Mathias and Manoharan, Praveen
(2016)
Membership Privacy in MicroRNA-based Studies.
Backes, Michael and Berrang, Pascal and Humbert, Mathias and Shen, Xiaoyu and Wolf, Verena
(2016)
Simulating the Large-Scale Erosion of Genomic Privacy Over Time.
Backes, Michael and Bugiel, Sven and Derr, Erik
(2016)
Reliable Third-Party Library Detection in Android and its Security Applications.
Backes, Michael and Bugiel, Sven and Derr, Erik and Gerling, Sebastian and Hammer, Christian
(2016)
R-Droid: Leveraging Android App Analysis with Static Slice Optimization.
Backes, Michael and Bugiel, Sven and Derr, Erik and McDaniel, Patrick and Octeau, Damien and Weisgerber, Sebastian
(2016)
On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis.
Backes, Michael and Bugiel, Sven and Huang, Jie and Schranz, Oliver
(2016)
POSTER: The ART of App Compartmentalization.
Backes, Michael and Hammer, Christian and Pfaff, David and Skoruppa, Malte
(2016)
Implementation-level Analysis of the JavaScript Helios Voting Client.
Backes, Michael and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2016)
Anonymous RAM.
Backes, Michael and Holz, Thorsten and Rossow, Christian and Rytilahti, Teemu and Simeonovski, Milivoj and Stock, Ben
(2016)
On the Feasibility of TTL-based Filtering for DRDoS Mitigation.
Backes, Michael and Künnemann, Robert and Mohammadi, Esfandiar
(2016)
Computational Soundness for Dalvik Bytecode.
Brengel, Michael and Backes, Michael and Rossow, Christian
(2016)
Detecting Hardware-Assisted Virtualization.
Götzfried, Johannes and Müller, Tilo and Drescher, Gabor and Nürnberger, Stefan and Backes, Michael
(2016)
RamCrypt: Kernel-based Address Space Encryption for User-mode Processes.
Krupp, Johannes and Backes, Michael and Rossow, Christian
(2016)
Identifying the Scan and Attack Infrastructures behind Amplification DDoS attacks.
Lu, Kangjie and Backes, Michael and Nürnberger, Stefan and Lee, Wenke
(2016)
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.
Maisuradze, Giorgi and Backes, Michael and Rossow, Christian
(2016)
What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses.
Nürnberger, Stefan and Rossow, Christian
(2016)
VatiCAN - Vetted, Authenticated CAN Bus.
Schneider, Jonas and Fleischhacker, Nils and Schröder, Dominique and Backes, Michael
(2016)
Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments.
Schürmann, Dominik and Busse, Karoline and Smith, Matthew and Fahl, Sascha and Dechand, Sergej and Acar, Yasemin
(2016)
An Empirical Study of Textual Key-Fingerprint Representations.
Stock, Ben and Livshits, Benjamin and Zorn, Benjamin
(2016)
Kizzle: A Signature Compiler for Detecting Exploit Kits.
Stock, Ben and Pellegrino, Giancarlo and Rossow, Christian and Johns, Martin and Backes, Michael
(2016)
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
Stock, Ben and Pellegrino, Giancarlo and Rossow, Christian and Johns, Martin and Backes, Michael
(2016)
POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications.
Yokoyama, Akira and Ishii, Kou and Tanabe, Rui and Papa, Yinmin and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Inoue, Daisuke and Brengel, Michael and Backes, Michael and Rossow, Christian
(2016)
SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
Article
Backes, Michael and Bugiel, Sven and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2016)
Boxify: Bringing Full-Fledged App Sandboxing to Stock Android.
USENIX ;login:, 41 (2).
pp. 16-21.
Backes, Michael and Manoharan, Praveen and Grosse, Kathrin and Papernot, Nicolas
(2016)
Adversarial Perturbations Against Deep Neural Networks for Malware Classification.
The Computing Research Repository (CoRR), abs/16.
Kremer, Steve and Künnemann, Robert
(2016)
Automated analysis of security protocols with global state.
Journal of Computer Security.
Marnau, Ninja
(2016)
Anonymisierung, Pseudonymisierung und Transparenz für Big Data. Technische Herausforderungen und Regelung in der Datenschutz-Grundverordnung.
Datenschutz und Datensicherheit (DuD), 05/201.
Nürnberger, Stefan and Bugiel, Sven
(2016)
Autonome Systeme.
Datenschutz und Datensicherheit, 40 (8).
pp. 503-506.
Shirazi, Fatemeh and Simeonovski, Milivoj and Asghar, Muhammad Rizwan and Backes, Michael and Díaz, Claudia
(2016)
A Survey on Routing in Anonymous Communication Protocols.
The Computing Research Repository (CoRR), abs/16.
Thesis
Awazid, Tahleen Rahman
(2016)
Curious Volunteers: Anonymity Impact of adding Tor nodes.
Masters thesis, UNSPECIFIED.
Bugiel, Sven
(2016)
Establishing mandatory access control on Android OS.
Doctoral thesis, UNSPECIFIED.
Bushart, Jonas
(2016)
Time-to-Live based Trilateration.
Bachelors thesis, UNSPECIFIED.
Dietel, Sebastian
(2016)
Towards Native Client Executables via Binary Translation on the x86 Platform.
Bachelors thesis, UNSPECIFIED.
Endner-Dühr, Frederic
(2016)
Extracting and Modeling Typosquatting Errors from Large-scale Passive DNS Data.
Masters thesis, UNSPECIFIED.
Hagestedt, Inken
(2016)
Static Analysis of Non-interference for Android Apps.
Masters thesis, UNSPECIFIED.
Lipp, Nils Peter
(2016)
Full Reference Monitoring for Android Intents.
Bachelors thesis, UNSPECIFIED.
Salem, Ahmed
(2016)
CRRP: A Cryptographic Protocol for Coercion-Resistant Rating Platforms.
Masters thesis, UNSPECIFIED.
Steffensky, Joshua
(2016)
Hardening Intel SGX enclaves against memory safety exploits.
Bachelors thesis, UNSPECIFIED.
Waxweiler, Daniel
(2016)
Making Chromium´s Certificate Transparency integration more accessible.
Masters thesis, UNSPECIFIED.
Wedeking, Lukas
(2016)
Anonymity Guarantees for Tor Hidden Services.
Bachelors thesis, Saarland University.
Book Section
Backes, Michael and Berrang, Pascal and Manoharan, Praveen
(2016)
From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy.
In:
UNSPECIFIED
Springer International Publishing, Cham, pp. 87-138.
ISBN 978-3-319-43005-8
Backes, Michael and Meiser, Sebastian and Schröder, Dominique
(2016)
Delegatable Functional Signatures.
In:
UNSPECIFIED
Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 357-386.
ISBN 978-3-662-49384-7
This list was generated on Sat Dec 21 15:49:06 2024 CET.