Number of items: 29.
A
Acar, Yasemin and Backes, Michael and Fahl, Sascha and Garfinkel, Simson and Kim, Doowon and Mazurek, Michelle and Stransky, Christian
(2017)
Comparing the Usability of Cryptographic APIs.
Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian
(2017)
How Internet Resources Might Be Helping You Develop Faster but Less Securely.
IEEE Security & Privacy.
Acar, Yasemin and Stransky, Christian and Wermke, Dominik and Mazurek, Michelle and Fahl, Sascha
(2017)
Security Developer Studies with GitHub Users: Exploring a Convenience Sample.
UNSPECIFIED.
B
Backes, Michael and Berrang, Pascal and Bieg, Matthias and Elis, Roland and Herrmann, Carl and Humbert, Mathias and Lehmann, Irina
(2017)
Identifying Personal DNA Methylation Profiles by Genotype Inference.
Backes, Michael and Bugiel, Sven and Schranz, Oliver and Styp-Rekowsky, Philipp von and Weisgerber, Sebastian
(2017)
ARTist: The Android Runtime Instrumentation and Security Toolkit.
Backes, Michael and Bugiel, Sven and von Styp-Rekowsky, Philipp and Wißfeld, Marvin
(2017)
Seamless In-App Ad Blocking on Stock Android.
Backes, Michael and Dreier, Jannik and Kremer, Steve and Künnemann, Robert
(2017)
A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange.
Backes, Michael and Gomez-Rodriguez, Manuel and Manoharan, Praveen and Surma, Bartlomiej
(2017)
Reconciling Privacy and Utility in Continuous-Time Diffusion Networks.
Backes, Michael and Hoffmann, Jörg and Künnemann, Robert and Speicher, Patrick and Steinmetz, Marcel
(2017)
Simulated Penetration Testing and Mitigation Analysis.
CoRR, abs/17.
Backes, Michael and Nauman, Mohammad
(2017)
LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning.
Backes, Michael and Rieck, Konrad and Skoruppa, Malte and Stock, Ben and Yamaguchi, Fabian
(2017)
Efficient and Flexible Discovery of PHP Application Vulnerabilities.
Brodowski, Dominik and Marnau, Ninja
(2017)
Tatobjekt und Vortaten der Datenhehlerei (§ 202 d StGB).
Neue Zeitschrift für Strafrecht (NStZ), 07/201.
D
Derr, Erik and Bugiel, Sven and Fahl, Sascha and Acar, Yasemin and Backes, Michael
(2017)
Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android.
F
Fischer, Felix and Böttinger, Konstantin and Xiao, Huang and Stransky, Christian and Acar, Yasemin and Backes, Michael and Fahl, Sascha
(2017)
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security.
G
Ghorbani Lyastani, Sanam and Schilling, Michael and Fahl, Sascha and Bugiel, Sven and Backes, Michael
(2017)
Studying the Impact of Managers on Password Strength and Reuse.
CoRR, abs/17.
Grosse, Kathrin and Manoharan, Praveen and Papernot, Nicolas and Backes, Michael and McDaniel, Patrick
(2017)
On the (Statistical) Detection of Adversarial Examples.
CoRR, abs/17.
(Submitted)
Grosse, Kathrin and Papernot, Nicolas and Manoharan, Praveen and Backes, Michael and McDaniel, Patrick
(2017)
Adversarial Examples for Malware Detection.
H
Huang, Jie and Schranz, Oliver and Bugiel, Sven and Backes, Michael
(2017)
The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android.
K
Krupp, Johannes and Karami, Mohammad and Rossow, Christian and McCoy, Damon and Backes, Michael
(2017)
Linking Amplification DDoS Attacks to Booter Services.
L
Lu, Kangjie and Walter, Marie-Therese and Pfaff, David and Nürnberger, Stefan and Lee, Wenke and Backes, Michael
(2017)
Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying.
M
Maisuradze, Giorgi and Backes, Michael and Rossow, Christian
(2017)
Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code.
Marnau, Ninja
(2017)
Die Blockchain im Spannungsfeld der Grundsätze der Datenschutzgrundverordnung.
N
Nguyen, Duc Cuong and Wermke, Dominik and Acar, Yasemin and Backes, Michael and Weir, Charles Alexander Forbes and Fahl, Sascha
(2017)
A Stitch in Time: Supporting Android Developers in Writing Secure Code.
P
Pellegrino, Giancarlo and Johns, Martin and Koch, Simon and Backes, Michael and Rossow, Christian
(2017)
Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs.
S
Simeonovski, Milivoj and Pellegrino, Giancarlo and Rossow, Christian and Backes, Michael
(2017)
Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals.
Sorge, Christoph and Marnau, Ninja
(2017)
Stellungnahme des CISPA zum Entwurf eines Gesetzes zur Förderung der elektronischen Verwaltung im Saarland sowie zur Änderung weiterer Vorschriften.
Stock, Ben and Johns, Martin and Steffens, Marius and Backes, Michael
(2017)
How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security.
Stransky, Christian and Acar, Yasemin and Nguyen, Duc Cuong and Wermke, Dominik and Redmiles, Elissa M. and Kim, Doowon and Backes, Michael and Garfinkel, Simson and Mazurek, Michelle and Fahl, Sascha
(2017)
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.
T
Tramèr, Floran and Atlidakis, Vaggelis and Geambasu, Roxana and Hsu, Daniel and Hubaux, Jean-Pierre and Humbert, Mathias and Juels, Ari and Lin, Huang
(2017)
FairTest: Discovering Unwarranted Associations in Data-Driven Applications.
This list was generated on Sat Dec 21 18:09:48 2024 CET.