Number of items: 179.
Conference or Workshop Item (A Paper)
Samhi, Jordan and Bissyandé, Tegawendé F. and Klein, Jacques
(2024)
AndroLibZoo: A Reliable Dataset of Libraries Based on Software Dependency Analysis.
(In Press)
Alecci, Marco and Samhi, Jordan and Bissyandé, Tegawendé F. and Jacques, Klein
(2024)
Revisiting Android App Categorization.
(In Press)
Bytes, Andrei and Rajput, Prashant Hari Narayan and Doumanidis, Constantine and Tippenhauer, Nils Ole and Maniatakos, Michail and Zhou, Jianying
(2023)
FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network.
Mammadov, Tural
(2023)
Learning Program Models from Generated Inputs.
Walita, Tim and Erba, Alessandro and Castellanos, John H. and Tippenhauer, Nils Ole
(2023)
Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks.
Ding, Aolin and Chan, Matthew and Hassanzadeh, Amin and Tippenhauer, Nils Ole and Ma, Shiqing and Zonouz, Saman
(2023)
Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Vehicle.
Motallebighomi, Maryam and Sathaye, Harshad and Singh, Mridula and Ranganathan, Aanjhan
(2023)
Location-independent GNSS Relay Attacks: A Lazy Attacker’s
Guide to Bypassing Navigation Message Authentication.
Smytzek, Marius
(2023)
From Input to Failure: Explaining Program Behavior via Cause-Effect Chains.
(In Press)
Eberlein, Martin and Smytzek, Marius and Steinhöfel, Dominic and Grunske, Lars and Zeller, Andreas
(2023)
Semantic Debugging.
(In Press)
Eberlein, Martin and Smytzek, Marius and Steinhöfel, Dominic and Grunske, Lars and Zeller, Andreas
(2023)
Semantic Debugging.
(In Press)
Roeschlin, Marc and Camurati, Giovanni and Brunner, Pascal and Mridula, Singh and Srdjan, Capkun
(2023)
EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems.
Schiller, Nico and Chlosta, Merlin and Schloegel, Moritz and Bars, Nils and Eisenhofer, Thorsten and Scharnowski, Tobias and Domke, Felix and Schönherr, Lea and Holz, Thorsten
(2023)
Drone Security and the Mysterious Case of DJI's DroneID.
Gegenhuber, Gabriel Karl and Mayer, Wilfried and Weippl, Edgar and Dabrowski, Adrian
(2023)
MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research.
(In Press)
Chakraborty, Dhiman and Schwarz, Michael and Bugiel, Sven
(2023)
TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors.
Erba, Alessandro and Tippenhauer, Nils Ole
(2022)
Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks.
Schwarz, Fabian and Do, Khue and Heide, Gunnar and Hanzlik, Lucjan and Rossow, Christian
(2022)
FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs.
(In Press)
Gupta, Abhilash and Gopinath, Rahul and Zeller, Andreas
(2022)
CLIFuzzer: Mining Grammars for Command-Line Invocations.
Hamid Reza, Ghaeini and Nils Ole, Tippenhauer
(2022)
Smooth Transition of Vehicles' Maximum Speed for Lane Detection based on Computer Vision.
(In Press)
Smytzek, Marius and Zeller, Andreas
(2022)
SFLKit: A Workbench for Statistical Fault Localization.
(In Press)
Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper and Payer, Mathias
(2022)
Blurtooth: Exploiting cross-transport key derivation in Bluetooth classic and Bluetooth low energy.
Singh, Mridula and Roeschlin, Marc and Ranganathan, Aanjhan and Capkun, Srdjan
(2022)
V-Range: Enabling Secure Ranging in 5G Wireless Networks.
(In Press)
Huang, Jie and Backes, Michael and Bugiel, Sven
(2021)
A11y and Privacy don’t have to be mutually exclusive: Constraining Accessibility Service Misuse on Android.
(In Press)
Kuznetsov, Konstantin and Fu, Chen and Gao, Song and Jansen, David N. and Zhang, Lijun and Zeller, Andreas
(2021)
Frontmatter: Mining Android User Interfaces at Scale.
Oltrogge, Marten and Huaman, Nicolas and Amft, Sabrina and Acar, Yasemin and Backes, Michael and Fahl, Sascha
(2021)
Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications.
(In Press)
Bhattacharyya, Apratim and Reino, Daniel Olmeda and Fritz, Mario and Schiele, Bernt
(2021)
Euro-PVI: Pedestrian Vehicle Interactions in Dense Urban Centers.
Gopinath, Rahul and Nemati, Hamed and Zeller, Andreas
(2021)
Input Algebras.
Wang, Jiawei and Li, Li and Zeller, Andreas
(2021)
Restoring Execution Environments of Jupyter Notebooks.
Dawoud, Abdallah and Bugiel, Sven
(2021)
Bringing Balance to the Force: Dynamic Analysis of the Android Application Framework.
Nguyen, Duc Cuong and Derr, Erik and Backes, Michael and Bugiel, Sven
(2020)
Up2Dep: Android Tool Support to Fix Insecure Code Dependencies.
Schlüter, Till and Lemke-Rust, Kerstin
(2020)
Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers.
Gopinath, Rahul and Mathis, Björn and Zeller, Andreas
(2020)
Mining Input Grammars from Dynamic Control Flow.
Kirschner, Lukas and Soremekun, Ezekiel and Zeller, Andreas
(2020)
Debugging Inputs.
Chen, Yiqun T and Gopinath, Rahul and Tadakamalla, Anita and Ernst, Michael D and Holmes, Reid and Fraser, Gordon and Ammann, Paul and Just, Rene
(2020)
Revisiting the Relationship Between Fault Detection,Test Adequacy Criteria, and Test Set Size.
Mathis, Björn and Gopinath, Rahul and Zeller, Andreas
(2020)
Learning Input Tokens for Effective Fuzzing.
(In Press)
Kampmann, Alexander and Havrikov, Nikolas and Soremekun, Ezekiel and Zeller, Andreas
(2020)
When does my Program do this? Learning Circumstances of Software Behavior.
(In Press)
Gopinath, Rahul and Kampmann, Alexander and Havrikov, Nikolas and Soremekun, Ezekiel and Zeller, Andreas
(2020)
Abstracting Failure-Inducing Inputs.
Calciati, Paolo and Kuznetsov, Konstantin and Gorla, Alessandra and Zeller, Andreas
(2020)
Automatically Granted Permissions in Android apps: An Empirical Study on their Prevalence and on the Potential Threats for Privacy.
Wang, Jiawei and Li, Li and Zeller, Andreas
(2020)
Better Code, Better Sharing: On the Need of Analyzing Jupyter Notebooks.
Wanwarang, Tanapuch and Pereira Borges Jr., Nataniel and Bettscheider, Leon and Zeller, Andreas
(2020)
Testing Apps With Real-World Inputs.
(In Press)
Benz, Manuel and Kristensen, Erik Krogh and Luo, Linghui and Pereira Borges Jr., Nataniel and Bodden, Eric and Zeller, Andreas
(2020)
Heaps’n’Leaks: How Heap Snapshots Improve Android Taint Analysis.
Chakraborty, Dhiman and Bugiel, Sven
(2019)
Poster: simFIDO – FIDO2 User Authentication with simTPM.
Havrikov, Nikolas and Zeller, Andreas
(2019)
Systematically Covering Input Structure.
Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne
(2019)
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR.
Naseri, Mohammad and Pereira Borges Jr., Nataniel and Zeller, Andreas and Rouvoy, Romain
(2019)
AccessiLeaks: Investigating Privacy Leaks Exposed by the Android Accessibility Service.
Degott, Christian and Pereira Borges Jr., Nataniel and Zeller, Andreas
(2019)
Learning User Interface Element Interactions.
Mathis, Björn and Gopinath, Rahul and Mera, Michaël and Kampmann, Alexander and Höschele, Matthias and Zeller, Andreas
(2019)
Parser-Directed Fuzzing.
(In Press)
Chakraborty, Dhiman and Hanzlik, Lucjan and Bugiel, Sven
(2019)
simTPM: User-centric TPM for Mobile Devices.
Kampmann, Alexander and Zeller, Andreas
(2019)
Carving Parameterized Unit Tests.
Chakraborty, Dhiman and Hammer, Christian and Bugiel, Sven
(2019)
Secure Multi-Execution in Android.
Pereira Borges Jr., Nataniel and Zeller, Andreas
(2019)
Why does this App need this Data? Automatic Tightening of Resource Access.
Dawoud, Abdallah and Bugiel, Sven
(2019)
DroidCap: OS Support for Capability-based Permissions in Android.
Chakraborty, Dhiman and Bugiel, Sven and Jha, Atul Ananad
(2019)
Poster: TGX: Secure SGX enclave management
using TPM.
Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper
(2019)
Nearby Threats: Reversing, Analyzing, and Attacking Google’s 'Nearby Connections' on Android.
Christi, Arpit and Groce, Alex and Gopinath, Rahul
(2019)
Evaluating Fault Localization for Resource Adaptation via Test-Based Software Modification.
Huang, Jie and Pereira Borges Jr., Nataniel and Bugiel, Sven and Backes, Michael
(2019)
Up-To-Crash: Evaluating Third-Party Library Updatability on Android.
Zhao, Fanghua and Gao, Linan and Zhang, Yang and Wang, Zeyu and Wang, Bo and Guo, Shanqing
(2018)
You Are Where You APP: An Assessment on Location Privacy of Social APPs.
Borges, Nataniel P. and Hotzkow, Jenny and Zeller, Andreas
(2018)
DroidMate-2: A Platform for Android Test Generation.
Wang, Xueou and Hou, Xiaolu and Rios, Ruben and Hallgren, Per and Tippenhauer, Nils Ole and Ochoa, Martín
(2018)
Location Proximity Attacks against Mobile Targets: Analytical Bounds and Attacker Strategies.
Rau, Andreas and Hotzkow, Jenny and Zeller, Andreas
(2018)
Efficient GUI Test Generation by Learning from Tests of Other Apps.
Pereira Borges Jr., Nataniel and Gómez, Maria and Zeller, Andreas
(2018)
Guiding app testing with mined interaction models.
Kuznetsov, Konstantin and Avdiienko, Vitalii and Gorla, Alessandra and Zeller, Andreas
(2018)
Analyzing the User Interface of Android Apps.
Fakhreddine, Aymen and Tippenhauer, Nils Ole and Giustiniano, Domenico
(2018)
Design and Large-Scale Evaluation of WiFi Proximity Metrics.
Gopinath, Rahul and Mathis, Björn and Zeller, Andreas
(2018)
If You Can't Kill a Supermutant, You Have a Problem.
Ghaeini, Hamid Reza and Antonioli, Daniele and Brasser, Ferdinand and Sadeghi, Ahmad-Reza and Tippenhauer, Nils Ole
(2018)
State-Aware Anomaly Detection for Industrial Control Systems.
Mathis, Björn and Avdiienko, Vitalii and Soremekun, Ezekiel and Böhme, Marcel and Zeller, Andreas
(2018)
Detecting Information Flow by Mutating Input data.
Hotzkow, Jenny
(2017)
Automatically Inferring and Enforcing User Expectations.
Pereira Borges Jr., Nataniel
(2017)
Data flow oriented UI testing: exploiting data flows and UI elements to test Android applications.
Fischer, Felix and Böttinger, Konstantin and Xiao, Huang and Stransky, Christian and Acar, Yasemin and Backes, Michael and Fahl, Sascha
(2017)
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security.
Avdiienko, Vitalii and Kuznetsov, Konstantin and Rommelfanger, Isabelle and Rau, Andreas and Gorla, Alessandra and Zeller, Andreas
(2017)
Detecting behavior anomalies in graphical user interfaces.
Backes, Michael and Bugiel, Sven and Schranz, Oliver and Styp-Rekowsky, Philipp von and Weisgerber, Sebastian
(2017)
ARTist: The Android Runtime Instrumentation and Security Toolkit.
Backes, Michael and Nauman, Mohammad
(2017)
LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning.
Huang, Jie and Schranz, Oliver and Bugiel, Sven and Backes, Michael
(2017)
The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android.
Mathis, Björn and Avdiienko, Vitalii and Soremekun, Ezekiel and Böhme, Marcel and Zeller, Andreas
(2017)
Detecting Information Flow by Mutating Input Data.
Mathis, Björn
(2017)
Dynamic Tainting for Automatic Test Case Generation.
Havrikov, Nikolas and Gambi, Alessio and Zeller, Andreas and Arcuri, Andrea and Galeotti, Juan Pablo
(2017)
Generating Unit Tests with Structured System Interactions.
Jamrozik, Konrad and Zeller, Andreas
(2017)
Mining Sandboxes for Security - Automatisches Sandboxing für Software-Sicherheit.
Chattopadhyay, Sudipta and Beck, Moritz and Rezine, Ahmed and Zeller, Andreas
(2017)
Quantifying the information leak in cache attacks via symbolic execution.
Backes, Michael and Bugiel, Sven and von Styp-Rekowsky, Philipp and Wißfeld, Marvin
(2017)
Seamless In-App Ad Blocking on Stock Android.
Zeller, Andreas
(2017)
Search-Based Testing and System Testing: A Marriage in Heaven.
Nguyen, Duc Cuong and Wermke, Dominik and Acar, Yasemin and Backes, Michael and Weir, Charles Alexander Forbes and Fahl, Sascha
(2017)
A Stitch in Time: Supporting Android Developers in Writing Secure Code.
Backes, Michael and Bugiel, Sven and Derr, Erik
(2016)
Reliable Third-Party Library Detection in Android and its Security Applications.
Backes, Michael and Bugiel, Sven and Derr, Erik and McDaniel, Patrick and Octeau, Damien and Weisgerber, Sebastian
(2016)
On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis.
Bhattacharjee, Bobby and Druschel, Peter and Herbster, Raul and DellaTorre, Scott
(2016)
Privacy Capsules: Preventing Information Leaks by Mobile Apps.
Backes, Michael and Bugiel, Sven and Derr, Erik and Gerling, Sebastian and Hammer, Christian
(2016)
R-Droid: Leveraging Android App Analysis with Static Slice Optimization.
Acar, Yasemin and Backes, Michael and Bugiel, Sven and Fahl, Sascha and McDaniel, Patrick and Smith, Matthew
(2016)
SoK: Lessons Learned From Android Security Research For Appified Software Platforms.
Zeller, Andreas and Jamrozik, Konrad
(2016)
DroidMate: a robust and extensible test generator for Android.
Backes, Michael and Bugiel, Sven and Huang, Jie and Schranz, Oliver
(2016)
POSTER: The ART of App Compartmentalization.
Avdiienko, Vitalii and Kuznetsov, Konstantin and Gorla, Alessandra and Zeller, Andreas and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric
(2016)
Abnormal Sensitive Data Usage in Android Apps.
Avdiienko, Vitalii and Kuznetsov, Konstantin and Calciati, Paolo and Caiza Rom\'an, Juan Carlos and Gorla, Alessandra and Zeller, Andreas
(2016)
CALAPPA: A Toolchain for Mining Android Applications.
Zeller, Andreas and Weyrich, Michael
(2016)
Challenges for functional testing of reconfigurable production systems.
Kuznetsov, Konstantin and Avdiienko, Vitalii and Gorla, Alessandra and Zeller, Andreas
(2016)
Checking App User Interfaces Against App Descriptions.
Höschele, Matthias and Zeller, Andreas
(2016)
Mining input grammars from dynamic taints.
Backes, Michael and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2015)
POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART).
Backes, Michael and Bugiel, Sven and Hammer, Christian and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2015)
Boxify: Full-fledged App Sandboxing for Stock Android.
Oltrogge, Marten and Acar, Yasemin and Dechand, Sergej and Smith, Matthew and Fahl, Sascha
(2015)
To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections.
Avdiienko, Vitalii and Kuznetsov, Konstantin and Gorla, Alessandra and Zeller, Andreas and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric
(2015)
Mining Apps for Abnormal Usage of Sensitive Data.
Avdiienko, Vitalii and Kuznetsov, Konstantin and Gorla, Alessandra and Zeller, Andreas and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric
(2015)
Mining apps for abnormal usage of sensitive data.
Zeller, Andreas and Weyrich, Michael
(2015)
Test case selection for networked production systems.
Backes, Michael and Bugiel, Sven and Gerling, Sebastian and Styp-Rekowsky, Philipp von
(2014)
Android Security Framework: Extensible Multi-Layered Access Control on Android.
Backes, Michael and Bugiel, Sven and Gerling, Sebastian
(2014)
Scippa: System-Centric IPC Provenance on Android.
Lentz, Matthew and Erdelyi, Viktor and Aditya, Paarijaat and Shi, Elaine and Druschel, Peter and Bhattacharjee, Bobby
(2014)
SDDR: Light-Weight, Secure Mobile Encounters.
Aditya, Paarijaat and Bhattacharjee, Bobby and Druschel, Peter and Erdelyi, Viktor and Lentz, Matthew
(2014)
Brave new world: privacy risks for mobile users.
Gorla, Alessandra and Tavecchia, Ilaria and Gross, Florian and Zeller, Andreas
(2014)
Checking App Behavior Against App Descriptions.
Aditya, Paarijaat and Erdelyi, Viktor and Lentz, Matthew and Shi, Elaine and Bhattacharjee, Bobby and Druschel, Peter
(2014)
EnCore: Private, Context-based Communication for Mobile Social Apps.
Galeotti, Juan Pablo and Furia, Carlo A. and May, Eva and Fraser, Gordon and Zeller, Andreas
(2014)
DynaMate: Dynamically Inferring Loop Invariants for Automatic Full Functional Verification.
Backes, Michael and Gagné, Martin and Skoruppa, Malte
(2013)
Using Mobile Device Communication to Strengthen e-Voting Protocols.
Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013)
AppGuard – Fine-grained Policy Enforcement for Untrusted Android Applications.
Tippenhauer, Nils Ole and Malisa, Luka and Ranganathan, Aanjhan and Capkun, Srdjan
(2013)
On Limitations of Friendly Jamming for Confidentiality.
Kahl, Gerrit and Paradowski, Denise
(2013)
A Privacy-aware Shopping Scenario.
Bugiel, Sven and Derr, Erik and Gerling, Sebastian and Hammer, Christian
(2013)
Advances in Mobile Security.
Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza
(2013)
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
Styp-Rekowsky, Philipp von and Gerling, Sebastian and Backes, Michael and Hammer, Christian
(2013)
Idea: Callee-Site Rewriting of Sealed System Libraries.
Hartmanns, Arnd and Hermanns, Holger and Berrang, Pascal
(2012)
A comparative analysis of decentralized power grid stabilization strategies.
Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2012)
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza and Shastry, Bhargava
(2012)
Towards Taming Privilege-Escalation Attacks on Android.
Fahl, Sascha and Harbach, Marian and Muders, Thomas and Baumgärtner, Lars and Freisleben, Bernd and Smith, Matthew
(2012)
Why Eve and Mallory Love Android: An Analysis of Android SSL (in)Security.
Bugiel, Sven and Pöppelmann, Thomas and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas
(2011)
AmazonIA: When Elasticity Snaps Back.
Tippenhauer, Nils Ole and Pöpper, Christina and Rasmussen, Kasper Bonne and \vCapkun, Srdjan
(2011)
On the Requirements for Successful GPS Spoofing Attacks.
Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2011)
Poster: Control-flow Integrity for Smartphones.
Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Heuser, Stephan and Sadeghi, Ahmad-Reza and Shastry, Bhargava
(2011)
Practical and Lightweight Domain Isolation on Android.
Bugiel, Sven and Davi, Lucas and Schulz, Steffen
(2011)
Scalable Trust Establishment with Software Reputation.
Schuler, David and Zeller, Andreas
(2011)
Assessing Oracle Quality with Checked Coverage.
Mileva, Yana Momchilova and Zeller, Andreas
(2011)
Assessing modularity via usage changes.
Schwarz, Birgit and Schuler, David and Zeller, Andreas
(2011)
Breeding High-Impact Mutations.
Nam, Jaechang and Schuler, David and Zeller, Andreas
(2011)
Calibrated Mutation Testing.
Fraser, Gordon and Zeller, Andreas
(2011)
Exploiting Common Object Usage in Test Case Generation.
Fraser, Gordon and Zeller, Andreas
(2011)
Generating parameterized unit tests.
Burger, Martin and Zeller, Andreas
(2011)
Minimizing reproduction of software failures.
Herzig, Kim and Zeller, Andreas
(2011)
Mining Cause-Effect-Chains from Version Histories.
Mileva, Yana Momchilova and Wasylkowski, Andrzej and Zeller, Andreas
(2011)
Mining Evolution of Object Usage.
Rößler, Jeremias and Orso, Alessandro and Zeller, Andreas
(2011)
When Does My Program Fail?
Article
Wang, Xueou and Hou, Xiaolu and Rios, Ruben and Tippenhauer, Nils Ole and Ochoa, Martín
(2022)
Constrained Proximity Attacks on Mobile Targets.
ACM Trans. Priv. Secur., 25 (2).
Soremekun, Ezekiel and Kirschner, Lukas and Böhme, Marcel and Zeller, Andreas
(2021)
Locating Faults with Program Slicing: An Empirical Analysis.
Empirical Software Engineering, 26.
Grochowksi, Marco and Simon, Hendrik and Bohlender, Dimitri and Kowalewski, Stefan and Löcklin, Andreas and Müller, Timo and Jazdi, Nasser and Zeller, Andreas and Weyrich, Michael
(2020)
Formale Methoden für rekonfigurierbare cyber-physische Systeme in der Produktion.
Automatisierungstechnik, 68 (1).
ISSN 0178-2312
Chakraborty, Dhiman and Hanzlik, Lucjan and Bugiel, Sven
(2019)
simTPM: User-centric TPM for Mobile Devices (Technical Report).
arxiv.org.
Malinowski, Mateusz and Rohrbach, Marcus and Fritz, Mario
(2017)
Ask Your Neurons: A Deep Learning Approach to Visual Question Answering.
International Journal of Computer Vision, 125 (1-3).
pp. 110-135.
Backes, Michael and Bugiel, Sven and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2016)
Boxify: Bringing Full-Fledged App Sandboxing to Stock Android.
USENIX ;login:, 41 (2).
pp. 16-21.
Nürnberger, Stefan and Bugiel, Sven
(2016)
Autonome Systeme.
Datenschutz und Datensicherheit, 40 (8).
pp. 503-506.
Blackburn, Stephen M. and Diwan, Amer and Hauswirth, Matthias and Sweeney, Peter F. and Amaral, José Nelson and Brecht, Tim and Bulej, Lubomír and Click, Cliff and Eeckhout, Lieven and Fischmeister, Sebastian and Frampton, Daniel and Hendren, Laurie J. and Hind, Michael and Hosking, Antony L. and Jones, Richard E. and Kalibera, Tomas and Keynes, Nathan and Nystrom, Nathaniel and Zeller, Andreas
(2016)
The Truth, The Whole Truth, and Nothing But the Truth: A Pragmatic Guide to Assessing Empirical Evaluations.
ACM Trans. Program. Lang. Syst., 38 (4).
15:1–15:20.
Galeotti, Juan Pablo and Furia, Carlo A. and May, Eva and Fraser, Gordon and Zeller, Andreas
(2015)
Inferring Loop Invariants by Mutation, Dynamic Analysis, and Static Checking.
IEEE Transactions of Software Engineering, 41 (10).
1019–1037.
Schur, Matthias and Roth, Andreas and Zeller, Andreas
(2015)
Mining Workflow Models from Web Applications.
IEEE Trans. Software Eng., 41 (12).
1184–1201.
Galeotti, Juan P. and Furia, Carlo A. and May, Eva and Fraser, Gordon and Zeller, Andreas
(2014)
Automating Full Functional Verification of Programs with Loops.
CoRR - Computing Research Repository, abs/14.
Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2011)
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
International Workshop on Trustworthy Embedded Devices (TrustED).
Backes, Michael and Gerling, Sebastian and Styp-Rekowsky, Philipp von
(2011)
A Local Cross-Site Scripting Attack against Android Phones.
Wasylkowski, Andrzej and Zeller, Andreas
(2011)
Mining temporal specifications from object usage.
Autom. Softw. Eng., 18 (3-4).
263–292.
Thesis
Dawoud, Abdallah
(2018)
OS Support For Capabilities In Android.
Masters thesis, Saarland University.
Endner-Dühr, Frederic
(2016)
Extracting and Modeling Typosquatting Errors from Large-scale Passive DNS Data.
Masters thesis, UNSPECIFIED.
Lipp, Nils Peter
(2016)
Full Reference Monitoring for Android Intents.
Bachelors thesis, UNSPECIFIED.
Steffensky, Joshua
(2016)
Hardening Intel SGX enclaves against memory safety exploits.
Bachelors thesis, UNSPECIFIED.
Hagestedt, Inken
(2016)
Static Analysis of Non-interference for Android Apps.
Masters thesis, UNSPECIFIED.
Bushart, Jonas
(2016)
Time-to-Live based Trilateration.
Bachelors thesis, UNSPECIFIED.
Dietel, Sebastian
(2016)
Towards Native Client Executables via Binary Translation on the x86 Platform.
Bachelors thesis, UNSPECIFIED.
Bugiel, Sven
(2016)
Establishing mandatory access control on Android OS.
Doctoral thesis, UNSPECIFIED.
Schranz, Oliver
(2015)
Towards Compiler-Assisted Taint Tracking on the Android Runtime.
Masters thesis, Saarland University.
Fatz, Filip
(2015)
Toward a Backward-compatible API for Defining Fine-grained App Policies on Android.
Bachelors thesis, Saarland University.
Frassinelli, Daniel
(2015)
Security Analysis of Telematic and Emergency Devices in a Modern Car.
Masters thesis, Saarland University.
Schwarz, Fabian Frank
(2015)
Security Analysis of Mobile Banking Apps.
Bachelors thesis, Saarland University.
Wißfeld, Marvin
(2015)
ArtHook: Callee-side Method Hook Injection on the New Android Runtime ART.
Bachelors thesis, Saarland University.
Grishchenko, Ilya
(2014)
Static Analysis of Android Applications.
Masters thesis, Saarland University.
Endner-Dühr, Frederic
(2014)
Application-level Firewall in Stock Android.
Bachelors thesis, Saarland University.
Schweig, Marc
(2014)
Developing a RiskScore for Android Applications.
Bachelors thesis, Saarland University.
Brachmann, Niklas
(2014)
Evaluating the Effectiveness of In-app DRM Systems for Android.
Bachelors thesis, Saarland University.
Perlov, Artem
(2014)
Identifying the Optimal Permission Set of Android Applications.
Bachelors thesis, Saarland University.
Frey, Tobias
(2014)
System Centric IPC Call Chains for Android.
Bachelors thesis, Saarland University.
Derr, Erik
(2014)
Verifying the Internet Access of Android Applications.
Masters thesis, Saarland University.
Teris, Liviu
(2012)
Securing User-data in Android - A conceptual approach for consumer and enterprise usage.
Masters thesis, Saarland University.
Obser, Sven
(2012)
User-controlled Internet Connections in Android.
Masters thesis, Saarland University.
Book Section
Avdiienko, Vitalii and Kuznetsov, Konstantin and Gorla, Alessandra and Zeller, Andreas and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric
(2017)
App Mining.
In:
Lecture Notes in Informatics (LNI) - Proceedings.
LNI, P-267
.
GI.
Zeller, Andreas
(2016)
Mining Apps for Anomalies.
In:
SoftwareMining.
Perspectives on Data Science for Software Engineering.
ISBN 9780128042069
Kuznetsov, Konstantin and Gorla, Alessandra and Tavecchia, Ilaria and Groß, Florian and Zeller, Andreas
(2015)
Mining Android Apps for Anomalies.
In:
Perspectives on Data Science for Software Engineering.
The Art and Science of Analyzing Software Data.
ISBN 9780124115194
Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013)
AppGuard - Enforcing User Requirements on Android Apps.
In:
Tools and Algorithms for the Construction and Analysis of Systems.
Springer, pp. 545-550.
Styp-Rekowsky, Philipp von and Gerling, Sebastian and Backes, Michael and Hammer, Christian
(2013)
Callee-site Rewriting of Sealed System Libraries.
In:
Engineering Secure Software and Systems.
Springer, pp. 33-41.
Asghar, Muhammad Rizwan and Miorandi, Daniele
(2013)
A Holistic View of Security and Privacy Issues in Smart Grids.
In:
UNSPECIFIED
Lecture Notes in Computer Science, 7823
.
Springer Berlin Heidelberg, pp. 58-71.
ISBN 978-3-642-38029-7
Book
Hof, Hans-Joachim and Fritz, Mario and Krauss, Christoph and Wasenmüller, Oliver
(2019)
ACM Computer Science in Cars Symposium.
Association for Computing Machinery, Kaiserslautern, Germany.
ISBN 978-1-4503-7004-2
Zeller, Andreas and Gopinath, Rahul and Böhme, Marcel and Fraser, Gordon and Holler, Christian
(2019)
The Fuzzing Book.
CISPA + Saarland University, Saarbrücken.
ISBN n/a
Monograph
Schwarz, Fabian and Do, Khue and Heide, Gunnar and Hanzlik, Lucjan and Rossow, Christian
(2023)
FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs (Extended Version).
Technical Report.
UNSPECIFIED.
Oh, Seong Joon and Augustin, Max and Schiele, Bernt and Fritz, Mario
(2017)
Whitening Black-Box Neural Networks.
Technical Report.
arXiv.
Backes, Michael and Bugiel, Sven and Derr, Erik and Hammer, Christian
(2014)
Taking Android App Vetting to the Next Level with Path-sensitive Value Analysis.
Technical Report.
UNSPECIFIED.
(Unpublished)
Other
Backes, Michael and Müller-Quade, Jörn and Unruh, Dominique
(2006)
On the Necessity of Rewinding in Secure Multiparty Computation.
This list was generated on Thu Nov 21 09:43:08 2024 CET.