Matthias Neugschwandtner
Matthias Neugschwandtner
Oracle Labs
Bestätigte E-Mail-Adresse bei oracle.com
TitelZitiert vonJahr
Andrubis--1,000,000 apps later: A view on current Android malware behaviors
M Lindorfer, M Neugschwandtner, L Weichselbaum, Y Fratantonio, ...
Building Analysis Datasets and Gathering Experience Returns for Security …, 2014
2172014
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations.
I Haller, A Slowinska, M Neugschwandtner, H Bos
USENIX Security Symposium, 49-64, 2013
161*2013
MARVIN: Efficient and Comprehensive Mobile App Classification Through Static and Dynamic Analysis
M Lindorfer, M Neugschwandtner, C Platzer
Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th …, 2015
1032015
Andrubis: Android malware under the magnifying glass
L Weichselbaum, M Neugschwandtner, M Lindorfer, Y Fratantonio, ...
Vienna University of Technology, Tech. Rep. TR-ISECLAB-0414-001, 2014
802014
A static, packer-agnostic filter to detect similar malware samples
G Jacob, PM Comparetti, M Neugschwandtner, C Kruegel, G Vigna
International Conference on Detection of Intrusions and Malware, and …, 2012
692012
Web services in building automation: Mapping KNX to oBIX
M Neugschwandtner, G Neugschwandtner, W Kastner
Industrial Informatics, 2007 5th IEEE International Conference on 1, 87-92, 2007
592007
AndRadar: fast discovery of android applications in alternative markets
M Lindorfer, S Volanis, A Sisto, M Neugschwandtner, E Athanasopoulos, ...
International Conference on Detection of Intrusions and Malware, and …, 2014
542014
A view to a kill: WebView exploitation
M Neugschwandtner, M Lindorfer, C Platzer
Presented as part of the 6th USENIX Workshop on Large-Scale Exploits and …, 2013
352013
Forecast: skimming off the malware cream
M Neugschwandtner, PM Comparetti, G Jacob, C Kruegel
Proceedings of the 27th Annual Computer Security Applications Conference, 11-20, 2011
352011
The BORG: Nanoprobing Binaries for Buffer Overreads
M Neugschwandtner, P Milani Comparetti, I Haller, H Bos
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
332015
Detecting malware's failover C&C strategies with squeeze
M Neugschwandtner, PM Comparetti, C Platzer
Proceedings of the 27th Annual Computer Security Applications Conference, 21-30, 2011
292011
Danubis–dynamic device driver analysis based on virtual machine introspection
M Neugschwandtner, C Platzer, PM Comparetti, U Bayer
International Conference on Detection of Intrusions and Malware, and …, 2010
202010
Dowser: a guided fuzzer to find buffer overflow vulnerabilities
I Haller, A Slowinska, H Bos
Proceedings of the European Workshop on System Security (Eurosec), 2013
122013
SMoTherSpectre: exploiting speculative execution through port contention
A Bhattacharyya, A Sandulescu, M Neugschwandtner, A Sorniotti, ...
arXiv preprint arXiv:1903.01843, 2019
102019
From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks
A Kurmus, N Ioannou, M Neugschwandtner, N Papandreou, T Parnell
11th USENIX Workshop on Offensive Technologies, 2017
102017
A transparent defense against USB eavesdropping attacks
M Neugschwandtner, A Beitler, A Kurmus
Proceedings of the 9th European Workshop on System Security, 6, 2016
82016
Lobotomy: An Architecture for JIT Spraying Mitigation
M Jauernig, M Neugschwandtner, C Platzer, PM Comparetti
Availability, Reliability and Security (ARES), 2014 Ninth International …, 2014
72014
Breaking Payloads with Runtime Code Stripping and Image Freezing
C Mulliner, M Neugschwandtner
Black Hat USA, 2015
42015
Reconciling Security and Functional Requirements in Multi-tenant Clouds
G Karame, M Neugschwandtner, M Önen, H Ritzdorf
Proceedings of the Fifth ACM International Workshop on Security in Cloud …, 2017
32017
Take a bite-Finding the worm in the Apple
M Lindorfer, B Miller, M Neugschwandtner, C Platzer
2013 9th International Conference on Information, Communications & Signal …, 2013
22013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20