Georg Merzdovnik
Georg Merzdovnik
Verified email at sba-research.org
TitleCited byYear
Protecting software through obfuscation: Can it keep pace with progress in code analysis?
S Schrittwieser, S Katzenbeisser, J Kinder, G Merzdovnik, E Weippl
ACM Computing Surveys (CSUR) 49 (1), 4, 2016
692016
Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools
G Merzdovnik, M Huber, D Buhov, N Nikiforakis, S Neuner, ...
IEEE European Symposium on Security and Privacy (EuroS&P), 2017
672017
Enter sandbox: Android sandbox comparison
S Neuner, V Van der Veen, M Lindorfer, M Huber, G Merzdovnik, ...
arXiv preprint arXiv:1410.7749, 2014
482014
Browser history stealing with captive Wi-Fi portals
A Dabrowski, G Merzdovnik, N Kommenda, E Weippl
2016 IEEE Security and Privacy Workshops (SPW), 234-240, 2016
132016
Network security challenges in Android applications
D Buhov, M Huber, G Merzdovnik, E Weippl, V Dimitrova
2015 10th International Conference on Availability, Reliability and Security …, 2015
122015
AES-SEC: Improving software obfuscation through hardware-assistance
S Schrittwieser, S Katzenbeisser, G Merzdovnik, P Kieseberg, E Weippl
2014 Ninth International Conference on Availability, Reliability and …, 2014
52014
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services
G Merzdovnik, K Falb, M Schmiedecker, AG Voyiatzis, E Weippl
Data and Applications Security and Privacy XXX, 331, 0
5*
Measuring Cookies and Web Privacy in a Post-GDPR World
A Dabrowski, G Merzdovnik, J Ullrich, G Sendera, E Weippl
International Conference on Passive and Active Network Measurement, 258-270, 2019
42019
Pin it! Improving Android network security at runtime
D Buhov, M Huber, G Merzdovnik, E Weippl
2016 IFIP Networking Conference (IFIP Networking) and Workshops, 297-305, 2016
42016
Lightweight address hopping for defending the IPv6 IoT
A Judmayer, J Ullrich, G Merzdovnik, AG Voyiatzis, E Weippl
Proceedings of the 12th International Conference on Availability …, 2017
22017
Notary-Assisted Certificate Pinning for Improved Security of Android Apps
G Merzdovnik, D Buhov, AG Voyiatzis, ER Weippl
2016 11th International Conference on Availability, Reliability and Security …, 2016
22016
Towards practical methods to protect the privacy of location information with mobile devices
C Hochreiner, M Huber, G Merzdovnik, E Weippl
Proceedings of the 7th international conference on security of information …, 2014
22014
A Performance Assessment of Network Address Shuffling in IoT Systems
A Judmayer, G Merzdovnik, J Ullrich, AG Voyiatzis, E Weippl
International Conference on Computer Aided Systems Theory, 197-204, 2017
12017
From Hack to Elaborate Technique—A Survey on Binary Rewriting
M Wenzl, G Merzdovnik, J Ullrich, E Weippl
ACM Computing Surveys (CSUR) 52 (3), 49, 2019
2019
u'smile-Secure Mobile Environments
G Merzdovnik, D Buhov, AG Voyiatzis, E Weippl
ERCIM NEWS, 53-54, 2017
2017
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services
AG Voyiatzis, E Weippl
Data and Applications Security and Privacy XXX: 30th Annual IFIP WG 11.3 …, 2016
2016
Plugin in the Middle-Minimising Security Risks in Mobile Middleware Implementations
P Aufner, G Merzdovnik, M Huber, E Weippl
Proceedings of the 7th International Conference on Security of Information …, 2014
2014
A performance assessment of network address shuffling in IoT systems
G Merzdovnik, A Judmayer, AG Voyiatzis, E Weippl
EUROCAST, 138, 0
The system can't perform the operation now. Try again later.
Articles 1–18