Follow
Manuel Leithner
Manuel Leithner
Information Security Researcher, SBA Research
Verified email at sba-research.org - Homepage
Title
Cited by
Cited by
Year
Dark clouds on the horizon: Using cloud storage as attack vector and online slack space
M Mulazzani, S Schrittwieser, M Leithner, M Huber, E Weippl
20th USENIX Security Symposium (USENIX Security 11), 2011
2932011
QR code security
P Kieseberg, M Leithner, M Mulazzani, L Munroe, S Schrittwieser, ...
Proceedings of the 8th International Conference on Advances in Mobile …, 2010
2712010
Fast and reliable browser identification with javascript engine fingerprinting
M Mulazzani, P Reschl, M Huber, M Leithner, S Schrittwieser, E Weippl, ...
Web 2.0 Workshop on Security and Privacy (W2SP) 5, 4, 2013
1552013
Guess who is texting you? evaluating the security of smartphone messaging applications
S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ...
1552012
Social snapshots: Digital forensics for online social networks
M Huber, M Mulazzani, M Leithner, S Schrittwieser, G Wondracek, ...
Proceedings of the 27th annual computer security applications conference …, 2011
1242011
Malicious pixels using qr codes as attack vector
P Kieseberg, S Schrittwieser, M Leithner, M Mulazzani, E Weippl, ...
Trustworthy ubiquitous computing, 21-38, 2012
342012
Automated combinatorial testing for detecting SQL vulnerabilities in web applications
DE Simos, J Zivanovic, M Leithner
2019 IEEE/ACM 14th International Workshop on Automation of Software Test …, 2019
272019
Testing TLS using planning-based combinatorial methods and execution framework
DE Simos, J Bozic, B Garn, M Leithner, F Duan, K Kleine, Y Lei, F Wotawa
Software quality journal 27, 703-729, 2019
222019
Covert computation: Hiding code in code for obfuscation purposes
S Schrittwieser, S Katzenbeisser, P Kieseberg, M Huber, M Leithner, ...
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
192013
Covert Computation—Hiding code in code through compile-time obfuscation
S Schrittwieser, S Katzenbeisser, P Kieseberg, M Huber, M Leithner, ...
Computers & security 42, 13-26, 2014
182014
Applying combinatorial testing to large-scale data processing at adobe
D Jarman, R Smith, G Gosney, L Kampel, M Leithner, D Simos, R Kacker, ...
2019 IEEE International Conference on Software Testing, Verification and …, 2019
162019
Practical Combinatorial Testing for XSS Detection using Locally Optimized Attack Models
DE Simos, B Garn, J Zivanovic, M Leithner
2019 IEEE International Conference on Software Testing, Verification and …, 2019
162019
HYDRA: Feedback-driven black-box exploitation of injection vulnerabilities
M Leithner, B Garn, DE Simos
Information and Software Technology 140, 106703, 2021
132021
CAmetrics: A tool for advanced combinatorial analysis and measurement of test sets
M Leithner, K Kleine, DE Simos
2018 IEEE International Conference on Software Testing, Verification and …, 2018
132018
Combinatorially XSSing Web Application Firewalls
B Garn, DS Lang, M Leithner, DR Kuhn, R Kacker, DE Simos
2021 IEEE International Conference on Software Testing, Verification and …, 2021
112021
A fault-driven combinatorial process for model evolution in xss vulnerability detection
B Garn, M Radavelli, A Gargantini, M Leithner, DE Simos
Advances and Trends in Artificial Intelligence. From Theory to Practice …, 2019
112019
Guess who’s texting you
S Schrittwieser, P Fruhwirt, P Kieseberg, M Leithner, M Mulazzani, ...
Evaluating the Security of Smartphone Messaging Applications. SBA Research gGmbH, 2012
102012
Combinatorial methods for dynamic gray‐box SQL injection testing
B Garn, J Zivanovic, M Leithner, DE Simos
Software Testing, Verification and Reliability 32 (6), e1826, 2022
92022
Sliced AETG: a memory-efficient variant of the AETG covering array generation algorithm
L Kampel, M Leithner, DE Simos
Optimization Letters, 1-14, 2019
82019
XIEv: dynamic analysis for crawling and modeling of web applications
M Leithner, DE Simos
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 2201-2210, 2020
72020
The system can't perform the operation now. Try again later.
Articles 1–20