Martina Lindorfer
Martina Lindorfer
Assistant Professor at TU Wien
Bestätigte E-Mail-Adresse bei tuwien.ac.at - Startseite
TitelZitiert vonJahr
Detecting Environment-Sensitive Malware
M Lindorfer, C Kolbitsch, P Milani Comparetti
Recent Advances in Intrusion Detection (RAID), 2011
2662011
ANDRUBIS - 1,000,000 Apps Later: A View on Current Android Malware Behaviors
M Lindorfer, M Neugschwandtner, L Weichselbaum, Y Fratantonio, ...
Workshop on Building Analysis Datasets and Gathering Experience Returns for …, 2014
2082014
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
V van der Veen, Y Fratantonio, M Lindorfer, D Gruss, C Maurice, G Vigna, ...
ACM SIGSAC Conference on Computer & Communications Security (CCS), 2016
1102016
MARVIN: Efficient and Comprehensive Mobile App Classification Through Static and Dynamic Analysis
M Lindorfer, M Neugschwandtner, C Platzer
Annual International Computers, Software & Applications Conference (COMPSAC), 2015
982015
ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic
J Ren, A Rao, M Lindorfer, A Legout, D Choffnes
International Conference on Mobile Systems, Applications and Services (MobiSys), 2016
852016
ANDRUBIS: Android Malware Under The Magnifying Glass
L Weichselbaum, M Neugschwandtner, M Lindorfer, Y Fratantonio, ...
Vienna University of Technology, Tech. Rep. TRISECLAB-0414-001, 2014
822014
AndRadar: Fast Discovery of Android Applications in Alternative Markets
M Lindorfer, S Volanis, A Sisto, M Neugschwandtner, E Athanasopoulos, ...
Conference on Detection of Intrusions and Malware & Vulnerability Assessment …, 2014
512014
Enter Sandbox: Android Sandbox Comparison
S Neuner, V van der Veen, M Lindorfer, M Huber, G Merzdovnik, ...
IEEE Mobile Security Technologies Workshop (MoST), 2014
432014
Lines of Malicious Code: Insights Into the Malicious Software Industry
M Lindorfer, A Di Federico, F Maggi, P Milani Comparetti, S Zanero
Annual Computer Security Applications Conference (ACSAC), 2012
402012
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis
A Continella, Y Fratantonio, M Lindorfer, A Puccetti, A Zand, C Kruegel, ...
Network and Distributed System Security Symposium (NDSS), 2017
372017
A View To A Kill: WebView Exploitation
M Neugschwandtner, M Lindorfer, C Platzer
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2013
312013
CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes
P Carter, C Mulliner, M Lindorfer, W Robertson, E Kirda
International Conference on Financial Cryptography and Data Security (FC), 2016
282016
Skin Sheriff: A Machine Learning Solution for Detecting Explicit Images
C Platzer, M Stuetz, M Lindorfer
Workshop on Security and Forensics in Communication Systems (ASIACCS-SFCS), 2014
252014
Bug Fixes, Improvements,... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions
J Ren, M Lindorfer, DJ Dubois, A Rao, D Choffnes, N Vallina-Rodriguez
Network and Distributed System Security Symposium (NDSS), 2018
16*2018
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense
RK Konoth, E Vineti, V Moonsamy, M Lindorfer, C Kruegel, H Bos, ...
ACM SIGSAC Conference on Computer & Communications Security (CCS), 2018
142018
GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM
V van der Veen, M Lindorfer, Y Fratantonio, HP Pillai, G Vigna, C Kruegel, ...
Conference on Detection of Intrusions and Malware & Vulnerability Assessment …, 2018
102018
Andrubis: A Tool for Analyzing Unknown Android Applications
M Lindorfer
102012
The Red Book: A Roadmap for Systems Security Research
E Markatos, D Balzarotti, M Almgren, E Athanasopoulos, H Bos, ...
72013
Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications
E Pan, J Ren, M Lindorfer, C Wilson, D Choffnes
Privacy Enhancing Technologies Symposium (PETS), 2018
52018
Demo: ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic
J Ren, A Rao, M Lindorfer, A Legout, D Choffnes
International Conference on Mobile Systems, Applications and Services …, 2016
32016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20