Dark clouds on the horizon: Using cloud storage as attack vector and online slack space M Mulazzani, S Schrittwieser, M Leithner, M Huber, E Weippl 20th USENIX Security Symposium (USENIX Security 11), 2011 | 295 | 2011 |
QR code security P Kieseberg, M Leithner, M Mulazzani, L Munroe, S Schrittwieser, ... Proceedings of the 8th International Conference on Advances in Mobile …, 2010 | 273 | 2010 |
Protecting software through obfuscation: Can it keep pace with progress in code analysis? S Schrittwieser, S Katzenbeisser, J Kinder, G Merzdovnik, E Weippl Acm computing surveys (csur) 49 (1), 1-37, 2016 | 231 | 2016 |
Fast and reliable browser identification with javascript engine fingerprinting M Mulazzani, P Reschl, M Huber, M Leithner, S Schrittwieser, E Weippl, ... Web 2.0 Workshop on Security and Privacy (W2SP) 5, 4, 2013 | 157 | 2013 |
Guess who is texting you? evaluating the security of smartphone messaging applications S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ... | 156 | 2012 |
Spoiled onions: Exposing malicious Tor exit relays P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ... Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014 | 135 | 2014 |
Social snapshots: Digital forensics for online social networks M Huber, M Mulazzani, M Leithner, S Schrittwieser, G Wondracek, ... Proceedings of the 27th annual computer security applications conference …, 2011 | 127 | 2011 |
Code obfuscation against static and dynamic reverse engineering S Schrittwieser, S Katzenbeisser Information Hiding: 13th International Conference, IH 2011, Prague, Czech …, 2011 | 125 | 2011 |
Shpf: Enhancing http (s) session security with browser fingerprinting T Unger, M Mulazzani, D Frühwirt, M Huber, S Schrittwieser, E Weippl 2013 International Conference on Availability, Reliability and Security, 255-261, 2013 | 86 | 2013 |
Semantics-aware detection of targeted attacks: a survey R Luh, S Marschalek, M Kaiser, H Janicke, S Schrittwieser Journal of Computer Virology and Hacking Techniques 13, 47-85, 2017 | 79 | 2017 |
Innodb database forensics: Reconstructing data manipulation queries from redo logs P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl 2012 Seventh International Conference on Availability, Reliability and …, 2012 | 60 | 2012 |
PenQuest: a gamified attacker/defender meta model for cyber security assessment and education R Luh, M Temper, S Tjoa, S Schrittwieser, H Janicke Journal of Computer Virology and Hacking Techniques 16, 19-61, 2020 | 49 | 2020 |
The other side of the coin: A framework for detecting and analyzing web-based cryptocurrency mining campaigns J Rauchberger, S Schrittwieser, T Dam, R Luh, D Buhov, G Pötzelsberger, ... Proceedings of the 13th International Conference on Availability …, 2018 | 44 | 2018 |
Appinspect: large-scale evaluation of social networking apps M Huber, M Mulazzani, S Schrittwieser, E Weippl Proceedings of the first ACM conference on Online social networks, 143-154, 2013 | 44 | 2013 |
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl Information Security Technical Report 17 (4), 227-238, 2013 | 42 | 2013 |
Trust me, I'm a Root CA! Analyzing SSL Root CAs in Modern Browsers and Operating Systems T Fadai, S Schrittwieser, P Kieseberg, M Mulazzani 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 34 | 2015 |
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata P Kieseberg, S Schrittwieser, M Mulazzani, I Echizen, E Weippl Electronic Markets 24, 113-124, 2014 | 34 | 2014 |
Malicious pixels using QR codes as attack vector P Kieseberg, S Schrittwieser, M Leithner, M Mulazzani, E Weippl, ... Trustworthy ubiquitous computing, 21-38, 2012 | 34 | 2012 |
Protecting anonymity in data-driven biomedical science P Kieseberg, H Hobel, S Schrittwieser, E Weippl, A Holzinger Interactive Knowledge Discovery and Data Mining in Biomedical Informatics …, 2014 | 33* | 2014 |
An Algorithm for k-Anonymity-Based Fingerprinting S Schrittwieser, P Kieseberg, I Echizen, S Wohlgemuth, N Sonehara, ... Digital Forensics and Watermarking: 10th International Workshop, IWDW 2011 …, 2012 | 31 | 2012 |