Dark clouds on the horizon: Using cloud storage as attack vector and online slack space M Mulazzani, S Schrittwieser, M Leithner, M Huber, E Weippl | 247 | 2011 |
QR code security P Kieseberg, M Leithner, M Mulazzani, L Munroe, S Schrittwieser, ... Proceedings of the 8th International Conference on Advances in Mobile …, 2010 | 197 | 2010 |
Guess who is texting you? evaluating the security of smartphone messaging applications S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ... | 137 | 2012 |
Protecting software through obfuscation: Can it keep pace with progress in code analysis? S Schrittwieser, S Katzenbeisser, J Kinder, G Merzdovnik, E Weippl ACM Computing Surveys (CSUR) 49 (1), 1-37, 2016 | 119 | 2016 |
Fast and reliable browser identification with javascript engine fingerprinting M Mulazzani, P Reschl, M Huber, M Leithner, S Schrittwieser, E Weippl, ... Web 2.0 Workshop on Security and Privacy (W2SP) 5, 2013 | 116 | 2013 |
Social snapshots: Digital forensics for online social networks M Huber, M Mulazzani, M Leithner, S Schrittwieser, G Wondracek, ... Proceedings of the 27th annual computer security applications conference …, 2011 | 99 | 2011 |
Spoiled onions: Exposing malicious Tor exit relays P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ... International Symposium on Privacy Enhancing Technologies Symposium, 304-331, 2014 | 95 | 2014 |
Code obfuscation against static and dynamic reverse engineering S Schrittwieser, S Katzenbeisser International workshop on information hiding, 270-284, 2011 | 90 | 2011 |
Shpf: enhancing http (s) session security with browser fingerprinting T Unger, M Mulazzani, D Frühwirt, M Huber, S Schrittwieser, E Weippl 2013 International Conference on Availability, Reliability and Security, 255-261, 2013 | 59 | 2013 |
Innodb database forensics: Reconstructing data manipulation queries from redo logs P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl 2012 Seventh International Conference on Availability, Reliability and …, 2012 | 44 | 2012 |
Semantics-aware detection of targeted attacks: a survey R Luh, S Marschalek, M Kaiser, H Janicke, S Schrittwieser Journal of Computer Virology and Hacking Techniques 13 (1), 47-85, 2017 | 41 | 2017 |
Appinspect: large-scale evaluation of social networking apps M Huber, M Mulazzani, S Schrittwieser, E Weippl Proceedings of the first ACM conference on Online social networks, 143-154, 2013 | 37 | 2013 |
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl Information Security Technical Report 17 (4), 227-238, 2013 | 28 | 2013 |
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl Information Security Technical Report 17 (4), 227-238, 2013 | 28 | 2013 |
The other side of the coin: A framework for detecting and analyzing web-based cryptocurrency mining campaigns J Rauchberger, S Schrittwieser, T Dam, R Luh, D Buhov, G Pötzelsberger, ... Proceedings of the 13th International Conference on Availability …, 2018 | 24 | 2018 |
Protecting anonymity in data-driven biomedical science P Kieseberg, H Hobel, S Schrittwieser, E Weippl, A Holzinger Interactive knowledge discovery and data mining in biomedical informatics …, 2014 | 24* | 2014 |
Trees Cannot Lie: Using Data Structures for Forensics Purposes P Kieseberg, S Schrittwieser, M Mulazzani, M Huber, E Weippl Intelligence and Security Informatics Conference (EISIC), 2011 European, 282-285, 2011 | 23 | 2011 |
An algorithm for k-anonymity-based fingerprinting S Schrittwieser, P Kieseberg, I Echizen, S Wohlgemuth, N Sonehara, ... International Workshop on Digital Watermarking, 439-452, 2011 | 22 | 2011 |
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata P Kieseberg, S Schrittwieser, M Mulazzani, I Echizen, E Weippl Electronic Markets 24 (2), 113-124, 2014 | 20 | 2014 |
Covert computation: Hiding code in code for obfuscation purposes S Schrittwieser, S Katzenbeisser, P Kieseberg, M Huber, M Leithner, ... Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 17 | 2013 |