Andrubis--1,000,000 apps later: A view on current Android malware behaviors M Lindorfer, M Neugschwandtner, L Weichselbaum, Y Fratantonio, ... Building Analysis Datasets and Gathering Experience Returns for Security …, 2014 | 283 | 2014 |
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations. I Haller, A Slowinska, M Neugschwandtner, H Bos USENIX Security Symposium, 49-64, 2013 | 219* | 2013 |
MARVIN: Efficient and Comprehensive Mobile App Classification Through Static and Dynamic Analysis M Lindorfer, M Neugschwandtner, C Platzer Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th …, 2015 | 170 | 2015 |
Andrubis: Android malware under the magnifying glass L Weichselbaum, M Neugschwandtner, M Lindorfer, Y Fratantonio, ... Vienna University of Technology, Tech. Rep. TR-ISECLAB-0414-001, 1-10, 2014 | 113 | 2014 |
A static, packer-agnostic filter to detect similar malware samples G Jacob, PM Comparetti, M Neugschwandtner, C Kruegel, G Vigna International Conference on Detection of Intrusions and Malware, and …, 2012 | 88 | 2012 |
AndRadar: fast discovery of android applications in alternative markets M Lindorfer, S Volanis, A Sisto, M Neugschwandtner, E Athanasopoulos, ... International Conference on Detection of Intrusions and Malware, and …, 2014 | 74 | 2014 |
Smotherspectre: exploiting speculative execution through port contention A Bhattacharyya, A Sandulescu, M Neugschwandtner, A Sorniotti, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 63 | 2019 |
Web services in building automation: Mapping KNX to oBIX M Neugschwandtner, G Neugschwandtner, W Kastner Industrial Informatics, 2007 5th IEEE International Conference on 1, 87-92, 2007 | 63 | 2007 |
A view to a kill: WebView exploitation M Neugschwandtner, M Lindorfer, C Platzer Presented as part of the 6th USENIX Workshop on Large-Scale Exploits and …, 2013 | 49 | 2013 |
The BORG: Nanoprobing Binaries for Buffer Overreads M Neugschwandtner, P Milani Comparetti, I Haller, H Bos Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 41 | 2015 |
Forecast: skimming off the malware cream M Neugschwandtner, PM Comparetti, G Jacob, C Kruegel Proceedings of the 27th Annual Computer Security Applications Conference, 11-20, 2011 | 39 | 2011 |
Detecting malware's failover C&C strategies with squeeze M Neugschwandtner, PM Comparetti, C Platzer Proceedings of the 27th Annual Computer Security Applications Conference, 21-30, 2011 | 32 | 2011 |
Danubis–dynamic device driver analysis based on virtual machine introspection M Neugschwandtner, C Platzer, PM Comparetti, U Bayer International Conference on Detection of Intrusions and Malware, and …, 2010 | 23 | 2010 |
From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks A Kurmus, N Ioannou, M Neugschwandtner, N Papandreou, T Parnell 11th USENIX Workshop on Offensive Technologies, 2017 | 17 | 2017 |
Dowser: a guided fuzzer to find buffer overflow vulnerabilities I Haller, A Slowinska, H Bos Proceedings of the European Workshop on System Security (Eurosec), 2013 | 16 | 2013 |
A transparent defense against USB eavesdropping attacks M Neugschwandtner, A Beitler, A Kurmus Proceedings of the 9th European Workshop on System Security, 1-6, 2016 | 13 | 2016 |
Breaking Payloads with Runtime Code Stripping and Image Freezing C Mulliner, M Neugschwandtner Black Hat USA, 2015 | 12 | 2015 |
USB device firmware sanitization A Beitler, J Jang, DH Kirat, A Kurmus, M Neugschwandtner, MP Stoecklin US Patent 10,216,673, 2019 | 9* | 2019 |
Lobotomy: An Architecture for JIT Spraying Mitigation M Jauernig, M Neugschwandtner, C Platzer, PM Comparetti Availability, Reliability and Security (ARES), 2014 Ninth International …, 2014 | 9 | 2014 |
Reconciling Security and Functional Requirements in Multi-tenant Clouds G Karame, M Neugschwandtner, M Önen, H Ritzdorf Proceedings of the Fifth ACM International Workshop on Security in Cloud …, 2017 | 6 | 2017 |