Protecting the creation of digital signatures with trusted computing platform technology against attacks by trojan horse programs A Spalka, AB Cremers, H Langweg Trusted Information: The New Decade Challenge 16, 403-419, 2001 | 48 | 2001 |
The fairy tale of’what you see is what you sign’-trojan horse attacks on software for digital signatures A Spalka, AB Cremers, H Langweg Proceedings of the IFIP WG 9 (11.7), 75-86, 2001 | 39 | 2001 |
A classification of malicious software attacks H Langweg, E Snekkenes IEEE International Conference on Performance, Computing, and Communications …, 2004 | 31 | 2004 |
Fingerprint presentation attack detection using laser speckle contrast imaging P Keilbach, J Kolberg, M Gomez-Barrero, C Busch, H Langweg 2018 international conference of the biometrics special interest group …, 2018 | 30 | 2018 |
Requirements for legally compliant software based on the GDPR SD Ringmann, H Langweg, M Waldvogel On the Move to Meaningful Internet Systems. OTM 2018 Conferences …, 2018 | 28 | 2018 |
Trojan horse attacks on software for electronic signatures A Spalka, AB Cremers, H Langweg INFORMATICA-LJUBLJANA- 26 (2), 191-204, 2002 | 25 | 2002 |
Framework for malware resistance metrics H Langweg Proceedings of the 2nd ACM workshop on Quality of protection, 39-44, 2006 | 24 | 2006 |
Malware attacks on electronic signatures revisited H Langweg Gesellschaft für Informatik eV, 2006 | 19 | 2006 |
Resource-based event reconstruction of digital crime scenes YC Liao, H Langweg 2014 IEEE Joint Intelligence and Security Informatics Conference, 129-136, 2014 | 16 | 2014 |
Building a trusted path for applications using COTS components H Langweg Proc. NATO RTS IST Panel Symposium on Adaptive Defence in Unclassified Networks, 2004 | 15 | 2004 |
A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the GDPR and Common Criteria. SD Zinsmaier, H Langweg, M Waldvogel ICISSP, 473-480, 2020 | 12 | 2020 |
Source code patterns of sql injection vulnerabilities F Schuckert, B Katt, H Langweg Proceedings of the 12th International Conference on Availability …, 2017 | 9 | 2017 |
OOXML file analysis of the July 22nd terrorist manual H Langweg Communications and Multimedia Security: 13th IFIP TC 6/TC 11 International …, 2012 | 8 | 2012 |
Cost-benefit analysis of kernel tracing systems for forensic readiness YC Liao, H Langweg Proceedings of the 2nd international workshop on Security and forensics in …, 2014 | 7 | 2014 |
With gaming technology towards secure user interfaces H Langweg 18th Annual Computer Security Applications Conference, 2002. Proceedings., 44-50, 2002 | 7 | 2002 |
Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse A Spalka, A Cremers, H Langweg IFIP Security Conference, 2001 | 7 | 2001 |
Evidential reasoning for forensic readiness YC Liao, H Langweg Journal of Digital Forensics, Security and Law 11 (1), 2, 2016 | 6 | 2016 |
Source code patterns of buffer overflow vulnerabilities in firefox F Schuckert, M Hildner, B Katt, H Langweg Gesellschaft für Informatik eV, 2018 | 5 | 2018 |
A survey of process activity tracking system YC Liao, H Langweg Norsk informasjonssikkerhetskonferanse (NISK), 49-60, 2013 | 5 | 2013 |
Schutz von FinTS/HBCI-Clients gegenüber Malware H Langweg, J Schwenk Proceedings of DA-CH Security, 227-238, 2007 | 5 | 2007 |