Follow
Hanno Langweg
Hanno Langweg
Professor in Computer Science at HTWG Konstanz University of Applied Sciences
Verified email at htwg-konstanz.de - Homepage
Title
Cited by
Cited by
Year
Protecting the creation of digital signatures with trusted computing platform technology against attacks by trojan horse programs
A Spalka, AB Cremers, H Langweg
Trusted Information: The New Decade Challenge 16, 403-419, 2001
482001
The fairy tale of’what you see is what you sign’-trojan horse attacks on software for digital signatures
A Spalka, AB Cremers, H Langweg
Proceedings of the IFIP WG 9 (11.7), 75-86, 2001
392001
A classification of malicious software attacks
H Langweg, E Snekkenes
IEEE International Conference on Performance, Computing, and Communications …, 2004
312004
Fingerprint presentation attack detection using laser speckle contrast imaging
P Keilbach, J Kolberg, M Gomez-Barrero, C Busch, H Langweg
2018 international conference of the biometrics special interest group …, 2018
302018
Requirements for legally compliant software based on the GDPR
SD Ringmann, H Langweg, M Waldvogel
On the Move to Meaningful Internet Systems. OTM 2018 Conferences …, 2018
282018
Trojan horse attacks on software for electronic signatures
A Spalka, AB Cremers, H Langweg
INFORMATICA-LJUBLJANA- 26 (2), 191-204, 2002
252002
Framework for malware resistance metrics
H Langweg
Proceedings of the 2nd ACM workshop on Quality of protection, 39-44, 2006
242006
Malware attacks on electronic signatures revisited
H Langweg
Gesellschaft für Informatik eV, 2006
192006
Resource-based event reconstruction of digital crime scenes
YC Liao, H Langweg
2014 IEEE Joint Intelligence and Security Informatics Conference, 129-136, 2014
162014
Building a trusted path for applications using COTS components
H Langweg
Proc. NATO RTS IST Panel Symposium on Adaptive Defence in Unclassified Networks, 2004
152004
A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the GDPR and Common Criteria.
SD Zinsmaier, H Langweg, M Waldvogel
ICISSP, 473-480, 2020
122020
Source code patterns of sql injection vulnerabilities
F Schuckert, B Katt, H Langweg
Proceedings of the 12th International Conference on Availability …, 2017
92017
OOXML file analysis of the July 22nd terrorist manual
H Langweg
Communications and Multimedia Security: 13th IFIP TC 6/TC 11 International …, 2012
82012
Cost-benefit analysis of kernel tracing systems for forensic readiness
YC Liao, H Langweg
Proceedings of the 2nd international workshop on Security and forensics in …, 2014
72014
With gaming technology towards secure user interfaces
H Langweg
18th Annual Computer Security Applications Conference, 2002. Proceedings., 44-50, 2002
72002
Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse
A Spalka, A Cremers, H Langweg
IFIP Security Conference, 2001
72001
Evidential reasoning for forensic readiness
YC Liao, H Langweg
Journal of Digital Forensics, Security and Law 11 (1), 2, 2016
62016
Source code patterns of buffer overflow vulnerabilities in firefox
F Schuckert, M Hildner, B Katt, H Langweg
Gesellschaft für Informatik eV, 2018
52018
A survey of process activity tracking system
YC Liao, H Langweg
Norsk informasjonssikkerhetskonferanse (NISK), 49-60, 2013
52013
Schutz von FinTS/HBCI-Clients gegenüber Malware
H Langweg, J Schwenk
Proceedings of DA-CH Security, 227-238, 2007
52007
The system can't perform the operation now. Try again later.
Articles 1–20