Dark clouds on the horizon: Using cloud storage as attack vector and online slack space M Mulazzani, S Schrittwieser, M Leithner, M Huber, E Weippl 20th USENIX Security Symposium (USENIX Security 11), 2011 | 271 | 2011 |
QR code security P Kieseberg, M Leithner, M Mulazzani, L Munroe, S Schrittwieser, ... Proceedings of the 8th International Conference on Advances in Mobile …, 2010 | 227 | 2010 |
Protecting software through obfuscation: Can it keep pace with progress in code analysis? S Schrittwieser, S Katzenbeisser, J Kinder, G Merzdovnik, E Weippl ACM Computing Surveys (CSUR) 49 (1), 1-37, 2016 | 156 | 2016 |
Guess who is texting you? evaluating the security of smartphone messaging applications S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ... | 145 | 2012 |
Fast and reliable browser identification with javascript engine fingerprinting M Mulazzani, P Reschl, M Huber, M Leithner, S Schrittwieser, E Weippl, ... Web 2.0 Workshop on Security and Privacy (W2SP) 5, 4, 2013 | 138 | 2013 |
Social snapshots: Digital forensics for online social networks M Huber, M Mulazzani, M Leithner, S Schrittwieser, G Wondracek, ... Proceedings of the 27th annual computer security applications conference …, 2011 | 114 | 2011 |
Spoiled onions: Exposing malicious Tor exit relays P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ... International Symposium on Privacy Enhancing Technologies Symposium, 304-331, 2014 | 111 | 2014 |
Code obfuscation against static and dynamic reverse engineering S Schrittwieser, S Katzenbeisser International workshop on information hiding, 270-284, 2011 | 104 | 2011 |
Shpf: Enhancing http (s) session security with browser fingerprinting T Unger, M Mulazzani, D Frühwirt, M Huber, S Schrittwieser, E Weippl 2013 International Conference on Availability, Reliability and Security, 255-261, 2013 | 69 | 2013 |
Semantics-aware detection of targeted attacks: a survey R Luh, S Marschalek, M Kaiser, H Janicke, S Schrittwieser Journal of Computer Virology and Hacking Techniques 13 (1), 47-85, 2017 | 64 | 2017 |
Innodb database forensics: Reconstructing data manipulation queries from redo logs P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl 2012 Seventh International Conference on Availability, Reliability and …, 2012 | 51 | 2012 |
Appinspect: large-scale evaluation of social networking apps M Huber, M Mulazzani, S Schrittwieser, E Weippl Proceedings of the first ACM conference on Online social networks, 143-154, 2013 | 41 | 2013 |
The other side of the coin: A framework for detecting and analyzing web-based cryptocurrency mining campaigns J Rauchberger, S Schrittwieser, T Dam, R Luh, D Buhov, G Pötzelsberger, ... Proceedings of the 13th International Conference on Availability …, 2018 | 37 | 2018 |
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl Information Security Technical Report 17 (4), 227-238, 2013 | 33 | 2013 |
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl Information Security Technical Report 17 (4), 227-238, 2013 | 33 | 2013 |
Protecting anonymity in data-driven biomedical science P Kieseberg, H Hobel, S Schrittwieser, E Weippl, A Holzinger Interactive knowledge discovery and data mining in biomedical informatics …, 2014 | 29* | 2014 |
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata P Kieseberg, S Schrittwieser, M Mulazzani, I Echizen, E Weippl Electronic Markets 24 (2), 113-124, 2014 | 27 | 2014 |
Malicious pixels using QR codes as attack vector P Kieseberg, S Schrittwieser, M Leithner, M Mulazzani, E Weippl, ... Trustworthy ubiquitous computing, 21-38, 2012 | 27 | 2012 |
An algorithm for k-anonymity-based fingerprinting S Schrittwieser, P Kieseberg, I Echizen, S Wohlgemuth, N Sonehara, ... International Workshop on Digital Watermarking, 439-452, 2011 | 24 | 2011 |
Trees Cannot Lie: Using Data Structures for Forensics Purposes P Kieseberg, S Schrittwieser, M Mulazzani, M Huber, E Weippl Intelligence and Security Informatics Conference (EISIC), 2011 European, 282-285, 2011 | 23 | 2011 |