Matthias Neugschwandtner
Matthias Neugschwandtner
Oracle Labs
Adresse e-mail validée de oracle.com
Titre
Citée par
Citée par
Année
Andrubis--1,000,000 apps later: A view on current Android malware behaviors
M Lindorfer, M Neugschwandtner, L Weichselbaum, Y Fratantonio, ...
Building Analysis Datasets and Gathering Experience Returns for Security …, 2014
2702014
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations.
I Haller, A Slowinska, M Neugschwandtner, H Bos
USENIX Security Symposium, 49-64, 2013
211*2013
MARVIN: Efficient and Comprehensive Mobile App Classification Through Static and Dynamic Analysis
M Lindorfer, M Neugschwandtner, C Platzer
Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th …, 2015
1592015
Andrubis: Android malware under the magnifying glass
L Weichselbaum, M Neugschwandtner, M Lindorfer, Y Fratantonio, ...
Vienna University of Technology, Tech. Rep. TR-ISECLAB-0414-001, 1-10, 2014
1032014
A static, packer-agnostic filter to detect similar malware samples
G Jacob, PM Comparetti, M Neugschwandtner, C Kruegel, G Vigna
International Conference on Detection of Intrusions and Malware, and …, 2012
852012
AndRadar: fast discovery of android applications in alternative markets
M Lindorfer, S Volanis, A Sisto, M Neugschwandtner, E Athanasopoulos, ...
International Conference on Detection of Intrusions and Malware, and …, 2014
692014
Web services in building automation: Mapping KNX to oBIX
M Neugschwandtner, G Neugschwandtner, W Kastner
Industrial Informatics, 2007 5th IEEE International Conference on 1, 87-92, 2007
612007
Smotherspectre: exploiting speculative execution through port contention
A Bhattacharyya, A Sandulescu, M Neugschwandtner, A Sorniotti, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
562019
A view to a kill: WebView exploitation
M Neugschwandtner, M Lindorfer, C Platzer
Presented as part of the 6th USENIX Workshop on Large-Scale Exploits and …, 2013
432013
The BORG: Nanoprobing Binaries for Buffer Overreads
M Neugschwandtner, P Milani Comparetti, I Haller, H Bos
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
422015
Forecast: skimming off the malware cream
M Neugschwandtner, PM Comparetti, G Jacob, C Kruegel
Proceedings of the 27th Annual Computer Security Applications Conference, 11-20, 2011
362011
Detecting malware's failover C&C strategies with squeeze
M Neugschwandtner, PM Comparetti, C Platzer
Proceedings of the 27th Annual Computer Security Applications Conference, 21-30, 2011
332011
Danubis–dynamic device driver analysis based on virtual machine introspection
M Neugschwandtner, C Platzer, PM Comparetti, U Bayer
International Conference on Detection of Intrusions and Malware, and …, 2010
242010
From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks
A Kurmus, N Ioannou, M Neugschwandtner, N Papandreou, T Parnell
11th USENIX Workshop on Offensive Technologies, 2017
162017
Dowser: a guided fuzzer to find buffer overflow vulnerabilities
I Haller, A Slowinska, H Bos
Proceedings of the European Workshop on System Security (Eurosec), 2013
162013
A transparent defense against USB eavesdropping attacks
M Neugschwandtner, A Beitler, A Kurmus
Proceedings of the 9th European Workshop on System Security, 1-6, 2016
122016
Lobotomy: An Architecture for JIT Spraying Mitigation
M Jauernig, M Neugschwandtner, C Platzer, PM Comparetti
Availability, Reliability and Security (ARES), 2014 Ninth International …, 2014
92014
USB device firmware sanitization
A Beitler, J Jang, DH Kirat, A Kurmus, M Neugschwandtner, MP Stoecklin
US Patent 10,216,673, 2019
8*2019
Breaking Payloads with Runtime Code Stripping and Image Freezing
C Mulliner, M Neugschwandtner
Black Hat USA, 2015
82015
Reconciling Security and Functional Requirements in Multi-tenant Clouds
G Karame, M Neugschwandtner, M Önen, H Ritzdorf
Proceedings of the Fifth ACM International Workshop on Security in Cloud …, 2017
62017
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20