Matthias Neugschwandtner
Matthias Neugschwandtner
Oracle Labs
Verified email at oracle.com
Title
Cited by
Cited by
Year
Andrubis--1,000,000 apps later: A view on current Android malware behaviors
M Lindorfer, M Neugschwandtner, L Weichselbaum, Y Fratantonio, ...
Building Analysis Datasets and Gathering Experience Returns for Security …, 2014
2512014
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations.
I Haller, A Slowinska, M Neugschwandtner, H Bos
USENIX Security Symposium, 49-64, 2013
196*2013
MARVIN: Efficient and Comprehensive Mobile App Classification Through Static and Dynamic Analysis
M Lindorfer, M Neugschwandtner, C Platzer
Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th …, 2015
1462015
Andrubis: Android malware under the magnifying glass
L Weichselbaum, M Neugschwandtner, M Lindorfer, Y Fratantonio, ...
Vienna University of Technology, Tech. Rep. TR-ISECLAB-0414-001, 1-10, 2014
932014
A static, packer-agnostic filter to detect similar malware samples
G Jacob, PM Comparetti, M Neugschwandtner, C Kruegel, G Vigna
International Conference on Detection of Intrusions and Malware, and …, 2012
802012
AndRadar: fast discovery of android applications in alternative markets
M Lindorfer, S Volanis, A Sisto, M Neugschwandtner, E Athanasopoulos, ...
International Conference on Detection of Intrusions and Malware, and …, 2014
612014
Web services in building automation: Mapping KNX to oBIX
M Neugschwandtner, G Neugschwandtner, W Kastner
Industrial Informatics, 2007 5th IEEE International Conference on 1, 87-92, 2007
612007
A view to a kill: WebView exploitation
M Neugschwandtner, M Lindorfer, C Platzer
Presented as part of the 6th USENIX Workshop on Large-Scale Exploits and …, 2013
412013
The BORG: Nanoprobing Binaries for Buffer Overreads
M Neugschwandtner, P Milani Comparetti, I Haller, H Bos
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
402015
Forecast: skimming off the malware cream
M Neugschwandtner, PM Comparetti, G Jacob, C Kruegel
Proceedings of the 27th Annual Computer Security Applications Conference, 11-20, 2011
362011
Smotherspectre: exploiting speculative execution through port contention
A Bhattacharyya, A Sandulescu, M Neugschwandtner, A Sorniotti, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
322019
Detecting malware's failover C&C strategies with squeeze
M Neugschwandtner, PM Comparetti, C Platzer
Proceedings of the 27th Annual Computer Security Applications Conference, 21-30, 2011
302011
Danubis–dynamic device driver analysis based on virtual machine introspection
M Neugschwandtner, C Platzer, PM Comparetti, U Bayer
International Conference on Detection of Intrusions and Malware, and …, 2010
222010
Dowser: a guided fuzzer to find buffer overflow vulnerabilities
I Haller, A Slowinska, H Bos
Proceedings of the European Workshop on System Security (Eurosec), 2013
152013
From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks
A Kurmus, N Ioannou, M Neugschwandtner, N Papandreou, T Parnell
11th USENIX Workshop on Offensive Technologies, 2017
122017
A transparent defense against USB eavesdropping attacks
M Neugschwandtner, A Beitler, A Kurmus
Proceedings of the 9th European Workshop on System Security, 1-6, 2016
92016
USB device firmware sanitization
A Beitler, J Jang, DH Kirat, A Kurmus, M Neugschwandtner, MP Stoecklin
US Patent 10,216,673, 2019
8*2019
Lobotomy: An Architecture for JIT Spraying Mitigation
M Jauernig, M Neugschwandtner, C Platzer, PM Comparetti
Availability, Reliability and Security (ARES), 2014 Ninth International …, 2014
82014
Reconciling Security and Functional Requirements in Multi-tenant Clouds
G Karame, M Neugschwandtner, M Önen, H Ritzdorf
Proceedings of the Fifth ACM International Workshop on Security in Cloud …, 2017
62017
Memory categorization
A Kurmus, M Neugschwandtner, A Sorniotti
US Patent 10,229,046, 2019
5*2019
The system can't perform the operation now. Try again later.
Articles 1–20