Christian Wressnegger
Christian Wressnegger
Bestätigte E-Mail-Adresse bei kit.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Chucky: Exposing missing checks in source code for vulnerability discovery
F Yamaguchi, C Wressnegger, H Gascon, K Rieck
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1022013
A close look on n-grams in intrusion detection: anomaly detection vs. classification
C Wressnegger, G Schwenk, D Arp, K Rieck
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
802013
Poisoning behavioral malware clustering
B Biggio, K Rieck, D Ariu, C Wressnegger, I Corona, G Giacinto, F Roli
Proceedings of the 2014 workshop on artificial intelligent and security …, 2014
792014
Privacy threats through ultrasonic side channels on mobile devices
D Arp, E Quiring, C Wressnegger, K Rieck
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 35-47, 2017
402017
Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols
H Gascon, C Wressnegger, F Yamaguchi, D Arp, K Rieck
International Conference on Security and Privacy in Communication Systems …, 2015
342015
Sally: A tool for embedding strings in vector spaces
K Rieck, C Wressnegger, A Bikadorov
Journal of Machine Learning Research 13 (Nov), 3247-3251, 2012
232012
Comprehensive analysis and detection of flash-based malware
C Wressnegger, F Yamaguchi, D Arp, K Rieck
International Conference on Detection of Intrusions and Malware, and …, 2016
182016
Automatically inferring malware signatures for anti-virus assisted attacks
C Wressnegger, K Freeman, F Yamaguchi, K Rieck
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
172017
Deobfuscating embedded malware using probable-plaintext attacks
C Wressnegger, F Boldewin, K Rieck
International Workshop on Recent Advances in Intrusion Detection, 164-183, 2013
152013
Harry: A tool for measuring string similarity
K Rieck, C Wressnegger
The Journal of Machine Learning Research 17 (1), 258-262, 2016
142016
Twice the bits, twice the trouble: Vulnerabilities induced by migrating to 64-bit platforms
C Wressnegger, F Yamaguchi, A Maier, K Rieck
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
102016
Web-based Cryptojacking in the Wild
M Musch, C Wressnegger, M Johns, K Rieck
arXiv preprint arXiv:1808.09474, 2018
82018
Zoe: Content-based anomaly detection for industrial control systems
C Wressnegger, A Kellner, K Rieck
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
82018
Looking back on three years of flash-based malware
C Wressnegger, K Rieck
Proceedings of the 10th European Workshop on Systems Security, 1-6, 2017
62017
Analyzing and detecting Flash-based malware using lightweight multi-path exploration
C Wressnegger, F Yamaguchi, D Arp, K Rieck
University of Göttingen, Germany, 2015
42015
From malware signatures to anti-virus assisted attacks
C Wressnegger, K Freeman, F Yamaguchi, K Rieck
arXiv preprint arXiv:1610.06022, 2016
32016
False Sense of Security: A Study on the Effectivity of Jailbreak Detection in Banking Apps
A Kellner, M Horlboge, K Rieck, C Wressnegger
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 1-14, 2019
22019
Bat in the Mobile: A Study on Ultrasonic Device Tracking
D Arp, E Quiring, C Wressnegger, K Rieck
Computer Science Report 2, 2016
22016
Political Elections Under (Social) Fire? Analysis and Detection of Propaganda on Twitter
A Kellner, L Rangosch, C Wressnegger, K Rieck
arXiv preprint arXiv:1912.04143, 2019
12019
Thieves in the Browser: Web-based Cryptojacking in the Wild
M Musch, C Wressnegger, M Johns, K Rieck
Proceedings of the 14th International Conference on Availability …, 2019
12019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20