Tobias Fiebig
Tobias Fiebig
Bestätigte E-Mail-Adresse bei - Startseite
TitelZitiert vonJahr
Security Impact of High Resolution Smartphone Cameras
T Fiebig, J Krissler, R Hänsch
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014
Taking Control of SDN-based Cloud Systems via the Data Plane
K Thimmaraju, B Shastry, T Fiebig, F Hetzelt, JP Seifert, A Feldmann, ...
ACM Symposium on SDN Research (SOSR), 2018
Something from nothing (There): collecting global IPv6 datasets from DNS
T Fiebig, K Borgolte, S Hao, C Kruegel, G Vigna
International Conference on Passive and Active Network Measurement, 30-43, 2017
Investigating System Operators’ Perspective on Security Misconfigurations
C Dietrich, K Krombholz, K Borgolte, T Fiebig
Proceedings ACM Conference on Computer and Communications Security (CCS), 2018
Static Program Analysis as a Fuzzing Aid
B Shastry, M Leutner, T Fiebig, K Thimmaraju, F Yamaguchi, K Rieck, ...
International Symposium on Research in Attacks, Intrusions, and Defenses, 2017
Enumerating active IPv6 hosts for large-scale security scans via DNSSEC-signed reverse zones
K Borgolte, S Hao, T Fiebig, G Vigna
2018 IEEE Symposium on Security and Privacy (SP), 770-784, 2018
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates
K Borgolte, T Fiebig, S Hao, C Kruegel, G Vigna
Network and Distributed Systems Security Symposium, 2018
Analyzing End-Users’ Knowledge and Feelings Surrounding Smartphone Security and Privacy
L Kraus, T Fiebig, V Miruchna, S Möller, A Shabtai
Security & Privacy Workshops 2015 - Mobile Security Technologies (MoST) 2015, 2015
In rDNS We Trust: Revisiting a Common Data-Source’s Reliability
T Fiebig, K Borgolte, S Hao, C Kruegel, G Vgina, A Feldmann
Passive and Active Measurement Conference, 2018
Learning from the Past: Designing Secure Network Protocols
T Fiebig, F Lichtblau, F Streibelt, T Krüger, P Lexis, R Bush, A Feldmann
Cybersecurity Best Practices, 585-613, 2018
A Metric for the Evaluation and Comparison of Keylogger Performance
T Fiebig, J Danisevskis, M Piekarska
7th Workshop on Cyber Security Experimentation and Test (CSET '14), 2014
The vAMP attack: Taking control of cloud systems via the unified packet parser
K Thimmaraju, B Shastry, T Fiebig, F Hetzelt, JP Seifert, A Feldmann, ...
Proceedings of the 2017 on Cloud Computing Security Workshop, 11-15, 2017
A One-Year Perspective on Exposed In-memory Key-Value Stores
T Fiebig, A Feldmann, M Petschick
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active …, 2016
Grindr application security evaluation report
T Fiebig, W Katz
University of Amsterdam, 2013
An empirical evaluation of misconfiguration in Internet services
T Fiebig
Memory Forensics on SOHO / Enduser Embedded Routing and Gateway Systems
T Fiebig
University of Amsterdam, 2013
You can-j REJECT but you can not hide: Global scanning of the IPv6 Internet
T Fiebig, K Borgolte, S Hao, C Kruegel, G Vigna
Chaos Communication Congress (CCC). Chaos Computer Club, 2016
21 Does Insurance Have a Future in Governing Cybersecurity?
DW Woods, T Moore, JL Hernández-Ramos, D Geneiatakis, I Kounelis, ...
Moving Fast and Breaking Things: How to stop crashing more than twice
T Fiebig
arXiv preprint arXiv:1911.12139, 2019
Governance Challenges for European CyberSecurity Policy: Stakeholders Views
P Sterlini, F Massacci, N Kadenko, T Fiebig, M van Eeten
IEEE Security & Privacy, 2019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20