Konrad Rieck
Konrad Rieck
Professor of Computer Science, TU Braunschweig
Bestätigte E-Mail-Adresse bei tu-bs.de - Startseite
TitelZitiert vonJahr
Drebin: Effective and explainable detection of android malware in your pocket.
D Arp, M Spreitzenbarth, M Hubner, H Gascon, K Rieck, C Siemens
Ndss 14, 23-26, 2014
11802014
Learning and classification of malware behavior
K Rieck, T Holz, C Willems, P Düssel, P Laskov
Detection of Intrusions and Malware, and Vulnerability Assessment, 108-125, 2008
6102008
Automatic analysis of malware behavior using machine learning
K Rieck, P Trinius, C Willems, T Holz
Journal of Computer Security 19 (4), 639-668, 2011
5882011
Measuring and detecting fast-flux service networks
T Holz, C Gorecki, K Rieck, FC Freiling
Proceedings of the Network & Distributed System Security Symposium, 2008
479*2008
Structural detection of android malware using embedded call graphs
H Gascon, F Yamaguchi, D Arp, K Rieck
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
2522013
Learning intrusion detection: supervised or unsupervised?
P Laskov, P Düssel, C Schäfer, K Rieck
International Conference on Image Analysis and Processing, 50-57, 2005
2382005
Cujo: Efficient detection and prevention of drive-by-download attacks
K Rieck, T Krueger, A Dewald
203*
Modeling and discovering vulnerabilities with code property graphs
F Yamaguchi, N Golde, D Arp, K Rieck
2014 IEEE Symposium on Security and Privacy, 590-604, 2014
1932014
Toward supervised anomaly detection
N Görnitz, M Kloft, K Rieck, U Brefeld
Journal of Artificial Intelligence Research 46, 235-262, 2013
1582013
Linear-time computation of similarity measures for sequential data
K Rieck, P Laskov
Journal of Machine Learning Research 9 (Jan), 23-48, 2008
1202008
Generalized vulnerability extrapolation using abstract syntax trees
F Yamaguchi, M Lottmann, K Rieck
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
1112012
Language models for detection of unknown attacks in network traffic
K Rieck, P Laskov
Journal in Computer Virology 2 (4), 243-256, 2007
1102007
Chucky: Exposing missing checks in source code for vulnerability discovery
F Yamaguchi, C Wressnegger, H Gascon, K Rieck
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
992013
Continuous authentication on mobile devices by analysis of typing motion behavior
H Gascon, S Uellenbeck, C Wolf, K Rieck
Sicherheit 2014–Sicherheit, Schutz und Zuverlässigkeit, 2014
942014
Smart metering de-pseudonymization
M Jawurek, M Johns, K Rieck
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
932011
Botzilla: detecting the" phoning home" of malicious software
K Rieck, G Schwenk, T Limmer, T Holz, P Laskov
Proceedings of the 2010 ACM symposium on applied computing, 1978-1984, 2010
932010
Vulnerability extrapolation: Assisted discovery of vulnerabilities using machine learning
F Yamaguchi, F Lindner, K Rieck
Proceedings of the 5th USENIX conference on Offensive technologies, 13-13, 2011
922011
VCCFinder: Finding potential vulnerabilities in open-source projects to assist code audits
H Perl, S Dechand, M Smith, D Arp, F Yamaguchi, K Rieck, S Fahl, Y Acar
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
802015
Detecting unknown network attacks using language models
K Rieck, P Laskov
International Conference on Detection of Intrusions and Malware, and …, 2006
802006
A close look on n-grams in intrusion detection: anomaly detection vs. classification
C Wressnegger, G Schwenk, D Arp, K Rieck
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
782013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20