Folgen
Felix Gröbert
Felix Gröbert
Google
Bestätigte E-Mail-Adresse bei groebert.org
Titel
Zitiert von
Zitiert von
Jahr
Automated identification of cryptographic primitives in binary programs
F Gröbert, C Willems, T Holz
International Workshop on Recent Advances in Intrusion Detection, 41-60, 2011
1332011
Automatic identification of cryptographic primitives in software
F Gröbert
Ruhr-University Bochum, 115, 2010
232010
Infiltrate the vault: Security analysis and decryption of lion full disk encryption
O Choudary, F Grobert, J Metz
Cryptology ePrint Archive, 2012
182012
Security analysis and decryption of filevault 2
O Choudary, F Grobert, J Metz
IFIP International Conference on Digital Forensics, 349-363, 2013
62013
Software distribution as a malware infection vector
F Gröbert, AR Sadeghi, M Winandy
2009 International Conference for Internet Technology and Secured …, 2009
62009
A forensic framework for tracing phishers
D Birk, S Gajek, F Gröbert, AR Sadeghi
IFIP Summer School on The Future of Identity in the Information Society, 2007
62007
Web 2.0: Freund oder Feind?
D Birk, F Gröbert
Praxis Web 2, 35-50, 2007
62007
Phishing phishers-tracing identity thieves and money launderer
D Birk, M Dornseif, S Gajek, F Gröbert
Horst Görtz Institute for IT Security, Ruhr University Bochum, Tech. Rep. TR …, 2006
52006
Is Teaching Hacking in Academia Ethical
F Grobert, T Kornau, L Pimenidis
32008
Attacking of smartcard-based banking applications with javascript-based rootkits
D Bußmeyer, F Gröbert, J Schwenk, C Wegener
International Conference on Financial Cryptography and Data Security, 320-327, 2010
12010
Datenschutz in Sozialen Netzwerken: Freund oder Feind?
D Birk, F Gröbert, C Wegener
Informatik 2009–Im Focus das Leben, 2009
2009
Attacking of SmartCard-based Banking Applications with JavaScript-based Rootkits (short paper)
D Bußmeyer, F Gröbert, J Schwenk, C Wegener
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–12