Automated identification of cryptographic primitives in binary programs F Gröbert, C Willems, T Holz Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011 | 147 | 2011 |
Automatic identification of cryptographic primitives in software F Gröbert Ruhr-University Bochum 115, 2010 | 27 | 2010 |
Infiltrate the vault: Security analysis and decryption of lion full disk encryption O Choudary, F Grobert, J Metz Cryptology ePrint Archive, 2012 | 19 | 2012 |
Security analysis and decryption of filevault 2 O Choudary, F Grobert, J Metz Advances in Digital Forensics IX: 9th IFIP WG 11.9 International Conference …, 2013 | 7 | 2013 |
Software distribution as a malware infection vector F Gröbert, AR Sadeghi, M Winandy 2009 International Conference for Internet Technology and Secured …, 2009 | 7 | 2009 |
Web 2.0: Freund oder Feind? D Birk, F Gröbert Praxis Web 2, 35-50, 2007 | 7 | 2007 |
A forensic framework for tracing phishers D Birk, S Gajek, F Gröbert, AR Sadeghi IFIP Summer School on The Future of Identity in the Information Society, 2007 | 5 | 2007 |
Phishing phishers-tracing identity thieves and money launderer D Birk, M Dornseif, S Gajek, F Gröbert Horst Görtz Institute for IT Security, Ruhr University Bochum, Tech. Rep. TR …, 2006 | 5 | 2006 |
Is Teaching Hacking in Academia Ethical F Grobert, T Kornau, L Pimenidis | 3 | 2008 |
Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits: (Short Paper) D Bußmeyer, F Gröbert, J Schwenk, C Wegener Financial Cryptography and Data Security: 14th International Conference, FC …, 2010 | 1 | 2010 |
Datenschutz in Sozialen Netzwerken: Freund oder Feind? D Birk, F Gröbert, C Wegener Informatik 2009–Im Focus das Leben, 192-192, 2009 | | 2009 |
Attacking of SmartCard-based Banking Applications with JavaScript-based Rootkits (short paper) D Bußmeyer, F Gröbert, J Schwenk, C Wegener | | |