Stephan Kleber
Cited by
Cited by
Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis
S Kleber, L Maile, F Kargl
IEEE Communications Surveys & Tutorials 21 (1), 526-561, 2018
NEMESYS: Network Message Syntax Reverse Engineering by Analysis of the Intrinsic Structure of Individual Messages
S Kleber, H Kopp, F Kargl
12th USENIX Workshop on Offensive Technologies (WOOT 18), 2018
An SDN-based Approach For Defending Against Reflective DDoS Attacks
T Lukaseder, K Stölzle, S Kleber, B Erb, F Kargl
2018 IEEE 43rd Conference on Local Computer Networks (LCN), 299-302, 2018
Message type identification of binary network protocols using continuous segment similarity
S Kleber, RW Heijden, F Kargl
IEEE International Conference on Computer Communications (INFOCOM) 2020, 2020
Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption.
S Kleber, F Unterstein, M Matousek, F Kargl, F Slomka, M Hiller
IACR Cryptology ePrint Archive 2015, 651, 2015
Automated {PCB} Reverse Engineering
S Kleber, HF Nölscher, F Kargl
11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017
Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions
S Kleber, RW Van der Heijden, H Kopp, F Kargl
2015 International Conference and Workshops on Networked Systems (NetSys), 1-8, 2015
Network attack detection and defense: Securing industrial control systems for critical infrastructures (dagstuhl seminar 14292)
M Dacier, F Kargl, H König, A Valdes
Dagstuhl reports 4 (7), 2014
ARIstoteles–Dissecting Apple’s Baseband Interface
T Kröll, S Kleber, F Kargl, M Hollick, J Classen
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
Poster: Network Message Field Type Recognition
S Kleber, F Kargl
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Analysis of the DoIP Protocol for Security Vulnerabilities
P Wachter, S Kleber
Proceedings of the 6th ACM Computer Science in Cars Symposium, 1-10, 2022
Refining Network Message Segmentation with Principal Component Analysis
S Kleber, F Kargl
2022 IEEE Conference on Communications and Network Security (CNS), 281-289, 2022
Network Message Field Type Clustering for Reverse Engineering of Unknown Binary Protocols
S Kleber, F Kargl, M Stute, M Hollick
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022
Secure code execution: A generic PUF-driven system architecture
S Kleber, F Unterstein, M Hiller, F Slomka, M Matousek, F Kargl, C Bösch
Information Security: 21st International Conference, ISC 2018, Guildford, UK …, 2018
Design of the Secure Execution PUF-based Processor (SEPP)
F Unterstein, S Kleber, M Matousek, F Kargl, F Slomka, M Hiller
Workshop on Trustworthy Manufacturing and Utilization of Secure Devices …, 2015
Heideggers Gelassenheit in der globalisierten Welt
S Kleber
Humboldt-Studienzentrum, Universität Ulm, 2010
A Strategy to Evaluate Test Time Evasion Attack Feasibility
S Kleber, P Wachter
Datenschutz und Datensicherheit-DuD 47 (8), 478-482, 2023
Über die Ehrfurcht vor dem Leben
S Kleber
Humboldt-Studienzentrum, Universität Ulm, 2011
A training and testing environment for penetration tests and security analyses
S Kleber
Institute of Media Informatics, Ulm University, 2010
Einsatz von RFID in der Materialverwaltung
S Kleber
Institut für Medieninformatik, Universität Ulm, 2007
The system can't perform the operation now. Try again later.
Articles 1–20