Matthias Neugschwandtner
Matthias Neugschwandtner
Oracle Labs
Dirección de correo verificada de
Citado por
Citado por
Andrubis--1,000,000 apps later: A view on current Android malware behaviors
M Lindorfer, M Neugschwandtner, L Weichselbaum, Y Fratantonio, ...
Building Analysis Datasets and Gathering Experience Returns for Security …, 2014
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations.
I Haller, A Slowinska, M Neugschwandtner, H Bos
USENIX Security Symposium, 49-64, 2013
MARVIN: Efficient and Comprehensive Mobile App Classification Through Static and Dynamic Analysis
M Lindorfer, M Neugschwandtner, C Platzer
Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th …, 2015
Smotherspectre: exploiting speculative execution through port contention
A Bhattacharyya, A Sandulescu, M Neugschwandtner, A Sorniotti, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Andrubis: Android malware under the magnifying glass
L Weichselbaum, M Neugschwandtner, M Lindorfer, Y Fratantonio, ...
Vienna University of Technology, Tech. Rep. TR-ISECLAB-0414-001, 1-10, 2014
A static, packer-agnostic filter to detect similar malware samples
G Jacob, PM Comparetti, M Neugschwandtner, C Kruegel, G Vigna
Detection of Intrusions and Malware, and Vulnerability Assessment: 9th …, 2013
AndRadar: fast discovery of android applications in alternative markets
M Lindorfer, S Volanis, A Sisto, M Neugschwandtner, E Athanasopoulos, ...
Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014
The BORG: Nanoprobing Binaries for Buffer Overreads
M Neugschwandtner, P Milani Comparetti, I Haller, H Bos
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
A view to a kill: WebView exploitation
M Neugschwandtner, M Lindorfer, C Platzer
Presented as part of the 6th USENIX Workshop on Large-Scale Exploits and …, 2013
Web services in building automation: Mapping KNX to oBIX
M Neugschwandtner, G Neugschwandtner, W Kastner
Industrial Informatics, 2007 5th IEEE International Conference on 1, 87-92, 2007
Forecast: skimming off the malware cream
M Neugschwandtner, PM Comparetti, G Jacob, C Kruegel
Proceedings of the 27th Annual Computer Security Applications Conference, 11-20, 2011
Endorsement in Hyperledger Fabric
E Androulaki, A De Caro, M Neugschwandtner, A Sorniotti
2019 IEEE International Conference on Blockchain (Blockchain), 510-519, 2019
Speculator: a tool to analyze speculative execution attacks and mitigations
A Mambretti, M Neugschwandtner, A Sorniotti, E Kirda, W Robertson, ...
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
Detecting malware's failover C&C strategies with squeeze
M Neugschwandtner, PM Comparetti, C Platzer
Proceedings of the 27th Annual Computer Security Applications Conference, 21-30, 2011
Dowser: a guided fuzzer to find buffer overflow vulnerabilities
I Haller, A Slowinska, H Bos
Proceedings of the European Workshop on System Security (Eurosec), 2013
From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks
A Kurmus, N Ioannou, M Neugschwandtner, N Papandreou, T Parnell
11th USENIX Workshop on Offensive Technologies, 2017
Danubis–dynamic device driver analysis based on virtual machine introspection
M Neugschwandtner, C Platzer, PM Comparetti, U Bayer
International Conference on Detection of Intrusions and Malware, and …, 2010
A transparent defense against USB eavesdropping attacks
M Neugschwandtner, A Beitler, A Kurmus
Proceedings of the 9th European Workshop on System Security, 1-6, 2016
Breaking Payloads with Runtime Code Stripping and Image Freezing
C Mulliner, M Neugschwandtner
Black Hat USA, 2015
Two methods for exploiting speculative control flow hijacks
A Mambretti, A Sandulescu, M Neugschwandtner, A Sorniotti, A Kurmus
13th USENIX Workshop on Offensive Technologies (WOOT 19), 2019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20