default search action
BibTeX records: Konrad Rieck
@article{DBLP:journals/popets/HorlbogeQMR24, author = {Micha Horlboge and Erwin Quiring and Roland Meyer and Konrad Rieck}, title = {I still know it's you! On Challenges in Anonymizing Source Code}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2024}, number = {3}, pages = {744--760}, year = {2024}, url = {https://doi.org/10.56553/popets-2024-0102}, doi = {10.56553/POPETS-2024-0102}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/HorlbogeQMR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/MaierWR24, author = {Alwin Maier and Felix Wei{\ss}berg and Konrad Rieck}, editor = {Jianying Zhou and Tony Q. S. Quek and Debin Gao and Alvaro A. C{\'{a}}rdenas}, title = {On the Role of Pre-trained Embeddings in Binary Code Analysis}, booktitle = {Proceedings of the 19th {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2024, Singapore, July 1-5, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3634737.3657029}, doi = {10.1145/3634737.3657029}, timestamp = {Fri, 16 Aug 2024 09:08:03 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/MaierWR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/MollerWPER24, author = {Jonas M{\"{o}}ller and Felix Wei{\ss}berg and Lukas Pirch and Thorsten Eisenhofer and Konrad Rieck}, editor = {Jianying Zhou and Tony Q. S. Quek and Debin Gao and Alvaro A. C{\'{a}}rdenas}, title = {Cross-Language Differential Testing of {JSON} Parsers}, booktitle = {Proceedings of the 19th {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2024, Singapore, July 1-5, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3634737.3657003}, doi = {10.1145/3634737.3657003}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/MollerWPER24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/WeissbergMGIPSS24, author = {Felix Weissberg and Jonas M{\"{o}}ller and Tom Ganz and Erik Imgrund and Lukas Pirch and Lukas Seidel and Moritz Schloegel and Thorsten Eisenhofer and Konrad Rieck}, editor = {Jianying Zhou and Tony Q. S. Quek and Debin Gao and Alvaro A. C{\'{a}}rdenas}, title = {SoK: Where to Fuzz? Assessing Target Selection Methods in Directed Fuzzing}, booktitle = {Proceedings of the 19th {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2024, Singapore, July 1-5, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3634737.3661141}, doi = {10.1145/3634737.3661141}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/WeissbergMGIPSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/PfisterMBKRA24, author = {Moritz Pfister and Robert Michael and Max Boll and Cosima K{\"{o}}rfer and Konrad Rieck and Daniel Arp}, editor = {Federico Maggi and Manuel Egele and Mathias Payer and Michele Carminati}, title = {Listening Between the Bits: Privacy Leaks in Audio Fingerprints}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 21st International Conference, {DIMVA} 2024, Lausanne, Switzerland, July 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14828}, pages = {184--204}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-64171-8\_10}, doi = {10.1007/978-3-031-64171-8\_10}, timestamp = {Sat, 20 Jul 2024 14:18:50 +0200}, biburl = {https://dblp.org/rec/conf/dimva/PfisterMBKRA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KirchnerMM0RJ24, author = {Robin Kirchner and Jonas M{\"{o}}ller and Marius Musch and David Klein and Konrad Rieck and Martin Johns}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/kirchner}, timestamp = {Mon, 22 Jul 2024 17:10:49 +0200}, biburl = {https://dblp.org/rec/conf/uss/KirchnerMM0RJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-06122, author = {Dilyara Bareeva and Marina M.{-}C. H{\"{o}}hne and Alexander Warnecke and Lukas Pirch and Klaus{-}Robert M{\"{u}}ller and Konrad Rieck and Kirill Bykov}, title = {Manipulating Feature Visualizations with Gradient Slingshots}, journal = {CoRR}, volume = {abs/2401.06122}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.06122}, doi = {10.48550/ARXIV.2401.06122}, eprinttype = {arXiv}, eprint = {2401.06122}, timestamp = {Thu, 25 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-06122.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ArpQPWPWCR23, author = {Daniel Arp and Erwin Quiring and Feargus Pendlebury and Alexander Warnecke and Fabio Pierazzi and Christian Wressnegger and Lorenzo Cavallaro and Konrad Rieck}, title = {Lessons Learned on Machine Learning for Computer Security}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {5}, pages = {72--77}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3287207}, doi = {10.1109/MSEC.2023.3287207}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/ArpQPWPWCR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/QuiringMR23, author = {Erwin Quiring and Andreas M{\"{u}}ller and Konrad Rieck}, title = {On the Detection of Image-Scaling Attacks in Machine Learning}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {506--520}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627134}, doi = {10.1145/3627106.3627134}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/QuiringMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GanzIHR23, author = {Tom Ganz and Erik Imgrund and Martin H{\"{a}}rterich and Konrad Rieck}, title = {{PAVUDI:} Patch-based Vulnerability Discovery using Machine Learning}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {704--717}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627188}, doi = {10.1145/3627106.3627188}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GanzIHR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/artman/Rieck23, author = {Konrad Rieck}, editor = {Gregory Blanc and Takeshi Takahashi and Zonghua Zhang}, title = {When Papers Choose Their Reviewers: Adversarial Machine Learning in Peer Review}, booktitle = {Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy {ML} Systems in Autonomous Networks, {ARTMAN} 2023, Copenhagen, Denmark, 30 November 2023}, pages = {3}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605772.3625394}, doi = {10.1145/3605772.3625394}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/artman/Rieck23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ImgrundGHPRR23, author = {Erik Imgrund and Tom Ganz and Martin H{\"{a}}rterich and Lukas Pirch and Niklas Risse and Konrad Rieck}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Broken Promises: Measuring Confounding Effects in Learning-based Vulnerability Discovery}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {149--160}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623915}, doi = {10.1145/3605764.3623915}, timestamp = {Sat, 02 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ImgrundGHPRR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/GanzAHR23, author = {Tom Ganz and Inaam Ashraf and Martin H{\"{a}}rterich and Konrad Rieck}, editor = {Mohamed Shehab and Maribel Fern{\'{a}}ndez and Ninghui Li}, title = {Detecting Backdoors in Collaboration Graphs of Software Repositories}, booktitle = {Proceedings of the Thirteenth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26, 2023}, pages = {189--200}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577923.3583657}, doi = {10.1145/3577923.3583657}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/GanzAHR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/GanzIHR23, author = {Tom Ganz and Erik Imgrund and Martin H{\"{a}}rterich and Konrad Rieck}, editor = {Vijayalakshmi Atluri and Anna Lisa Ferrara}, title = {CodeGraphSMOTE - Data Augmentation for Vulnerability Discovery}, booktitle = {Data and Applications Security and Privacy {XXXVII} - 37th Annual {IFIP} {WG} 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19-21, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13942}, pages = {282--301}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-37586-6\_17}, doi = {10.1007/978-3-031-37586-6\_17}, timestamp = {Fri, 14 Jul 2023 22:01:48 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/GanzIHR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SeidelEPRMY23, author = {Lukas Seidel and Sedick David Baker Effendi and Xavier Pinho and Konrad Rieck and Brink van der Merwe and Fabian Yamaguchi}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Learning Type Inference for Enhanced Dataflow Analysis}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14347}, pages = {184--203}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51482-1\_10}, doi = {10.1007/978-3-031-51482-1\_10}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/SeidelEPRMY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/GanzRHR23, author = {Tom Ganz and Philipp Rall and Martin H{\"{a}}rterich and Konrad Rieck}, title = {Hunting for Truth: Analyzing Explanation Methods in Learning-based Vulnerability Discovery}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {524--541}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00038}, doi = {10.1109/EUROSP57164.2023.00038}, timestamp = {Mon, 07 Aug 2023 15:56:23 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/GanzRHR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/CzybikHR23, author = {Stefan Czybik and Micha Horlboge and Konrad Rieck}, editor = {Marie{-}Jos{\'{e}} Montpetit and Aris Leivadeas and Steve Uhlig and Mobin Javed}, title = {Lazy Gatekeepers: {A} Large-Scale Study on {SPF} Configuration in the Wild}, booktitle = {Proceedings of the 2023 {ACM} on Internet Measurement Conference, {IMC} 2023, Montreal, QC, Canada, October 24-26, 2023}, pages = {344--355}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3618257.3624827}, doi = {10.1145/3618257.3624827}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/CzybikHR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WarneckePWR23, author = {Alexander Warnecke and Lukas Pirch and Christian Wressnegger and Konrad Rieck}, title = {Machine Unlearning of Features and Labels}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/machine-unlearning-of-features-and-labels/}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/WarneckePWR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/EisenhoferQMRHR23, author = {Thorsten Eisenhofer and Erwin Quiring and Jonas M{\"{o}}ller and Doreen Riepel and Thorsten Holz and Konrad Rieck}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {No more Reviewer {\#}2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5109--5126}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/eisenhofer}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/EisenhoferQMRHR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-14443, author = {Thorsten Eisenhofer and Erwin Quiring and Jonas M{\"{o}}ller and Doreen Riepel and Thorsten Holz and Konrad Rieck}, title = {No more Reviewer {\#}2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning}, journal = {CoRR}, volume = {abs/2303.14443}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.14443}, doi = {10.48550/ARXIV.2303.14443}, eprinttype = {arXiv}, eprint = {2303.14443}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-14443.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-08411, author = {Alexander Warnecke and Julian Speith and Jan{-}Niklas M{\"{o}}ller and Konrad Rieck and Christof Paar}, title = {Evil from Within: Machine Learning Backdoors through Hardware Trojans}, journal = {CoRR}, volume = {abs/2304.08411}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.08411}, doi = {10.48550/ARXIV.2304.08411}, eprinttype = {arXiv}, eprint = {2304.08411}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-08411.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-00673, author = {Lukas Seidel and Sedick David Baker Effendi and Xavier Pinho and Konrad Rieck and Brink van der Merwe and Fabian Yamaguchi}, title = {Learning Type Inference for Enhanced Dataflow Analysis}, journal = {CoRR}, volume = {abs/2310.00673}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.00673}, doi = {10.48550/ARXIV.2310.00673}, eprinttype = {arXiv}, eprint = {2310.00673}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-00673.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-15085, author = {Erwin Quiring and Andreas M{\"{u}}ller and Konrad Rieck}, title = {On the Detection of Image-Scaling Attacks in Machine Learning}, journal = {CoRR}, volume = {abs/2310.15085}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.15085}, doi = {10.48550/ARXIV.2310.15085}, eprinttype = {arXiv}, eprint = {2310.15085}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-15085.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/CzybikAR22, author = {Stefan Czybik and Daniel Arp and Konrad Rieck}, editor = {Anupam Joshi and Maribel Fern{\'{a}}ndez and Rakesh M. Verma}, title = {Quantifying the Risk of Wormhole Attacks on Bluetooth Contact Tracing}, booktitle = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022}, pages = {264--275}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3508398.3511496}, doi = {10.1145/3508398.3511496}, timestamp = {Wed, 20 Apr 2022 12:17:48 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/CzybikAR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WesselkampRAQ22, author = {Vera Wesselkamp and Konrad Rieck and Daniel Arp and Erwin Quiring}, title = {Misleading Deep-Fake Detection with {GAN} Fingerprints}, booktitle = {43rd {IEEE} Security and Privacy, {SP} Workshops 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {59--65}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SPW54247.2022.9833860}, doi = {10.1109/SPW54247.2022.9833860}, timestamp = {Thu, 21 Sep 2023 16:11:09 +0200}, biburl = {https://dblp.org/rec/conf/sp/WesselkampRAQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ArpQPWPWCR22, author = {Daniel Arp and Erwin Quiring and Feargus Pendlebury and Alexander Warnecke and Fabio Pierazzi and Christian Wressnegger and Lorenzo Cavallaro and Konrad Rieck}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Dos and Don'ts of Machine Learning in Computer Security}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {3971--3988}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/arp}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/ArpQPWPWCR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-12543, author = {Vera Wesselkamp and Konrad Rieck and Daniel Arp and Erwin Quiring}, title = {Misleading Deep-Fake Detection with {GAN} Fingerprints}, journal = {CoRR}, volume = {abs/2205.12543}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.12543}, doi = {10.48550/ARXIV.2205.12543}, eprinttype = {arXiv}, eprint = {2205.12543}, timestamp = {Mon, 30 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-12543.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-12553, author = {Micha Horlboge and Erwin Quiring and Roland Meyer and Konrad Rieck}, title = {I still know it's you! On Challenges in Anonymizing Source Code}, journal = {CoRR}, volume = {abs/2208.12553}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.12553}, doi = {10.48550/ARXIV.2208.12553}, eprinttype = {arXiv}, eprint = {2208.12553}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-12553.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/BiggioCLRC22, author = {Battista Biggio and Nicholas Carlini and Pavel Laskov and Konrad Rieck and Antonio Emanuele Cin{\`{a}}}, title = {Security of Machine Learning (Dagstuhl Seminar 22281)}, journal = {Dagstuhl Reports}, volume = {12}, number = {7}, pages = {41--61}, year = {2022}, url = {https://doi.org/10.4230/DagRep.12.7.41}, doi = {10.4230/DAGREP.12.7.41}, timestamp = {Tue, 07 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/BiggioCLRC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/DirksenKMSRJ21, author = {Alexandra Dirksen and David Klein and Robert Michael and Tilman Stehr and Konrad Rieck and Martin Johns}, title = {LogPicker: Strengthening Certificate Transparency Against Covert Adversaries}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {4}, pages = {184--202}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0066}, doi = {10.2478/POPETS-2021-0066}, timestamp = {Tue, 28 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/DirksenKMSRJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KuhnapfelPNSRW21, author = {Niclas K{\"{u}}hnapfel and Stefan Preu{\ss}ler and Maximilian Noppel and Thomas Schneider and Konrad Rieck and Christian Wressnegger}, title = {LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {796--811}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485911}, doi = {10.1145/3485832.3485911}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KuhnapfelPNSRW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HilgefortAR21, author = {Jan Malte Hilgefort and Daniel Arp and Konrad Rieck}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {Spying through Virtual Backgrounds of Video Calls}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {135--144}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486870}, doi = {10.1145/3474369.3486870}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HilgefortAR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GanzHWR21, author = {Tom Ganz and Martin H{\"{a}}rterich and Alexander Warnecke and Konrad Rieck}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {Explaining Graph Neural Networks for Vulnerability Discovery}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {145--156}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486866}, doi = {10.1145/3474369.3486866}, timestamp = {Tue, 02 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GanzHWR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/PirchWWR21, author = {Lukas Pirch and Alexander Warnecke and Christian Wressnegger and Konrad Rieck}, title = {TagVet: Vetting Malware Tags using Explainable Machine Learning}, booktitle = {EuroSec '21: Proceedings of the 14th European Workshop on Systems Security, Virtual Event / Edinburgh, Scotland, UK, April 26, 2021}, pages = {34--40}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3447852.3458719}, doi = {10.1145/3447852.3458719}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosec/PirchWWR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-04119, author = {Niclas K{\"{u}}hnapfel and Stefan Preu{\ss}ler and Maximilian Noppel and Thomas Schneider and Konrad Rieck and Christian Wressnegger}, title = {LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems}, journal = {CoRR}, volume = {abs/2106.04119}, year = {2021}, url = {https://arxiv.org/abs/2106.04119}, eprinttype = {arXiv}, eprint = {2106.04119}, timestamp = {Fri, 11 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-04119.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-11577, author = {Alexander Warnecke and Lukas Pirch and Christian Wressnegger and Konrad Rieck}, title = {Machine Unlearning of Features and Labels}, journal = {CoRR}, volume = {abs/2108.11577}, year = {2021}, url = {https://arxiv.org/abs/2108.11577}, eprinttype = {arXiv}, eprint = {2108.11577}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-11577.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-09411, author = {Andr{\'{e}} Noll Barreto and Stefan K{\"{o}}psell and Arsenia Chorti and Bertram Poettering and Jens Jelitto and Julia Hesse and Jonathan Boole and Konrad Rieck and Marios Kountouris and Dave Singel{\'{e}}e and Kumar Ashwinee}, title = {Towards Intelligent Context-Aware 6G Security}, journal = {CoRR}, volume = {abs/2112.09411}, year = {2021}, url = {https://arxiv.org/abs/2112.09411}, eprinttype = {arXiv}, eprint = {2112.09411}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-09411.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/KellnerWR20, author = {Ansgar Kellner and Christian Wressnegger and Konrad Rieck}, editor = {Lorenzo Cavallaro and Andrea Lanzi}, title = {What's all that noise: analysis and detection of propaganda on Twitter}, booktitle = {Proceedings of the 13th European Workshop on Systems Security, EuroSec@EuroSys 2020, Heraklion, Greece, April 27, 2020}, pages = {25--30}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3380786.3391399}, doi = {10.1145/3380786.3391399}, timestamp = {Fri, 08 May 2020 16:26:35 +0200}, biburl = {https://dblp.org/rec/conf/eurosec/KellnerWR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/WarneckeAWR20, author = {Alexander Warnecke and Daniel Arp and Christian Wressnegger and Konrad Rieck}, title = {Evaluating Explanation Methods for Deep Learning in Security}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2020, Genoa, Italy, September 7-11, 2020}, pages = {158--174}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSP48549.2020.00018}, doi = {10.1109/EUROSP48549.2020.00018}, timestamp = {Tue, 10 Nov 2020 11:45:04 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/WarneckeAWR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpr/ScalasRG20, author = {Michele Scalas and Konrad Rieck and Giorgio Giacinto}, editor = {Alberto Del Bimbo and Rita Cucchiara and Stan Sclaroff and Giovanni Maria Farinella and Tao Mei and Marco Bertini and Hugo Jair Escalante and Roberto Vezzani}, title = {Explanation-Driven Characterization of Android Ransomware}, booktitle = {Pattern Recognition. {ICPR} International Workshops and Challenges - Virtual Event, January 10-15, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12663}, pages = {228--242}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68796-0\_17}, doi = {10.1007/978-3-030-68796-0\_17}, timestamp = {Tue, 11 Apr 2023 17:29:51 +0200}, biburl = {https://dblp.org/rec/conf/icpr/ScalasRG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/QuiringR20, author = {Erwin Quiring and Konrad Rieck}, title = {Backdooring and Poisoning Neural Networks with Image-Scaling Attacks}, booktitle = {2020 {IEEE} Security and Privacy Workshops, {SP} Workshops, San Francisco, CA, USA, May 21, 2020}, pages = {41--47}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SPW50608.2020.00024}, doi = {10.1109/SPW50608.2020.00024}, timestamp = {Thu, 21 Sep 2023 16:11:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/QuiringR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/QuiringKAJR20, author = {Erwin Quiring and David Klein and Daniel Arp and Martin Johns and Konrad Rieck}, editor = {Srdjan Capkun and Franziska Roesner}, title = {Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {1363--1380}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/quiring}, timestamp = {Tue, 28 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/QuiringKAJR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-08633, author = {Erwin Quiring and Konrad Rieck}, title = {Backdooring and Poisoning Neural Networks with Image-Scaling Attacks}, journal = {CoRR}, volume = {abs/2003.08633}, year = {2020}, url = {https://arxiv.org/abs/2003.08633}, eprinttype = {arXiv}, eprint = {2003.08633}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-08633.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-09470, author = {Daniel Arp and Erwin Quiring and Feargus Pendlebury and Alexander Warnecke and Fabio Pierazzi and Christian Wressnegger and Lorenzo Cavallaro and Konrad Rieck}, title = {Dos and Don'ts of Machine Learning in Computer Security}, journal = {CoRR}, volume = {abs/2010.09470}, year = {2020}, url = {https://arxiv.org/abs/2010.09470}, eprinttype = {arXiv}, eprint = {2010.09470}, timestamp = {Wed, 21 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-09470.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-09569, author = {Erwin Quiring and Lukas Pirch and Michael Reimsbach and Daniel Arp and Konrad Rieck}, title = {Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification}, journal = {CoRR}, volume = {abs/2010.09569}, year = {2020}, url = {https://arxiv.org/abs/2010.09569}, eprinttype = {arXiv}, eprint = {2010.09569}, timestamp = {Wed, 21 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-09569.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DemontisMBMARCG19, author = {Ambra Demontis and Marco Melis and Battista Biggio and Davide Maiorca and Daniel Arp and Konrad Rieck and Igino Corona and Giorgio Giacinto and Fabio Roli}, title = {Yes, Machine Learning Can Be More Secure! {A} Case Study on Android Malware Detection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {4}, pages = {711--724}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2700270}, doi = {10.1109/TDSC.2017.2700270}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DemontisMBMARCG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MuschWJR19, author = {Marius Musch and Christian Wressnegger and Martin Johns and Konrad Rieck}, title = {Thieves in the Browser: Web-based Cryptojacking in the Wild}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {4:1--4:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339261}, doi = {10.1145/3339252.3339261}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/MuschWJR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/MuschWJR19, author = {Marius Musch and Christian Wressnegger and Martin Johns and Konrad Rieck}, editor = {Roberto Perdisci and Cl{\'{e}}mentine Maurice and Giorgio Giacinto and Magnus Almgren}, title = {New Kid on the Web: {A} Study on the Prevalence of WebAssembly in the Wild}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11543}, pages = {23--42}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22038-9\_2}, doi = {10.1007/978-3-030-22038-9\_2}, timestamp = {Sun, 04 Aug 2024 19:42:33 +0200}, biburl = {https://dblp.org/rec/conf/dimva/MuschWJR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/MaierGWR19, author = {Alwin Maier and Hugo Gascon and Christian Wressnegger and Konrad Rieck}, editor = {Roberto Perdisci and Cl{\'{e}}mentine Maurice and Giorgio Giacinto and Magnus Almgren}, title = {TypeMiner: Recovering Types in Binary Programs Using Machine Learning}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11543}, pages = {288--308}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22038-9\_14}, doi = {10.1007/978-3-030-22038-9\_14}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/MaierGWR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/QuiringKR19, author = {Erwin Quiring and Matthias Kirchner and Konrad Rieck}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {On the Security and Applicability of Fragile Camera Fingerprints}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {450--470}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_22}, doi = {10.1007/978-3-030-29959-0\_22}, timestamp = {Fri, 07 Aug 2020 17:57:31 +0200}, biburl = {https://dblp.org/rec/conf/esorics/QuiringKR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/KellnerHRW19, author = {Ansgar Kellner and Micha Horlboge and Konrad Rieck and Christian Wressnegger}, title = {False Sense of Security: {A} Study on the Effectivity of Jailbreak Detection in Banking Apps}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {1--14}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00011}, doi = {10.1109/EUROSP.2019.00011}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/KellnerHRW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/QuiringMR19, author = {Erwin Quiring and Alwin Maier and Konrad Rieck}, editor = {Nadia Heninger and Patrick Traynor}, title = {Misleading Authorship Attribution of Source Code using Adversarial Learning}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {479--496}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/quiring}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/QuiringMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-12386, author = {Erwin Quiring and Alwin Maier and Konrad Rieck}, title = {Misleading Authorship Attribution of Source Code using Adversarial Learning}, journal = {CoRR}, volume = {abs/1905.12386}, year = {2019}, url = {http://arxiv.org/abs/1905.12386}, eprinttype = {arXiv}, eprint = {1905.12386}, timestamp = {Mon, 03 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-12386.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-02108, author = {Alexander Warnecke and Daniel Arp and Christian Wressnegger and Konrad Rieck}, title = {Don't Paint It Black: White-Box Explanations for Deep Learning in Computer Security}, journal = {CoRR}, volume = {abs/1906.02108}, year = {2019}, url = {http://arxiv.org/abs/1906.02108}, eprinttype = {arXiv}, eprint = {1906.02108}, timestamp = {Thu, 13 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-02108.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-04025, author = {Erwin Quiring and Matthias Kirchner and Konrad Rieck}, title = {On the Security and Applicability of Fragile Camera Fingerprints}, journal = {CoRR}, volume = {abs/1907.04025}, year = {2019}, url = {http://arxiv.org/abs/1907.04025}, eprinttype = {arXiv}, eprint = {1907.04025}, timestamp = {Wed, 17 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-04025.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-04143, author = {Ansgar Kellner and Lisa Rangosch and Christian Wressnegger and Konrad Rieck}, title = {Political Elections Under (Social) Fire? Analysis and Detection of Propaganda on Twitter}, journal = {CoRR}, volume = {abs/1912.04143}, year = {2019}, url = {http://arxiv.org/abs/1912.04143}, eprinttype = {arXiv}, eprint = {1912.04143}, timestamp = {Thu, 02 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-04143.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Rieck18, author = {Konrad Rieck}, editor = {Roger A. Hallman and Shujun Li and Victor Chang}, title = {Family Reunion: Adversarial Machine Learning meets Digital Watermarking}, booktitle = {Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, MPS@CCS 2018, Toronto, ON, Canada, October 15, 2018}, pages = {1}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3267357.3267366}, doi = {10.1145/3267357.3267366}, timestamp = {Mon, 16 Nov 2020 11:14:54 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Rieck18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/WressneggerKR18, author = {Christian Wressnegger and Ansgar Kellner and Konrad Rieck}, title = {{ZOE:} Content-Based Anomaly Detection for Industrial Control Systems}, booktitle = {48th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2018, Luxembourg City, Luxembourg, June 25-28, 2018}, pages = {127--138}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/DSN.2018.00025}, doi = {10.1109/DSN.2018.00025}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/WressneggerKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/QuiringAR18, author = {Erwin Quiring and Daniel Arp and Konrad Rieck}, title = {Forgotten Siblings: Unifying Attacks on Machine Learning and Digital Watermarking}, booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2018, London, United Kingdom, April 24-26, 2018}, pages = {488--502}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EuroSP.2018.00041}, doi = {10.1109/EUROSP.2018.00041}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/QuiringAR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eusipco/QuiringR18, author = {Erwin Quiring and Konrad Rieck}, title = {Adversarial Machine Learning Against Digital Watermarking}, booktitle = {26th European Signal Processing Conference, {EUSIPCO} 2018, Roma, Italy, September 3-7, 2018}, pages = {519--523}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/EUSIPCO.2018.8553343}, doi = {10.23919/EUSIPCO.2018.8553343}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/eusipco/QuiringR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/CaliskanYDHRGN18, author = {Aylin Caliskan and Fabian Yamaguchi and Edwin Dauber and Richard E. Harang and Konrad Rieck and Rachel Greenstadt and Arvind Narayanan}, title = {When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_06B-2\_Caliskan\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/CaliskanYDHRGN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GasconUSR18, author = {Hugo Gascon and Steffen Ullrich and Benjamin Stritter and Konrad Rieck}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {69--91}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_4}, doi = {10.1007/978-3-030-00470-5\_4}, timestamp = {Mon, 20 Nov 2023 09:00:29 +0100}, biburl = {https://dblp.org/rec/conf/raid/GasconUSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ArpQKDR18, author = {Daniel Arp and Erwin Quiring and Tammo Krueger and Stanimir Dragiev and Konrad Rieck}, editor = {Raheem Beyah and Bing Chang and Yingjiu Li and Sencun Zhu}, title = {Privacy-Enhanced Fraud Detection with Bloom Filters}, booktitle = {Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {254}, pages = {396--415}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01701-9\_22}, doi = {10.1007/978-3-030-01701-9\_22}, timestamp = {Fri, 11 Jan 2019 16:12:16 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/ArpQKDR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurosys/2018eurosec, editor = {Angelos Stavrou and Konrad Rieck}, title = {Proceedings of the 11th European Workshop on Systems Security, EuroSec@EuroSys 2018, Porto, Portugal, April 23, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3193111}, doi = {10.1145/3193111}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/2018eurosec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-09474, author = {Marius Musch and Christian Wressnegger and Martin Johns and Konrad Rieck}, title = {Web-based Cryptojacking in the Wild}, journal = {CoRR}, volume = {abs/1808.09474}, year = {2018}, url = {http://arxiv.org/abs/1808.09474}, eprinttype = {arXiv}, eprint = {1808.09474}, timestamp = {Mon, 03 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-09474.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-09985, author = {Battista Biggio and Konrad Rieck and Davide Ariu and Christian Wressnegger and Igino Corona and Giorgio Giacinto and Fabio Roli}, title = {Poisoning Behavioral Malware Clustering}, journal = {CoRR}, volume = {abs/1811.09985}, year = {2018}, url = {http://arxiv.org/abs/1811.09985}, eprinttype = {arXiv}, eprint = {1811.09985}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-09985.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/Rieck17, author = {Konrad Rieck}, title = {Vulnerability analysis}, journal = {it Inf. Technol.}, volume = {59}, number = {2}, pages = {57}, year = {2017}, url = {https://doi.org/10.1515/itit-2016-0059}, doi = {10.1515/ITIT-2016-0059}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/it/Rieck17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/WressneggerYMR17, author = {Christian Wressnegger and Fabian Yamaguchi and Alwin Maier and Konrad Rieck}, title = {64-Bit Migration Vulnerabilities}, journal = {it Inf. Technol.}, volume = {59}, number = {2}, pages = {73}, year = {2017}, url = {https://doi.org/10.1515/itit-2016-0041}, doi = {10.1515/ITIT-2016-0041}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/it/WressneggerYMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WressneggerFYR17, author = {Christian Wressnegger and Kevin Freeman and Fabian Yamaguchi and Konrad Rieck}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {587--598}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053002}, doi = {10.1145/3052973.3053002}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WressneggerFYR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/GasconGSRAR17, author = {Hugo Gascon and Bernd Grobauer and Thomas Schreck and Lukas Rist and Daniel Arp and Konrad Rieck}, editor = {Gail{-}Joon Ahn and Alexander Pretschner and Gabriel Ghinita}, title = {Mining Attributed Graphs for Threat Intelligence}, booktitle = {Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24, 2017}, pages = {15--22}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3029806.3029811}, doi = {10.1145/3029806.3029811}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/GasconGSRAR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/WressneggerR17, author = {Christian Wressnegger and Konrad Rieck}, editor = {Cristiano Giuffrida and Angelos Stavrou}, title = {Looking Back on Three Years of Flash-based Malware}, booktitle = {Proceedings of the 10th European Workshop on Systems Security, {EUROSEC} 2017, Belgrade, Serbia, April 23, 2017}, pages = {6:1--6:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3065913.3065921}, doi = {10.1145/3065913.3065921}, timestamp = {Tue, 06 Nov 2018 16:58:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosec/WressneggerR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/GoltzscheWMRPK17, author = {David Goltzsche and Colin Wulf and Divya Muthukumaran and Konrad Rieck and Peter R. Pietzuch and R{\"{u}}diger Kapitza}, editor = {Cristiano Giuffrida and Angelos Stavrou}, title = {TrustJS: Trusted Client-side Execution of JavaScript}, booktitle = {Proceedings of the 10th European Workshop on Systems Security, {EUROSEC} 2017, Belgrade, Serbia, April 23, 2017}, pages = {7:1--7:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3065913.3065917}, doi = {10.1145/3065913.3065917}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosec/GoltzscheWMRPK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ArpQWR17, author = {Daniel Arp and Erwin Quiring and Christian Wressnegger and Konrad Rieck}, title = {Privacy Threats through Ultrasonic Side Channels on Mobile Devices}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {35--47}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.33}, doi = {10.1109/EUROSP.2017.33}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/ArpQWR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/0001RSSY17, author = {Michael Backes and Konrad Rieck and Malte Skoruppa and Ben Stock and Fabian Yamaguchi}, title = {Efficient and Flexible Discovery of {PHP} Application Vulnerabilities}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {334--349}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.14}, doi = {10.1109/EUROSP.2017.14}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/0001RSSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ShastryLFTYRSSF17, author = {Bhargava Shastry and Markus Leutner and Tobias Fiebig and Kashyap Thimmaraju and Fabian Yamaguchi and Konrad Rieck and Stefan Schmid and Jean{-}Pierre Seifert and Anja Feldmann}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Static Program Analysis as a Fuzzing Aid}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {26--47}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_2}, doi = {10.1007/978-3-319-66332-6\_2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ShastryLFTYRSSF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/ShastryMYRS17, author = {Bhargava Shastry and Federico Maggi and Fabian Yamaguchi and Konrad Rieck and Jean{-}Pierre Seifert}, editor = {William Enck and Collin Mulliner}, title = {Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing}, booktitle = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver, BC, Canada, August 14-15, 2017}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/woot17/workshop-program/presentation/shastry}, timestamp = {Mon, 01 Feb 2021 08:41:51 +0100}, biburl = {https://dblp.org/rec/conf/woot/ShastryMYRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/UnruhSSMRSY17, author = {Tommi Unruh and Bhargava Shastry and Malte Skoruppa and Federico Maggi and Konrad Rieck and Jean{-}Pierre Seifert and Fabian Yamaguchi}, editor = {William Enck and Collin Mulliner}, title = {Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery}, booktitle = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver, BC, Canada, August 14-15, 2017}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/woot17/workshop-program/presentation/unruh}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/woot/UnruhSSMRSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/QuiringAR17, author = {Erwin Quiring and Daniel Arp and Konrad Rieck}, title = {Fraternal Twins: Unifying Attacks on Machine Learning and Digital Watermarking}, journal = {CoRR}, volume = {abs/1703.05561}, year = {2017}, url = {http://arxiv.org/abs/1703.05561}, eprinttype = {arXiv}, eprint = {1703.05561}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/QuiringAR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/UnruhSSMRSY17, author = {Tommi Unruh and Bhargava Shastry and Malte Skoruppa and Federico Maggi and Konrad Rieck and Jean{-}Pierre Seifert and Fabian Yamaguchi}, title = {Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery}, journal = {CoRR}, volume = {abs/1704.02786}, year = {2017}, url = {http://arxiv.org/abs/1704.02786}, eprinttype = {arXiv}, eprint = {1704.02786}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/UnruhSSMRSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DemontisMBMARCG17, author = {Ambra Demontis and Marco Melis and Battista Biggio and Davide Maiorca and Daniel Arp and Konrad Rieck and Igino Corona and Giorgio Giacinto and Fabio Roli}, title = {Yes, Machine Learning Can Be More Secure! {A} Case Study on Android Malware Detection}, journal = {CoRR}, volume = {abs/1704.08996}, year = {2017}, url = {http://arxiv.org/abs/1704.08996}, eprinttype = {arXiv}, eprint = {1704.08996}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DemontisMBMARCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ShastryMYRS17, author = {Bhargava Shastry and Federico Maggi and Fabian Yamaguchi and Konrad Rieck and Jean{-}Pierre Seifert}, title = {Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing}, journal = {CoRR}, volume = {abs/1706.00206}, year = {2017}, url = {http://arxiv.org/abs/1706.00206}, eprinttype = {arXiv}, eprint = {1706.00206}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ShastryMYRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/YamaguchiR16, author = {Fabian Yamaguchi and Konrad Rieck}, title = {Die Codeanalyseplattform "Octopus"}, journal = {Datenschutz und Datensicherheit}, volume = {40}, number = {11}, pages = {713--717}, year = {2016}, url = {https://doi.org/10.1007/s11623-016-0689-4}, doi = {10.1007/S11623-016-0689-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/YamaguchiR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmlr/RieckW16, author = {Konrad Rieck and Christian Wressnegger}, title = {Harry: {A} Tool for Measuring String Similarity}, journal = {J. Mach. Learn. Res.}, volume = {17}, pages = {9:1--9:5}, year = {2016}, url = {https://jmlr.org/papers/v17/rieck16a.html}, timestamp = {Wed, 11 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmlr/RieckW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/KurtzGBRF16, author = {Andreas Kurtz and Hugo Gascon and Tobias Becker and Konrad Rieck and Felix C. Freiling}, title = {Fingerprinting Mobile Devices Using Personalized Configurations}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2016}, number = {1}, pages = {4--19}, year = {2016}, url = {https://doi.org/10.1515/popets-2015-0027}, doi = {10.1515/POPETS-2015-0027}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/KurtzGBRF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WressneggerYMR16, author = {Christian Wressnegger and Fabian Yamaguchi and Alwin Maier and Konrad Rieck}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {541--552}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978403}, doi = {10.1145/2976749.2978403}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WressneggerYMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/ShastryYRS16, author = {Bhargava Shastry and Fabian Yamaguchi and Konrad Rieck and Jean{-}Pierre Seifert}, editor = {Juan Caballero and Urko Zurutuza and Ricardo J. Rodr{\'{\i}}guez}, title = {Towards Vulnerability Discovery Using Staged Program Analysis}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, {DIMVA} 2016, San Sebasti{\'{a}}n, Spain, July 7-8, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9721}, pages = {78--97}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40667-1\_5}, doi = {10.1007/978-3-319-40667-1\_5}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/ShastryYRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/WressneggerYAR16, author = {Christian Wressnegger and Fabian Yamaguchi and Daniel Arp and Konrad Rieck}, editor = {Juan Caballero and Urko Zurutuza and Ricardo J. Rodr{\'{\i}}guez}, title = {Comprehensive Analysis and Detection of Flash-Based Malware}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, {DIMVA} 2016, San Sebasti{\'{a}}n, Spain, July 7-8, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9721}, pages = {101--121}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40667-1\_6}, doi = {10.1007/978-3-319-40667-1\_6}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/WressneggerYAR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/HartungKRH16, author = {Salke Hartung and Ansgar Kellner and Konrad Rieck and Dieter Hogrefe}, title = {Monte Carlo Localization for path-based mobility in mobile wireless sensor networks}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2016, Doha, Qatar, April 3-6, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/WCNC.2016.7564906}, doi = {10.1109/WCNC.2016.7564906}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/HartungKRH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WressneggerFYR16, author = {Christian Wressnegger and Kevin Freeman and Fabian Yamaguchi and Konrad Rieck}, title = {From Malware Signatures to Anti-Virus Assisted Attacks}, journal = {CoRR}, volume = {abs/1610.06022}, year = {2016}, url = {http://arxiv.org/abs/1610.06022}, eprinttype = {arXiv}, eprint = {1610.06022}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WressneggerFYR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PerlD0AYRFA15, author = {Henning Perl and Sergej Dechand and Matthew Smith and Daniel Arp and Fabian Yamaguchi and Konrad Rieck and Sascha Fahl and Yasemin Acar}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {426--437}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813604}, doi = {10.1145/2810103.2813604}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PerlD0AYRFA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArpYR15, author = {Daniel Arp and Fabian Yamaguchi and Konrad Rieck}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Torben: {A} Practical Side-Channel Attack for Deanonymizing Tor Communication}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {597--602}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714627}, doi = {10.1145/2714576.2714627}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ArpYR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/GasconWYAR15, author = {Hugo Gascon and Christian Wressnegger and Fabian Yamaguchi and Daniel Arp and Konrad Rieck}, editor = {Bhavani Thuraisingham and XiaoFeng Wang and Vinod Yegneswaran}, title = {Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols}, booktitle = {Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {164}, pages = {330--347}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28865-9\_18}, doi = {10.1007/978-3-319-28865-9\_18}, timestamp = {Wed, 29 Jun 2022 15:37:43 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/GasconWYAR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/YamaguchiMGR15, author = {Fabian Yamaguchi and Alwin Maier and Hugo Gascon and Konrad Rieck}, title = {Automatic Inference of Search Patterns for Taint-Style Vulnerabilities}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {797--812}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.54}, doi = {10.1109/SP.2015.54}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/YamaguchiMGR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/IslamYDHRGN15, author = {Aylin Caliskan Islam and Fabian Yamaguchi and Edwin Dauber and Richard E. Harang and Konrad Rieck and Rachel Greenstadt and Arvind Narayanan}, title = {When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries}, journal = {CoRR}, volume = {abs/1512.08546}, year = {2015}, url = {http://arxiv.org/abs/1512.08546}, eprinttype = {arXiv}, eprint = {1512.08546}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/IslamYDHRGN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiRW14, author = {Shujun Li and Konrad Rieck and Alan Woodward}, title = {Special issue on threat detection, analysis and defense}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {3}, pages = {163--164}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.08.001}, doi = {10.1016/J.JISA.2014.08.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiRW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BiggioRAWCGR14, author = {Battista Biggio and Konrad Rieck and Davide Ariu and Christian Wressnegger and Igino Corona and Giorgio Giacinto and Fabio Roli}, editor = {Christos Dimitrakakis and Aikaterini Mitrokotsa and Benjamin I. P. Rubinstein and Gail{-}Joon Ahn}, title = {Poisoning behavioral malware clustering}, booktitle = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014}, pages = {27--36}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666652.2666666}, doi = {10.1145/2666652.2666666}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BiggioRAWCGR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ArpSHGR14, author = {Daniel Arp and Michael Spreitzenbarth and Malte Hubner and Hugo Gascon and Konrad Rieck}, title = {{DREBIN:} Effective and Explainable Detection of Android Malware in Your Pocket}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/drebin-effective-and-explainable-detection-android-malware-your-pocket}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ArpSHGR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GasconUWR14, author = {Hugo Gascon and Sebastian Uellenbeck and Christopher Wolf and Konrad Rieck}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Continuous Authentication on Mobile Devices by Analysis of Typing Motion Behavior}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {1--12}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20035}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GasconUWR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/YamaguchiGAR14, author = {Fabian Yamaguchi and Nico Golde and Daniel Arp and Konrad Rieck}, title = {Modeling and Discovering Vulnerabilities with Code Property Graphs}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {590--604}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.44}, doi = {10.1109/SP.2014.44}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/YamaguchiGAR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GornitzKRB14, author = {Nico G{\"{o}}rnitz and Marius Kloft and Konrad Rieck and Ulf Brefeld}, title = {Toward Supervised Anomaly Detection}, journal = {CoRR}, volume = {abs/1401.6424}, year = {2014}, url = {http://arxiv.org/abs/1401.6424}, eprinttype = {arXiv}, eprint = {1401.6424}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GornitzKRB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jair/GoernitzKRB13, author = {Nico G{\"{o}}rnitz and Marius Kloft and Konrad Rieck and Ulf Brefeld}, title = {Toward Supervised Anomaly Detection}, journal = {J. Artif. Intell. Res.}, volume = {46}, pages = {235--262}, year = {2013}, url = {https://doi.org/10.1613/jair.3623}, doi = {10.1613/JAIR.3623}, timestamp = {Mon, 21 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jair/GoernitzKRB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Rieck13, author = {Konrad Rieck}, editor = {Ahmad{-}Reza Sadeghi and Blaine Nelson and Christos Dimitrakakis and Elaine Shi}, title = {Off the beaten path: machine learning for offensive security}, booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence and Security, Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013}, pages = {1--2}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517312.2517313}, doi = {10.1145/2517312.2517313}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Rieck13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GasconYAR13, author = {Hugo Gascon and Fabian Yamaguchi and Daniel Arp and Konrad Rieck}, editor = {Ahmad{-}Reza Sadeghi and Blaine Nelson and Christos Dimitrakakis and Elaine Shi}, title = {Structural detection of android malware using embedded call graphs}, booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence and Security, Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013}, pages = {45--54}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517312.2517315}, doi = {10.1145/2517312.2517315}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GasconYAR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WressneggerSAR13, author = {Christian Wressnegger and Guido Schwenk and Daniel Arp and Konrad Rieck}, editor = {Ahmad{-}Reza Sadeghi and Blaine Nelson and Christos Dimitrakakis and Elaine Shi}, title = {A close look on \emph{n}-grams in intrusion detection: anomaly detection vs. classification}, booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence and Security, Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013}, pages = {67--76}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517312.2517316}, doi = {10.1145/2517312.2517316}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WressneggerSAR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YamaguchiWGR13, author = {Fabian Yamaguchi and Christian Wressnegger and Hugo Gascon and Konrad Rieck}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Chucky: exposing missing checks in source code for vulnerability discovery}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {499--510}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516665}, doi = {10.1145/2508859.2516665}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YamaguchiWGR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WressneggerBR13, author = {Christian Wressnegger and Frank Boldewin and Konrad Rieck}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Deobfuscating Embedded Malware Using Probable-Plaintext Attacks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {164--183}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_9}, doi = {10.1007/978-3-642-41284-4\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/WressneggerBR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dimva/2013, editor = {Konrad Rieck and Patrick Stewin and Jean{-}Pierre Seifert}, title = {Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, {DIMVA} 2013, Berlin, Germany, July 18-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7967}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39235-1}, doi = {10.1007/978-3-642-39235-1}, isbn = {978-3-642-39234-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmlr/RieckWB12, author = {Konrad Rieck and Christian Wressnegger and Alexander Bikadorov}, title = {Sally: a tool for embedding strings in vector spaces}, journal = {J. Mach. Learn. Res.}, volume = {13}, pages = {3247--3251}, year = {2012}, url = {https://dl.acm.org/doi/10.5555/2503308.2503345}, doi = {10.5555/2503308.2503345}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmlr/RieckWB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pik/KruegerR12, author = {Tammo Krueger and Konrad Rieck}, title = {Intelligent Defense against Malicious JavaScript Code}, journal = {Prax. Inf.verarb. Kommun.}, volume = {35}, number = {1}, pages = {54--60}, year = {2012}, url = {https://doi.org/10.1515/pik-2012-0009}, doi = {10.1515/PIK-2012-0009}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pik/KruegerR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YamaguchiLR12, author = {Fabian Yamaguchi and Markus Lottmann and Konrad Rieck}, editor = {Robert H'obbes' Zakon}, title = {Generalized vulnerability extrapolation using abstract syntax trees}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {359--368}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421003}, doi = {10.1145/2420950.2421003}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YamaguchiLR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchuttKBR12, author = {Kristof Sch{\"{u}}tt and Marius Kloft and Alexander Bikadorov and Konrad Rieck}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Early detection of malicious behavior in JavaScript code}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {15--24}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381901}, doi = {10.1145/2381896.2381901}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SchuttKBR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KruegerGKR12, author = {Tammo Krueger and Hugo Gascon and Nicole Kr{\"{a}}mer and Konrad Rieck}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Learning stateful models for network honeypots}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {37--48}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381904}, doi = {10.1145/2381896.2381904}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KruegerGKR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchwenkBKR12, author = {Guido Schwenk and Alexander Bikadorov and Tammo Krueger and Konrad Rieck}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Autonomous learning for detection of JavaScript attacks: vision or reality?}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {93--104}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381911}, doi = {10.1145/2381896.2381911}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchwenkBKR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/Rieck11, author = {Konrad Rieck}, title = {Self-Learning Network Intrusion Detection}, journal = {it Inf. Technol.}, volume = {53}, number = {3}, pages = {152--156}, year = {2011}, url = {https://doi.org/10.1524/itit.2011.0637}, doi = {10.1524/ITIT.2011.0637}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/it/Rieck11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/RieckTWH11, author = {Konrad Rieck and Philipp Trinius and Carsten Willems and Thorsten Holz}, title = {Automatic analysis of malware behavior using machine learning}, journal = {J. Comput. Secur.}, volume = {19}, number = {4}, pages = {639--668}, year = {2011}, url = {https://doi.org/10.3233/JCS-2010-0410}, doi = {10.3233/JCS-2010-0410}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/RieckTWH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/widm/Rieck11, author = {Konrad Rieck}, title = {Similarity measures for sequential data}, journal = {WIREs Data Mining Knowl. Discov.}, volume = {1}, number = {4}, pages = {296--304}, year = {2011}, url = {https://doi.org/10.1002/widm.36}, doi = {10.1002/WIDM.36}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/widm/Rieck11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JawurekJR11, author = {Marek Jawurek and Martin Johns and Konrad Rieck}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Smart metering de-pseudonymization}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {227--236}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076764}, doi = {10.1145/2076732.2076764}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/JawurekJR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/Rieck11, author = {Konrad Rieck}, title = {Computer Security and Machine Learning: Worst Enemies or Best Friends?}, booktitle = {First SysSec Workshop 2011, SysSec@DIMVA 2011, Amsterdam, The Netherlands, July 6, 2011}, pages = {107--110}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.ieeecomputersociety.org/10.1109/SysSec.2011.16}, doi = {10.1109/SYSSEC.2011.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dimva/Rieck11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ec2nd/SchwenkR11, author = {Guido Schwenk and Konrad Rieck}, title = {Adaptive Detection of Covert Communication in {HTTP} Requests}, booktitle = {Seventh European Conference on Computer Network Defense, {EC2ND} 2011, Gothenburg, Sweden, September 6-7, 2011}, pages = {25--32}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/EC2ND.2011.12}, doi = {10.1109/EC2ND.2011.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ec2nd/SchwenkR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/YamaguchiLR11a, author = {Fabian Yamaguchi and Felix "FX" Lindner and Konrad Rieck}, editor = {David Brumley and Michal Zalewski}, title = {Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine Learning}, booktitle = {5th {USENIX} Workshop on Offensive Technologies, WOOT'11, August 8, 2011, San Francisco, CA, USA, Proceedings}, pages = {118--127}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/event/woot11/tech/final\_files/Yamaguchi.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/YamaguchiLR11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmlr/RieckKBM10, author = {Konrad Rieck and Tammo Krueger and Ulf Brefeld and Klaus{-}Robert M{\"{u}}ller}, title = {Approximate Tree Kernels}, journal = {J. Mach. Learn. Res.}, volume = {11}, pages = {555--580}, year = {2010}, url = {https://dl.acm.org/doi/10.5555/1756006.1756022}, doi = {10.5555/1756006.1756022}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmlr/RieckKBM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RieckKD10, author = {Konrad Rieck and Tammo Krueger and Andreas Dewald}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Cujo: efficient detection and prevention of drive-by-download attacks}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {31--39}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920267}, doi = {10.1145/1920261.1920267}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RieckKD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkdd/KruegerKR10, author = {Tammo Krueger and Nicole Kr{\"{a}}mer and Konrad Rieck}, editor = {Christos Dimitrakakis and Aris Gkoulalas{-}Divanis and Aikaterini Mitrokotsa and Vassilios S. Verykios and Y{\"{u}}cel Saygin}, title = {{ASAP:} Automatic Semantics-Aware Analysis of Network Payloads}, booktitle = {Privacy and Security Issues in Data Mining and Machine Learning - International {ECML/PKDD} Workshop, {PSDML} 2010, Barcelona, Spain, September 24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6549}, pages = {50--63}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19896-0\_5}, doi = {10.1007/978-3-642-19896-0\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkdd/KruegerKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/KruegerGRL10, author = {Tammo Krueger and Christian Gehl and Konrad Rieck and Pavel Laskov}, editor = {Sung Y. Shin and Sascha Ossowski and Michael Schumacher and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {TokDoc: a self-healing web application firewall}, booktitle = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010}, pages = {1846--1853}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1774088.1774480}, doi = {10.1145/1774088.1774480}, timestamp = {Sun, 02 Jun 2019 21:18:37 +0200}, biburl = {https://dblp.org/rec/conf/sac/KruegerGRL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/RieckSLHL10, author = {Konrad Rieck and Guido Schwenk and Tobias Limmer and Thorsten Holz and Pavel Laskov}, editor = {Sung Y. Shin and Sascha Ossowski and Michael Schumacher and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {Botzilla: detecting the "phoning home" of malicious software}, booktitle = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010}, pages = {1978--1984}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1774088.1774506}, doi = {10.1145/1774088.1774506}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/RieckSLHL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/TriniusWHR10, author = {Philipp Trinius and Carsten Willems and Thorsten Holz and Konrad Rieck}, editor = {Felix C. Freiling}, title = {A Malware Instruction Set for Behavior-Based Analysis}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {205--216}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19782}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/TriniusWHR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/de/Rieck2009, author = {Konrad Rieck}, title = {Machine learning for application layer intrusion detection}, school = {Berlin Institute of Technology}, year = {2009}, url = {http://opus.kobv.de/tuberlin/volltexte/2009/2284/}, urn = {urn:nbn:de:kobv:83-opus-22840}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/de/Rieck2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/WahlRLDM09, author = {Stefan Wahl and Konrad Rieck and Pavel Laskov and Peter Domschitz and Klaus{-}Robert M{\"{u}}ller}, title = {Securing {IMS} against novel threats}, journal = {Bell Labs Tech. J.}, volume = {14}, number = {1}, pages = {243--257}, year = {2009}, url = {https://doi.org/10.1002/bltj.20365}, doi = {10.1002/BLTJ.20365}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/WahlRLDM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GornitzKRB09, author = {Nico G{\"{o}}rnitz and Marius Kloft and Konrad Rieck and Ulf Brefeld}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Active learning for network intrusion detection}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009}, pages = {47--54}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1654988.1655002}, doi = {10.1145/1654988.1655002}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GornitzKRB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmlr/RieckL08, author = {Konrad Rieck and Pavel Laskov}, title = {Linear-Time Computation of Similarity Measures for Sequential Data}, journal = {J. Mach. Learn. Res.}, volume = {9}, pages = {23--48}, year = {2008}, url = {https://dl.acm.org/doi/10.5555/1390681.1390683}, doi = {10.5555/1390681.1390683}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmlr/RieckL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/RieckHWDL08, author = {Konrad Rieck and Thorsten Holz and Carsten Willems and Patrick D{\"{u}}ssel and Pavel Laskov}, editor = {Diego Zamboni}, title = {Learning and Classification of Malware Behavior}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, {DIMVA} 2008, Paris, France, July 10-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5137}, pages = {108--125}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70542-0\_6}, doi = {10.1007/978-3-540-70542-0\_6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dimva/RieckHWDL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/DusselGLR08, author = {Patrick D{\"{u}}ssel and Christian Gehl and Pavel Laskov and Konrad Rieck}, editor = {R. Sekar and Arun K. Pujari}, title = {Incorporation of Application Layer Protocol Syntax into Anomaly Detection}, booktitle = {Information Systems Security, 4th International Conference, {ICISS} 2008, Hyderabad, India, December 16-20, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {188--202}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89862-7\_17}, doi = {10.1007/978-3-540-89862-7\_17}, timestamp = {Thu, 18 Nov 2021 17:21:37 +0100}, biburl = {https://dblp.org/rec/conf/iciss/DusselGLR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptcomm/RieckWLDM08, author = {Konrad Rieck and Stefan Wahl and Pavel Laskov and Peter Domschitz and Klaus{-}Robert M{\"{u}}ller}, editor = {Henning Schulzrinne and Radu State and Saverio Niccolini}, title = {A Self-learning System for Detection of Anomalous {SIP} Messages}, booktitle = {Principles, Systems and Applications of {IP} Telecommunications. Services and Security for Next Generation Networks, Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5310}, pages = {90--106}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89054-6\_5}, doi = {10.1007/978-3-540-89054-6\_5}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptcomm/RieckWLDM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HolzGRF08, author = {Thorsten Holz and Christian Gorecki and Konrad Rieck and Felix C. Freiling}, title = {Measuring and Detecting Fast-Flux Service Networks}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2008, San Diego, California, USA, 10th February - 13th February 2008}, publisher = {The Internet Society}, year = {2008}, url = {https://www.ndss-symposium.org/ndss2008/measuring-and-detecting-fast-flux-service-networks/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/HolzGRF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BraunDHKKKLRS08, author = {Lothar Braun and Falko Dressler and Thorsten Holz and Engin Kirda and Jan Kohlrausch and Christopher Kruegel and Tobias Limmer and Konrad Rieck and James P. G. Sterbenz}, editor = {Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K{\"{o}}nig and Christopher Kruegel}, title = {08102 Working Group -- Requirements for Network Monitoring from an {IDS} Perspective}, booktitle = {Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08102}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1497}, timestamp = {Thu, 10 Jun 2021 13:02:08 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BraunDHKKKLRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/DacierDHKKKRS08, author = {Marc Dacier and Herv{\'{e}} Debar and Thorsten Holz and Engin Kirda and Jan Kohlrausch and Christopher Kruegel and Konrad Rieck and James P. G. Sterbenz}, editor = {Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K{\"{o}}nig and Christopher Kruegel}, title = {8102 Working Group -- Attack Taxonomy}, booktitle = {Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08102}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1495}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/DacierDHKKKRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/RieckL07, author = {Konrad Rieck and Pavel Laskov}, title = {Language models for detection of unknown attacks in network traffic}, journal = {J. Comput. Virol.}, volume = {2}, number = {4}, pages = {243--256}, year = {2007}, url = {https://doi.org/10.1007/s11416-006-0030-0}, doi = {10.1007/S11416-006-0030-0}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/RieckL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nato/LaskovRM07, author = {Pavel Laskov and Konrad Rieck and Klaus{-}Robert M{\"{u}}ller}, editor = {Fran{\c{c}}oise Fogelman{-}Souli{\'{e}} and Domenico Perrotta and Jakub Piskorski and Ralf Steinberger}, title = {Machine Learning for Intrusion Detection}, booktitle = {Mining Massive Data Sets for Security - Advances in Data Mining, Search, Social Networks and Text Mining, and their Applications to Security, Proceedings of the {NATO} Advanced Study Institute on Mining Massive Data Sets for Security, Gazzada (Varese), Italy, 10-21 September 2007}, series = {{NATO} Science for Peace and Security Series - {D:} Information and Communication Security}, volume = {19}, pages = {366--373}, publisher = {{IOS} Press}, year = {2007}, url = {https://doi.org/10.3233/978-1-58603-898-4-366}, doi = {10.3233/978-1-58603-898-4-366}, timestamp = {Mon, 06 May 2019 12:23:28 +0200}, biburl = {https://dblp.org/rec/conf/nato/LaskovRM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagm/RieckLM06, author = {Konrad Rieck and Pavel Laskov and Klaus{-}Robert M{\"{u}}ller}, editor = {Katrin Franke and Klaus{-}Robert M{\"{u}}ller and Bertram Nickolay and Ralf Sch{\"{a}}fer}, title = {Efficient Algorithms for Similarity Measures over Sequential Data: {A} Look Beyond Kernels}, booktitle = {Pattern Recognition, 28th {DAGM} Symposium, Berlin, Germany, September 12-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4174}, pages = {374--383}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11861898\_38}, doi = {10.1007/11861898\_38}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dagm/RieckLM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/RieckL06, author = {Konrad Rieck and Pavel Laskov}, editor = {Roland B{\"{u}}schkes and Pavel Laskov}, title = {Detecting Unknown Network Attacks Using Language Models}, booktitle = {Detection of Intrusions and Malware {\&} Vulnerability Assessment, Third International Conference, {DIMVA} 2006, Berlin, Germany, July 13-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4064}, pages = {74--90}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11790754\_5}, doi = {10.1007/11790754\_5}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/RieckL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/RieckLS06, author = {Konrad Rieck and Pavel Laskov and S{\"{o}}ren Sonnenburg}, editor = {Bernhard Sch{\"{o}}lkopf and John C. Platt and Thomas Hofmann}, title = {Computation of Similarity Measures for Sequential Data using Generalized Suffix Trees}, booktitle = {Advances in Neural Information Processing Systems 19, Proceedings of the Twentieth Annual Conference on Neural Information Processing Systems, Vancouver, British Columbia, Canada, December 4-7, 2006}, pages = {1177--1184}, publisher = {{MIT} Press}, year = {2006}, url = {https://proceedings.neurips.cc/paper/2006/hash/a36e841c5230a79c2102036d2e259848-Abstract.html}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/RieckLS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciap/LaskovDSR05, author = {Pavel Laskov and Patrick D{\"{u}}ssel and Christin Sch{\"{a}}fer and Konrad Rieck}, editor = {Fabio Roli and Sergio Vitulano}, title = {Learning Intrusion Detection: Supervised or Unsupervised?}, booktitle = {Image Analysis and Processing - {ICIAP} 2005, 13th International Conference, Cagliari, Italy, September 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3617}, pages = {50--57}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11553595\_6}, doi = {10.1007/11553595\_6}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/iciap/LaskovDSR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/LaskovRSM05, author = {Pavel Laskov and Konrad Rieck and Christin Sch{\"{a}}fer and Klaus{-}Robert M{\"{u}}ller}, editor = {Hannes Federrath}, title = {Visualization of anomaly detection using prediction sensitivity}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {197--208}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28373}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/LaskovRSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.