BibTeX records: Konrad Rieck

download as .bib file

@article{DBLP:journals/popets/HorlbogeQMR24,
  author       = {Micha Horlboge and
                  Erwin Quiring and
                  Roland Meyer and
                  Konrad Rieck},
  title        = {I still know it's you! On Challenges in Anonymizing Source Code},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {3},
  pages        = {744--760},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0102},
  doi          = {10.56553/POPETS-2024-0102},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/HorlbogeQMR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/MaierWR24,
  author       = {Alwin Maier and
                  Felix Wei{\ss}berg and
                  Konrad Rieck},
  editor       = {Jianying Zhou and
                  Tony Q. S. Quek and
                  Debin Gao and
                  Alvaro A. C{\'{a}}rdenas},
  title        = {On the Role of Pre-trained Embeddings in Binary Code Analysis},
  booktitle    = {Proceedings of the 19th {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2024, Singapore, July 1-5, 2024},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3634737.3657029},
  doi          = {10.1145/3634737.3657029},
  timestamp    = {Fri, 16 Aug 2024 09:08:03 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/MaierWR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/MollerWPER24,
  author       = {Jonas M{\"{o}}ller and
                  Felix Wei{\ss}berg and
                  Lukas Pirch and
                  Thorsten Eisenhofer and
                  Konrad Rieck},
  editor       = {Jianying Zhou and
                  Tony Q. S. Quek and
                  Debin Gao and
                  Alvaro A. C{\'{a}}rdenas},
  title        = {Cross-Language Differential Testing of {JSON} Parsers},
  booktitle    = {Proceedings of the 19th {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2024, Singapore, July 1-5, 2024},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3634737.3657003},
  doi          = {10.1145/3634737.3657003},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/MollerWPER24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/WeissbergMGIPSS24,
  author       = {Felix Weissberg and
                  Jonas M{\"{o}}ller and
                  Tom Ganz and
                  Erik Imgrund and
                  Lukas Pirch and
                  Lukas Seidel and
                  Moritz Schloegel and
                  Thorsten Eisenhofer and
                  Konrad Rieck},
  editor       = {Jianying Zhou and
                  Tony Q. S. Quek and
                  Debin Gao and
                  Alvaro A. C{\'{a}}rdenas},
  title        = {SoK: Where to Fuzz? Assessing Target Selection Methods in Directed
                  Fuzzing},
  booktitle    = {Proceedings of the 19th {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2024, Singapore, July 1-5, 2024},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3634737.3661141},
  doi          = {10.1145/3634737.3661141},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/WeissbergMGIPSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/PfisterMBKRA24,
  author       = {Moritz Pfister and
                  Robert Michael and
                  Max Boll and
                  Cosima K{\"{o}}rfer and
                  Konrad Rieck and
                  Daniel Arp},
  editor       = {Federico Maggi and
                  Manuel Egele and
                  Mathias Payer and
                  Michele Carminati},
  title        = {Listening Between the Bits: Privacy Leaks in Audio Fingerprints},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 21st International Conference, {DIMVA} 2024, Lausanne, Switzerland,
                  July 17-19, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14828},
  pages        = {184--204},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-64171-8\_10},
  doi          = {10.1007/978-3-031-64171-8\_10},
  timestamp    = {Sat, 20 Jul 2024 14:18:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/PfisterMBKRA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KirchnerMM0RJ24,
  author       = {Robin Kirchner and
                  Jonas M{\"{o}}ller and
                  Marius Musch and
                  David Klein and
                  Konrad Rieck and
                  Martin Johns},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind
                  Cross-Site Scripting},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/kirchner},
  timestamp    = {Mon, 22 Jul 2024 17:10:49 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KirchnerMM0RJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-06122,
  author       = {Dilyara Bareeva and
                  Marina M.{-}C. H{\"{o}}hne and
                  Alexander Warnecke and
                  Lukas Pirch and
                  Klaus{-}Robert M{\"{u}}ller and
                  Konrad Rieck and
                  Kirill Bykov},
  title        = {Manipulating Feature Visualizations with Gradient Slingshots},
  journal      = {CoRR},
  volume       = {abs/2401.06122},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.06122},
  doi          = {10.48550/ARXIV.2401.06122},
  eprinttype    = {arXiv},
  eprint       = {2401.06122},
  timestamp    = {Thu, 25 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-06122.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ArpQPWPWCR23,
  author       = {Daniel Arp and
                  Erwin Quiring and
                  Feargus Pendlebury and
                  Alexander Warnecke and
                  Fabio Pierazzi and
                  Christian Wressnegger and
                  Lorenzo Cavallaro and
                  Konrad Rieck},
  title        = {Lessons Learned on Machine Learning for Computer Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {5},
  pages        = {72--77},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3287207},
  doi          = {10.1109/MSEC.2023.3287207},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ArpQPWPWCR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/QuiringMR23,
  author       = {Erwin Quiring and
                  Andreas M{\"{u}}ller and
                  Konrad Rieck},
  title        = {On the Detection of Image-Scaling Attacks in Machine Learning},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {506--520},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627134},
  doi          = {10.1145/3627106.3627134},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/QuiringMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GanzIHR23,
  author       = {Tom Ganz and
                  Erik Imgrund and
                  Martin H{\"{a}}rterich and
                  Konrad Rieck},
  title        = {{PAVUDI:} Patch-based Vulnerability Discovery using Machine Learning},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {704--717},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627188},
  doi          = {10.1145/3627106.3627188},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GanzIHR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/artman/Rieck23,
  author       = {Konrad Rieck},
  editor       = {Gregory Blanc and
                  Takeshi Takahashi and
                  Zonghua Zhang},
  title        = {When Papers Choose Their Reviewers: Adversarial Machine Learning in
                  Peer Review},
  booktitle    = {Proceedings of the 2023 Workshop on Recent Advances in Resilient and
                  Trustworthy {ML} Systems in Autonomous Networks, {ARTMAN} 2023, Copenhagen,
                  Denmark, 30 November 2023},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605772.3625394},
  doi          = {10.1145/3605772.3625394},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/artman/Rieck23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ImgrundGHPRR23,
  author       = {Erik Imgrund and
                  Tom Ganz and
                  Martin H{\"{a}}rterich and
                  Lukas Pirch and
                  Niklas Risse and
                  Konrad Rieck},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Broken Promises: Measuring Confounding Effects in Learning-based Vulnerability
                  Discovery},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {149--160},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623915},
  doi          = {10.1145/3605764.3623915},
  timestamp    = {Sat, 02 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ImgrundGHPRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GanzAHR23,
  author       = {Tom Ganz and
                  Inaam Ashraf and
                  Martin H{\"{a}}rterich and
                  Konrad Rieck},
  editor       = {Mohamed Shehab and
                  Maribel Fern{\'{a}}ndez and
                  Ninghui Li},
  title        = {Detecting Backdoors in Collaboration Graphs of Software Repositories},
  booktitle    = {Proceedings of the Thirteenth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26,
                  2023},
  pages        = {189--200},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577923.3583657},
  doi          = {10.1145/3577923.3583657},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/GanzAHR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/GanzIHR23,
  author       = {Tom Ganz and
                  Erik Imgrund and
                  Martin H{\"{a}}rterich and
                  Konrad Rieck},
  editor       = {Vijayalakshmi Atluri and
                  Anna Lisa Ferrara},
  title        = {CodeGraphSMOTE - Data Augmentation for Vulnerability Discovery},
  booktitle    = {Data and Applications Security and Privacy {XXXVII} - 37th Annual
                  {IFIP} {WG} 11.3 Conference, DBSec 2023, Sophia-Antipolis, France,
                  July 19-21, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13942},
  pages        = {282--301},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-37586-6\_17},
  doi          = {10.1007/978-3-031-37586-6\_17},
  timestamp    = {Fri, 14 Jul 2023 22:01:48 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/GanzIHR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SeidelEPRMY23,
  author       = {Lukas Seidel and
                  Sedick David Baker Effendi and
                  Xavier Pinho and
                  Konrad Rieck and
                  Brink van der Merwe and
                  Fabian Yamaguchi},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Learning Type Inference for Enhanced Dataflow Analysis},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14347},
  pages        = {184--203},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51482-1\_10},
  doi          = {10.1007/978-3-031-51482-1\_10},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/SeidelEPRMY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/GanzRHR23,
  author       = {Tom Ganz and
                  Philipp Rall and
                  Martin H{\"{a}}rterich and
                  Konrad Rieck},
  title        = {Hunting for Truth: Analyzing Explanation Methods in Learning-based
                  Vulnerability Discovery},
  booktitle    = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023, Delft, Netherlands, July 3-7, 2023},
  pages        = {524--541},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSP57164.2023.00038},
  doi          = {10.1109/EUROSP57164.2023.00038},
  timestamp    = {Mon, 07 Aug 2023 15:56:23 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/GanzRHR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/CzybikHR23,
  author       = {Stefan Czybik and
                  Micha Horlboge and
                  Konrad Rieck},
  editor       = {Marie{-}Jos{\'{e}} Montpetit and
                  Aris Leivadeas and
                  Steve Uhlig and
                  Mobin Javed},
  title        = {Lazy Gatekeepers: {A} Large-Scale Study on {SPF} Configuration in
                  the Wild},
  booktitle    = {Proceedings of the 2023 {ACM} on Internet Measurement Conference,
                  {IMC} 2023, Montreal, QC, Canada, October 24-26, 2023},
  pages        = {344--355},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3618257.3624827},
  doi          = {10.1145/3618257.3624827},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/CzybikHR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WarneckePWR23,
  author       = {Alexander Warnecke and
                  Lukas Pirch and
                  Christian Wressnegger and
                  Konrad Rieck},
  title        = {Machine Unlearning of Features and Labels},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/machine-unlearning-of-features-and-labels/},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/WarneckePWR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/EisenhoferQMRHR23,
  author       = {Thorsten Eisenhofer and
                  Erwin Quiring and
                  Jonas M{\"{o}}ller and
                  Doreen Riepel and
                  Thorsten Holz and
                  Konrad Rieck},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {No more Reviewer {\#}2: Subverting Automatic Paper-Reviewer Assignment
                  using Adversarial Learning},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5109--5126},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/eisenhofer},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/EisenhoferQMRHR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-14443,
  author       = {Thorsten Eisenhofer and
                  Erwin Quiring and
                  Jonas M{\"{o}}ller and
                  Doreen Riepel and
                  Thorsten Holz and
                  Konrad Rieck},
  title        = {No more Reviewer {\#}2: Subverting Automatic Paper-Reviewer Assignment
                  using Adversarial Learning},
  journal      = {CoRR},
  volume       = {abs/2303.14443},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.14443},
  doi          = {10.48550/ARXIV.2303.14443},
  eprinttype    = {arXiv},
  eprint       = {2303.14443},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-14443.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-08411,
  author       = {Alexander Warnecke and
                  Julian Speith and
                  Jan{-}Niklas M{\"{o}}ller and
                  Konrad Rieck and
                  Christof Paar},
  title        = {Evil from Within: Machine Learning Backdoors through Hardware Trojans},
  journal      = {CoRR},
  volume       = {abs/2304.08411},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.08411},
  doi          = {10.48550/ARXIV.2304.08411},
  eprinttype    = {arXiv},
  eprint       = {2304.08411},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-08411.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-00673,
  author       = {Lukas Seidel and
                  Sedick David Baker Effendi and
                  Xavier Pinho and
                  Konrad Rieck and
                  Brink van der Merwe and
                  Fabian Yamaguchi},
  title        = {Learning Type Inference for Enhanced Dataflow Analysis},
  journal      = {CoRR},
  volume       = {abs/2310.00673},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.00673},
  doi          = {10.48550/ARXIV.2310.00673},
  eprinttype    = {arXiv},
  eprint       = {2310.00673},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-00673.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-15085,
  author       = {Erwin Quiring and
                  Andreas M{\"{u}}ller and
                  Konrad Rieck},
  title        = {On the Detection of Image-Scaling Attacks in Machine Learning},
  journal      = {CoRR},
  volume       = {abs/2310.15085},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.15085},
  doi          = {10.48550/ARXIV.2310.15085},
  eprinttype    = {arXiv},
  eprint       = {2310.15085},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-15085.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/CzybikAR22,
  author       = {Stefan Czybik and
                  Daniel Arp and
                  Konrad Rieck},
  editor       = {Anupam Joshi and
                  Maribel Fern{\'{a}}ndez and
                  Rakesh M. Verma},
  title        = {Quantifying the Risk of Wormhole Attacks on Bluetooth Contact Tracing},
  booktitle    = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security
                  and Privacy, Baltimore, MD, USA, April 24 - 27, 2022},
  pages        = {264--275},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3508398.3511496},
  doi          = {10.1145/3508398.3511496},
  timestamp    = {Wed, 20 Apr 2022 12:17:48 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/CzybikAR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WesselkampRAQ22,
  author       = {Vera Wesselkamp and
                  Konrad Rieck and
                  Daniel Arp and
                  Erwin Quiring},
  title        = {Misleading Deep-Fake Detection with {GAN} Fingerprints},
  booktitle    = {43rd {IEEE} Security and Privacy, {SP} Workshops 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {59--65},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SPW54247.2022.9833860},
  doi          = {10.1109/SPW54247.2022.9833860},
  timestamp    = {Thu, 21 Sep 2023 16:11:09 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/WesselkampRAQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ArpQPWPWCR22,
  author       = {Daniel Arp and
                  Erwin Quiring and
                  Feargus Pendlebury and
                  Alexander Warnecke and
                  Fabio Pierazzi and
                  Christian Wressnegger and
                  Lorenzo Cavallaro and
                  Konrad Rieck},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Dos and Don'ts of Machine Learning in Computer Security},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {3971--3988},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/arp},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ArpQPWPWCR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-12543,
  author       = {Vera Wesselkamp and
                  Konrad Rieck and
                  Daniel Arp and
                  Erwin Quiring},
  title        = {Misleading Deep-Fake Detection with {GAN} Fingerprints},
  journal      = {CoRR},
  volume       = {abs/2205.12543},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.12543},
  doi          = {10.48550/ARXIV.2205.12543},
  eprinttype    = {arXiv},
  eprint       = {2205.12543},
  timestamp    = {Mon, 30 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-12543.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-12553,
  author       = {Micha Horlboge and
                  Erwin Quiring and
                  Roland Meyer and
                  Konrad Rieck},
  title        = {I still know it's you! On Challenges in Anonymizing Source Code},
  journal      = {CoRR},
  volume       = {abs/2208.12553},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.12553},
  doi          = {10.48550/ARXIV.2208.12553},
  eprinttype    = {arXiv},
  eprint       = {2208.12553},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-12553.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/BiggioCLRC22,
  author       = {Battista Biggio and
                  Nicholas Carlini and
                  Pavel Laskov and
                  Konrad Rieck and
                  Antonio Emanuele Cin{\`{a}}},
  title        = {Security of Machine Learning (Dagstuhl Seminar 22281)},
  journal      = {Dagstuhl Reports},
  volume       = {12},
  number       = {7},
  pages        = {41--61},
  year         = {2022},
  url          = {https://doi.org/10.4230/DagRep.12.7.41},
  doi          = {10.4230/DAGREP.12.7.41},
  timestamp    = {Tue, 07 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/BiggioCLRC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DirksenKMSRJ21,
  author       = {Alexandra Dirksen and
                  David Klein and
                  Robert Michael and
                  Tilman Stehr and
                  Konrad Rieck and
                  Martin Johns},
  title        = {LogPicker: Strengthening Certificate Transparency Against Covert Adversaries},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {4},
  pages        = {184--202},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0066},
  doi          = {10.2478/POPETS-2021-0066},
  timestamp    = {Tue, 28 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/DirksenKMSRJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KuhnapfelPNSRW21,
  author       = {Niclas K{\"{u}}hnapfel and
                  Stefan Preu{\ss}ler and
                  Maximilian Noppel and
                  Thomas Schneider and
                  Konrad Rieck and
                  Christian Wressnegger},
  title        = {LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped
                  Systems},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {796--811},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485911},
  doi          = {10.1145/3485832.3485911},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KuhnapfelPNSRW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HilgefortAR21,
  author       = {Jan Malte Hilgefort and
                  Daniel Arp and
                  Konrad Rieck},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {Spying through Virtual Backgrounds of Video Calls},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {135--144},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486870},
  doi          = {10.1145/3474369.3486870},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HilgefortAR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GanzHWR21,
  author       = {Tom Ganz and
                  Martin H{\"{a}}rterich and
                  Alexander Warnecke and
                  Konrad Rieck},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {Explaining Graph Neural Networks for Vulnerability Discovery},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {145--156},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486866},
  doi          = {10.1145/3474369.3486866},
  timestamp    = {Tue, 02 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GanzHWR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/PirchWWR21,
  author       = {Lukas Pirch and
                  Alexander Warnecke and
                  Christian Wressnegger and
                  Konrad Rieck},
  title        = {TagVet: Vetting Malware Tags using Explainable Machine Learning},
  booktitle    = {EuroSec '21: Proceedings of the 14th European Workshop on Systems
                  Security, Virtual Event / Edinburgh, Scotland, UK, April 26, 2021},
  pages        = {34--40},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3447852.3458719},
  doi          = {10.1145/3447852.3458719},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosec/PirchWWR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-04119,
  author       = {Niclas K{\"{u}}hnapfel and
                  Stefan Preu{\ss}ler and
                  Maximilian Noppel and
                  Thomas Schneider and
                  Konrad Rieck and
                  Christian Wressnegger},
  title        = {LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped
                  Systems},
  journal      = {CoRR},
  volume       = {abs/2106.04119},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.04119},
  eprinttype    = {arXiv},
  eprint       = {2106.04119},
  timestamp    = {Fri, 11 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-04119.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-11577,
  author       = {Alexander Warnecke and
                  Lukas Pirch and
                  Christian Wressnegger and
                  Konrad Rieck},
  title        = {Machine Unlearning of Features and Labels},
  journal      = {CoRR},
  volume       = {abs/2108.11577},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.11577},
  eprinttype    = {arXiv},
  eprint       = {2108.11577},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-11577.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-09411,
  author       = {Andr{\'{e}} Noll Barreto and
                  Stefan K{\"{o}}psell and
                  Arsenia Chorti and
                  Bertram Poettering and
                  Jens Jelitto and
                  Julia Hesse and
                  Jonathan Boole and
                  Konrad Rieck and
                  Marios Kountouris and
                  Dave Singel{\'{e}}e and
                  Kumar Ashwinee},
  title        = {Towards Intelligent Context-Aware 6G Security},
  journal      = {CoRR},
  volume       = {abs/2112.09411},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.09411},
  eprinttype    = {arXiv},
  eprint       = {2112.09411},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-09411.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/KellnerWR20,
  author       = {Ansgar Kellner and
                  Christian Wressnegger and
                  Konrad Rieck},
  editor       = {Lorenzo Cavallaro and
                  Andrea Lanzi},
  title        = {What's all that noise: analysis and detection of propaganda on Twitter},
  booktitle    = {Proceedings of the 13th European Workshop on Systems Security, EuroSec@EuroSys
                  2020, Heraklion, Greece, April 27, 2020},
  pages        = {25--30},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3380786.3391399},
  doi          = {10.1145/3380786.3391399},
  timestamp    = {Fri, 08 May 2020 16:26:35 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosec/KellnerWR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/WarneckeAWR20,
  author       = {Alexander Warnecke and
                  Daniel Arp and
                  Christian Wressnegger and
                  Konrad Rieck},
  title        = {Evaluating Explanation Methods for Deep Learning in Security},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2020, Genoa, Italy, September 7-11, 2020},
  pages        = {158--174},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSP48549.2020.00018},
  doi          = {10.1109/EUROSP48549.2020.00018},
  timestamp    = {Tue, 10 Nov 2020 11:45:04 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/WarneckeAWR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpr/ScalasRG20,
  author       = {Michele Scalas and
                  Konrad Rieck and
                  Giorgio Giacinto},
  editor       = {Alberto Del Bimbo and
                  Rita Cucchiara and
                  Stan Sclaroff and
                  Giovanni Maria Farinella and
                  Tao Mei and
                  Marco Bertini and
                  Hugo Jair Escalante and
                  Roberto Vezzani},
  title        = {Explanation-Driven Characterization of Android Ransomware},
  booktitle    = {Pattern Recognition. {ICPR} International Workshops and Challenges
                  - Virtual Event, January 10-15, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12663},
  pages        = {228--242},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68796-0\_17},
  doi          = {10.1007/978-3-030-68796-0\_17},
  timestamp    = {Tue, 11 Apr 2023 17:29:51 +0200},
  biburl       = {https://dblp.org/rec/conf/icpr/ScalasRG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/QuiringR20,
  author       = {Erwin Quiring and
                  Konrad Rieck},
  title        = {Backdooring and Poisoning Neural Networks with Image-Scaling Attacks},
  booktitle    = {2020 {IEEE} Security and Privacy Workshops, {SP} Workshops, San Francisco,
                  CA, USA, May 21, 2020},
  pages        = {41--47},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SPW50608.2020.00024},
  doi          = {10.1109/SPW50608.2020.00024},
  timestamp    = {Thu, 21 Sep 2023 16:11:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/QuiringR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/QuiringKAJR20,
  author       = {Erwin Quiring and
                  David Klein and
                  Daniel Arp and
                  Martin Johns and
                  Konrad Rieck},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {Adversarial Preprocessing: Understanding and Preventing Image-Scaling
                  Attacks in Machine Learning},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {1363--1380},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/quiring},
  timestamp    = {Tue, 28 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/QuiringKAJR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-08633,
  author       = {Erwin Quiring and
                  Konrad Rieck},
  title        = {Backdooring and Poisoning Neural Networks with Image-Scaling Attacks},
  journal      = {CoRR},
  volume       = {abs/2003.08633},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.08633},
  eprinttype    = {arXiv},
  eprint       = {2003.08633},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-08633.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-09470,
  author       = {Daniel Arp and
                  Erwin Quiring and
                  Feargus Pendlebury and
                  Alexander Warnecke and
                  Fabio Pierazzi and
                  Christian Wressnegger and
                  Lorenzo Cavallaro and
                  Konrad Rieck},
  title        = {Dos and Don'ts of Machine Learning in Computer Security},
  journal      = {CoRR},
  volume       = {abs/2010.09470},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.09470},
  eprinttype    = {arXiv},
  eprint       = {2010.09470},
  timestamp    = {Wed, 21 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-09470.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-09569,
  author       = {Erwin Quiring and
                  Lukas Pirch and
                  Michael Reimsbach and
                  Daniel Arp and
                  Konrad Rieck},
  title        = {Against All Odds: Winning the Defense Challenge in an Evasion Competition
                  with Diversification},
  journal      = {CoRR},
  volume       = {abs/2010.09569},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.09569},
  eprinttype    = {arXiv},
  eprint       = {2010.09569},
  timestamp    = {Wed, 21 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-09569.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DemontisMBMARCG19,
  author       = {Ambra Demontis and
                  Marco Melis and
                  Battista Biggio and
                  Davide Maiorca and
                  Daniel Arp and
                  Konrad Rieck and
                  Igino Corona and
                  Giorgio Giacinto and
                  Fabio Roli},
  title        = {Yes, Machine Learning Can Be More Secure! {A} Case Study on Android
                  Malware Detection},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {4},
  pages        = {711--724},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2017.2700270},
  doi          = {10.1109/TDSC.2017.2700270},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DemontisMBMARCG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MuschWJR19,
  author       = {Marius Musch and
                  Christian Wressnegger and
                  Martin Johns and
                  Konrad Rieck},
  title        = {Thieves in the Browser: Web-based Cryptojacking in the Wild},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {4:1--4:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339261},
  doi          = {10.1145/3339252.3339261},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MuschWJR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/MuschWJR19,
  author       = {Marius Musch and
                  Christian Wressnegger and
                  Martin Johns and
                  Konrad Rieck},
  editor       = {Roberto Perdisci and
                  Cl{\'{e}}mentine Maurice and
                  Giorgio Giacinto and
                  Magnus Almgren},
  title        = {New Kid on the Web: {A} Study on the Prevalence of WebAssembly in
                  the Wild},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden,
                  June 19-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11543},
  pages        = {23--42},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22038-9\_2},
  doi          = {10.1007/978-3-030-22038-9\_2},
  timestamp    = {Sun, 04 Aug 2024 19:42:33 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/MuschWJR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/MaierGWR19,
  author       = {Alwin Maier and
                  Hugo Gascon and
                  Christian Wressnegger and
                  Konrad Rieck},
  editor       = {Roberto Perdisci and
                  Cl{\'{e}}mentine Maurice and
                  Giorgio Giacinto and
                  Magnus Almgren},
  title        = {TypeMiner: Recovering Types in Binary Programs Using Machine Learning},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden,
                  June 19-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11543},
  pages        = {288--308},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22038-9\_14},
  doi          = {10.1007/978-3-030-22038-9\_14},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/MaierGWR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/QuiringKR19,
  author       = {Erwin Quiring and
                  Matthias Kirchner and
                  Konrad Rieck},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {On the Security and Applicability of Fragile Camera Fingerprints},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {450--470},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_22},
  doi          = {10.1007/978-3-030-29959-0\_22},
  timestamp    = {Fri, 07 Aug 2020 17:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/QuiringKR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/KellnerHRW19,
  author       = {Ansgar Kellner and
                  Micha Horlboge and
                  Konrad Rieck and
                  Christian Wressnegger},
  title        = {False Sense of Security: {A} Study on the Effectivity of Jailbreak
                  Detection in Banking Apps},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSP.2019.00011},
  doi          = {10.1109/EUROSP.2019.00011},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/KellnerHRW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/QuiringMR19,
  author       = {Erwin Quiring and
                  Alwin Maier and
                  Konrad Rieck},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {Misleading Authorship Attribution of Source Code using Adversarial
                  Learning},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {479--496},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/quiring},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/QuiringMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-12386,
  author       = {Erwin Quiring and
                  Alwin Maier and
                  Konrad Rieck},
  title        = {Misleading Authorship Attribution of Source Code using Adversarial
                  Learning},
  journal      = {CoRR},
  volume       = {abs/1905.12386},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.12386},
  eprinttype    = {arXiv},
  eprint       = {1905.12386},
  timestamp    = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-12386.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-02108,
  author       = {Alexander Warnecke and
                  Daniel Arp and
                  Christian Wressnegger and
                  Konrad Rieck},
  title        = {Don't Paint It Black: White-Box Explanations for Deep Learning in
                  Computer Security},
  journal      = {CoRR},
  volume       = {abs/1906.02108},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.02108},
  eprinttype    = {arXiv},
  eprint       = {1906.02108},
  timestamp    = {Thu, 13 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-02108.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-04025,
  author       = {Erwin Quiring and
                  Matthias Kirchner and
                  Konrad Rieck},
  title        = {On the Security and Applicability of Fragile Camera Fingerprints},
  journal      = {CoRR},
  volume       = {abs/1907.04025},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.04025},
  eprinttype    = {arXiv},
  eprint       = {1907.04025},
  timestamp    = {Wed, 17 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-04025.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-04143,
  author       = {Ansgar Kellner and
                  Lisa Rangosch and
                  Christian Wressnegger and
                  Konrad Rieck},
  title        = {Political Elections Under (Social) Fire? Analysis and Detection of
                  Propaganda on Twitter},
  journal      = {CoRR},
  volume       = {abs/1912.04143},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.04143},
  eprinttype    = {arXiv},
  eprint       = {1912.04143},
  timestamp    = {Thu, 02 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-04143.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Rieck18,
  author       = {Konrad Rieck},
  editor       = {Roger A. Hallman and
                  Shujun Li and
                  Victor Chang},
  title        = {Family Reunion: Adversarial Machine Learning meets Digital Watermarking},
  booktitle    = {Proceedings of the 2nd International Workshop on Multimedia Privacy
                  and Security, MPS@CCS 2018, Toronto, ON, Canada, October 15, 2018},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3267357.3267366},
  doi          = {10.1145/3267357.3267366},
  timestamp    = {Mon, 16 Nov 2020 11:14:54 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Rieck18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/WressneggerKR18,
  author       = {Christian Wressnegger and
                  Ansgar Kellner and
                  Konrad Rieck},
  title        = {{ZOE:} Content-Based Anomaly Detection for Industrial Control Systems},
  booktitle    = {48th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2018, Luxembourg City, Luxembourg, June 25-28,
                  2018},
  pages        = {127--138},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSN.2018.00025},
  doi          = {10.1109/DSN.2018.00025},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/WressneggerKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/QuiringAR18,
  author       = {Erwin Quiring and
                  Daniel Arp and
                  Konrad Rieck},
  title        = {Forgotten Siblings: Unifying Attacks on Machine Learning and Digital
                  Watermarking},
  booktitle    = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2018, London, United Kingdom, April 24-26, 2018},
  pages        = {488--502},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EuroSP.2018.00041},
  doi          = {10.1109/EUROSP.2018.00041},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/QuiringAR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eusipco/QuiringR18,
  author       = {Erwin Quiring and
                  Konrad Rieck},
  title        = {Adversarial Machine Learning Against Digital Watermarking},
  booktitle    = {26th European Signal Processing Conference, {EUSIPCO} 2018, Roma,
                  Italy, September 3-7, 2018},
  pages        = {519--523},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/EUSIPCO.2018.8553343},
  doi          = {10.23919/EUSIPCO.2018.8553343},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/eusipco/QuiringR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CaliskanYDHRGN18,
  author       = {Aylin Caliskan and
                  Fabian Yamaguchi and
                  Edwin Dauber and
                  Richard E. Harang and
                  Konrad Rieck and
                  Rachel Greenstadt and
                  Arvind Narayanan},
  title        = {When Coding Style Survives Compilation: De-anonymizing Programmers
                  from Executable Binaries},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_06B-2\_Caliskan\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/CaliskanYDHRGN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GasconUSR18,
  author       = {Hugo Gascon and
                  Steffen Ullrich and
                  Benjamin Stritter and
                  Konrad Rieck},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing
                  Emails},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {69--91},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_4},
  doi          = {10.1007/978-3-030-00470-5\_4},
  timestamp    = {Mon, 20 Nov 2023 09:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/GasconUSR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ArpQKDR18,
  author       = {Daniel Arp and
                  Erwin Quiring and
                  Tammo Krueger and
                  Stanimir Dragiev and
                  Konrad Rieck},
  editor       = {Raheem Beyah and
                  Bing Chang and
                  Yingjiu Li and
                  Sencun Zhu},
  title        = {Privacy-Enhanced Fraud Detection with Bloom Filters},
  booktitle    = {Security and Privacy in Communication Networks - 14th International
                  Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {254},
  pages        = {396--415},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01701-9\_22},
  doi          = {10.1007/978-3-030-01701-9\_22},
  timestamp    = {Fri, 11 Jan 2019 16:12:16 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/ArpQKDR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurosys/2018eurosec,
  editor       = {Angelos Stavrou and
                  Konrad Rieck},
  title        = {Proceedings of the 11th European Workshop on Systems Security, EuroSec@EuroSys
                  2018, Porto, Portugal, April 23, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3193111},
  doi          = {10.1145/3193111},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosys/2018eurosec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-09474,
  author       = {Marius Musch and
                  Christian Wressnegger and
                  Martin Johns and
                  Konrad Rieck},
  title        = {Web-based Cryptojacking in the Wild},
  journal      = {CoRR},
  volume       = {abs/1808.09474},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.09474},
  eprinttype    = {arXiv},
  eprint       = {1808.09474},
  timestamp    = {Mon, 03 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-09474.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-09985,
  author       = {Battista Biggio and
                  Konrad Rieck and
                  Davide Ariu and
                  Christian Wressnegger and
                  Igino Corona and
                  Giorgio Giacinto and
                  Fabio Roli},
  title        = {Poisoning Behavioral Malware Clustering},
  journal      = {CoRR},
  volume       = {abs/1811.09985},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.09985},
  eprinttype    = {arXiv},
  eprint       = {1811.09985},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-09985.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/Rieck17,
  author       = {Konrad Rieck},
  title        = {Vulnerability analysis},
  journal      = {it Inf. Technol.},
  volume       = {59},
  number       = {2},
  pages        = {57},
  year         = {2017},
  url          = {https://doi.org/10.1515/itit-2016-0059},
  doi          = {10.1515/ITIT-2016-0059},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/it/Rieck17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/WressneggerYMR17,
  author       = {Christian Wressnegger and
                  Fabian Yamaguchi and
                  Alwin Maier and
                  Konrad Rieck},
  title        = {64-Bit Migration Vulnerabilities},
  journal      = {it Inf. Technol.},
  volume       = {59},
  number       = {2},
  pages        = {73},
  year         = {2017},
  url          = {https://doi.org/10.1515/itit-2016-0041},
  doi          = {10.1515/ITIT-2016-0041},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/it/WressneggerYMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WressneggerFYR17,
  author       = {Christian Wressnegger and
                  Kevin Freeman and
                  Fabian Yamaguchi and
                  Konrad Rieck},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Automatically Inferring Malware Signatures for Anti-Virus Assisted
                  Attacks},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {587--598},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053002},
  doi          = {10.1145/3052973.3053002},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WressneggerFYR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GasconGSRAR17,
  author       = {Hugo Gascon and
                  Bernd Grobauer and
                  Thomas Schreck and
                  Lukas Rist and
                  Daniel Arp and
                  Konrad Rieck},
  editor       = {Gail{-}Joon Ahn and
                  Alexander Pretschner and
                  Gabriel Ghinita},
  title        = {Mining Attributed Graphs for Threat Intelligence},
  booktitle    = {Proceedings of the Seventh {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
                  2017},
  pages        = {15--22},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3029806.3029811},
  doi          = {10.1145/3029806.3029811},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/GasconGSRAR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/WressneggerR17,
  author       = {Christian Wressnegger and
                  Konrad Rieck},
  editor       = {Cristiano Giuffrida and
                  Angelos Stavrou},
  title        = {Looking Back on Three Years of Flash-based Malware},
  booktitle    = {Proceedings of the 10th European Workshop on Systems Security, {EUROSEC}
                  2017, Belgrade, Serbia, April 23, 2017},
  pages        = {6:1--6:6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3065913.3065921},
  doi          = {10.1145/3065913.3065921},
  timestamp    = {Tue, 06 Nov 2018 16:58:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/WressneggerR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/GoltzscheWMRPK17,
  author       = {David Goltzsche and
                  Colin Wulf and
                  Divya Muthukumaran and
                  Konrad Rieck and
                  Peter R. Pietzuch and
                  R{\"{u}}diger Kapitza},
  editor       = {Cristiano Giuffrida and
                  Angelos Stavrou},
  title        = {TrustJS: Trusted Client-side Execution of JavaScript},
  booktitle    = {Proceedings of the 10th European Workshop on Systems Security, {EUROSEC}
                  2017, Belgrade, Serbia, April 23, 2017},
  pages        = {7:1--7:6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3065913.3065917},
  doi          = {10.1145/3065913.3065917},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/GoltzscheWMRPK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ArpQWR17,
  author       = {Daniel Arp and
                  Erwin Quiring and
                  Christian Wressnegger and
                  Konrad Rieck},
  title        = {Privacy Threats through Ultrasonic Side Channels on Mobile Devices},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {35--47},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.33},
  doi          = {10.1109/EUROSP.2017.33},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/ArpQWR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/0001RSSY17,
  author       = {Michael Backes and
                  Konrad Rieck and
                  Malte Skoruppa and
                  Ben Stock and
                  Fabian Yamaguchi},
  title        = {Efficient and Flexible Discovery of {PHP} Application Vulnerabilities},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {334--349},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.14},
  doi          = {10.1109/EUROSP.2017.14},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/0001RSSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ShastryLFTYRSSF17,
  author       = {Bhargava Shastry and
                  Markus Leutner and
                  Tobias Fiebig and
                  Kashyap Thimmaraju and
                  Fabian Yamaguchi and
                  Konrad Rieck and
                  Stefan Schmid and
                  Jean{-}Pierre Seifert and
                  Anja Feldmann},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Static Program Analysis as a Fuzzing Aid},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {26--47},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_2},
  doi          = {10.1007/978-3-319-66332-6\_2},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ShastryLFTYRSSF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/ShastryMYRS17,
  author       = {Bhargava Shastry and
                  Federico Maggi and
                  Fabian Yamaguchi and
                  Konrad Rieck and
                  Jean{-}Pierre Seifert},
  editor       = {William Enck and
                  Collin Mulliner},
  title        = {Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing},
  booktitle    = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver,
                  BC, Canada, August 14-15, 2017},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/woot17/workshop-program/presentation/shastry},
  timestamp    = {Mon, 01 Feb 2021 08:41:51 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/ShastryMYRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/UnruhSSMRSY17,
  author       = {Tommi Unruh and
                  Bhargava Shastry and
                  Malte Skoruppa and
                  Federico Maggi and
                  Konrad Rieck and
                  Jean{-}Pierre Seifert and
                  Fabian Yamaguchi},
  editor       = {William Enck and
                  Collin Mulliner},
  title        = {Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability
                  Discovery},
  booktitle    = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver,
                  BC, Canada, August 14-15, 2017},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/woot17/workshop-program/presentation/unruh},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/UnruhSSMRSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/QuiringAR17,
  author       = {Erwin Quiring and
                  Daniel Arp and
                  Konrad Rieck},
  title        = {Fraternal Twins: Unifying Attacks on Machine Learning and Digital
                  Watermarking},
  journal      = {CoRR},
  volume       = {abs/1703.05561},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.05561},
  eprinttype    = {arXiv},
  eprint       = {1703.05561},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/QuiringAR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/UnruhSSMRSY17,
  author       = {Tommi Unruh and
                  Bhargava Shastry and
                  Malte Skoruppa and
                  Federico Maggi and
                  Konrad Rieck and
                  Jean{-}Pierre Seifert and
                  Fabian Yamaguchi},
  title        = {Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability
                  Discovery},
  journal      = {CoRR},
  volume       = {abs/1704.02786},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.02786},
  eprinttype    = {arXiv},
  eprint       = {1704.02786},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/UnruhSSMRSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DemontisMBMARCG17,
  author       = {Ambra Demontis and
                  Marco Melis and
                  Battista Biggio and
                  Davide Maiorca and
                  Daniel Arp and
                  Konrad Rieck and
                  Igino Corona and
                  Giorgio Giacinto and
                  Fabio Roli},
  title        = {Yes, Machine Learning Can Be More Secure! {A} Case Study on Android
                  Malware Detection},
  journal      = {CoRR},
  volume       = {abs/1704.08996},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.08996},
  eprinttype    = {arXiv},
  eprint       = {1704.08996},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DemontisMBMARCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ShastryMYRS17,
  author       = {Bhargava Shastry and
                  Federico Maggi and
                  Fabian Yamaguchi and
                  Konrad Rieck and
                  Jean{-}Pierre Seifert},
  title        = {Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing},
  journal      = {CoRR},
  volume       = {abs/1706.00206},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.00206},
  eprinttype    = {arXiv},
  eprint       = {1706.00206},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ShastryMYRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/YamaguchiR16,
  author       = {Fabian Yamaguchi and
                  Konrad Rieck},
  title        = {Die Codeanalyseplattform "Octopus"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {40},
  number       = {11},
  pages        = {713--717},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11623-016-0689-4},
  doi          = {10.1007/S11623-016-0689-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/YamaguchiR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmlr/RieckW16,
  author       = {Konrad Rieck and
                  Christian Wressnegger},
  title        = {Harry: {A} Tool for Measuring String Similarity},
  journal      = {J. Mach. Learn. Res.},
  volume       = {17},
  pages        = {9:1--9:5},
  year         = {2016},
  url          = {https://jmlr.org/papers/v17/rieck16a.html},
  timestamp    = {Wed, 11 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmlr/RieckW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KurtzGBRF16,
  author       = {Andreas Kurtz and
                  Hugo Gascon and
                  Tobias Becker and
                  Konrad Rieck and
                  Felix C. Freiling},
  title        = {Fingerprinting Mobile Devices Using Personalized Configurations},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2016},
  number       = {1},
  pages        = {4--19},
  year         = {2016},
  url          = {https://doi.org/10.1515/popets-2015-0027},
  doi          = {10.1515/POPETS-2015-0027},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/KurtzGBRF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WressneggerYMR16,
  author       = {Christian Wressnegger and
                  Fabian Yamaguchi and
                  Alwin Maier and
                  Konrad Rieck},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating
                  to 64-Bit Platforms},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {541--552},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978403},
  doi          = {10.1145/2976749.2978403},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WressneggerYMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/ShastryYRS16,
  author       = {Bhargava Shastry and
                  Fabian Yamaguchi and
                  Konrad Rieck and
                  Jean{-}Pierre Seifert},
  editor       = {Juan Caballero and
                  Urko Zurutuza and
                  Ricardo J. Rodr{\'{\i}}guez},
  title        = {Towards Vulnerability Discovery Using Staged Program Analysis},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 13th International Conference, {DIMVA} 2016, San Sebasti{\'{a}}n,
                  Spain, July 7-8, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9721},
  pages        = {78--97},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40667-1\_5},
  doi          = {10.1007/978-3-319-40667-1\_5},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/ShastryYRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/WressneggerYAR16,
  author       = {Christian Wressnegger and
                  Fabian Yamaguchi and
                  Daniel Arp and
                  Konrad Rieck},
  editor       = {Juan Caballero and
                  Urko Zurutuza and
                  Ricardo J. Rodr{\'{\i}}guez},
  title        = {Comprehensive Analysis and Detection of Flash-Based Malware},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 13th International Conference, {DIMVA} 2016, San Sebasti{\'{a}}n,
                  Spain, July 7-8, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9721},
  pages        = {101--121},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40667-1\_6},
  doi          = {10.1007/978-3-319-40667-1\_6},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/WressneggerYAR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/HartungKRH16,
  author       = {Salke Hartung and
                  Ansgar Kellner and
                  Konrad Rieck and
                  Dieter Hogrefe},
  title        = {Monte Carlo Localization for path-based mobility in mobile wireless
                  sensor networks},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2016,
                  Doha, Qatar, April 3-6, 2016},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WCNC.2016.7564906},
  doi          = {10.1109/WCNC.2016.7564906},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/HartungKRH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WressneggerFYR16,
  author       = {Christian Wressnegger and
                  Kevin Freeman and
                  Fabian Yamaguchi and
                  Konrad Rieck},
  title        = {From Malware Signatures to Anti-Virus Assisted Attacks},
  journal      = {CoRR},
  volume       = {abs/1610.06022},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.06022},
  eprinttype    = {arXiv},
  eprint       = {1610.06022},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WressneggerFYR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PerlD0AYRFA15,
  author       = {Henning Perl and
                  Sergej Dechand and
                  Matthew Smith and
                  Daniel Arp and
                  Fabian Yamaguchi and
                  Konrad Rieck and
                  Sascha Fahl and
                  Yasemin Acar},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects
                  to Assist Code Audits},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {426--437},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813604},
  doi          = {10.1145/2810103.2813604},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PerlD0AYRFA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArpYR15,
  author       = {Daniel Arp and
                  Fabian Yamaguchi and
                  Konrad Rieck},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Torben: {A} Practical Side-Channel Attack for Deanonymizing Tor Communication},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {597--602},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714627},
  doi          = {10.1145/2714576.2714627},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ArpYR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/GasconWYAR15,
  author       = {Hugo Gascon and
                  Christian Wressnegger and
                  Fabian Yamaguchi and
                  Daniel Arp and
                  Konrad Rieck},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {330--347},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_18},
  doi          = {10.1007/978-3-319-28865-9\_18},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/GasconWYAR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/YamaguchiMGR15,
  author       = {Fabian Yamaguchi and
                  Alwin Maier and
                  Hugo Gascon and
                  Konrad Rieck},
  title        = {Automatic Inference of Search Patterns for Taint-Style Vulnerabilities},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {797--812},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.54},
  doi          = {10.1109/SP.2015.54},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/YamaguchiMGR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/IslamYDHRGN15,
  author       = {Aylin Caliskan Islam and
                  Fabian Yamaguchi and
                  Edwin Dauber and
                  Richard E. Harang and
                  Konrad Rieck and
                  Rachel Greenstadt and
                  Arvind Narayanan},
  title        = {When Coding Style Survives Compilation: De-anonymizing Programmers
                  from Executable Binaries},
  journal      = {CoRR},
  volume       = {abs/1512.08546},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.08546},
  eprinttype    = {arXiv},
  eprint       = {1512.08546},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/IslamYDHRGN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiRW14,
  author       = {Shujun Li and
                  Konrad Rieck and
                  Alan Woodward},
  title        = {Special issue on threat detection, analysis and defense},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {3},
  pages        = {163--164},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.08.001},
  doi          = {10.1016/J.JISA.2014.08.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiRW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BiggioRAWCGR14,
  author       = {Battista Biggio and
                  Konrad Rieck and
                  Davide Ariu and
                  Christian Wressnegger and
                  Igino Corona and
                  Giorgio Giacinto and
                  Fabio Roli},
  editor       = {Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Benjamin I. P. Rubinstein and
                  Gail{-}Joon Ahn},
  title        = {Poisoning behavioral malware clustering},
  booktitle    = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security
                  Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014},
  pages        = {27--36},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2666652.2666666},
  doi          = {10.1145/2666652.2666666},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BiggioRAWCGR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ArpSHGR14,
  author       = {Daniel Arp and
                  Michael Spreitzenbarth and
                  Malte Hubner and
                  Hugo Gascon and
                  Konrad Rieck},
  title        = {{DREBIN:} Effective and Explainable Detection of Android Malware in
                  Your Pocket},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/drebin-effective-and-explainable-detection-android-malware-your-pocket},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ArpSHGR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GasconUWR14,
  author       = {Hugo Gascon and
                  Sebastian Uellenbeck and
                  Christopher Wolf and
                  Konrad Rieck},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Continuous Authentication on Mobile Devices by Analysis of Typing
                  Motion Behavior},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {1--12},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20035},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GasconUWR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/YamaguchiGAR14,
  author       = {Fabian Yamaguchi and
                  Nico Golde and
                  Daniel Arp and
                  Konrad Rieck},
  title        = {Modeling and Discovering Vulnerabilities with Code Property Graphs},
  booktitle    = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  pages        = {590--604},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SP.2014.44},
  doi          = {10.1109/SP.2014.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/YamaguchiGAR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GornitzKRB14,
  author       = {Nico G{\"{o}}rnitz and
                  Marius Kloft and
                  Konrad Rieck and
                  Ulf Brefeld},
  title        = {Toward Supervised Anomaly Detection},
  journal      = {CoRR},
  volume       = {abs/1401.6424},
  year         = {2014},
  url          = {http://arxiv.org/abs/1401.6424},
  eprinttype    = {arXiv},
  eprint       = {1401.6424},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GornitzKRB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jair/GoernitzKRB13,
  author       = {Nico G{\"{o}}rnitz and
                  Marius Kloft and
                  Konrad Rieck and
                  Ulf Brefeld},
  title        = {Toward Supervised Anomaly Detection},
  journal      = {J. Artif. Intell. Res.},
  volume       = {46},
  pages        = {235--262},
  year         = {2013},
  url          = {https://doi.org/10.1613/jair.3623},
  doi          = {10.1613/JAIR.3623},
  timestamp    = {Mon, 21 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jair/GoernitzKRB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Rieck13,
  author       = {Konrad Rieck},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Blaine Nelson and
                  Christos Dimitrakakis and
                  Elaine Shi},
  title        = {Off the beaten path: machine learning for offensive security},
  booktitle    = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
                  and Security, Co-located with {CCS} 2013, Berlin, Germany, November
                  4, 2013},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517312.2517313},
  doi          = {10.1145/2517312.2517313},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Rieck13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GasconYAR13,
  author       = {Hugo Gascon and
                  Fabian Yamaguchi and
                  Daniel Arp and
                  Konrad Rieck},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Blaine Nelson and
                  Christos Dimitrakakis and
                  Elaine Shi},
  title        = {Structural detection of android malware using embedded call graphs},
  booktitle    = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
                  and Security, Co-located with {CCS} 2013, Berlin, Germany, November
                  4, 2013},
  pages        = {45--54},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517312.2517315},
  doi          = {10.1145/2517312.2517315},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GasconYAR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WressneggerSAR13,
  author       = {Christian Wressnegger and
                  Guido Schwenk and
                  Daniel Arp and
                  Konrad Rieck},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Blaine Nelson and
                  Christos Dimitrakakis and
                  Elaine Shi},
  title        = {A close look on \emph{n}-grams in intrusion detection: anomaly detection
                  vs. classification},
  booktitle    = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
                  and Security, Co-located with {CCS} 2013, Berlin, Germany, November
                  4, 2013},
  pages        = {67--76},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517312.2517316},
  doi          = {10.1145/2517312.2517316},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WressneggerSAR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YamaguchiWGR13,
  author       = {Fabian Yamaguchi and
                  Christian Wressnegger and
                  Hugo Gascon and
                  Konrad Rieck},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Chucky: exposing missing checks in source code for vulnerability discovery},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {499--510},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516665},
  doi          = {10.1145/2508859.2516665},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YamaguchiWGR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WressneggerBR13,
  author       = {Christian Wressnegger and
                  Frank Boldewin and
                  Konrad Rieck},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Deobfuscating Embedded Malware Using Probable-Plaintext Attacks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {164--183},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_9},
  doi          = {10.1007/978-3-642-41284-4\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WressneggerBR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimva/2013,
  editor       = {Konrad Rieck and
                  Patrick Stewin and
                  Jean{-}Pierre Seifert},
  title        = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 10th International Conference, {DIMVA} 2013, Berlin, Germany, July
                  18-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7967},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39235-1},
  doi          = {10.1007/978-3-642-39235-1},
  isbn         = {978-3-642-39234-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmlr/RieckWB12,
  author       = {Konrad Rieck and
                  Christian Wressnegger and
                  Alexander Bikadorov},
  title        = {Sally: a tool for embedding strings in vector spaces},
  journal      = {J. Mach. Learn. Res.},
  volume       = {13},
  pages        = {3247--3251},
  year         = {2012},
  url          = {https://dl.acm.org/doi/10.5555/2503308.2503345},
  doi          = {10.5555/2503308.2503345},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmlr/RieckWB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pik/KruegerR12,
  author       = {Tammo Krueger and
                  Konrad Rieck},
  title        = {Intelligent Defense against Malicious JavaScript Code},
  journal      = {Prax. Inf.verarb. Kommun.},
  volume       = {35},
  number       = {1},
  pages        = {54--60},
  year         = {2012},
  url          = {https://doi.org/10.1515/pik-2012-0009},
  doi          = {10.1515/PIK-2012-0009},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pik/KruegerR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YamaguchiLR12,
  author       = {Fabian Yamaguchi and
                  Markus Lottmann and
                  Konrad Rieck},
  editor       = {Robert H'obbes' Zakon},
  title        = {Generalized vulnerability extrapolation using abstract syntax trees},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {359--368},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421003},
  doi          = {10.1145/2420950.2421003},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YamaguchiLR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchuttKBR12,
  author       = {Kristof Sch{\"{u}}tt and
                  Marius Kloft and
                  Alexander Bikadorov and
                  Konrad Rieck},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Early detection of malicious behavior in JavaScript code},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {15--24},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381901},
  doi          = {10.1145/2381896.2381901},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SchuttKBR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KruegerGKR12,
  author       = {Tammo Krueger and
                  Hugo Gascon and
                  Nicole Kr{\"{a}}mer and
                  Konrad Rieck},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Learning stateful models for network honeypots},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {37--48},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381904},
  doi          = {10.1145/2381896.2381904},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KruegerGKR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchwenkBKR12,
  author       = {Guido Schwenk and
                  Alexander Bikadorov and
                  Tammo Krueger and
                  Konrad Rieck},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Autonomous learning for detection of JavaScript attacks: vision or
                  reality?},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {93--104},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381911},
  doi          = {10.1145/2381896.2381911},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SchwenkBKR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/Rieck11,
  author       = {Konrad Rieck},
  title        = {Self-Learning Network Intrusion Detection},
  journal      = {it Inf. Technol.},
  volume       = {53},
  number       = {3},
  pages        = {152--156},
  year         = {2011},
  url          = {https://doi.org/10.1524/itit.2011.0637},
  doi          = {10.1524/ITIT.2011.0637},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/it/Rieck11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/RieckTWH11,
  author       = {Konrad Rieck and
                  Philipp Trinius and
                  Carsten Willems and
                  Thorsten Holz},
  title        = {Automatic analysis of malware behavior using machine learning},
  journal      = {J. Comput. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {639--668},
  year         = {2011},
  url          = {https://doi.org/10.3233/JCS-2010-0410},
  doi          = {10.3233/JCS-2010-0410},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/RieckTWH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/widm/Rieck11,
  author       = {Konrad Rieck},
  title        = {Similarity measures for sequential data},
  journal      = {WIREs Data Mining Knowl. Discov.},
  volume       = {1},
  number       = {4},
  pages        = {296--304},
  year         = {2011},
  url          = {https://doi.org/10.1002/widm.36},
  doi          = {10.1002/WIDM.36},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/widm/Rieck11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JawurekJR11,
  author       = {Marek Jawurek and
                  Martin Johns and
                  Konrad Rieck},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Smart metering de-pseudonymization},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {227--236},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076764},
  doi          = {10.1145/2076732.2076764},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/JawurekJR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/Rieck11,
  author       = {Konrad Rieck},
  title        = {Computer Security and Machine Learning: Worst Enemies or Best Friends?},
  booktitle    = {First SysSec Workshop 2011, SysSec@DIMVA 2011, Amsterdam, The Netherlands,
                  July 6, 2011},
  pages        = {107--110},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.ieeecomputersociety.org/10.1109/SysSec.2011.16},
  doi          = {10.1109/SYSSEC.2011.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/Rieck11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ec2nd/SchwenkR11,
  author       = {Guido Schwenk and
                  Konrad Rieck},
  title        = {Adaptive Detection of Covert Communication in {HTTP} Requests},
  booktitle    = {Seventh European Conference on Computer Network Defense, {EC2ND} 2011,
                  Gothenburg, Sweden, September 6-7, 2011},
  pages        = {25--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/EC2ND.2011.12},
  doi          = {10.1109/EC2ND.2011.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ec2nd/SchwenkR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/YamaguchiLR11a,
  author       = {Fabian Yamaguchi and
                  Felix "FX" Lindner and
                  Konrad Rieck},
  editor       = {David Brumley and
                  Michal Zalewski},
  title        = {Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities
                  Using Machine Learning},
  booktitle    = {5th {USENIX} Workshop on Offensive Technologies, WOOT'11, August 8,
                  2011, San Francisco, CA, USA, Proceedings},
  pages        = {118--127},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/event/woot11/tech/final\_files/Yamaguchi.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/YamaguchiLR11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmlr/RieckKBM10,
  author       = {Konrad Rieck and
                  Tammo Krueger and
                  Ulf Brefeld and
                  Klaus{-}Robert M{\"{u}}ller},
  title        = {Approximate Tree Kernels},
  journal      = {J. Mach. Learn. Res.},
  volume       = {11},
  pages        = {555--580},
  year         = {2010},
  url          = {https://dl.acm.org/doi/10.5555/1756006.1756022},
  doi          = {10.5555/1756006.1756022},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmlr/RieckKBM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RieckKD10,
  author       = {Konrad Rieck and
                  Tammo Krueger and
                  Andreas Dewald},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Cujo: efficient detection and prevention of drive-by-download attacks},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {31--39},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920267},
  doi          = {10.1145/1920261.1920267},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RieckKD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkdd/KruegerKR10,
  author       = {Tammo Krueger and
                  Nicole Kr{\"{a}}mer and
                  Konrad Rieck},
  editor       = {Christos Dimitrakakis and
                  Aris Gkoulalas{-}Divanis and
                  Aikaterini Mitrokotsa and
                  Vassilios S. Verykios and
                  Y{\"{u}}cel Saygin},
  title        = {{ASAP:} Automatic Semantics-Aware Analysis of Network Payloads},
  booktitle    = {Privacy and Security Issues in Data Mining and Machine Learning -
                  International {ECML/PKDD} Workshop, {PSDML} 2010, Barcelona, Spain,
                  September 24, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6549},
  pages        = {50--63},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19896-0\_5},
  doi          = {10.1007/978-3-642-19896-0\_5},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkdd/KruegerKR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/KruegerGRL10,
  author       = {Tammo Krueger and
                  Christian Gehl and
                  Konrad Rieck and
                  Pavel Laskov},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski and
                  Michael Schumacher and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {TokDoc: a self-healing web application firewall},
  booktitle    = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC),
                  Sierre, Switzerland, March 22-26, 2010},
  pages        = {1846--1853},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1774088.1774480},
  doi          = {10.1145/1774088.1774480},
  timestamp    = {Sun, 02 Jun 2019 21:18:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/KruegerGRL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/RieckSLHL10,
  author       = {Konrad Rieck and
                  Guido Schwenk and
                  Tobias Limmer and
                  Thorsten Holz and
                  Pavel Laskov},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski and
                  Michael Schumacher and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {Botzilla: detecting the "phoning home" of malicious software},
  booktitle    = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC),
                  Sierre, Switzerland, March 22-26, 2010},
  pages        = {1978--1984},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1774088.1774506},
  doi          = {10.1145/1774088.1774506},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/RieckSLHL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/TriniusWHR10,
  author       = {Philipp Trinius and
                  Carsten Willems and
                  Thorsten Holz and
                  Konrad Rieck},
  editor       = {Felix C. Freiling},
  title        = {A Malware Instruction Set for Behavior-Based Analysis},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {205--216},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19782},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/TriniusWHR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/de/Rieck2009,
  author       = {Konrad Rieck},
  title        = {Machine learning for application layer intrusion detection},
  school       = {Berlin Institute of Technology},
  year         = {2009},
  url          = {http://opus.kobv.de/tuberlin/volltexte/2009/2284/},
  urn          = {urn:nbn:de:kobv:83-opus-22840},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/de/Rieck2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/WahlRLDM09,
  author       = {Stefan Wahl and
                  Konrad Rieck and
                  Pavel Laskov and
                  Peter Domschitz and
                  Klaus{-}Robert M{\"{u}}ller},
  title        = {Securing {IMS} against novel threats},
  journal      = {Bell Labs Tech. J.},
  volume       = {14},
  number       = {1},
  pages        = {243--257},
  year         = {2009},
  url          = {https://doi.org/10.1002/bltj.20365},
  doi          = {10.1002/BLTJ.20365},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/WahlRLDM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GornitzKRB09,
  author       = {Nico G{\"{o}}rnitz and
                  Marius Kloft and
                  Konrad Rieck and
                  Ulf Brefeld},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Active learning for network intrusion detection},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2009, Chicago, Illinois, USA, November 9, 2009},
  pages        = {47--54},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1654988.1655002},
  doi          = {10.1145/1654988.1655002},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GornitzKRB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmlr/RieckL08,
  author       = {Konrad Rieck and
                  Pavel Laskov},
  title        = {Linear-Time Computation of Similarity Measures for Sequential Data},
  journal      = {J. Mach. Learn. Res.},
  volume       = {9},
  pages        = {23--48},
  year         = {2008},
  url          = {https://dl.acm.org/doi/10.5555/1390681.1390683},
  doi          = {10.5555/1390681.1390683},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmlr/RieckL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/RieckHWDL08,
  author       = {Konrad Rieck and
                  Thorsten Holz and
                  Carsten Willems and
                  Patrick D{\"{u}}ssel and
                  Pavel Laskov},
  editor       = {Diego Zamboni},
  title        = {Learning and Classification of Malware Behavior},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  5th International Conference, {DIMVA} 2008, Paris, France, July 10-11,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5137},
  pages        = {108--125},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70542-0\_6},
  doi          = {10.1007/978-3-540-70542-0\_6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/RieckHWDL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DusselGLR08,
  author       = {Patrick D{\"{u}}ssel and
                  Christian Gehl and
                  Pavel Laskov and
                  Konrad Rieck},
  editor       = {R. Sekar and
                  Arun K. Pujari},
  title        = {Incorporation of Application Layer Protocol Syntax into Anomaly Detection},
  booktitle    = {Information Systems Security, 4th International Conference, {ICISS}
                  2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {188--202},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89862-7\_17},
  doi          = {10.1007/978-3-540-89862-7\_17},
  timestamp    = {Thu, 18 Nov 2021 17:21:37 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/DusselGLR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptcomm/RieckWLDM08,
  author       = {Konrad Rieck and
                  Stefan Wahl and
                  Pavel Laskov and
                  Peter Domschitz and
                  Klaus{-}Robert M{\"{u}}ller},
  editor       = {Henning Schulzrinne and
                  Radu State and
                  Saverio Niccolini},
  title        = {A Self-learning System for Detection of Anomalous {SIP} Messages},
  booktitle    = {Principles, Systems and Applications of {IP} Telecommunications. Services
                  and Security for Next Generation Networks, Second International Conference,
                  IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5310},
  pages        = {90--106},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89054-6\_5},
  doi          = {10.1007/978-3-540-89054-6\_5},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptcomm/RieckWLDM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HolzGRF08,
  author       = {Thorsten Holz and
                  Christian Gorecki and
                  Konrad Rieck and
                  Felix C. Freiling},
  title        = {Measuring and Detecting Fast-Flux Service Networks},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2008, San Diego, California, USA, 10th February - 13th February
                  2008},
  publisher    = {The Internet Society},
  year         = {2008},
  url          = {https://www.ndss-symposium.org/ndss2008/measuring-and-detecting-fast-flux-service-networks/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/HolzGRF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BraunDHKKKLRS08,
  author       = {Lothar Braun and
                  Falko Dressler and
                  Thorsten Holz and
                  Engin Kirda and
                  Jan Kohlrausch and
                  Christopher Kruegel and
                  Tobias Limmer and
                  Konrad Rieck and
                  James P. G. Sterbenz},
  editor       = {Georg Carle and
                  Falko Dressler and
                  Richard A. Kemmerer and
                  Hartmut K{\"{o}}nig and
                  Christopher Kruegel},
  title        = {08102 Working Group -- Requirements for Network Monitoring from an
                  {IDS} Perspective},
  booktitle    = {Perspectives Workshop: Network Attack Detection and Defense, 2.3.
                  - 6.3.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08102},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1497},
  timestamp    = {Thu, 10 Jun 2021 13:02:08 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BraunDHKKKLRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/DacierDHKKKRS08,
  author       = {Marc Dacier and
                  Herv{\'{e}} Debar and
                  Thorsten Holz and
                  Engin Kirda and
                  Jan Kohlrausch and
                  Christopher Kruegel and
                  Konrad Rieck and
                  James P. G. Sterbenz},
  editor       = {Georg Carle and
                  Falko Dressler and
                  Richard A. Kemmerer and
                  Hartmut K{\"{o}}nig and
                  Christopher Kruegel},
  title        = {8102 Working Group -- Attack Taxonomy},
  booktitle    = {Perspectives Workshop: Network Attack Detection and Defense, 2.3.
                  - 6.3.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08102},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1495},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/DacierDHKKKRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/RieckL07,
  author       = {Konrad Rieck and
                  Pavel Laskov},
  title        = {Language models for detection of unknown attacks in network traffic},
  journal      = {J. Comput. Virol.},
  volume       = {2},
  number       = {4},
  pages        = {243--256},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11416-006-0030-0},
  doi          = {10.1007/S11416-006-0030-0},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/RieckL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nato/LaskovRM07,
  author       = {Pavel Laskov and
                  Konrad Rieck and
                  Klaus{-}Robert M{\"{u}}ller},
  editor       = {Fran{\c{c}}oise Fogelman{-}Souli{\'{e}} and
                  Domenico Perrotta and
                  Jakub Piskorski and
                  Ralf Steinberger},
  title        = {Machine Learning for Intrusion Detection},
  booktitle    = {Mining Massive Data Sets for Security - Advances in Data Mining, Search,
                  Social Networks and Text Mining, and their Applications to Security,
                  Proceedings of the {NATO} Advanced Study Institute on Mining Massive
                  Data Sets for Security, Gazzada (Varese), Italy, 10-21 September 2007},
  series       = {{NATO} Science for Peace and Security Series - {D:} Information and
                  Communication Security},
  volume       = {19},
  pages        = {366--373},
  publisher    = {{IOS} Press},
  year         = {2007},
  url          = {https://doi.org/10.3233/978-1-58603-898-4-366},
  doi          = {10.3233/978-1-58603-898-4-366},
  timestamp    = {Mon, 06 May 2019 12:23:28 +0200},
  biburl       = {https://dblp.org/rec/conf/nato/LaskovRM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagm/RieckLM06,
  author       = {Konrad Rieck and
                  Pavel Laskov and
                  Klaus{-}Robert M{\"{u}}ller},
  editor       = {Katrin Franke and
                  Klaus{-}Robert M{\"{u}}ller and
                  Bertram Nickolay and
                  Ralf Sch{\"{a}}fer},
  title        = {Efficient Algorithms for Similarity Measures over Sequential Data:
                  {A} Look Beyond Kernels},
  booktitle    = {Pattern Recognition, 28th {DAGM} Symposium, Berlin, Germany, September
                  12-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4174},
  pages        = {374--383},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11861898\_38},
  doi          = {10.1007/11861898\_38},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dagm/RieckLM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/RieckL06,
  author       = {Konrad Rieck and
                  Pavel Laskov},
  editor       = {Roland B{\"{u}}schkes and
                  Pavel Laskov},
  title        = {Detecting Unknown Network Attacks Using Language Models},
  booktitle    = {Detection of Intrusions and Malware {\&} Vulnerability Assessment,
                  Third International Conference, {DIMVA} 2006, Berlin, Germany, July
                  13-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4064},
  pages        = {74--90},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11790754\_5},
  doi          = {10.1007/11790754\_5},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/RieckL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/RieckLS06,
  author       = {Konrad Rieck and
                  Pavel Laskov and
                  S{\"{o}}ren Sonnenburg},
  editor       = {Bernhard Sch{\"{o}}lkopf and
                  John C. Platt and
                  Thomas Hofmann},
  title        = {Computation of Similarity Measures for Sequential Data using Generalized
                  Suffix Trees},
  booktitle    = {Advances in Neural Information Processing Systems 19, Proceedings
                  of the Twentieth Annual Conference on Neural Information Processing
                  Systems, Vancouver, British Columbia, Canada, December 4-7, 2006},
  pages        = {1177--1184},
  publisher    = {{MIT} Press},
  year         = {2006},
  url          = {https://proceedings.neurips.cc/paper/2006/hash/a36e841c5230a79c2102036d2e259848-Abstract.html},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/RieckLS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciap/LaskovDSR05,
  author       = {Pavel Laskov and
                  Patrick D{\"{u}}ssel and
                  Christin Sch{\"{a}}fer and
                  Konrad Rieck},
  editor       = {Fabio Roli and
                  Sergio Vitulano},
  title        = {Learning Intrusion Detection: Supervised or Unsupervised?},
  booktitle    = {Image Analysis and Processing - {ICIAP} 2005, 13th International Conference,
                  Cagliari, Italy, September 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3617},
  pages        = {50--57},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11553595\_6},
  doi          = {10.1007/11553595\_6},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iciap/LaskovDSR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/LaskovRSM05,
  author       = {Pavel Laskov and
                  Konrad Rieck and
                  Christin Sch{\"{a}}fer and
                  Klaus{-}Robert M{\"{u}}ller},
  editor       = {Hannes Federrath},
  title        = {Visualization of anomaly detection using prediction sensitivity},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {197--208},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28373},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/LaskovRSM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}