default search action
Felix C. Freiling
Felix C. Gärtner
Person information
- affiliation: University of Erlangen-Nuremberg, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j81]Simon Ebbers, Stefan Gense, Mouad Bakkouch, Felix C. Freiling, Sebastian Schinzel:
Grand theft API: A forensic analysis of vehicle cloud data. Forensic Sci. Int. Digit. Investig. 48: 301691 (2024) - [j80]Lisa Marie Dreier, Céline Vanini, Christopher James Hargreaves, Frank Breitinger, Felix C. Freiling:
Beyond timestamps: Integrating implicit timing information into digital forensic timelines. Forensic Sci. Int. Digit. Investig. 49: 301755 (2024) - [j79]Ella Savchenko, Jenny Ottmann, Felix C. Freiling:
In the time loop: Data remanence in main memory of virtual machines. Forensic Sci. Int. Digit. Investig. 49: 301758 (2024) - [j78]Christian Lindenmeier, Andreas Hammer, Jan Gruber, Jonas Röckl, Felix C. Freiling:
Key extraction-based lawful access to encrypted data: Taxonomy and survey. Forensic Sci. Int. Digit. Investig. 50: 301796 (2024) - [j77]Christian Lindenmeier, Jan Gruber, Felix C. Freiling:
InvesTEE: A TEE-supported Framework for Lawful Remote Forensic Investigations. DTRAP 5(3): 27:1-27:20 (2024) - [j76]Andreas Hammer, Julian Geus, Florian Nicolai, Philip Schütz, Christofer Fein, Felix C. Freiling:
Fit for Forensics: Taxonomy and Common Model for Forensic Analysis of Fitness Trackers. DTRAP 5(3): 29:1-29:20 (2024) - [j75]Lisa Rzepka, Jenny Ottmann, Felix C. Freiling, Harald Baier:
Causal Inconsistencies Are Normal in Windows Memory Dumps (Too). DTRAP 5(3): 31:1-31:20 (2024) - [j74]Andreas Hammer, Christian Cerny, Christoph Jung, Christian Eichenmüller, Felix C. Freiling:
Increasing Street Credibility: Cartography-Aware Forensic Analysis of GNSS Trace Validity. DTRAP 5(3): 32:1-32:20 (2024) - [j73]Jenny Ottmann, Frank Breitinger, Felix C. Freiling:
An Experimental Assessment of Inconsistencies in Memory Forensics. ACM Trans. Priv. Secur. 27(1): 2:1-2:29 (2024) - [c136]Matti Schulze, Christian Lindenmeier, Jonas Röckl, Felix C. Freiling:
IlluminaTEE: Effective Man-At-The-End Attacks from within ARM TrustZone. Checkmate@CCS 2024: 11-21 - [c135]Dennis Eckhardt, Felix C. Freiling, Dominik Herrmann, Stefan Katzenbeisser, Henrich C. Pöhls:
Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme. Sicherheit 2024: 107-118 - [e17]Steffen Wendzel, Christian Wressnegger, Laura Hartmann, Felix C. Freiling, Frederik Armknecht, Lena Reinfelder:
Sicherheit, Schutz und Zuverlässigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024. LNI P-345, Gesellschaft für Informatik e.V. 2024, ISBN 978-3-88579-739-5 [contents] - [e16]Rüdiger Reischuk, Sven Apel, Abraham Bernstein, Maike Buchin, Anna Förster, Felix C. Freiling, Jan Mendling, Gustaf Neumann, Kay Uwe Römer, Björn Scheuermann, Ingo Scholtes, Nicole Schweikardt, Klaus Wehrle:
Ausgezeichnete Informatikdissertationen 2023. LNI D-24, GI 2024 [contents] - [i11]Julian Geus, Jenny Ottmann, Felix C. Freiling:
Systematic Evaluation of Forensic Data Acquisition using Smartphone Local Backup. CoRR abs/2404.12808 (2024) - [i10]Marcel Stachak, Julian Geus, Gaston Pugliese, Felix C. Freiling:
Nyon Unchained: Forensic Analysis of Bosch's eBike Board Computers. CoRR abs/2404.12864 (2024) - 2023
- [j72]Jan Gruber, Christopher James Hargreaves, Felix C. Freiling:
Contamination of digital evidence: Understanding an underexposed risk. Forensic Sci. Int. Digit. Investig. 44(Supplement): 301501 (2023) - [j71]Andreas Hammer, Mathis Ohlig, Julian Geus, Felix C. Freiling:
A Functional Classification of Forensic Access to Storage and its Legal Implications. DTRAP 4(3): 32:1-32:14 (2023) - [j70]Edita Bajramovic, Christofer Fein, Marius Frinken, Paul Rösler, Felix C. Freiling:
LAVA: Log Authentication and Verification Algorithm. DTRAP 4(3): 35:1-35:17 (2023) - [e15]Rüdiger Reischuk, Sven Apel, Abraham Bernstein, Felix C. Freiling, Hans-Peter Lenhof, Gustaf Neumann, Kay Uwe Römer, Björn Scheuermann, Nicole Schweikardt, Klaus Wehrle:
Ausgezeichnete Informatikdissertationen 2022. LNI D-23, GI 2023 [contents] - [i9]Jenny Ottmann, Üsame Cengiz, Frank Breitinger, Felix C. Freiling:
As if Time Had Stopped - Checking Memory Dumps for Quasi-Instantaneous Consistency. CoRR abs/2307.12060 (2023) - 2022
- [j69]Janine Schneider, Linus Düsel, Benedikt Lorch, Julia Drafz, Felix C. Freiling:
Prudent design principles for digital tampering experiments. Digit. Investig. 40(Supplement): 301334 (2022) - [j68]Janine Schneider, Maximilian Eichhorn, Felix C. Freiling:
Ambiguous file system partitions. Digit. Investig. 42(Supplement): 301399 (2022) - [j67]Jan Gruber, Lena L. Voigt, Zinaida Benenson, Felix C. Freiling:
Foundations of cybercriminalistics: From general process models to case-specific concretizations in cybercrime investigations. Digit. Investig. 43(Supplement): 301438 (2022) - [j66]Christoph Einzinger, Christian Rückert, Felix C. Freiling:
Datenminimierung in der Netzwerkforensik. Datenschutz und Datensicherheit 46(3): 149-155 (2022) - [j65]Jan Gruber, Felix C. Freiling:
Fighting Evasive Malware. Datenschutz und Datensicherheit 46(5): 284-290 (2022) - [c134]Tobias Latzo, Andreas Hellmich, Annika Knepper, Lukas Hardi, Tim Phillip Castello-Waldow, Felix C. Freiling, Andreas Attenberger:
Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data. NordSec 2022: 329-345 - [c133]Jan Gruber, Felix C. Freiling:
Fighting Evasive Malware: How to Pass the Reverse Turing Test By Utilizing a VMI-Based Human Interaction Simulator. Sicherheit 2022: 49-64 - [e14]Steffen Hölldobler, Rüdiger Reischuk, Sven Apel, Abraham Bernstein, Felix C. Freiling, Hans-Peter Lenhof, Gustaf Neumann, Kay Uwe Römer, Björn Scheuermann, Nicole Schweikardt, Klaus Wehrle:
Ausgezeichnete Informatikdissertationen 2021. LNI D-22, GI 2022, ISBN 978-3-88579-980-1 [contents] - 2021
- [j64]Florian Menges, Tobias Latzo, Manfred Vielberth, Sabine Sobola, Henrich C. Pöhls, Benjamin Taubmann, Johannes Köstler, Alexander Puchta, Felix C. Freiling, Hans P. Reiser, Günther Pernul:
Towards GDPR-compliant data processing in modern SIEM systems. Comput. Secur. 103: 102165 (2021) - [j63]Fabian Faust, Aurélien Thierry, Tilo Müller, Felix C. Freiling:
Selective Imaging of File System Data on Live Systems. Digit. Investig. 36 Supplement: 301115 (2021) - [j62]Jenny Ottmann, Johannes Pollach, Nicole Scheler, Janine Schneider, Christian Rückert, Felix C. Freiling:
Zur Blackbox-Problematik im Bereich Mobilfunkforensik. Datenschutz und Datensicherheit 45(8): 546-552 (2021) - [c132]Jonas Röckl, Mykolai Protsenko, Monika Huber, Tilo Müller, Felix C. Freiling:
Advanced System Resiliency Based on Virtualization Techniques for IoT Devices. ACSAC 2021: 455-467 - [e13]Steffen Hölldobler, Sven Apel, Abraham Bernstein, Felix C. Freiling, Hans-Peter Lenhof, Gustaf Neumann, Rüdiger Reischuk, Kay Uwe Römer, Björn Scheuermann, Nicole Schweikardt, Myra Spiliopoulou, Sabine Süsstrunk, Klaus Wehrle:
Ausgezeichnete Informatikdissertationen 2020. LNI D-21, GI 2021, ISBN 978-3-88579-775-3 [contents] - 2020
- [j61]Patrick Mullan, Christian Riess, Felix C. Freiling:
Towards Open-Set Forensic Source Grouping on JPEG Header Information. Digit. Investig. 32 Supplement: 300916 (2020) - [j60]Tobias Latzo, Julian Brost, Felix C. Freiling:
BMCLeech: Introducing Stealthy Memory Forensics to BMC. Digit. Investig. 32 Supplement: 300919 (2020) - [j59]Janine Schneider, Julian Wolf, Felix C. Freiling:
Tampering with Digital Evidence is Hard: The Case of Main Memory Images. Digit. Investig. 32 Supplement: 300924 (2020) - [j58]Janine Schneider, Hans-Peter Deifel, Stefan Milius, Felix C. Freiling:
Unifying Metadata-Based Storage Reconstruction and Carving with LAYR. Digit. Investig. 33 Supplement: 301006 (2020) - [c131]Marcel Busch, Florian Nicolai, Fabian Fleischer, Christian Rückert, Christoph Safferling, Felix C. Freiling:
Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations. ICDF2C 2020: 23-43 - [c130]Ralph Palutke, Simon Ruderich, Matthias Wild, Felix C. Freiling:
HyperLeech: Stealthy System Virtualization with Minimal Target Impact through DMA-Based Hypervisor Injection. RAID 2020: 165-179 - [c129]Tobias Groß, Richard Dirauf, Felix C. Freiling:
Systematic Analysis of Browser History Evidence. SADFE 2020: 1-12 - [c128]Nico Müller, Tilo Müller, Felix C. Freiling:
Urheberrecht ./. Sicherheitsanalyse. Sicherheit 2020: 105-115 - [c127]Philipp Morgner, Christoph Mai, Nicole Koschate-Fischer, Felix C. Freiling, Zinaida Benenson:
Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products. SP 2020: 429-446 - [e12]Steffen Hölldobler, Sven Apel, Abraham Bernstein, Felix C. Freiling, Hans-Peter Lenhof, Gustaf Neumann, Rüdiger Reischuk, Kay Uwe Römer, Björn Scheuermann, Nicole Schweikardt, Myra Spiliopoulou, Sabine Süsstrunk, Klaus Wehrle:
Ausgezeichnete Informatikdissertationen 2019. LNI D-20, GI 2020, ISBN 978-3-88579-775-3 [contents] - [i8]Fabian Faust, Aurélien Thierry, Tilo Müller, Felix C. Freiling:
Technical Report: Selective Imaging of File System Data on Live Systems. CoRR abs/2012.02573 (2020)
2010 – 2019
- 2019
- [j57]Tobias Latzo, Ralph Palutke, Felix C. Freiling:
A universal taxonomy and survey of forensic memory acquisition techniques. Digit. Investig. 28(Supplement): 56-69 (2019) - [j56]Patrick Mullan, Christian Riess, Felix C. Freiling:
Forensic source identification using JPEG image headers: The case of smartphones. Digit. Investig. 28 Supplement: S68-S76 (2019) - [j55]Jan Schiller, Felix C. Freiling, Zinaida Benenson, Werner Massonne:
Berufsbegleitendes Studieren an Universitäten - Ein Zukunftsfeld für die IT-Sicherheit. Inform. Spektrum 42(1): 38-47 (2019) - [j54]Pieter Maene, Johannes Götzfried, Tilo Müller, Ruan de Clercq, Felix C. Freiling, Ingrid Verbauwhede:
Atlas: Application Confidentiality in Compromised Embedded Systems. IEEE Trans. Dependable Secur. Comput. 16(3): 415-423 (2019) - [c126]Stefan Schorradt, Edita Bajramovic, Felix C. Freiling:
On the Feasibility of Secure Logging for Industrial Control Systems Using Blockchain. CECC 2019: 4:1-4:6 - [c125]Lamya Abdullah, Sebastian Hahn, Felix C. Freiling:
Achieving Consistency of Software Updates against Strong Attackers. CECC 2019: 6:1-6:6 - [c124]Tobias Latzo, Felix C. Freiling:
Characterizing the Limitations of Forensic Event Reconstruction Based on Log Files. TrustCom/BigDataSE 2019: 466-475 - [e11]Sven Apel, Abraham Bernstein, Felix C. Freiling, Steffen Hölldobler, Hans-Peter Lenhof, Paul Molitor, Gustaf Neumann, Rüdiger Reischuk, Björn Scheuermann, Nicole Schweikardt, Myra Spiliopoulou, Sabine Süsstrunk, Klaus Wehrle:
Ausgezeichnete Informatikdissertationen 2018. LNI D-19, GI 2019, ISBN 978-3-88579-977-1 [contents] - [i7]Lamya Abdullah, Felix C. Freiling, Juan Quintero, Zinaida Benenson:
Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing. CoRR abs/1906.07841 (2019) - [i6]Philipp Morgner, Christoph Mai, Nicole Koschate-Fischer, Felix C. Freiling, Zinaida Benenson:
Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products. CoRR abs/1906.11094 (2019) - 2018
- [j53]Sebastian Nemetz, Sven Schmitt, Felix C. Freiling:
A standardized corpus for SQLite database forensics. Digit. Investig. 24 Supplement: S121-S130 (2018) - [j52]Ralph Palutke, Felix C. Freiling:
Styx: Countering robust memory acquisition. Digit. Investig. 24 Supplement: S18-S28 (2018) - [j51]Felix C. Freiling, Leonhard Hösch:
Controlled experiments in digital evidence tampering. Digit. Investig. 24 Supplement: S83-S92 (2018) - [j50]Felix C. Freiling, Tobias Groß, Tobias Latzo, Tilo Müller, Ralph Palutke:
Advances in Forensic Data Acquisition. IEEE Des. Test 35(5): 63-74 (2018) - [j49]Pieter Maene, Johannes Götzfried, Ruan de Clercq, Tilo Müller, Felix C. Freiling, Ingrid Verbauwhede:
Hardware-Based Trusted Computing Architectures for Isolation and Attestation. IEEE Trans. Computers 67(3): 361-374 (2018) - [c123]Lamya Abdullah, Felix C. Freiling, Juan Quintero, Zinaida Benenson:
Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing. CyberICPS/SECPRE@ESORICS 2018: 137-152 - [c122]Norman Hänsch, Andrea Schankin, Mykolai Protsenko, Felix C. Freiling, Zinaida Benenson:
Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently. SOUPS @ USENIX Security Symposium 2018: 341-356 - [c121]Philipp Morgner, Felix C. Freiling, Zinaida Benenson:
Opinion: Security Lifetime Labels - Overcoming Information Asymmetry in Security of IoT Consumer Products. WISEC 2018: 208-211 - [e10]Sven Apel, Abraham Bernstein, Wolfgang Effelsberg, Felix C. Freiling, Steffen Hölldobler, Hans-Peter Lenhof, Paul Molitor, Gustaf Neumann, Rüdiger Reischuk, Nicole Schweikardt, Björn Scheuermann, Myra Spiliopoulou, Sabine Süsstrunk:
Ausgezeichnete Informatikdissertationen 2017. LNI D-18, GI 2018, ISBN 978-3-88579-977-1 [contents] - 2017
- [j48]Felix C. Freiling, Thomas Glanzmann, Hans P. Reiser:
Characterizing loss of digital evidence due to abstraction layers. Digit. Investig. 20 Supplement: S107-S115 (2017) - [j47]Felix C. Freiling, Christian Zoubek:
Do digital investigators have to program? A controlled experiment in digital investigation. Digit. Investig. 20 Supplement: S37-S46 (2017) - [j46]Job Noorman, Jo Van Bulck, Jan Tobias Mühlberg, Frank Piessens, Pieter Maene, Bart Preneel, Ingrid Verbauwhede, Johannes Götzfried, Tilo Müller, Felix C. Freiling:
Sancus 2.0: A Low-Cost Security Architecture for IoT Devices. ACM Trans. Priv. Secur. 20(3): 7:1-7:33 (2017) - [e9]Abraham Bernstein, Wolfgang Effelsberg, Felix C. Freiling, Steffen Hölldobler, Hans-Peter Lenhof, Paul Molitor, Gustaf Neumann, Rüdiger Reischuk, Nicole Schweikardt, Myra Spiliopoulou, Sabine Süsstrunk:
Ausgezeichnete Informatikdissertationen 2016. LNI D-17, GI 2017, ISBN 978-3-88579-976-4 [contents] - 2016
- [j45]Michael Gruhn, Felix C. Freiling:
Evaluating atomicity, and integrity of correct memory acquisition methods. Digit. Investig. 16 Supplement: S1-S10 (2016) - [j44]Johannes Bauer, Michael Gruhn, Felix C. Freiling:
Lest we forget: Cold-boot attacks on scrambled DDR3 memory. Digit. Investig. 16 Supplement: S65-S74 (2016) - [j43]Benjamin Stritter, Felix C. Freiling, Hartmut König, René Rietz, Steffen Ullrich, Alexander von Gernler, Felix Erlacher, Falko Dressler:
Cleaning up Web 2.0's Security Mess-at Least Partly. IEEE Secur. Priv. 14(2): 48-57 (2016) - [j42]Felix C. Freiling:
Staatliche Spähsoftware zur Strafverfolgung - Zur Verhältnismäßigkeit einer umstrittenen Maßnahme. Inform. Spektrum 39(3): 203-209 (2016) - [j41]Gabor Drescher, Christoph Erhardt, Felix C. Freiling, Johannes Götzfried, Daniel Lohmann, Pieter Maene, Tilo Müller, Ingrid Verbauwhede, Andreas Weichslgartner, Stefan Wildermann:
Providing security on demand using invasive computing. it Inf. Technol. 58(6): 281-295 (2016) - [j40]Andreas Kurtz, Hugo Gascon, Tobias Becker, Konrad Rieck, Felix C. Freiling:
Fingerprinting Mobile Devices Using Personalized Configurations. Proc. Priv. Enhancing Technol. 2016(1): 4-19 (2016) - [c120]Johannes Bauer, Felix C. Freiling:
Towards Cycle-Accurate Emulation of Cortex-M Code to Detect Timing Side Channels. ARES 2016: 49-58 - [c119]Johannes Bauer, Sebastian Schinzel, Felix C. Freiling, Andreas Dewald:
Information leakage behind the curtain: Abusing anti-EMI features for covert communication. HOST 2016: 130-134 - [c118]Andreas Weichslgartner, Stefan Wildermann, Johannes Götzfried, Felix C. Freiling, Michael Glaß, Jürgen Teich:
Design-Time/Run-Time Mapping of Security-Critical Applications in Heterogeneous MPSoCs. SCOPES 2016: 153-162 - [e8]Abraham Bernstein, Wolfgang Effelsberg, Felix C. Freiling, Steffen Hölldobler, Hans-Peter Lenhof, Paul Molitor, Gustaf Neumann, Rüdiger Reischuk, Nicole Schweikardt, Myra Spiliopoulou, Harald Störrle, Sabine Süsstrunk:
Ausgezeichnete Informatikdissertationen 2015. LNI D-16, GI 2016, ISBN 978-3-88579-975-7 [contents] - 2015
- [j39]Maxim Anikeev, Felix C. Freiling, Johannes Götzfried, Tilo Müller:
Secure garbage collection: Preventing malicious data harvesting from deallocated Java objects inside the Dalvik VM. J. Inf. Secur. Appl. 22: 81-86 (2015) - [j38]Felix C. Freiling:
From IT forensics to forensic computing. it Inf. Technol. 57(6): 337-338 (2015) - [j37]Felix C. Freiling, Jan C. Schuhr, Michael Gruhn:
What is essential data in digital forensic analysis? it Inf. Technol. 57(6): 376-383 (2015) - [j36]Tilo Müller, Felix C. Freiling:
A Systematic Assessment of the Security of Full Disk Encryption. IEEE Trans. Dependable Secur. Comput. 12(5): 491-503 (2015) - [c117]Johannes Götzfried, Tilo Müller, Ruan de Clercq, Pieter Maene, Felix C. Freiling, Ingrid Verbauwhede:
Soteria: Offline Software Protection within Low-cost Embedded Devices. ACSAC 2015: 241-250 - [c116]Felix C. Freiling, Michael Gruhn:
What is Essential Data in Digital Forensic Analysis? IMF 2015: 40-48 - [e7]Abraham Bernstein, Wolfgang Effelsberg, Felix C. Freiling, Steffen Hölldobler, Hans-Peter Lenhof, Paul Molitor, Gustaf Neumann, Rüdiger Reischuk, Nicole Schweikardt, Myra Spiliopoulou, Harald Störrle, Sabine Süsstrunk:
Ausgezeichnete Informatikdissertationen 2014. LNI D-15, GI 2015, ISBN 978-3-88579-419-6 [contents] - 2014
- [j35]Felix C. Freiling, Konstantin Sack:
Selektive Datensicherungen in der IT-Forensik. Datenschutz und Datensicherheit 38(2): 112-117 (2014) - [j34]Felix C. Freiling, Rüdiger Grimm, Karl-Erwin Großpietsch, Hubert B. Keller, Jürgen Mottok, Isabel Münch, Kai Rannenberg, Francesca Saglietti:
Technische Sicherheit und Informationssicherheit - Unterschiede und Gemeinsamkeiten. Inform. Spektrum 37(1): 14-24 (2014) - [c115]Yan Zhuang, Mykola Protsenko, Tilo Müller, Felix C. Freiling:
An(other) Exercise in Measuring the Strength of Source Code Obfuscation. DEXA Workshops 2014: 313-317 - [c114]Felix C. Freiling, Mykola Protsenko, Yan Zhuang:
An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs. SecureComm (2) 2014: 315-328 - [c113]Andreas Kurtz, Markus Troßbach, Felix C. Freiling:
Snoop-it: Dynamische Analyse und Manipulation von Apple iOS Apps. Sicherheit 2014: 13-23 - [c112]Nadina Hintz, Markus Engelberth, Zinaida Benenson, Felix C. Freiling:
Phishing still works: Erfahrungen und Lehren aus der Durchführung von Phishing-Experimenten. Sicherheit 2014: 37-51 - [c111]Dominik Brodowski, Andreas Dewald, Felix C. Freiling, Steve Kovács, Martin Rieger:
Drei Jahre Master Online Digitale Forensik: Ergebnisse und Erfahrungen. Sicherheit 2014: 391-405 - [e6]Felix C. Freiling, Holger Morgenstern, Sandra Frings, Oliver Göbel, Detlef Günther, Jens Nedon, Dirk Schadt:
Eighth International Conference on IT Security Incident Management & IT Forensics, IMF 2014, Münster, Germany, May 12-14, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-4330-2 [contents] - 2013
- [j33]Felix C. Freiling:
Im Fokus: Technische und menschliche Aspekte von Cyberkriminalität. Prax. Inf.verarb. Kommun. 36(3): 199-200 (2013) - [c110]Tilo Müller, Hans Spath, Richard Mäckl, Felix C. Freiling:
Stark - Tamperproof Authentication to Resist Keylogging. Financial Cryptography 2013: 295-312 - [c109]Johannes Stüttgen, Andreas Dewald, Felix C. Freiling:
Selective Imaging Revisited. IMF 2013: 45-58 - [c108]Martin Wundram, Felix C. Freiling, Christian Moch:
Anti-forensics: The Next Step in Digital Forensics Tool Testing. IMF 2013: 83-97 - [c107]Sven Kälber, Andreas Dewald, Felix C. Freiling:
Forensic Application-Fingerprinting Based on File System Metadata. IMF 2013: 98-112 - [c106]Viviane Zwanger, Felix C. Freiling:
Kernel mode API spectroscopy for incident response and digital forensics. PPREW@POPL 2013: 3:1-3:11 - [c105]Michael Spreitzenbarth, Felix C. Freiling, Florian Echtler, Thomas Schreck, Johannes Hoffmann:
Mobile-sandbox: having a deeper look into android applications. SAC 2013: 1808-1815 - [c104]Maxim Anikeev, Felix C. Freiling:
Preventing malicious data harvesting from deallocated memory areas. SIN 2013: 448-449 - [p3]Andreas Dewald, Felix C. Freiling, Sven Schmitt, Michael Spreitzenbarth, Stefan Vömel:
Systematische Probleme und Grenzen der forensischen Informatik. Jenseits von 1984 2013: 101-118 - [e5]Holger Morgenstern, Ralf Ehlert, Felix C. Freiling, Sandra Frings, Oliver Göbel, Detlef Günther, Stefan Kiltz, Jens Nedon, Dirk Schadt:
Seventh International Conference on IT Security Incident Management and IT Forensics, IMF 2013, Nuremberg, Germany, March 12-14, 2013. IEEE Computer Society 2013, ISBN 978-1-4673-6307-5 [contents] - [i5]Felix C. Freiling, Gerrit Hornung, Radim Polcák:
Forensic Computing (Dagstuhl Seminar 13482). Dagstuhl Reports 3(11): 193-208 (2013) - 2012
- [j32]Stefan Vömel, Felix C. Freiling:
Correctness, atomicity, and integrity: Defining criteria for forensically-sound memory acquisition. Digit. Investig. 9(2): 125-137 (2012) - [j31]Matthias Bäcker, Andreas Dewald, Felix C. Freiling, Sven Schmitt:
Kriterien für die Priorisierung bei der Sicherung und Analyse digitaler Spuren. Datenschutz und Datensicherheit 36(8): 597-602 (2012) - [j30]Carsten Willems, Felix C. Freiling:
Reverse Code Engineering - State of the Art and Countermeasures. it Inf. Technol. 54(2): 53-63 (2012) - [j29]Roberto Cortiñas, Felix C. Freiling, Marjan Ghajar-Azadanlou, Alberto Lafuente, Mikel Larrea, Lucia Draque Penso, Iratxe Soraluze Arriola:
Secure Failure Detection and Consensus in TrustedPals. IEEE Trans. Dependable Secur. Comput. 9(4): 610-625 (2012) - [c103]Tilo Müller, Benjamin Taubmann, Felix C. Freiling:
TreVisor - OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks. ACNS 2012: 66-83 - [c102]Carsten Willems, Felix C. Freiling, Thorsten Holz:
Using memory management to detect and extract illegitimate code for malware analysis. ACSAC 2012: 179-188 - [c101]Colin Atkinson, Florian Barth, Ralph Gerbig, Felix C. Freiling, Sebastian Schinzel, Frank Hadasch, Alexander Maedche, Benjamin Müller:
Reducing the Incidence of Unintended, Human-Caused Information Flows in Enterprise Systems. EDOC Workshops 2012: 11-18 - [c100]Michael Spreitzenbarth, Sven Schmitt, Felix C. Freiling:
Comparing Sources of Location Data from Android Smartphones. IFIP Int. Conf. Digital Forensics 2012: 143-157 - [c99]