


Остановите войну!
for scientists:


default search action
Felix C. Freiling
Felix C. Gärtner
Person information

- affiliation: University of Erlangen-Nuremberg, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j70]Jan Gruber, Christopher James Hargreaves, Felix C. Freiling:
Contamination of digital evidence: Understanding an underexposed risk. Forensic Sci. Int. Digit. Investig. 44(Supplement): 301501 (2023) - [e15]Rüdiger Reischuk, Sven Apel, Abraham Bernstein, Felix C. Freiling, Hans-Peter Lenhof, Gustaf Neumann, Kay Uwe Römer, Björn Scheuermann, Nicole Schweikardt, Klaus Wehrle:
Ausgezeichnete Informatikdissertationen 2022. LNI D-23, GI 2023 [contents] - [i9]Jenny Ottmann, Üsame Cengiz, Frank Breitinger, Felix C. Freiling:
As if Time Had Stopped - Checking Memory Dumps for Quasi-Instantaneous Consistency. CoRR abs/2307.12060 (2023) - 2022
- [j69]Janine Schneider
, Linus Düsel, Benedikt Lorch, Julia Drafz, Felix C. Freiling:
Prudent design principles for digital tampering experiments. Digit. Investig. 40(Supplement): 301334 (2022) - [j68]Janine Schneider
, Maximilian Eichhorn, Felix C. Freiling:
Ambiguous file system partitions. Digit. Investig. 42(Supplement): 301399 (2022) - [j67]Jan Gruber
, Lena L. Voigt, Zinaida Benenson, Felix C. Freiling
:
Foundations of cybercriminalistics: From general process models to case-specific concretizations in cybercrime investigations. Digit. Investig. 43(Supplement): 301438 (2022) - [j66]Christoph Einzinger, Christian Rückert, Felix C. Freiling:
Datenminimierung in der Netzwerkforensik. Datenschutz und Datensicherheit 46(3): 149-155 (2022) - [j65]Jan Gruber
, Felix C. Freiling:
Fighting Evasive Malware. Datenschutz und Datensicherheit 46(5): 284-290 (2022) - [c133]Tobias Latzo, Andreas Hellmich, Annika Knepper, Lukas Hardi, Tim Phillip Castello-Waldow, Felix C. Freiling, Andreas Attenberger:
Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data. NordSec 2022: 329-345 - [c132]Jan Gruber
, Felix C. Freiling:
Fighting Evasive Malware: How to Pass the Reverse Turing Test By Utilizing a VMI-Based Human Interaction Simulator. Sicherheit 2022: 49-64 - [e14]Steffen Hölldobler, Rüdiger Reischuk, Sven Apel, Abraham Bernstein, Felix C. Freiling, Hans-Peter Lenhof, Gustaf Neumann, Kay Uwe Römer, Björn Scheuermann, Nicole Schweikardt, Klaus Wehrle:
Ausgezeichnete Informatikdissertationen 2021. LNI D-22, GI 2022, ISBN 978-3-88579-980-1 [contents] - 2021
- [j64]Florian Menges, Tobias Latzo, Manfred Vielberth
, Sabine Sobola, Henrich C. Pöhls, Benjamin Taubmann, Johannes Köstler, Alexander Puchta, Felix C. Freiling, Hans P. Reiser, Günther Pernul:
Towards GDPR-compliant data processing in modern SIEM systems. Comput. Secur. 103: 102165 (2021) - [j63]Fabian Faust, Aurélien Thierry, Tilo Müller, Felix C. Freiling:
Selective Imaging of File System Data on Live Systems. Digit. Investig. 36 Supplement: 301115 (2021) - [j62]Jenny Ottmann, Johannes Pollach, Nicole Scheler, Janine Schneider
, Christian Rückert, Felix C. Freiling:
Zur Blackbox-Problematik im Bereich Mobilfunkforensik. Datenschutz und Datensicherheit 45(8): 546-552 (2021) - [c131]Jonas Röckl, Mykolai Protsenko, Monika Huber
, Tilo Müller, Felix C. Freiling:
Advanced System Resiliency Based on Virtualization Techniques for IoT Devices. ACSAC 2021: 455-467 - [e13]Steffen Hölldobler, Sven Apel, Abraham Bernstein, Felix C. Freiling, Hans-Peter Lenhof, Gustaf Neumann, Rüdiger Reischuk, Kay Uwe Römer, Björn Scheuermann, Nicole Schweikardt, Myra Spiliopoulou, Sabine Süsstrunk, Klaus Wehrle:
Ausgezeichnete Informatikdissertationen 2020. LNI D-21, GI 2021, ISBN 978-3-88579-775-3 [contents] - 2020
- [j61]Patrick Mullan, Christian Riess, Felix C. Freiling:
Towards Open-Set Forensic Source Grouping on JPEG Header Information. Digit. Investig. 32 Supplement: 300916 (2020) - [j60]Tobias Latzo, Julian Brost, Felix C. Freiling:
BMCLeech: Introducing Stealthy Memory Forensics to BMC. Digit. Investig. 32 Supplement: 300919 (2020) - [j59]Janine Schneider
, Julian Wolf
, Felix C. Freiling:
Tampering with Digital Evidence is Hard: The Case of Main Memory Images. Digit. Investig. 32 Supplement: 300924 (2020) - [j58]Janine Schneider
, Hans-Peter Deifel, Stefan Milius, Felix C. Freiling:
Unifying Metadata-Based Storage Reconstruction and Carving with LAYR. Digit. Investig. 33 Supplement: 301006 (2020) - [c130]Ralph Palutke, Simon Ruderich, Matthias Wild, Felix C. Freiling:
HyperLeech: Stealthy System Virtualization with Minimal Target Impact through DMA-Based Hypervisor Injection. RAID 2020: 165-179 - [c129]Tobias Groß, Richard Dirauf
, Felix C. Freiling:
Systematic Analysis of Browser History Evidence. SADFE 2020: 1-12 - [c128]Nico Müller, Tilo Müller, Felix C. Freiling:
Urheberrecht ./. Sicherheitsanalyse. Sicherheit 2020: 105-115 - [c127]Philipp Morgner, Christoph Mai, Nicole Koschate-Fischer, Felix C. Freiling, Zinaida Benenson:
Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products. SP 2020: 429-446 - [e12]Steffen Hölldobler, Sven Apel, Abraham Bernstein, Felix C. Freiling, Hans-Peter Lenhof, Gustaf Neumann, Rüdiger Reischuk, Kay Uwe Römer, Björn Scheuermann, Nicole Schweikardt, Myra Spiliopoulou, Sabine Süsstrunk, Klaus Wehrle:
Ausgezeichnete Informatikdissertationen 2019. LNI D-20, GI 2020, ISBN 978-3-88579-775-3 [contents] - [i8]Fabian Faust, Aurélien Thierry, Tilo Müller, Felix C. Freiling:
Technical Report: Selective Imaging of File System Data on Live Systems. CoRR abs/2012.02573 (2020)
2010 – 2019
- 2019
- [j57]Tobias Latzo, Ralph Palutke, Felix C. Freiling:
A universal taxonomy and survey of forensic memory acquisition techniques. Digit. Investig. 28(Supplement): 56-69 (2019) - [j56]Patrick Mullan, Christian Riess, Felix C. Freiling:
Forensic source identification using JPEG image headers: The case of smartphones. Digit. Investig. 28 Supplement: S68-S76 (2019) - [j55]Jan Schiller
, Felix C. Freiling, Zinaida Benenson, Werner Massonne:
Berufsbegleitendes Studieren an Universitäten - Ein Zukunftsfeld für die IT-Sicherheit. Inform. Spektrum 42(1): 38-47 (2019) - [j54]Pieter Maene
, Johannes Götzfried, Tilo Müller, Ruan de Clercq, Felix C. Freiling
, Ingrid Verbauwhede
:
Atlas: Application Confidentiality in Compromised Embedded Systems. IEEE Trans. Dependable Secur. Comput. 16(3): 415-423 (2019) - [c126]Stefan Schorradt, Edita Bajramovic, Felix C. Freiling:
On the Feasibility of Secure Logging for Industrial Control Systems Using Blockchain. CECC 2019: 4:1-4:6 - [c125]Lamya Abdullah, Sebastian Hahn, Felix C. Freiling:
Achieving Consistency of Software Updates against Strong Attackers. CECC 2019: 6:1-6:6 - [c124]Tobias Latzo, Felix C. Freiling:
Characterizing the Limitations of Forensic Event Reconstruction Based on Log Files. TrustCom/BigDataSE 2019: 466-475 - [e11]Sven Apel, Abraham Bernstein, Felix C. Freiling, Steffen Hölldobler, Hans-Peter Lenhof, Paul Molitor, Gustaf Neumann, Rüdiger Reischuk, Björn Scheuermann, Nicole Schweikardt, Myra Spiliopoulou, Sabine Süsstrunk, Klaus Wehrle:
Ausgezeichnete Informatikdissertationen 2018. LNI D-19, GI 2019, ISBN 978-3-88579-977-1 [contents] - [i7]Lamya Abdullah, Felix C. Freiling, Juan Quintero, Zinaida Benenson:
Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing. CoRR abs/1906.07841 (2019) - [i6]Philipp Morgner, Christoph Mai, Nicole Koschate-Fischer, Felix C. Freiling, Zinaida Benenson:
Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products. CoRR abs/1906.11094 (2019) - 2018
- [j53]Sebastian Nemetz, Sven Schmitt, Felix C. Freiling:
A standardized corpus for SQLite database forensics. Digit. Investig. 24 Supplement: S121-S130 (2018) - [j52]Ralph Palutke, Felix C. Freiling:
Styx: Countering robust memory acquisition. Digit. Investig. 24 Supplement: S18-S28 (2018) - [j51]Felix C. Freiling, Leonhard Hösch:
Controlled experiments in digital evidence tampering. Digit. Investig. 24 Supplement: S83-S92 (2018) - [j50]Felix C. Freiling
, Tobias Groß, Tobias Latzo, Tilo Müller, Ralph Palutke:
Advances in Forensic Data Acquisition. IEEE Des. Test 35(5): 63-74 (2018) - [j49]Pieter Maene
, Johannes Götzfried, Ruan de Clercq, Tilo Müller, Felix C. Freiling, Ingrid Verbauwhede
:
Hardware-Based Trusted Computing Architectures for Isolation and Attestation. IEEE Trans. Computers 67(3): 361-374 (2018) - [c123]Lamya Abdullah, Felix C. Freiling, Juan Quintero, Zinaida Benenson:
Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing. CyberICPS/SECPRE@ESORICS 2018: 137-152 - [c122]Norman Hänsch, Andrea Schankin, Mykolai Protsenko, Felix C. Freiling, Zinaida Benenson:
Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently. SOUPS @ USENIX Security Symposium 2018: 341-356 - [c121]Philipp Morgner, Felix C. Freiling, Zinaida Benenson:
Opinion: Security Lifetime Labels - Overcoming Information Asymmetry in Security of IoT Consumer Products. WISEC 2018: 208-211 - [e10]Sven Apel, Abraham Bernstein, Wolfgang Effelsberg, Felix C. Freiling, Steffen Hölldobler, Hans-Peter Lenhof, Paul Molitor, Gustaf Neumann, Rüdiger Reischuk, Nicole Schweikardt, Björn Scheuermann, Myra Spiliopoulou, Sabine Süsstrunk:
Ausgezeichnete Informatikdissertationen 2017. LNI D-18, GI 2018, ISBN 978-3-88579-977-1 [contents] - 2017
- [j48]Felix C. Freiling, Thomas Glanzmann, Hans P. Reiser
:
Characterizing loss of digital evidence due to abstraction layers. Digit. Investig. 20 Supplement: S107-S115 (2017) - [j47]Felix C. Freiling, Christian Zoubek:
Do digital investigators have to program? A controlled experiment in digital investigation. Digit. Investig. 20 Supplement: S37-S46 (2017) - [j46]Job Noorman, Jo Van Bulck
, Jan Tobias Mühlberg
, Frank Piessens, Pieter Maene, Bart Preneel
, Ingrid Verbauwhede
, Johannes Götzfried, Tilo Müller, Felix C. Freiling:
Sancus 2.0: A Low-Cost Security Architecture for IoT Devices. ACM Trans. Priv. Secur. 20(3): 7:1-7:33 (2017) - [e9]Abraham Bernstein, Wolfgang Effelsberg, Felix C. Freiling, Steffen Hölldobler, Hans-Peter Lenhof, Paul Molitor, Gustaf Neumann, Rüdiger Reischuk, Nicole Schweikardt, Myra Spiliopoulou, Sabine Süsstrunk:
Ausgezeichnete Informatikdissertationen 2016. LNI D-17, GI 2017, ISBN 978-3-88579-976-4 [contents] - 2016
- [j45]Michael Gruhn, Felix C. Freiling:
Evaluating atomicity, and integrity of correct memory acquisition methods. Digit. Investig. 16 Supplement: S1-S10 (2016) - [j44]Johannes Bauer, Michael Gruhn, Felix C. Freiling:
Lest we forget: Cold-boot attacks on scrambled DDR3 memory. Digit. Investig. 16 Supplement: S65-S74 (2016) - [j43]Benjamin Stritter, Felix C. Freiling, Hartmut König, René Rietz, Steffen Ullrich, Alexander von Gernler, Felix Erlacher, Falko Dressler
:
Cleaning up Web 2.0's Security Mess-at Least Partly. IEEE Secur. Priv. 14(2): 48-57 (2016) - [j42]Felix C. Freiling:
Staatliche Spähsoftware zur Strafverfolgung - Zur Verhältnismäßigkeit einer umstrittenen Maßnahme. Inform. Spektrum 39(3): 203-209 (2016) - [j41]Gabor Drescher, Christoph Erhardt, Felix C. Freiling, Johannes Götzfried, Daniel Lohmann
, Pieter Maene, Tilo Müller, Ingrid Verbauwhede
, Andreas Weichslgartner
, Stefan Wildermann:
Providing security on demand using invasive computing. it Inf. Technol. 58(6): 281-295 (2016) - [j40]Andreas Kurtz, Hugo Gascon, Tobias Becker, Konrad Rieck, Felix C. Freiling:
Fingerprinting Mobile Devices Using Personalized Configurations. Proc. Priv. Enhancing Technol. 2016(1): 4-19 (2016) - [c120]Johannes Bauer, Felix C. Freiling:
Towards Cycle-Accurate Emulation of Cortex-M Code to Detect Timing Side Channels. ARES 2016: 49-58 - [c119]Johannes Bauer, Sebastian Schinzel, Felix C. Freiling, Andreas Dewald:
Information leakage behind the curtain: Abusing anti-EMI features for covert communication. HOST 2016: 130-134 - [c118]Andreas Weichslgartner
, Stefan Wildermann, Johannes Götzfried, Felix C. Freiling, Michael Glaß, Jürgen Teich:
Design-Time/Run-Time Mapping of Security-Critical Applications in Heterogeneous MPSoCs. SCOPES 2016: 153-162 - [e8]Abraham Bernstein, Wolfgang Effelsberg, Felix C. Freiling, Steffen Hölldobler, Hans-Peter Lenhof, Paul Molitor, Gustaf Neumann, Rüdiger Reischuk, Nicole Schweikardt, Myra Spiliopoulou, Harald Störrle, Sabine Süsstrunk:
Ausgezeichnete Informatikdissertationen 2015. LNI D-16, GI 2016, ISBN 978-3-88579-975-7 [contents] - 2015
- [j39]Maxim Anikeev
, Felix C. Freiling, Johannes Götzfried, Tilo Müller:
Secure garbage collection: Preventing malicious data harvesting from deallocated Java objects inside the Dalvik VM. J. Inf. Secur. Appl. 22: 81-86 (2015) - [j38]Felix C. Freiling:
From IT forensics to forensic computing. it Inf. Technol. 57(6): 337-338 (2015) - [j37]Felix C. Freiling, Jan C. Schuhr, Michael Gruhn:
What is essential data in digital forensic analysis? it Inf. Technol. 57(6): 376-383 (2015) - [j36]Tilo Müller, Felix C. Freiling:
A Systematic Assessment of the Security of Full Disk Encryption. IEEE Trans. Dependable Secur. Comput. 12(5): 491-503 (2015) - [c117]Johannes Götzfried, Tilo Müller, Ruan de Clercq
, Pieter Maene, Felix C. Freiling, Ingrid Verbauwhede
:
Soteria: Offline Software Protection within Low-cost Embedded Devices. ACSAC 2015: 241-250 - [c116]Felix C. Freiling, Michael Gruhn:
What is Essential Data in Digital Forensic Analysis? IMF 2015: 40-48 - [e7]Abraham Bernstein, Wolfgang Effelsberg, Felix C. Freiling, Steffen Hölldobler, Hans-Peter Lenhof, Paul Molitor, Gustaf Neumann, Rüdiger Reischuk, Nicole Schweikardt, Myra Spiliopoulou, Harald Störrle, Sabine Süsstrunk:
Ausgezeichnete Informatikdissertationen 2014. LNI D-15, GI 2015, ISBN 978-3-88579-419-6 [contents] - 2014
- [j35]Felix C. Freiling, Konstantin Sack:
Selektive Datensicherungen in der IT-Forensik. Datenschutz und Datensicherheit 38(2): 112-117 (2014) - [j34]Felix C. Freiling, Rüdiger Grimm, Karl-Erwin Großpietsch, Hubert B. Keller
, Jürgen Mottok, Isabel Münch, Kai Rannenberg, Francesca Saglietti:
Technische Sicherheit und Informationssicherheit - Unterschiede und Gemeinsamkeiten. Inform. Spektrum 37(1): 14-24 (2014) - [c115]Yan Zhuang, Mykola Protsenko, Tilo Müller, Felix C. Freiling:
An(other) Exercise in Measuring the Strength of Source Code Obfuscation. DEXA Workshops 2014: 313-317 - [c114]Felix C. Freiling, Mykola Protsenko, Yan Zhuang:
An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs. SecureComm (2) 2014: 315-328 - [c113]Andreas Kurtz, Markus Troßbach, Felix C. Freiling:
Snoop-it: Dynamische Analyse und Manipulation von Apple iOS Apps. Sicherheit 2014: 13-23 - [c112]Nadina Hintz, Markus Engelberth, Zinaida Benenson, Felix C. Freiling:
Phishing still works: Erfahrungen und Lehren aus der Durchführung von Phishing-Experimenten. Sicherheit 2014: 37-51 - [c111]Dominik Brodowski, Andreas Dewald, Felix C. Freiling, Steve Kovács, Martin Rieger:
Drei Jahre Master Online Digitale Forensik: Ergebnisse und Erfahrungen. Sicherheit 2014: 391-405 - [e6]Felix C. Freiling, Holger Morgenstern, Sandra Frings, Oliver Göbel, Detlef Günther, Jens Nedon, Dirk Schadt:
Eighth International Conference on IT Security Incident Management & IT Forensics, IMF 2014, Münster, Germany, May 12-14, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-4330-2 [contents] - 2013
- [j33]Felix C. Freiling:
Im Fokus: Technische und menschliche Aspekte von Cyberkriminalität. Prax. Inf.verarb. Kommun. 36(3): 199-200 (2013) - [c110]Tilo Müller, Hans Spath, Richard Mäckl, Felix C. Freiling:
Stark - Tamperproof Authentication to Resist Keylogging. Financial Cryptography 2013: 295-312 - [c109]Johannes Stüttgen, Andreas Dewald, Felix C. Freiling:
Selective Imaging Revisited. IMF 2013: 45-58 - [c108]Martin Wundram, Felix C. Freiling, Christian Moch:
Anti-forensics: The Next Step in Digital Forensics Tool Testing. IMF 2013: 83-97 - [c107]Sven Kälber, Andreas Dewald, Felix C. Freiling:
Forensic Application-Fingerprinting Based on File System Metadata. IMF 2013: 98-112 - [c106]Viviane Zwanger, Felix C. Freiling:
Kernel mode API spectroscopy for incident response and digital forensics. PPREW@POPL 2013: 3:1-3:11 - [c105]Michael Spreitzenbarth, Felix C. Freiling, Florian Echtler
, Thomas Schreck
, Johannes Hoffmann:
Mobile-sandbox: having a deeper look into android applications. SAC 2013: 1808-1815 - [c104]Maxim Anikeev
, Felix C. Freiling:
Preventing malicious data harvesting from deallocated memory areas. SIN 2013: 448-449 - [p3]Andreas Dewald, Felix C. Freiling, Sven Schmitt, Michael Spreitzenbarth, Stefan Vömel:
Systematische Probleme und Grenzen der forensischen Informatik. Jenseits von 1984 2013: 101-118 - [e5]Holger Morgenstern, Ralf Ehlert, Felix C. Freiling, Sandra Frings, Oliver Göbel, Detlef Günther, Stefan Kiltz, Jens Nedon, Dirk Schadt:
Seventh International Conference on IT Security Incident Management and IT Forensics, IMF 2013, Nuremberg, Germany, March 12-14, 2013. IEEE Computer Society 2013, ISBN 978-1-4673-6307-5 [contents] - [i5]Felix C. Freiling, Gerrit Hornung, Radim Polcák:
Forensic Computing (Dagstuhl Seminar 13482). Dagstuhl Reports 3(11): 193-208 (2013) - 2012
- [j32]Stefan Vömel, Felix C. Freiling:
Correctness, atomicity, and integrity: Defining criteria for forensically-sound memory acquisition. Digit. Investig. 9(2): 125-137 (2012) - [j31]Matthias Bäcker, Andreas Dewald, Felix C. Freiling, Sven Schmitt:
Kriterien für die Priorisierung bei der Sicherung und Analyse digitaler Spuren. Datenschutz und Datensicherheit 36(8): 597-602 (2012) - [j30]Carsten Willems, Felix C. Freiling:
Reverse Code Engineering - State of the Art and Countermeasures. it Inf. Technol. 54(2): 53-63 (2012) - [j29]Roberto Cortiñas
, Felix C. Freiling, Marjan Ghajar-Azadanlou, Alberto Lafuente, Mikel Larrea
, Lucia Draque Penso, Iratxe Soraluze Arriola
:
Secure Failure Detection and Consensus in TrustedPals. IEEE Trans. Dependable Secur. Comput. 9(4): 610-625 (2012) - [c103]Tilo Müller, Benjamin Taubmann, Felix C. Freiling:
TreVisor - OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks. ACNS 2012: 66-83 - [c102]Carsten Willems, Felix C. Freiling, Thorsten Holz
:
Using memory management to detect and extract illegitimate code for malware analysis. ACSAC 2012: 179-188 - [c101]Colin Atkinson
, Florian Barth, Ralph Gerbig, Felix C. Freiling, Sebastian Schinzel, Frank Hadasch, Alexander Maedche
, Benjamin Müller:
Reducing the Incidence of Unintended, Human-Caused Information Flows in Enterprise Systems. EDOC Workshops 2012: 11-18 - [c100]Michael Spreitzenbarth, Sven Schmitt, Felix C. Freiling:
Comparing Sources of Location Data from Android Smartphones. IFIP Int. Conf. Digital Forensics 2012: 143-157 - [c99]Andreas Dewald, Felix C. Freiling, Thomas Schreck, Michael Spreitzenbarth, Johannes Stüttgen, Stefan Vömel, Carsten Willems:
Analyse und Vergleich von BckR2D2-I und II. Sicherheit 2012: 47-58 - [c98]Christian Zimmermann, Michael Spreitzenbarth, Sven Schmitt, Felix C. Freiling:
Forensic Analysis of YAFFS2. Sicherheit 2012: 59-69 - [c97]Markus Engelberth, Jan Göbel, Christian Schönbein, Felix C. Freiling:
PyBox - A Python Sandbox. Sicherheit 2012: 137-148 - [c96]Philipp Trinius, Felix C. Freiling:
Filtern von Spam-Nachrichten mit kontextfreien Grammatiken. Sicherheit 2012: 163-174 - [e4]Dieter Gollmann, Felix C. Freiling:
Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings. Lecture Notes in Computer Science 7483, Springer 2012, ISBN 978-3-642-33382-8 [contents] - 2011
- [b2]Andreas Dewald, Felix C. Freiling:
Forensische Informatik. Books on Demand GmbH 2011, ISBN 978-3-8423-7947-3, pp. I-VIII, 1-123 - [j28]Felix C. Freiling, Rachid Guerraoui
, Petr Kuznetsov:
The failure detector abstraction. ACM Comput. Surv. 43(2): 9:1-9:40 (2011) - [j27]Stefan Vömel, Felix C. Freiling:
A survey of main memory acquisition and analysis techniques for the windows operating system. Digit. Investig. 8(1): 3-22 (2011) - [j26]Markus Engelberth, Felix C. Freiling, Jan Göbel, Christian Gorecki, Thorsten Holz
, Ralf Hund, Philipp Trinius, Carsten Willems:
Das Internet-Malware-Analyse-System (InMAS) - Ein System zur großflächigen Sammlung und Analyse von Schadsoftware im Internet. Datenschutz und Datensicherheit 35(4): 247-252 (2011) - [j25]Iratxe Soraluze Arriola
, Roberto Cortiñas
, Alberto Lafuente, Mikel Larrea
, Felix C. Freiling:
Communication-efficient failure detection and consensus in omission environments. Inf. Process. Lett. 111(6): 262-268 (2011) - [c95]Christian Rossow, Christian J. Dietrich, Herbert Bos
, Lorenzo Cavallaro
, Maarten van Steen
, Felix C. Freiling, Norbert Pohlmann:
Sandnet: network traffic analysis of malicious software. BADGERS@EuroSys 2011: 78-88 - [c94]Zinaida Benenson, Andreas Dewald, Hans-Georg Eßer, Felix C. Freiling, Tilo Müller, Christian Moch, Stefan Vömel, Sebastian Schinzel, Michael Spreitzenbarth, Ben Stock, Johannes Stüttgen:
Exploring the Landscape of Cybercrime. SysSec@DIMVA 2011: 71-74 - [c93]Christian J. Dietrich, Christian Rossow, Felix C. Freiling, Herbert Bos
, Maarten van Steen
, Norbert Pohlmann:
On Botnets That Use DNS for Command and Control. EC2ND 2011: 9-16 - [c92]Alexander Knaus, Johannes Stüttgen, Jan Göbel, Markus Engelberth, Felix C. Freiling:
Säuberung eines infizierten Windows-Betriebssystems auf Basis von Malware-Analyse-Berichten. GI-Jahrestagung 2011: 114 - [c91]Marek Jawurek, Felix C. Freiling:
Privacy threat analysis of smart metering. GI-Jahrestagung 2011: 318 - [c90]Christian Moch, Felix C. Freiling:
Evaluating the Forensic Image Generator Generator. ICDF2C 2011: 238-252 - [c89]Andreas Dewald, Felix C. Freiling, Tim Weber:
Design and Implementation of a Documentation Tool for Interactive Commandline Sessions. IMF 2011: 62-80 - [c88]Felix C. Freiling, Sebastian Schinzel:
Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications. SEC 2011: 41-55 - [c87]