Drebin: Effective and explainable detection of android malware in your pocket. D Arp, M Spreitzenbarth, M Hubner, H Gascon, K Rieck, C Siemens Ndss 14, 23-26, 2014 | 2714 | 2014 |
Structural detection of android malware using embedded call graphs H Gascon, F Yamaguchi, D Arp, K Rieck Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013 | 421 | 2013 |
Automatic inference of search patterns for taint-style vulnerabilities F Yamaguchi, A Maier, H Gascon, K Rieck 2015 IEEE Symposium on Security and Privacy, 797-812, 2015 | 238 | 2015 |
Chucky: Exposing missing checks in source code for vulnerability discovery F Yamaguchi, C Wressnegger, H Gascon, K Rieck Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 215 | 2013 |
Continuous authentication on mobile devices by analysis of typing motion behavior H Gascon, S Uellenbeck, C Wolf, K Rieck Gesellschaft für Informatik eV, 2014 | 159 | 2014 |
Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols H Gascon, C Wressnegger, F Yamaguchi, D Arp, K Rieck Security and Privacy in Communication Networks: 11th EAI International …, 2015 | 151 | 2015 |
Fingerprinting mobile devices using personalized configurations A Kurtz, H Gascon, T Becker, K Rieck, F Freiling Proceedings on Privacy Enhancing Technologies, 2016 | 119 | 2016 |
Learning stateful models for network honeypots T Krueger, H Gascon, N Krämer, K Rieck Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012 | 92 | 2012 |
Mining attributed graphs for threat intelligence H Gascon, B Grobauer, T Schreck, L Rist, D Arp, K Rieck Proceedings of the Seventh ACM on Conference on Data and Application …, 2017 | 39 | 2017 |
TypeMiner: Recovering types in binary programs using machine learning A Maier, H Gascon, C Wressnegger, K Rieck Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019 | 35 | 2019 |
Reading Between The Lines: Content-Agnostic Detection of Spear-Phishing Emails H Gascon, S Ulrich, B Stritter, K Rieck Proc. of 21st International Symposium on Research in Attacks, Intrusions and …, 2018 | 35 | 2018 |
Analysis of update delays in signature-based network intrusion detection systems H Gascon, A Orfila, J Blasco Computers & Security 30 (8), 613-624, 2011 | 35 | 2011 |
Chucky F Yamaguchi, C Wressnegger, H Gascon, K Rieck Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 3 | 2013 |
Designing a broadband residential gateway using click! modular router H Gascón, D Diez, J Garcia, F Valera, C Guerrero, A Azcorra IFIP EUNICE (Networked applications), 2005 | 2 | 2005 |
Designing a broadband residential gateway using Click! modular router. EUNICE'05 H Gascón, D Díez, J García, F Valera, C Guerrero, A Azcorra July, 2005 | 2 | 2005 |
Estudio de un Router Software para la implementación de una Pasarela Residencial J García, F Valera, D Díez, H Gascón, C Guerrero, A Azcorra Universidad Carlos III de Madrid. España, 0 | 2 | |
Abschlussbericht des Teilvorhabens: Lernbasierte Erkennung von zielgerichteten Angriffen: im BMBF Vorhaben: APT-Sweeper: Kontext-und strukturbasierte Abwehr zielgerichteter … K Rieck, H Gascon, C Wressnegger, F Yamaguchi, D Arp, A Maier Technische Universität Braunschweig, 2018 | | 2018 |
Abschlussbericht des Teilvorhabens: Selbstlernende Angriffserkennung und Schwachstellensuche für proprietäre Protokolle: im BMBF-Vorhaben: Intelligente Intrusion-Detection … C Wressnegger, D Arp, H Gascon, A Kellner, A Maier, F Yamaguchi, ... Technische Universität Braunschweig, 2018 | | 2018 |
: Stateful Black-Box Fuzzing of Proprietary Network Protocols H Gascon, C Wressnegger, F Yamaguchi, D Arp, K Rieck Security and Privacy in Communication Networks. 11th International …, 2016 | | 2016 |
Technical Report IFI-TB-2013-02 DREBIN: Efficient and Explainable Detection of Android Malware in Your Pocket D Arp, M Spreitzenbarth, M Hübner, H Gascon, K Rieck | | 2013 |