Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Generic Malware Unpacking: A Comprehensive Study on the Unpacking Behavior of Malicious Run-Time Packers., , and . NordSec, volume 14324 of Lecture Notes in Computer Science, page 245-262. Springer, (2023)PIdARCI: Using Assembly Instruction Patterns to Identify, Annotate, and Revert Compiler Idioms., , and . PST, page 1-7. IEEE, (2021)Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps., , , and . DIMVA, volume 10327 of Lecture Notes in Computer Science, page 209-229. Springer, (2017)A Measurement Study on Interprocess Code Propagation of Malicious Software., , , and . ICDF2C (2), volume 571 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 264-282. Springer, (2023)Corpus Christi: Establishing Replicability when Sharing the Bread is Not Allowed., , and . CoRR, (2024)Open SESAME: Fighting Botnets with Seed Reconstructions of Domain Generation Algorithms., , , and . CoRR, (2023)Comprehensively Analyzing the Impact of Cyberattacks on Power Grids., , , , , , , , and . EuroS&P, page 1065-1081. IEEE, (2023)Keeping the Baddies Out and the Bridge Calm: Embedded Authentication for Maritime Networks., , , and . ISNCC, page 1-6. IEEE, (2022)XLab-UUV - A Virtual Testbed for Extra-Large Uncrewed Underwater Vehicles., , , and . LCN, page 1-6. IEEE, (2023)No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantics-Preserving Transformations, , , and . Network and Distributed System Security (NDSS), ISOC, (2015)