Manuel Leithner
Manuel Leithner
Information Security Researcher, SBA Research
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα sba-research.org - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.
M Mulazzani, S Schrittwieser, M Leithner, M Huber, ER Weippl
USENIX security symposium, 65-76, 2011
2482011
Dark clouds on the horizon: using cloud storage as attack vector and online slack space
M Martin, S Sebastian, L Manuel
Proceedings of the 20th USENIX conference on Security. San Francisco, CA …, 2011
248*2011
QR code security
P Kieseberg, M Leithner, M Mulazzani, L Munroe, S Schrittwieser, ...
Proceedings of the 8th International Conference on Advances in Mobile …, 2010
2022010
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ...
NDSS, 2012
1372012
Fast and reliable browser identification with javascript engine fingerprinting
M Mulazzani, P Reschl, M Huber, M Leithner, S Schrittwieser, E Weippl, ...
Web 2.0 Workshop on Security and Privacy (W2SP) 5, 2013
1172013
Social snapshots: Digital forensics for online social networks
M Huber, M Mulazzani, M Leithner, S Schrittwieser, G Wondracek, ...
Proceedings of the 27th annual computer security applications conference …, 2011
1012011
Malicious pixels using qr codes as attack vector
P Kieseberg, S Schrittwieser, M Leithner, M Mulazzani, E Weippl, ...
Trustworthy ubiquitous computing, 21-38, 2012
182012
Covert computation: Hiding code in code for obfuscation purposes
S Schrittwieser, S Katzenbeisser, P Kieseberg, M Huber, M Leithner, ...
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
172013
Covert Computation—Hiding code in code through compile-time obfuscation
S Schrittwieser, S Katzenbeisser, P Kieseberg, M Huber, M Leithner, ...
Computers & security 42, 13-26, 2014
162014
Guess who’s texting you
S Schrittwieser, P Fruhwirt, P Kieseberg, M Leithner, M Mulazzani, ...
Evaluating the Security of Smartphone Messaging Applications. SBA Research gGmbH, 2012
92012
Testing TLS using planning-based combinatorial methods and execution framework
DE Simos, J Bozic, B Garn, M Leithner, F Duan, K Kleine, Y Lei, F Wotawa
Software quality journal, 1-27, 2018
82018
CAmetrics: A tool for advanced combinatorial analysis and measurement of test sets
M Leithner, K Kleine, DE Simos
2018 IEEE International Conference on Software Testing, Verification and …, 2018
82018
Automated combinatorial testing for detecting SQL vulnerabilities in web applications
DE Simos, J Zivanovic, M Leithner
Proceedings of the 14th International Workshop on Automation of Software …, 2019
72019
QR code security
K Peter, L Manuel, M Martin, M Lindsay, S Sebastian, S Mayank, W Edgar
MoMM’10 Proceedings of the 8th International Conference on Advances in …, 2010
62010
Problems and algorithms for covering arrays via set covers
L Kampel, M Leithner, B Garn, DE Simos
Theoretical Computer Science, 2019
52019
Applying Combinatorial Testing to Large-scale Data Processing at Adobe
R Smith, D Jarman, R Kacker, R Kuhn, D Simos, L Kampel, M Leithner, ...
2019 IEEE International Conference on Software Testing, Verification and …, 2019
52019
A comparison of Web service technologies for smart meter data exchange
M Jung, W Kastner, G Kienesberger, M Leithner
2012 3rd IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe), 1-8, 2012
42012
A Fault-Driven Combinatorial Process for Model Evolution in XSS Vulnerability Detection
B Garn, M Radavelli, A Gargantini, M Leithner, DE Simos
International Conference on Industrial, Engineering and Other Applications …, 2019
32019
DOMdiff: Identification and Classification of Inter-DOM Modifications
M Leithner, DE Simos
2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI), 262-269, 2018
22018
Book review: Android forensics
M Leithner, E Weippl
Computers and Security 31 (1), 3, 2012
22012
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20