Blog
People
Research
Publications
Contact
Contact Us
Impressum
Privacy Policy
Light
Dark
Automatic
1
Detecting Obfuscated Function Clones in Binaries using Machine Learning
The complexity and functionality of malware is ever-increasing. Obfuscation is used to hide the malicious intent from virus scanners …
Michael Pucher
,
Christian Kudera
,
Georg Merzdovnik
AVRS: Emulating AVR Microcontrollers for Reverse Engineering and Security Testing
Michael Pucher
,
Christian Kudera
,
Georg Merzdovnik
Actively Probing Routes for Tor AS-Level Adversaries with RIPE Atlas
Wilfried Mayer
,
Georg Merzdovnik
,
Edgar Weippl
Security Development Lifecycle for Cyber-Physical Production Systems
Matthias Eckhart
,
Andreas Ekelhart
,
Arndt Luder
,
Stefan Biffl
,
Edgar Weippl
Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins
Matthias Eckhart
,
Andreas Ekelhart
,
Edgar Weippl
Measuring Cookies and Web Privacy in a Post-GDPR World
Adrian Dabrowski
,
Georg Merzdovnik
,
Johanna Ullrich
,
Gerald Sendera
,
Edgar Weippl
Security and Privacy Implementations within the AnyPLACE Energy Management Solution
Christian Kudera
,
Viktor Ullmann
,
Markus Kammerstetter
,
Wolfgang Kastner
Computer Aided IC Reverse Engineering Methodology on the Basis of the TI DST80 Cryptographic Immobilizer Tag
Markus Kammerstetter
,
Markus Muellner
,
Daniel Burian
,
Christian Kudera
,
Wolfgang Kastner
Design and Implementation of a Negative Voltage Fault Injection Attack Prototype
Christian Kudera
,
Markus Kammerstetter
,
Markus Muellner
,
Daniel Burian
,
Wolfgang Kastner
Towards Security-Aware Virtual Environments for Digital Twins
Matthias Eckhart
,
Andreas Ekelhart
»
Cite
×