Analysis of Android Factory Resets. (2022). Bachelor Thesis.
Embedded Binary Rewriting - Utilizing Ghidra and LLVM. (2022). TU Wien. Master Thesis.
An evaluation of Anti-Tracking methods in Mobile environments. (2021). Bachelor Thesis.
Function Clone Detection Evaluation. (2021). Bachelor Thesis.
Privacy-Preserving Remote Attestation Protocol. (2021). TU Wien. Master Thesis.
Large-Scale Fuzzing of Embedded Web Interfaces. (2021). Bachelor Thesis.
Smart Home Privacy Leaks. (2021). TU Wien. Master Thesis.
Object Capabilities and their Benefits for Web Application Security. (2021). TU Wien. Master Thesis.
Taint Trace Visualization. (2020). Bachelor Thesis.
Cruel intentions : enhancing androids intent firewall. (2020). Master Thesis.
Android Information Extraction. (2020). Bachelor Thesis.
AVRS: Emulating AVR Microcontrollers for Reverse Engineering and Security Testing. (2020). Proceedings of the 15th International Conference on Availability, Reliability and Security.
Automated Security Risk Identification Using AutomationML-based Engineering Data. (2020). IEEE Transactions on Dependable and Secure Computing.
Actively Probing Routes for Tor AS-Level Adversaries with RIPE Atlas. (2020). IFIP International Conference on ICT Systems Security and Privacy Protection.
Security concepts in IoT operating systems. (2019). Bachelor Thesis.
Embedded Automated Exploit Generation. (2019). Bachelor Thesis.
Automatic Identification of Cross-Container Side-Channels. (2019). Master Thesis.
Security Development Lifecycle for Cyber-Physical Production Systems. (2019). IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society.
Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins. (2019). 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).
Securing the testing process for industrial automation software. (2019). Computers & Security.
Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges. (2019). Journal of Internet Services and Information Security (JISIS).
Internet of Things Botnet Landscape. (2019). Bachelor Thesis.
From Hack to Elaborate Technique—A Survey on Binary Rewriting. (2019). ACM Computing Surveys (CSUR).
A multi-architecture decompiler based on an SSA-form IR. (2019). Master Thesis.
Measuring Cookies and Web Privacy in a Post-GDPR World. (2019). International Conference on Passive and Active Network Measurement.
Container Technologies Security Analysis. (2019). Bachelor Thesis.
Security Evaluation of Hola VPN. (2019). Bachelor Thesis.
Digital Twins for Cyber-Physical Systems Security: State of the Art and Outlook. (2019). Security and Quality in Cyber-Physical Systems Engineering: With Forewords by Robert M. Lee and Tom Gilb.
Container-based Malware Analysis. (2018). Bachelor Thesis.
Security and Privacy Implementations within the AnyPLACE Energy Management Solution. (2018). IEEE 23rd International Conference on Emerging Technologies and Factory Automation.
Internet of Things Forensics. (2018). Bachelor Thesis.
Design and Implementation of a Negative Voltage Fault Injection Attack Prototype. (2018). IEEE International Workshop on Physical Attacks and Inspection on Electronics (PAINE).
Computer Aided IC Reverse Engineering Methodology on the Basis of the TI DST80 Cryptographic Immobilizer Tag. (2018). IEEE International Workshop on Physical Attacks and Inspection on Electronics (PAINE).
Towards Security-Aware Virtual Environments for Digital Twins. (2018). Proceedings of the 4th ACM Workshop on Cyber-Physical System Security.
A Specification-based State Replication Approach for Digital Twins. (2018). Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy.
Lightweight Address Hopping for Defending the IPv6 IoT. (2017). 12th International Conference on Availability, Reliability and Security (ARES).
Android SSL Vulnerability Analyzer. (2017). Bachelor Thesis.
u'smile-Secure Mobile Environments.. (2017). ERCIM News.
Open and Secure: Amending the Security of the BSI Smart Metering Infrastructure to Smart Home Applications via the Smart Meter Gateway. (2017). Smart Energy Research at the crossroads of Engineering, Economics and Computer Science 2017.
Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools. (2017). IEEE European Symposium on Security and Privacy (EuroS&P).
A performance assessment of network address shuffling in IoT systems (Extended Abstract). (2017). Sixteenth International Conference on Computer Aided Systems Theory (EUROCAST 2017).
A performance assessment of network address shuffling in IoT systems. (2017). International Conference on Computer Aided Systems Theory.
Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering. (2016). Conference on Cryptographic Hardware and Embedded Systems 2016 (CHES 2016).
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services. (2016). Data and Applications Security and Privacy XXX - 30th Annual IFIP WG 11.3 Conference (DBSec).
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?. (2016). ACM Computing Surveys (CSUR).
Pin It! Improving Android network security at runtime. (2016). Proceedings of the 15th IFIP Networking Conference, Networking 2016.
Notary-Assisted Certificate Pinning for Improved Security of Android Apps. (2016). Availability, Reliability and Security (ARES), 2016 11th International Conference on.
Browser History Stealing with Captive Wi-Fi Portals. (2016). Proceedings of Workshops at IEEE Security & Privacy 2016, Mobile Security Technologies (MoST).
Network Security Challenges in Android Applications. (2015). Proceedings of the 2015 10th International Conference on Availability, Reliability and Security (ARES 2015).
Enter Sandbox: Android Sandbox Comparison. (2014). Proceedings of the IEEE Mobile Security Technologies workshop (MoST).
Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices. (2014). Proceedings of the 7th International Conference on Security of Information and Networks.
Plugin in the Middle-Minimising Security Risks in Mobile Middleware Implementations. (2014). Proceedings of the 7th International Conference on Security of Information and Networks.
AES-SEC: Improving software obfuscation through hardware-assistance. (2014). Availability, Reliability and Security (ARES), 2014 Ninth International Conference on.