Chucky: Exposing missing checks in source code for vulnerability discovery F Yamaguchi, C Wressnegger, H Gascon, K Rieck Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 191 | 2013 |
Poisoning behavioral malware clustering B Biggio, K Rieck, D Ariu, C Wressnegger, I Corona, G Giacinto, F Roli Proceedings of the 2014 workshop on artificial intelligent and security …, 2014 | 150 | 2014 |
A close look on n-grams in intrusion detection: anomaly detection vs. classification C Wressnegger, G Schwenk, D Arp, K Rieck Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013 | 128 | 2013 |
Dos and don'ts of machine learning in computer security D Arp, E Quiring, F Pendlebury, A Warnecke, F Pierazzi, C Wressnegger, ... 31st USENIX Security Symposium (USENIX Security 22), 3971-3988, 2022 | 118 | 2022 |
Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols H Gascon, C Wressnegger, F Yamaguchi, D Arp, K Rieck Security and Privacy in Communication Networks: 11th EAI International …, 2015 | 118 | 2015 |
Privacy threats through ultrasonic side channels on mobile devices D Arp, E Quiring, C Wressnegger, K Rieck 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 35-47, 2017 | 86 | 2017 |
Evaluating explanation methods for deep learning in security A Warnecke, D Arp, C Wressnegger, K Rieck 2020 IEEE european symposium on security and privacy (EuroS&P), 158-174, 2020 | 66 | 2020 |
Thieves in the browser: Web-based cryptojacking in the wild M Musch, C Wressnegger, M Johns, K Rieck Proceedings of the 14th International Conference on Availability …, 2019 | 63* | 2019 |
Automatically inferring malware signatures for anti-virus assisted attacks C Wressnegger, K Freeman, F Yamaguchi, K Rieck Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 53 | 2017 |
New kid on the web: A study on the prevalence of webassembly in the wild M Musch, C Wressnegger, M Johns, K Rieck Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019 | 50 | 2019 |
Comprehensive analysis and detection of flash-based malware C Wressnegger, F Yamaguchi, D Arp, K Rieck Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016 | 36* | 2016 |
Zoe: Content-based anomaly detection for industrial control systems C Wressnegger, A Kellner, K Rieck 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018 | 34 | 2018 |
Sally: A tool for embedding strings in vector spaces K Rieck, C Wressnegger, A Bikadorov The Journal of Machine Learning Research 13 (1), 3247-3251, 2012 | 26 | 2012 |
TypeMiner: Recovering types in binary programs using machine learning A Maier, H Gascon, C Wressnegger, K Rieck Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019 | 24 | 2019 |
Harry: A tool for measuring string similarity K Rieck, C Wressnegger The Journal of Machine Learning Research 17 (1), 258-262, 2016 | 21 | 2016 |
Deobfuscating embedded malware using probable-plaintext attacks C Wressnegger, F Boldewin, K Rieck Research in Attacks, Intrusions, and Defenses: 16th International Symposium …, 2013 | 19 | 2013 |
False sense of security: A study on the effectivity of jailbreak detection in banking apps A Kellner, M Horlboge, K Rieck, C Wressnegger 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 1-14, 2019 | 17 | 2019 |
Machine unlearning of features and labels A Warnecke, L Pirch, C Wressnegger, K Rieck arXiv preprint arXiv:2108.11577, 2021 | 16 | 2021 |
Twice the bits, twice the trouble: Vulnerabilities induced by migrating to 64-bit platforms C Wressnegger, F Yamaguchi, A Maier, K Rieck Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 15 | 2016 |
Political elections under (social) fire? Analysis and detection of propaganda on twitter A Kellner, L Rangosch, C Wressnegger, K Rieck arXiv preprint arXiv:1912.04143, 2019 | 8 | 2019 |