Follow
Matthias Neugschwandtner
Matthias Neugschwandtner
Oracle Labs
Verified email at oracle.com
Title
Cited by
Cited by
Year
Andrubis--1,000,000 apps later: A view on current Android malware behaviors
M Lindorfer, M Neugschwandtner, L Weichselbaum, Y Fratantonio, ...
Building Analysis Datasets and Gathering Experience Returns for Security …, 2014
3622014
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations.
I Haller, A Slowinska, M Neugschwandtner, H Bos
USENIX Security Symposium, 49-64, 2013
295*2013
MARVIN: Efficient and Comprehensive Mobile App Classification Through Static and Dynamic Analysis
M Lindorfer, M Neugschwandtner, C Platzer
Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th …, 2015
2342015
Smotherspectre: exploiting speculative execution through port contention
A Bhattacharyya, A Sandulescu, M Neugschwandtner, A Sorniotti, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1402019
Andrubis: Android malware under the magnifying glass
L Weichselbaum, M Neugschwandtner, M Lindorfer, Y Fratantonio, ...
Vienna University of Technology, Tech. Rep. TR-ISECLAB-0414-001, 1-10, 2014
1212014
A static, packer-agnostic filter to detect similar malware samples
G Jacob, PM Comparetti, M Neugschwandtner, C Kruegel, G Vigna
International Conference on Detection of Intrusions and Malware, and …, 2012
1022012
AndRadar: fast discovery of android applications in alternative markets
M Lindorfer, S Volanis, A Sisto, M Neugschwandtner, E Athanasopoulos, ...
International Conference on Detection of Intrusions and Malware, and …, 2014
842014
Web services in building automation: Mapping KNX to oBIX
M Neugschwandtner, G Neugschwandtner, W Kastner
Industrial Informatics, 2007 5th IEEE International Conference on 1, 87-92, 2007
672007
The BORG: Nanoprobing Binaries for Buffer Overreads
M Neugschwandtner, P Milani Comparetti, I Haller, H Bos
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
602015
A view to a kill: WebView exploitation
M Neugschwandtner, M Lindorfer, C Platzer
Presented as part of the 6th USENIX Workshop on Large-Scale Exploits and …, 2013
562013
Forecast: skimming off the malware cream
M Neugschwandtner, PM Comparetti, G Jacob, C Kruegel
Proceedings of the 27th Annual Computer Security Applications Conference, 11-20, 2011
432011
Detecting malware's failover C&C strategies with squeeze
M Neugschwandtner, PM Comparetti, C Platzer
Proceedings of the 27th Annual Computer Security Applications Conference, 21-30, 2011
372011
Dowser: a guided fuzzer to find buffer overflow vulnerabilities
I Haller, A Slowinska, H Bos
Proceedings of the European Workshop on System Security (Eurosec), 2013
272013
Danubis–dynamic device driver analysis based on virtual machine introspection
M Neugschwandtner, C Platzer, PM Comparetti, U Bayer
International Conference on Detection of Intrusions and Malware, and …, 2010
252010
From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks
A Kurmus, N Ioannou, M Neugschwandtner, N Papandreou, T Parnell
11th USENIX Workshop on Offensive Technologies, 2017
242017
Speculator: a tool to analyze speculative execution attacks and mitigations
A Mambretti, M Neugschwandtner, A Sorniotti, E Kirda, W Robertson, ...
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
232019
Endorsement in Hyperledger Fabric
E Androulaki, A De Caro, M Neugschwandtner, A Sorniotti
2019 IEEE International Conference on Blockchain (Blockchain), 510-519, 2019
202019
Breaking Payloads with Runtime Code Stripping and Image Freezing
C Mulliner, M Neugschwandtner
Black Hat USA, 2015
172015
A transparent defense against USB eavesdropping attacks
M Neugschwandtner, A Beitler, A Kurmus
Proceedings of the 9th European Workshop on System Security, 1-6, 2016
162016
Let’s not speculate: Discovering and analyzing speculative execution attacks
A Mambretti, M Neugschwandtner, A Sorniotti, E Kirda, W Robertson, ...
IBM Research, 2018
152018
The system can't perform the operation now. Try again later.
Articles 1–20