Seguir
Georg Merzdovnik
Georg Merzdovnik
Dirección de correo verificada de sba-research.org
Título
Citado por
Citado por
Año
Protecting software through obfuscation: Can it keep pace with progress in code analysis?
S Schrittwieser, S Katzenbeisser, J Kinder, G Merzdovnik, E Weippl
Acm computing surveys (csur) 49 (1), 1-37, 2016
2202016
Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools
G Merzdovnik, M Huber, D Buhov, N Nikiforakis, S Neuner, ...
IEEE European Symposium on Security and Privacy (EuroS&P), 2017
2002017
Measuring cookies and web privacy in a post-gdpr world
A Dabrowski, G Merzdovnik, J Ullrich, G Sendera, E Weippl
Passive and Active Measurement: 20th International Conference, PAM 2019 …, 2019
1072019
From hack to elaborate technique—a survey on binary rewriting
M Wenzl, G Merzdovnik, J Ullrich, E Weippl
ACM Computing Surveys (CSUR) 52 (3), 1-37, 2019
872019
Enter sandbox: Android sandbox comparison
S Neuner, V Van der Veen, M Lindorfer, M Huber, G Merzdovnik, ...
arXiv preprint arXiv:1410.7749, 2014
762014
Pin it! Improving Android network security at runtime
D Buhov, M Huber, G Merzdovnik, E Weippl
2016 IFIP Networking Conference (IFIP Networking) and Workshops, 297-305, 2016
262016
Browser history stealing with captive Wi-Fi portals
A Dabrowski, G Merzdovnik, N Kommenda, E Weippl
2016 IEEE Security and Privacy Workshops (SPW), 234-240, 2016
232016
Network security challenges in Android applications
D Buhov, M Huber, G Merzdovnik, E Weippl, V Dimitrova
2015 10th International Conference on Availability, Reliability and Security …, 2015
212015
Lightweight address hopping for defending the IPv6 IoT
A Judmayer, J Ullrich, G Merzdovnik, AG Voyiatzis, E Weippl
Proceedings of the 12th international conference on availability …, 2017
182017
Whom you gonna trust? a longitudinal study on TLS notary services
G Merzdovnik, K Falb, M Schmiedecker, AG Voyiatzis, E Weippl
Data and Applications Security and Privacy XXX: 30th Annual IFIP WG 11.3 …, 2016
132016
Aes-sec: Improving software obfuscation through hardware-assistance
S Schrittwieser, S Katzenbeisser, G Merzdovnik, P Kieseberg, E Weippl
2014 Ninth International Conference on Availability, Reliability and …, 2014
122014
Notary-assisted certificate pinning for improved security of android apps
G Merzdovnik, D Buhov, AG Voyiatzis, ER Weippl
2016 11th International Conference on Availability, Reliability and Security …, 2016
72016
Towards practical methods to protect the privacy of location information with mobile devices
C Hochreiner, M Huber, G Merzdovnik, E Weippl
Proceedings of the 7th international conference on security of information …, 2014
72014
A performance assessment of network address shuffling in IoT systems
A Judmayer, G Merzdovnik, J Ullrich, AG Voyiatzis, E Weippl
Computer Aided Systems Theory–EUROCAST 2017: 16th International Conference …, 2018
62018
An extended view on measuring tor as-level adversaries
GK Gegenhuber, M Maier, F Holzbauer, W Mayer, G Merzdovnik, ...
Computers & Security 132, 103302, 2023
32023
Actively probing routes for Tor as-level adversaries with ripe atlas
W Mayer, G Merzdovnik, E Weippl
ICT Systems Security and Privacy Protection: 35th IFIP TC 11 International …, 2020
32020
AVRS: emulating AVR microcontrollers for reverse engineering and security testing
M Pucher, C Kudera, G Merzdovnik
Proceedings of the 15th International Conference on Availability …, 2020
22020
Technical and Legal Review of the Stopp Corona App by the Austrian Red Cross
U Bayer, A Bernauer, M Blocher, B Gollatz, A Judmayer, M Koppmann, ...
22020
Detecting Obfuscated Function Clones in Binaries using Machine Learning
M Pucher, C Kudera, G Merzdovnik
12022
Security and privacy in mobile environments
G Merzdovnik
Technische Universität Wien, 2017
12017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20