Seguir
Tobias Fiebig
Tobias Fiebig
Max-Planck-Institut für Informatik, FG INET
Dirección de correo verificada de fiebig.nl - Página principal
Título
Citado por
Citado por
Año
Investigating System Operators’ Perspective on Security Misconfigurations
C Dietrich, K Krombholz, K Borgolte, T Fiebig
Proceedings ACM Conference on Computer and Communications Security (CCS), 2018
1312018
Taking Control of SDN-based Cloud Systems via the Data Plane
K Thimmaraju, B Shastry, T Fiebig, F Hetzelt, JP Seifert, A Feldmann, ...
ACM Symposium on SDN Research (SOSR), 2018
70*2018
Something from nothing (There): collecting global IPv6 datasets from DNS
T Fiebig, K Borgolte, S Hao, C Kruegel, G Vigna
Passive and Active Measurement: 18th International Conference, PAM 2017 …, 2017
642017
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates
K Borgolte, T Fiebig, S Hao, C Kruegel, G Vigna
Network and Distributed Systems Security Symposium, 2018
622018
Enumerating active IPv6 hosts for large-scale security scans via DNSSEC-signed reverse zones
K Borgolte, S Hao, T Fiebig, G Vigna
2018 IEEE Symposium on Security and Privacy (SP), 770-784, 2018
552018
Heads in the Clouds? Measuring Universities' Migration to Public Clouds: Implications for Privacy & Academic Freedom
T Fiebig, S Gürses, CH Gañán, E Kotkamp, F Kuipers, M Lindorfer, ...
Proceedings on Privacy Enhancing Technologies Symposium 2023 (2), 2022
44*2022
Security Impact of High Resolution Smartphone Cameras
T Fiebig, J Krissler, R Hänsch
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014
432014
Static Program Analysis as a Fuzzing Aid
B Shastry, M Leutner, T Fiebig, K Thimmaraju, F Yamaguchi, K Rieck, ...
International Symposium on Research in Attacks, Intrusions, and Defenses, 2017
382017
In rDNS We Trust: Revisiting a Common Data-Source’s Reliability
T Fiebig, K Borgolte, S Hao, C Kruegel, G Vgina, A Feldmann
Passive and Active Measurement Conference, 2018
332018
Human factors in security research: Lessons learned from 2008-2018
M Kaur, M van Eeten, M Janssen, K Borgolte, T Fiebig
arXiv preprint arXiv:2103.13287, 2021
282021
Security at the End of the Tunnel: The Anatomy of {VPN} Mental Models Among Experts and {Non-Experts} in a Corporate Context
V Binkhorst, T Fiebig, K Krombholz, W Pieters, K Labunets
31st USENIX Security Symposium (USENIX Security 22), 3433-3450, 2022
272022
Learning from the past: designing secure network protocols
T Fiebig, F Lichtblau, F Streibelt, T Krüger, P Lexis, R Bush, A Feldmann
Cybersecurity Best Practices: Lösungen zur Erhöhung der Cyberresilienz für …, 2018
22*2018
Analyzing End-Users’ Knowledge and Feelings Surrounding Smartphone Security and Privacy
L Kraus, T Fiebig, V Miruchna, S Möller, A Shabtai
Security & Privacy Workshops 2015 - Mobile Security Technologies (MoST) 2015, 2015
182015
Governance Challenges for European CyberSecurity Policy: Stakeholders Views
P Sterlini, F Massacci, N Kadenko, T Fiebig, M van Eeten
IEEE Security & Privacy, 2020
142020
TXTing 101: finding security issues in the long tail of DNS TXT records
O Van Der Toorn, R van Rijswijk-Deij, T Fiebig, M Lindorfer, A Sperotto
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
122020
A One-Year Perspective on Exposed In-memory Key-Value Stores
T Fiebig, A Feldmann, M Petschick
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active …, 2016
122016
SoK: a framework for asset discovery: systematizing advances in network measurements for protecting organizations
M Vermeer, J West, A Cuevas, S Niu, N Christin, M Van Eeten, T Fiebig, ...
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 440-456, 2021
112021
The vamp attack: Taking control of cloud systems via the unified packet parser
K Thimmaraju, B Shastry, T Fiebig, F Hetzelt, JP Seifert, A Feldmann, ...
Proceedings of the 2017 on Cloud Computing Security Workshop, 11-15, 2017
112017
A Metric for the Evaluation and Comparison of Keylogger Performance
T Fiebig, J Danisevskis, M Piekarska
7th Workshop on Cyber Security Experimentation and Test (CSET '14), 2014
112014
Techniek van de onmacht
MJG Van Eeten
NSOB, 2010
112010
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20