Manuel Leithner
Manuel Leithner
Information Security Researcher, SBA Research
Zweryfikowany adres z sba-research.org - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.
M Mulazzani, S Schrittwieser, M Leithner, M Huber, ER Weippl
USENIX security symposium, 65-76, 2011
2472011
Dark clouds on the horizon: using cloud storage as attack vector and online slack space
M Martin, S Sebastian, L Manuel
Proceedings of the 20th USENIX conference on Security. San Francisco, CA …, 2011
247*2011
QR code security
P Kieseberg, M Leithner, M Mulazzani, L Munroe, S Schrittwieser, ...
Proceedings of the 8th International Conference on Advances in Mobile …, 2010
2032010
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ...
NDSS, 2012
1372012
Fast and reliable browser identification with javascript engine fingerprinting
M Mulazzani, P Reschl, M Huber, M Leithner, S Schrittwieser, E Weippl, ...
Web 2.0 Workshop on Security and Privacy (W2SP) 5, 2013
1192013
Social snapshots: Digital forensics for online social networks
M Huber, M Mulazzani, M Leithner, S Schrittwieser, G Wondracek, ...
Proceedings of the 27th annual computer security applications conference …, 2011
1032011
Malicious pixels using qr codes as attack vector
P Kieseberg, S Schrittwieser, M Leithner, M Mulazzani, E Weippl, ...
Trustworthy ubiquitous computing, 21-38, 2012
192012
Covert computation: Hiding code in code for obfuscation purposes
S Schrittwieser, S Katzenbeisser, P Kieseberg, M Huber, M Leithner, ...
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
172013
Covert Computation—Hiding code in code through compile-time obfuscation
S Schrittwieser, S Katzenbeisser, P Kieseberg, M Huber, M Leithner, ...
Computers & security 42, 13-26, 2014
162014
Automated combinatorial testing for detecting SQL vulnerabilities in web applications
DE Simos, J Zivanovic, M Leithner
Proceedings of the 14th International Workshop on Automation of Software …, 2019
102019
Testing TLS using planning-based combinatorial methods and execution framework
DE Simos, J Bozic, B Garn, M Leithner, F Duan, K Kleine, Y Lei, F Wotawa
Software quality journal, 1-27, 2018
92018
Guess who’s texting you
S Schrittwieser, P Fruhwirt, P Kieseberg, M Leithner, M Mulazzani, ...
Evaluating the Security of Smartphone Messaging Applications. SBA Research gGmbH, 2012
92012
CAmetrics: A tool for advanced combinatorial analysis and measurement of test sets
M Leithner, K Kleine, DE Simos
2018 IEEE International Conference on Software Testing, Verification and …, 2018
82018
Applying Combinatorial Testing to Large-scale Data Processing at Adobe
R Smith, D Jarman, R Kacker, R Kuhn, D Simos, L Kampel, M Leithner, ...
2019 IEEE International Conference on Software Testing, Verification and …, 2019
62019
QR code security
K Peter, L Manuel, M Martin, M Lindsay, S Sebastian, S Mayank, W Edgar
MoMM’10 Proceedings of the 8th International Conference on Advances in …, 2010
62010
Problems and algorithms for covering arrays via set covers
L Kampel, M Leithner, B Garn, DE Simos
Theoretical Computer Science, 2019
52019
A Fault-Driven Combinatorial Process for Model Evolution in XSS Vulnerability Detection
B Garn, M Radavelli, A Gargantini, M Leithner, DE Simos
International Conference on Industrial, Engineering and Other Applications …, 2019
42019
Practical Combinatorial Testing for XSS Detection using Locally Optimized Attack Models
DE Simos, B Garn, J Zivanovic, M Leithner
2019 IEEE International Conference on Software Testing, Verification and …, 2019
42019
A comparison of Web service technologies for smart meter data exchange
M Jung, W Kastner, G Kienesberger, M Leithner
2012 3rd IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe), 1-8, 2012
42012
Book review: Android forensics
M Leithner, E Weippl
Computers and Security 31 (1), 3, 2012
32012
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20