Dark clouds on the horizon: Using cloud storage as attack vector and online slack space M Mulazzani, S Schrittwieser, M Leithner, M Huber, E Weippl 20th USENIX Security Symposium (USENIX Security 11), 2011 | 292 | 2011 |
QR code security P Kieseberg, M Leithner, M Mulazzani, L Munroe, S Schrittwieser, ... Proceedings of the 8th International Conference on Advances in Mobile …, 2010 | 270 | 2010 |
Fast and reliable browser identification with javascript engine fingerprinting M Mulazzani, P Reschl, M Huber, M Leithner, S Schrittwieser, E Weippl, ... Web 2.0 Workshop on Security and Privacy (W2SP) 5, 4, 2013 | 155 | 2013 |
Guess who is texting you? evaluating the security of smartphone messaging applications S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ... | 155 | 2012 |
Social snapshots: Digital forensics for online social networks M Huber, M Mulazzani, M Leithner, S Schrittwieser, G Wondracek, ... Proceedings of the 27th annual computer security applications conference …, 2011 | 122 | 2011 |
Malicious pixels using qr codes as attack vector P Kieseberg, S Schrittwieser, M Leithner, M Mulazzani, E Weippl, ... Trustworthy ubiquitous computing, 21-38, 2012 | 33 | 2012 |
Automated combinatorial testing for detecting SQL vulnerabilities in web applications DE Simos, J Zivanovic, M Leithner 2019 IEEE/ACM 14th International Workshop on Automation of Software Test …, 2019 | 28 | 2019 |
Testing TLS using planning-based combinatorial methods and execution framework DE Simos, J Bozic, B Garn, M Leithner, F Duan, K Kleine, Y Lei, F Wotawa Software quality journal 27, 703-729, 2019 | 20 | 2019 |
Covert computation: Hiding code in code for obfuscation purposes S Schrittwieser, S Katzenbeisser, P Kieseberg, M Huber, M Leithner, ... Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 19 | 2013 |
Covert Computation—Hiding code in code through compile-time obfuscation S Schrittwieser, S Katzenbeisser, P Kieseberg, M Huber, M Leithner, ... Computers & security 42, 13-26, 2014 | 18 | 2014 |
Applying combinatorial testing to large-scale data processing at adobe D Jarman, R Smith, G Gosney, L Kampel, M Leithner, D Simos, R Kacker, ... 2019 IEEE International Conference on Software Testing, Verification and …, 2019 | 16 | 2019 |
Practical Combinatorial Testing for XSS Detection using Locally Optimized Attack Models DE Simos, B Garn, J Zivanovic, M Leithner 2019 IEEE International Conference on Software Testing, Verification and …, 2019 | 16 | 2019 |
CAmetrics: A tool for advanced combinatorial analysis and measurement of test sets M Leithner, K Kleine, DE Simos 2018 IEEE International Conference on Software Testing, Verification and …, 2018 | 13 | 2018 |
HYDRA: Feedback-driven black-box exploitation of injection vulnerabilities M Leithner, B Garn, DE Simos Information and Software Technology 140, 106703, 2021 | 12 | 2021 |
Combinatorially XSSing Web Application Firewalls B Garn, DS Lang, M Leithner, DR Kuhn, R Kacker, DE Simos 2021 IEEE International Conference on Software Testing, Verification and …, 2021 | 11 | 2021 |
A fault-driven combinatorial process for model evolution in xss vulnerability detection B Garn, M Radavelli, A Gargantini, M Leithner, DE Simos Advances and Trends in Artificial Intelligence. From Theory to Practice …, 2019 | 11 | 2019 |
Guess who’s texting you S Schrittwieser, P Fruhwirt, P Kieseberg, M Leithner, M Mulazzani, ... Evaluating the Security of Smartphone Messaging Applications. SBA Research gGmbH, 2012 | 10 | 2012 |
Combinatorial methods for dynamic gray‐box SQL injection testing B Garn, J Zivanovic, M Leithner, DE Simos Software Testing, Verification and Reliability 32 (6), e1826, 2022 | 8 | 2022 |
Sliced AETG: a memory-efficient variant of the AETG covering array generation algorithm L Kampel, M Leithner, DE Simos Optimization Letters, 1-14, 2019 | 8 | 2019 |
XIEv: dynamic analysis for crawling and modeling of web applications M Leithner, DE Simos Proceedings of the 35th Annual ACM Symposium on Applied Computing, 2201-2210, 2020 | 7 | 2020 |