Seguir
Damjan Buhov
Damjan Buhov
Researcher
Dirección de correo verificada de fhstp.ac.at
Título
Citado por
Citado por
Año
Block me if you can: A large-scale study of tracker-blocking tools
G Merzdovnik, M Huber, D Buhov, N Nikiforakis, S Neuner, ...
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 319-333, 2017
2032017
The other side of the coin: A framework for detecting and analyzing web-based cryptocurrency mining campaigns
J Rauchberger, S Schrittwieser, T Dam, R Luh, D Buhov, G Pötzelsberger, ...
Proceedings of the 13th International Conference on Availability …, 2018
442018
Pin it! Improving Android network security at runtime
D Buhov, M Huber, G Merzdovnik, E Weippl
2016 IFIP Networking Conference (IFIP Networking) and Workshops, 297-305, 2016
262016
Network security challenges in Android applications
D Buhov, M Huber, G Merzdovnik, E Weippl, V Dimitrova
2015 10th International Conference on Availability, Reliability and Security …, 2015
212015
Large-scale analysis of pop-up scam on typosquatting urls
T Dam, LD Klausner, D Buhov, S Schrittwieser
Proceedings of the 14th International Conference on Availability …, 2019
182019
Block cipher defined by matrix presentation of quasigroups
S Markovski, V Dimitrova, Z Trajcheska, M Petkovska, M Kostadinoski, ...
Cryptology ePrint Archive, 2021
102021
Notary-assisted certificate pinning for improved security of android apps
G Merzdovnik, D Buhov, AG Voyiatzis, ER Weippl
2016 11th International Conference on Availability, Reliability and Security …, 2016
72016
FLASH: Is the 20th Century Hero Really Gone? Large-Scale Evaluation on Flash Usage & Its Security and Privacy Implications.
D Buhov, J Rauchberger, S Schrittwieser
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (4), 26-40, 2018
52018
Discovering cryptographic algorithms in binary code through loop enumeration
D Buhov, P Kochberger, R Thron, S Schrittwieser
2017 International Conference on Software Security and Assurance (ICSSA), 80-86, 2017
42017
Catch me if you can! Transparent detection of shellcode
D Buhov, R Thron, S Schrittwieser
2016 International Conference on Software Security and Assurance (ICSSA), 60-63, 2016
42016
Some Cryptanalysis of the Block Cipher BCMPQ
V Dimitrova, M Kostadinoski, Z Trajcheska, M Petkovska, D Buhov
ICT Innovations, 201-209, 2014
12014
Coineater: Automatisierte Erkennung Von Krypto-Mining Im Webbrowser
T Dam, J Rauchberger, D Buhov, S Schrittwieser
2019
u'smile-Secure Mobile Environments
G Merzdovnik, D Buhov, AG Voyiatzis, E Weippl
ERCIM NEWS, 53-54, 2017
2017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–13