Block me if you can: A large-scale study of tracker-blocking tools G Merzdovnik, M Huber, D Buhov, N Nikiforakis, S Neuner, ... 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 319-333, 2017 | 203 | 2017 |
The other side of the coin: A framework for detecting and analyzing web-based cryptocurrency mining campaigns J Rauchberger, S Schrittwieser, T Dam, R Luh, D Buhov, G Pötzelsberger, ... Proceedings of the 13th International Conference on Availability …, 2018 | 44 | 2018 |
Pin it! Improving Android network security at runtime D Buhov, M Huber, G Merzdovnik, E Weippl 2016 IFIP Networking Conference (IFIP Networking) and Workshops, 297-305, 2016 | 26 | 2016 |
Network security challenges in Android applications D Buhov, M Huber, G Merzdovnik, E Weippl, V Dimitrova 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 21 | 2015 |
Large-scale analysis of pop-up scam on typosquatting urls T Dam, LD Klausner, D Buhov, S Schrittwieser Proceedings of the 14th International Conference on Availability …, 2019 | 18 | 2019 |
Block cipher defined by matrix presentation of quasigroups S Markovski, V Dimitrova, Z Trajcheska, M Petkovska, M Kostadinoski, ... Cryptology ePrint Archive, 2021 | 10 | 2021 |
Notary-assisted certificate pinning for improved security of android apps G Merzdovnik, D Buhov, AG Voyiatzis, ER Weippl 2016 11th International Conference on Availability, Reliability and Security …, 2016 | 7 | 2016 |
FLASH: Is the 20th Century Hero Really Gone? Large-Scale Evaluation on Flash Usage & Its Security and Privacy Implications. D Buhov, J Rauchberger, S Schrittwieser J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (4), 26-40, 2018 | 5 | 2018 |
Discovering cryptographic algorithms in binary code through loop enumeration D Buhov, P Kochberger, R Thron, S Schrittwieser 2017 International Conference on Software Security and Assurance (ICSSA), 80-86, 2017 | 4 | 2017 |
Catch me if you can! Transparent detection of shellcode D Buhov, R Thron, S Schrittwieser 2016 International Conference on Software Security and Assurance (ICSSA), 60-63, 2016 | 4 | 2016 |
Some Cryptanalysis of the Block Cipher BCMPQ V Dimitrova, M Kostadinoski, Z Trajcheska, M Petkovska, D Buhov ICT Innovations, 201-209, 2014 | 1 | 2014 |
Coineater: Automatisierte Erkennung Von Krypto-Mining Im Webbrowser T Dam, J Rauchberger, D Buhov, S Schrittwieser | | 2019 |
u'smile-Secure Mobile Environments G Merzdovnik, D Buhov, AG Voyiatzis, E Weippl ERCIM NEWS, 53-54, 2017 | | 2017 |