Investigating System Operators’ Perspective on Security Misconfigurations C Dietrich, K Krombholz, K Borgolte, T Fiebig Proceedings ACM Conference on Computer and Communications Security (CCS), 2018 | 115 | 2018 |
Taking Control of SDN-based Cloud Systems via the Data Plane K Thimmaraju, B Shastry, T Fiebig, F Hetzelt, JP Seifert, A Feldmann, ... ACM Symposium on SDN Research (SOSR), 2018 | 68* | 2018 |
Something from nothing (There): collecting global IPv6 datasets from DNS T Fiebig, K Borgolte, S Hao, C Kruegel, G Vigna Passive and Active Measurement: 18th International Conference, PAM 2017 …, 2017 | 62 | 2017 |
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates K Borgolte, T Fiebig, S Hao, C Kruegel, G Vigna Network and Distributed Systems Security Symposium, 2018 | 58 | 2018 |
Enumerating active IPv6 hosts for large-scale security scans via DNSSEC-signed reverse zones K Borgolte, S Hao, T Fiebig, G Vigna 2018 IEEE Symposium on Security and Privacy (SP), 770-784, 2018 | 52 | 2018 |
Security Impact of High Resolution Smartphone Cameras T Fiebig, J Krissler, R Hänsch 8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014 | 42 | 2014 |
Heads in the Clouds? Measuring Universities' Migration to Public Clouds: Implications for Privacy & Academic Freedom T Fiebig, S Gürses, CH Gañán, E Kotkamp, F Kuipers, M Lindorfer, ... Proceedings on Privacy Enhancing Technologies Symposium 2023 (2), 2022 | 40* | 2022 |
Static Program Analysis as a Fuzzing Aid B Shastry, M Leutner, T Fiebig, K Thimmaraju, F Yamaguchi, K Rieck, ... International Symposium on Research in Attacks, Intrusions, and Defenses, 2017 | 35 | 2017 |
In rDNS We Trust: Revisiting a Common Data-Source’s Reliability T Fiebig, K Borgolte, S Hao, C Kruegel, G Vgina, A Feldmann Passive and Active Measurement Conference, 2018 | 33 | 2018 |
Human factors in security research: Lessons learned from 2008-2018 M Kaur, M van Eeten, M Janssen, K Borgolte, T Fiebig arXiv preprint arXiv:2103.13287, 2021 | 24 | 2021 |
Learning from the past: designing secure network protocols T Fiebig, F Lichtblau, F Streibelt, T Krüger, P Lexis, R Bush, A Feldmann Cybersecurity Best Practices: Lösungen zur Erhöhung der Cyberresilienz für …, 2018 | 21* | 2018 |
Security at the End of the Tunnel: The Anatomy of {VPN} Mental Models Among Experts and {Non-Experts} in a Corporate Context V Binkhorst, T Fiebig, K Krombholz, W Pieters, K Labunets 31st USENIX Security Symposium (USENIX Security 22), 3433-3450, 2022 | 20 | 2022 |
Analyzing End-Users’ Knowledge and Feelings Surrounding Smartphone Security and Privacy L Kraus, T Fiebig, V Miruchna, S Möller, A Shabtai Security & Privacy Workshops 2015 - Mobile Security Technologies (MoST) 2015, 2015 | 18 | 2015 |
Governance Challenges for European CyberSecurity Policy: Stakeholders Views P Sterlini, F Massacci, N Kadenko, T Fiebig, M van Eeten IEEE Security & Privacy, 2020 | 13 | 2020 |
TXTing 101: finding security issues in the long tail of DNS TXT records O Van Der Toorn, R van Rijswijk-Deij, T Fiebig, M Lindorfer, A Sperotto 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020 | 12 | 2020 |
The vamp attack: Taking control of cloud systems via the unified packet parser K Thimmaraju, B Shastry, T Fiebig, F Hetzelt, JP Seifert, A Feldmann, ... Proceedings of the 2017 on Cloud Computing Security Workshop, 11-15, 2017 | 11 | 2017 |
A One-Year Perspective on Exposed In-memory Key-Value Stores T Fiebig, A Feldmann, M Petschick Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active …, 2016 | 11 | 2016 |
A Metric for the Evaluation and Comparison of Keylogger Performance T Fiebig, J Danisevskis, M Piekarska 7th Workshop on Cyber Security Experimentation and Test (CSET '14), 2014 | 11 | 2014 |
Techniek van de onmacht MJG Van Eeten NSOB, 2010 | 11 | 2010 |
" I needed to solve their overwhelmness": How System Administration Work was Affected by COVID-19 M Kaur, S Parkin, M Janssen, T Fiebig Proceedings of the ACM on Human-Computer Interaction 6 (CSCW2), 1-30, 2022 | 10 | 2022 |