Divide-and-conquer: Why android malware cannot be stopped D Maier, T Müller, M Protsenko 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 100 | 2014 |
Classifying malware attacks in IaaS cloud environments N Rakotondravony, B Taubmann, W Mandarawi, E Weishäupl, P Xu, ... Journal of Cloud Computing 6, 1-12, 2017 | 58 | 2017 |
A game of Droid and Mouse: The threat of split-personality malware on Android D Maier, M Protsenko, T Müller Computers & Security 54, 2-15, 2015 | 43 | 2015 |
An ecosystem and IoT device architecture for building trust in the industrial data space GS Brost, M Huber, M Weiß, M Protsenko, J Schütte, S Wessel Proceedings of the 4th ACM workshop on cyber-physical system security, 39-50, 2018 | 36 | 2018 |
Comparative evaluation of machine learning-based malware detection on android. S Hahn, M Protsenko, T Müller Gesellschaft für Informatik eV, 2016 | 35 | 2016 |
Dynamic self-protection and tamperproofing for android apps using native code M Protsenko, S Kreuter, T Müller 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 35 | 2015 |
Pandora applies non-deterministic obfuscation randomly to android M Protsenko, T Müller 2013 8th International conference on malicious and unwanted software:" The …, 2013 | 34 | 2013 |
Anti-proguard: Towards automated deobfuscation of android apps R Baumann, M Protsenko, T Müller Proceedings of the 4th Workshop on Security in Highly Connected IT Systems, 7-12, 2017 | 32 | 2017 |
An empirical evaluation of software obfuscation techniques applied to Android APKs FC Freiling, M Protsenko, Y Zhuang International Conference on Security and Privacy in Communication Networks …, 2015 | 25 | 2015 |
Programming experience might not help in comprehending obfuscated source code efficiently N Hänsch, A Schankin, M Protsenko, F Freiling, Z Benenson Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 341-356, 2018 | 19 | 2018 |
Android malware detection based on software complexity metrics M Protsenko, T Müller International Conference on Trust, Privacy and Security in Digital Business …, 2014 | 19 | 2014 |
Artist: the android runtime instrumentation toolkit L Dresel, M Protsenko, T Müller 2016 11th International Conference on Availability, Reliability and Security …, 2016 | 16 | 2016 |
CloudIDEA: a malware defense architecture for cloud data centers A Fischer, T Kittel, B Kolosnjaji, TK Lengyel, W Mandarawi, H de Meer, ... On the Move to Meaningful Internet Systems: OTM 2015 Conferences …, 2015 | 15 | 2015 |
Tackling androids native library malware with robust, efficient and accurate similarity measures A Kalysch, O Milisterfer, M Protsenko, T Müller Proceedings of the 13th international conference on availability …, 2018 | 12 | 2018 |
Toward an open source location privacy evaluation framework for vehicular networks D Eckhoff, M Protsenko, R German 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), 1-2, 2014 | 10 | 2014 |
Protecting android apps against reverse engineering by the use of the native code M Protsenko, T Müller Trust, Privacy and Security in Digital Business: 12th International …, 2015 | 9 | 2015 |
Advanced system resiliency based on virtualization techniques for IoT devices J Röckl, M Protsenko, M Huber, T Müller, FC Freiling Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 8 | 2021 |
An (other) exercise in measuring the strength of source code obfuscation Y Zhuang, M Protsenko, T Muller, FC Freiling 2014 25th International Workshop on Database and Expert Systems Applications …, 2014 | 6 | 2014 |
A cloud-based compilation and hardening platform for android apps M Busch, M Protsenko, T Müller Proceedings of the 12th International Conference on Availability …, 2017 | 5 | 2017 |
Gateway to the Danger Zone: Secure and Authentic Remote Reset in Machine Safety SN Peters, N Puch, MP Heinl, P Zieris, M Protsenko, T Larsen-Vefring, ... Proceedings of the 19th International Conference on Availability …, 2024 | | 2024 |