关注
Mykolai Protsenko
Mykolai Protsenko
未知所在单位机构
在 aisec.fraunhofer.de 的电子邮件经过验证
标题
引用次数
引用次数
年份
Divide-and-conquer: Why android malware cannot be stopped
D Maier, T Müller, M Protsenko
2014 Ninth International Conference on Availability, Reliability and …, 2014
1002014
Classifying malware attacks in IaaS cloud environments
N Rakotondravony, B Taubmann, W Mandarawi, E Weishäupl, P Xu, ...
Journal of Cloud Computing 6, 1-12, 2017
582017
A game of Droid and Mouse: The threat of split-personality malware on Android
D Maier, M Protsenko, T Müller
Computers & Security 54, 2-15, 2015
432015
An ecosystem and IoT device architecture for building trust in the industrial data space
GS Brost, M Huber, M Weiß, M Protsenko, J Schütte, S Wessel
Proceedings of the 4th ACM workshop on cyber-physical system security, 39-50, 2018
362018
Comparative evaluation of machine learning-based malware detection on android.
S Hahn, M Protsenko, T Müller
Gesellschaft für Informatik eV, 2016
352016
Dynamic self-protection and tamperproofing for android apps using native code
M Protsenko, S Kreuter, T Müller
2015 10th International Conference on Availability, Reliability and Security …, 2015
352015
Pandora applies non-deterministic obfuscation randomly to android
M Protsenko, T Müller
2013 8th International conference on malicious and unwanted software:" The …, 2013
342013
Anti-proguard: Towards automated deobfuscation of android apps
R Baumann, M Protsenko, T Müller
Proceedings of the 4th Workshop on Security in Highly Connected IT Systems, 7-12, 2017
322017
An empirical evaluation of software obfuscation techniques applied to Android APKs
FC Freiling, M Protsenko, Y Zhuang
International Conference on Security and Privacy in Communication Networks …, 2015
252015
Programming experience might not help in comprehending obfuscated source code efficiently
N Hänsch, A Schankin, M Protsenko, F Freiling, Z Benenson
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 341-356, 2018
192018
Android malware detection based on software complexity metrics
M Protsenko, T Müller
International Conference on Trust, Privacy and Security in Digital Business …, 2014
192014
Artist: the android runtime instrumentation toolkit
L Dresel, M Protsenko, T Müller
2016 11th International Conference on Availability, Reliability and Security …, 2016
162016
CloudIDEA: a malware defense architecture for cloud data centers
A Fischer, T Kittel, B Kolosnjaji, TK Lengyel, W Mandarawi, H de Meer, ...
On the Move to Meaningful Internet Systems: OTM 2015 Conferences …, 2015
152015
Tackling androids native library malware with robust, efficient and accurate similarity measures
A Kalysch, O Milisterfer, M Protsenko, T Müller
Proceedings of the 13th international conference on availability …, 2018
122018
Toward an open source location privacy evaluation framework for vehicular networks
D Eckhoff, M Protsenko, R German
2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), 1-2, 2014
102014
Protecting android apps against reverse engineering by the use of the native code
M Protsenko, T Müller
Trust, Privacy and Security in Digital Business: 12th International …, 2015
92015
Advanced system resiliency based on virtualization techniques for IoT devices
J Röckl, M Protsenko, M Huber, T Müller, FC Freiling
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
82021
An (other) exercise in measuring the strength of source code obfuscation
Y Zhuang, M Protsenko, T Muller, FC Freiling
2014 25th International Workshop on Database and Expert Systems Applications …, 2014
62014
A cloud-based compilation and hardening platform for android apps
M Busch, M Protsenko, T Müller
Proceedings of the 12th International Conference on Availability …, 2017
52017
Gateway to the Danger Zone: Secure and Authentic Remote Reset in Machine Safety
SN Peters, N Puch, MP Heinl, P Zieris, M Protsenko, T Larsen-Vefring, ...
Proceedings of the 19th International Conference on Availability …, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20