Drebin: Effective and explainable detection of android malware in your pocket D Arp, M Spreitzenbarth, M Hübner, H Gascon, K Rieck Proc. of NDSS, 2014 | 2755 | 2014 |
Mobile-sandbox: having a deeper look into android applications M Spreitzenbarth, F Freiling, F Echtler, T Schreck, J Hoffmann Proceedings of the 28th annual ACM symposium on applied computing, 1808-1815, 2013 | 440 | 2013 |
FROST: Forensic recovery of scrambled telephones T Müller, M Spreitzenbarth Applied Cryptography and Network Security: 11th International Conference …, 2013 | 170 | 2013 |
Slicing droids: program slicing for smali code J Hoffmann, M Ussath, T Holz, M Spreitzenbarth Proceedings of the 28th Annual ACM Symposium on Applied Computing, 1844-1851, 2013 | 143 | 2013 |
Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques M Spreitzenbarth, T Schreck, F Echtler, D Arp, J Hoffmann International Journal of Information Security 14, 141-153, 2015 | 139 | 2015 |
Post-mortem memory analysis of cold-booted android devices C Hilgers, H Macht, T Müller, M Spreitzenbarth 2014 Eighth International Conference on IT Security Incident Management & IT …, 2014 | 52 | 2014 |
„Forensic Analysis of Smartphones: The Android Data Extractor Lite (ADEL)” in Conference on Digital Forensics F Freiling, S Schmitt, M Spreitzenbarth Security and Law, 2011 | 22* | 2011 |
Forensic analysis of YAFFS2 C Zimmermann, M Spreitzenbarth, S Schmitt, FC Freiling Gesellschaft für Informatik eV, 2012 | 21 | 2012 |
Android Malware on the Rise M Spreitzenbarth, F Freiling Universitätsbibliothek der Universität, 2012 | 18 | 2012 |
Comparing sources of location data from android smartphones M Spreitzenbarth, S Schmitt, F Freiling Advances in Digital Forensics VIII: 8th IFIP WG 11.9 International …, 2012 | 14 | 2012 |
Mastering Python Forensics M Spreitzenbarth, J Uhrmann Packt Publishing, 2015 | 13 | 2015 |
Dissecting the Droid: Forensic analysis of android and its malicious applications M Spreitzenbarth PQDT-Global, 2013 | 12 | 2013 |
Defeating the secrets of otp apps P Polleit, M Spreitzenbarth Proceedings of the 2018 11th International Conference on IT Security …, 2018 | 11 | 2018 |
The Evil Inside a Droid—Android Malware: past, present and future M Spreitzenbarth Proceedings of the 1st Baltic Conference on Network Security & Forensics, 41-59, 2012 | 11 | 2012 |
Analysis and Comparison of BckR2D2-I and II A Dewald, FC Freiling, T Schreck, M Spreitzenbarth, J Stüttgen, S Vömel, ... | 9* | 2011 |
Mobile Phone Forensics: Analysis of the Android Filesystem (YAFFS2) C Zimmermann, M Spreitzenbarth, S Schmitt | 8* | 2011 |
Exploring the Landscape of Cybercrime Z Benenson, A Dewald, HG Eßer, FC Freiling, T Müller, C Moch, S Vömel, ... Deliverable D2. 3: 1st Project Workshop Proceedings, 70, 2011 | 6 | 2011 |
Tools and Processes for Forensic Analyses of Smartphones and Mobile Malware M Spreitzenbarth | 6 | 2011 |
Reverse Engineering of the Android File System (YAFFS2) M Spreitzenbarth, S Schmitt, C Zimmermann | 3 | 2011 |
Mobile phone forensics M Spreitzenbarth Diplomarbeit, Universität Mannheim, 2009. Retrieved 2012-04-04 from http …, 2009 | 3 | 2009 |