Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis S Kleber, L Maile, F Kargl IEEE Communications Surveys & Tutorials 21 (1), 526-561, 2018 | 48 | 2018 |
NEMESYS: Network Message Syntax Reverse Engineering by Analysis of the Intrinsic Structure of Individual Messages S Kleber, H Kopp, F Kargl 12th USENIX Workshop on Offensive Technologies (WOOT 18), 2018 | 41 | 2018 |
An SDN-based Approach For Defending Against Reflective DDoS Attacks T Lukaseder, K Stölzle, S Kleber, B Erb, F Kargl 2018 IEEE 43rd Conference on Local Computer Networks (LCN), 299-302, 2018 | 23 | 2018 |
Message type identification of binary network protocols using continuous segment similarity S Kleber, RW Heijden, F Kargl IEEE International Conference on Computer Communications (INFOCOM) 2020, 2020 | 17 | 2020 |
Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption. S Kleber, F Unterstein, M Matousek, F Kargl, F Slomka, M Hiller IACR Cryptology ePrint Archive 2015, 651, 2015 | 14 | 2015 |
Automated {PCB} Reverse Engineering S Kleber, HF Nölscher, F Kargl 11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017 | 9 | 2017 |
Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions S Kleber, RW Van der Heijden, H Kopp, F Kargl 2015 International Conference and Workshops on Networked Systems (NetSys), 1-8, 2015 | 9 | 2015 |
Network attack detection and defense: Securing industrial control systems for critical infrastructures (dagstuhl seminar 14292) M Dacier, F Kargl, H König, A Valdes Dagstuhl reports 4 (7), 2014 | 8 | 2014 |
ARIstoteles–Dissecting Apple’s Baseband Interface T Kröll, S Kleber, F Kargl, M Hollick, J Classen Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021 | 7 | 2021 |
Poster: Network Message Field Type Recognition S Kleber, F Kargl Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 4 | 2019 |
Analysis of the DoIP Protocol for Security Vulnerabilities P Wachter, S Kleber Proceedings of the 6th ACM Computer Science in Cars Symposium, 1-10, 2022 | 2 | 2022 |
Refining Network Message Segmentation with Principal Component Analysis S Kleber, F Kargl 2022 IEEE Conference on Communications and Network Security (CNS), 281-289, 2022 | 2 | 2022 |
Network Message Field Type Clustering for Reverse Engineering of Unknown Binary Protocols S Kleber, F Kargl, M Stute, M Hollick 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022 | 2* | 2022 |
Secure code execution: A generic PUF-driven system architecture S Kleber, F Unterstein, M Hiller, F Slomka, M Matousek, F Kargl, C Bösch Information Security: 21st International Conference, ISC 2018, Guildford, UK …, 2018 | 2 | 2018 |
Design of the Secure Execution PUF-based Processor (SEPP) F Unterstein, S Kleber, M Matousek, F Kargl, F Slomka, M Hiller Workshop on Trustworthy Manufacturing and Utilization of Secure Devices …, 2015 | 2* | 2015 |
Heideggers Gelassenheit in der globalisierten Welt S Kleber Humboldt-Studienzentrum, Universität Ulm, 2010 | 1 | 2010 |
A Strategy to Evaluate Test Time Evasion Attack Feasibility S Kleber, P Wachter Datenschutz und Datensicherheit-DuD 47 (8), 478-482, 2023 | | 2023 |
Über die Ehrfurcht vor dem Leben S Kleber Humboldt-Studienzentrum, Universität Ulm, 2011 | | 2011 |
A training and testing environment for penetration tests and security analyses S Kleber Institute of Media Informatics, Ulm University, 2010 | | 2010 |
Einsatz von RFID in der Materialverwaltung S Kleber Institut für Medieninformatik, Universität Ulm, 2007 | | 2007 |