
Felix C. Freiling
Felix C. Gärtner
Person information
- affiliation: University of Erlangen-Nuremberg, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [c129]Tobias Groß, Richard Dirauf, Felix C. Freiling:
Systematic Analysis of Browser History Evidence. SADFE 2020: 1-12 - [c128]Nico Müller, Tilo Müller, Felix C. Freiling:
Urheberrecht ./. Sicherheitsanalyse. Sicherheit 2020: 105-115 - [c127]Philipp Morgner, Christoph Mai, Nicole Koschate-Fischer, Felix C. Freiling, Zinaida Benenson:
Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products. IEEE Symposium on Security and Privacy 2020: 429-446 - [i8]Fabian Faust, Aurélien Thierry, Tilo Müller, Felix C. Freiling:
Technical Report: Selective Imaging of File System Data on Live Systems. CoRR abs/2012.02573 (2020)
2010 – 2019
- 2019
- [j53]Tobias Latzo, Ralph Palutke, Felix C. Freiling:
A universal taxonomy and survey of forensic memory acquisition techniques. Digit. Investig. 28(Supplement): 56-69 (2019) - [j52]Patrick Mullan, Christian Riess, Felix C. Freiling:
Forensic source identification using JPEG image headers: The case of smartphones. Digit. Investig. 28(Supplement): S68-S76 (2019) - [j51]Jan Schiller, Felix C. Freiling, Zinaida Benenson, Werner Massonne:
Berufsbegleitendes Studieren an Universitäten - Ein Zukunftsfeld für die IT-Sicherheit. Inform. Spektrum 42(1): 38-47 (2019) - [j50]Pieter Maene
, Johannes Götzfried, Tilo Müller, Ruan de Clercq, Felix C. Freiling
, Ingrid Verbauwhede
:
Atlas: Application Confidentiality in Compromised Embedded Systems. IEEE Trans. Dependable Secur. Comput. 16(3): 415-423 (2019) - [c126]Stefan Schorradt, Edita Bajramovic, Felix C. Freiling:
On the Feasibility of Secure Logging for Industrial Control Systems Using Blockchain. CECC 2019: 4:1-4:6 - [c125]Lamya Abdullah, Sebastian Hahn, Felix C. Freiling:
Achieving Consistency of Software Updates against Strong Attackers. CECC 2019: 6:1-6:6 - [c124]Tobias Latzo, Felix C. Freiling:
Characterizing the Limitations of Forensic Event Reconstruction Based on Log Files. TrustCom/BigDataSE 2019: 466-475 - [i7]Lamya Abdullah, Felix C. Freiling, Juan Quintero, Zinaida Benenson:
Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing. CoRR abs/1906.07841 (2019) - [i6]Philipp Morgner, Christoph Mai, Nicole Koschate-Fischer, Felix C. Freiling, Zinaida Benenson:
Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products. CoRR abs/1906.11094 (2019) - 2018
- [j49]Sebastian Nemetz, Sven Schmitt, Felix C. Freiling:
A standardized corpus for SQLite database forensics. Digit. Investig. 24: S121-S130 (2018) - [j48]Ralph Palutke, Felix C. Freiling:
Styx: Countering robust memory acquisition. Digit. Investig. 24: S18-S28 (2018) - [j47]Felix C. Freiling, Leonhard Hösch:
Controlled experiments in digital evidence tampering. Digit. Investig. 24: S83-S92 (2018) - [j46]Felix C. Freiling
, Tobias Groß, Tobias Latzo, Tilo Müller, Ralph Palutke:
Advances in Forensic Data Acquisition. IEEE Des. Test 35(5): 63-74 (2018) - [j45]Pieter Maene
, Johannes Götzfried, Ruan de Clercq, Tilo Müller, Felix C. Freiling, Ingrid Verbauwhede
:
Hardware-Based Trusted Computing Architectures for Isolation and Attestation. IEEE Trans. Computers 67(3): 361-374 (2018) - [c123]Lamya Abdullah, Felix C. Freiling, Juan Quintero, Zinaida Benenson:
Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing. CyberICPS/SECPRE@ESORICS 2018: 137-152 - [c122]Norman Hänsch, Andrea Schankin, Mykolai Protsenko, Felix C. Freiling, Zinaida Benenson:
Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently. SOUPS @ USENIX Security Symposium 2018: 341-356 - [c121]Philipp Morgner, Felix C. Freiling, Zinaida Benenson:
Opinion: Security Lifetime Labels - Overcoming Information Asymmetry in Security of IoT Consumer Products. WISEC 2018: 208-211 - 2017
- [j44]Job Noorman, Jo Van Bulck
, Jan Tobias Mühlberg
, Frank Piessens, Pieter Maene, Bart Preneel
, Ingrid Verbauwhede
, Johannes Götzfried, Tilo Müller, Felix C. Freiling:
Sancus 2.0: A Low-Cost Security Architecture for IoT Devices. ACM Trans. Priv. Secur. 20(3): 7:1-7:33 (2017) - 2016
- [j43]Benjamin Stritter, Felix C. Freiling, Hartmut König, René Rietz, Steffen Ullrich, Alexander von Gernler, Felix Erlacher, Falko Dressler
:
Cleaning up Web 2.0's Security Mess-at Least Partly. IEEE Secur. Priv. 14(2): 48-57 (2016) - [j42]Felix C. Freiling:
Staatliche Spähsoftware zur Strafverfolgung - Zur Verhältnismäßigkeit einer umstrittenen Maßnahme. Inform. Spektrum 39(3): 203-209 (2016) - [j41]Gabor Drescher, Christoph Erhardt, Felix C. Freiling, Johannes Götzfried, Daniel Lohmann
, Pieter Maene, Tilo Müller, Ingrid Verbauwhede
, Andreas Weichslgartner
, Stefan Wildermann:
Providing security on demand using invasive computing. it Inf. Technol. 58(6): 281-295 (2016) - [j40]Andreas Kurtz, Hugo Gascon, Tobias Becker, Konrad Rieck, Felix C. Freiling:
Fingerprinting Mobile Devices Using Personalized Configurations. Proc. Priv. Enhancing Technol. 2016(1): 4-19 (2016) - [c120]Johannes Bauer, Felix C. Freiling:
Towards Cycle-Accurate Emulation of Cortex-M Code to Detect Timing Side Channels. ARES 2016: 49-58 - [c119]Johannes Bauer, Sebastian Schinzel, Felix C. Freiling, Andreas Dewald:
Information leakage behind the curtain: Abusing anti-EMI features for covert communication. HOST 2016: 130-134 - [c118]Andreas Weichslgartner
, Stefan Wildermann, Johannes Götzfried, Felix C. Freiling, Michael Glaß, Jürgen Teich:
Design-Time/Run-Time Mapping of Security-Critical Applications in Heterogeneous MPSoCs. SCOPES 2016: 153-162 - 2015
- [j39]Maxim Anikeev
, Felix C. Freiling, Johannes Götzfried, Tilo Müller:
Secure garbage collection: Preventing malicious data harvesting from deallocated Java objects inside the Dalvik VM. J. Inf. Secur. Appl. 22: 81-86 (2015) - [j38]Felix C. Freiling:
From IT forensics to forensic computing. it Inf. Technol. 57(6): 337-338 (2015) - [j37]Felix C. Freiling, Jan C. Schuhr, Michael Gruhn:
What is essential data in digital forensic analysis? it Inf. Technol. 57(6): 376-383 (2015) - [j36]Tilo Müller, Felix C. Freiling:
A Systematic Assessment of the Security of Full Disk Encryption. IEEE Trans. Dependable Secur. Comput. 12(5): 491-503 (2015) - [c117]Johannes Götzfried, Tilo Müller, Ruan de Clercq
, Pieter Maene, Felix C. Freiling, Ingrid Verbauwhede
:
Soteria: Offline Software Protection within Low-cost Embedded Devices. ACSAC 2015: 241-250 - [c116]Felix C. Freiling, Michael Gruhn:
What is Essential Data in Digital Forensic Analysis? IMF 2015: 40-48 - 2014
- [j35]Felix C. Freiling, Konstantin Sack:
Selektive Datensicherungen in der IT-Forensik. Datenschutz und Datensicherheit 38(2): 112-117 (2014) - [j34]Felix C. Freiling, Rüdiger Grimm, Karl-Erwin Großpietsch, Hubert B. Keller
, Jürgen Mottok, Isabel Münch, Kai Rannenberg, Francesca Saglietti:
Technische Sicherheit und Informationssicherheit - Unterschiede und Gemeinsamkeiten. Inform. Spektrum 37(1): 14-24 (2014) - [c115]Yan Zhuang, Mykola Protsenko, Tilo Müller, Felix C. Freiling:
An(other) Exercise in Measuring the Strength of Source Code Obfuscation. DEXA Workshops 2014: 313-317 - [c114]Felix C. Freiling, Mykola Protsenko, Yan Zhuang:
An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs. SecureComm (2) 2014: 315-328 - [c113]Andreas Kurtz, Markus Troßbach, Felix C. Freiling:
Snoop-it: Dynamische Analyse und Manipulation von Apple iOS Apps. Sicherheit 2014: 13-23 - [c112]Nadina Hintz, Markus Engelberth, Zinaida Benenson, Felix C. Freiling:
Phishing still works: Erfahrungen und Lehren aus der Durchführung von Phishing-Experimenten. Sicherheit 2014: 37-51 - [c111]Dominik Brodowski, Andreas Dewald, Felix C. Freiling, Steve Kovács, Martin Rieger:
Drei Jahre Master Online Digitale Forensik: Ergebnisse und Erfahrungen. Sicherheit 2014: 391-405 - [e6]Felix C. Freiling, Holger Morgenstern, Sandra Frings, Oliver Göbel, Detlef Günther, Jens Nedon, Dirk Schadt:
Eighth International Conference on IT Security Incident Management & IT Forensics, IMF 2014, Münster, Germany, May 12-14, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-4330-2 [contents] - 2013
- [j33]Felix C. Freiling:
Im Fokus: Technische und menschliche Aspekte von Cyberkriminalität. PIK Prax. Informationsverarbeitung Kommun. 36(3): 199-200 (2013) - [c110]Tilo Müller, Hans Spath, Richard Mäckl, Felix C. Freiling:
Stark - Tamperproof Authentication to Resist Keylogging. Financial Cryptography 2013: 295-312 - [c109]Johannes Stüttgen, Andreas Dewald, Felix C. Freiling:
Selective Imaging Revisited. IMF 2013: 45-58 - [c108]Martin Wundram, Felix C. Freiling, Christian Moch:
Anti-forensics: The Next Step in Digital Forensics Tool Testing. IMF 2013: 83-97 - [c107]Sven Kälber, Andreas Dewald, Felix C. Freiling:
Forensic Application-Fingerprinting Based on File System Metadata. IMF 2013: 98-112 - [c106]Viviane Zwanger, Felix C. Freiling:
Kernel mode API spectroscopy for incident response and digital forensics. PPREW@POPL 2013: 3:1-3:11 - [c105]Michael Spreitzenbarth, Felix C. Freiling, Florian Echtler
, Thomas Schreck, Johannes Hoffmann:
Mobile-sandbox: having a deeper look into android applications. SAC 2013: 1808-1815 - [c104]Maxim Anikeev
, Felix C. Freiling:
Preventing malicious data harvesting from deallocated memory areas. SIN 2013: 448-449 - [p2]Andreas Dewald, Felix C. Freiling, Sven Schmitt, Michael Spreitzenbarth, Stefan Vömel:
Systematische Probleme und Grenzen der forensischen Informatik. Jenseits von 1984 2013: 101-118 - [e5]Holger Morgenstern, Ralf Ehlert, Felix C. Freiling, Sandra Frings, Oliver Göbel, Detlef Günther, Stefan Kiltz, Jens Nedon, Dirk Schadt:
Seventh International Conference on IT Security Incident Management and IT Forensics, IMF 2013, Nuremberg, Germany, March 12-14, 2013. IEEE Computer Society 2013, ISBN 978-1-4673-6307-5 [contents] - [i5]Felix C. Freiling, Gerrit Hornung, Radim Polcák:
Forensic Computing (Dagstuhl Seminar 13482). Dagstuhl Reports 3(11): 193-208 (2013) - 2012
- [j32]Stefan Vömel, Felix C. Freiling:
Correctness, atomicity, and integrity: Defining criteria for forensically-sound memory acquisition. Digit. Investig. 9(2): 125-137 (2012) - [j31]Matthias Bäcker, Andreas Dewald, Felix C. Freiling, Sven Schmitt:
Kriterien für die Priorisierung bei der Sicherung und Analyse digitaler Spuren. Datenschutz und Datensicherheit 36(8): 597-602 (2012) - [j30]Carsten Willems, Felix C. Freiling:
Reverse Code Engineering - State of the Art and Countermeasures. it Inf. Technol. 54(2): 53-63 (2012) - [j29]Roberto Cortiñas
, Felix C. Freiling, Marjan Ghajar-Azadanlou, Alberto Lafuente, Mikel Larrea, Lucia Draque Penso, Iratxe Soraluze Arriola
:
Secure Failure Detection and Consensus in TrustedPals. IEEE Trans. Dependable Secur. Comput. 9(4): 610-625 (2012) - [c103]Tilo Müller, Benjamin Taubmann, Felix C. Freiling:
TreVisor - OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks. ACNS 2012: 66-83 - [c102]Carsten Willems, Felix C. Freiling, Thorsten Holz
:
Using memory management to detect and extract illegitimate code for malware analysis. ACSAC 2012: 179-188 - [c101]Colin Atkinson
, Florian Barth, Ralph Gerbig, Felix C. Freiling, Sebastian Schinzel, Frank Hadasch, Alexander Maedche
, Benjamin Müller:
Reducing the Incidence of Unintended, Human-Caused Information Flows in Enterprise Systems. EDOC Workshops 2012: 11-18 - [c100]Michael Spreitzenbarth, Sven Schmitt, Felix C. Freiling:
Comparing Sources of Location Data from Android Smartphones. IFIP Int. Conf. Digital Forensics 2012: 143-157 - [c99]Andreas Dewald, Felix C. Freiling, Thomas Schreck, Michael Spreitzenbarth, Johannes Stüttgen, Stefan Vömel, Carsten Willems:
Analyse und Vergleich von BckR2D2-I und II. Sicherheit 2012: 47-58 - [c98]Christian Zimmermann, Michael Spreitzenbarth, Sven Schmitt, Felix C. Freiling:
Forensic Analysis of YAFFS2. Sicherheit 2012: 59-69 - [c97]Markus Engelberth, Jan Göbel, Christian Schönbein, Felix C. Freiling:
PyBox - A Python Sandbox. Sicherheit 2012: 137-148 - [c96]Philipp Trinius, Felix C. Freiling:
Filtern von Spam-Nachrichten mit kontextfreien Grammatiken. Sicherheit 2012: 163-174 - [e4]Dieter Gollmann, Felix C. Freiling:
Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings. Lecture Notes in Computer Science 7483, Springer 2012, ISBN 978-3-642-33382-8 [contents] - 2011
- [b2]Andreas Dewald, Felix C. Freiling:
Forensische Informatik. Books on Demand GmbH 2011, ISBN 978-3-8423-7947-3, pp. I-VIII, 1-123 - [j28]Felix C. Freiling, Rachid Guerraoui, Petr Kuznetsov:
The failure detector abstraction. ACM Comput. Surv. 43(2): 9:1-9:40 (2011) - [j27]Stefan Vömel, Felix C. Freiling:
A survey of main memory acquisition and analysis techniques for the windows operating system. Digit. Investig. 8(1): 3-22 (2011) - [j26]Markus Engelberth, Felix C. Freiling, Jan Göbel, Christian Gorecki, Thorsten Holz
, Ralf Hund, Philipp Trinius, Carsten Willems:
Das Internet-Malware-Analyse-System (InMAS) - Ein System zur großflächigen Sammlung und Analyse von Schadsoftware im Internet. Datenschutz und Datensicherheit 35(4): 247-252 (2011) - [j25]Iratxe Soraluze Arriola
, Roberto Cortiñas
, Alberto Lafuente, Mikel Larrea, Felix C. Freiling:
Communication-efficient failure detection and consensus in omission environments. Inf. Process. Lett. 111(6): 262-268 (2011) - [c95]Christian Rossow, Christian J. Dietrich, Herbert Bos
, Lorenzo Cavallaro, Maarten van Steen
, Felix C. Freiling, Norbert Pohlmann:
Sandnet: network traffic analysis of malicious software. BADGERS@EuroSys 2011: 78-88 - [c94]Zinaida Benenson, Andreas Dewald, Hans-Georg Eßer, Felix C. Freiling, Tilo Müller, Christian Moch, Stefan Vömel, Sebastian Schinzel, Michael Spreitzenbarth, Ben Stock, Johannes Stüttgen:
Exploring the Landscape of Cybercrime. SysSec@DIMVA 2011: 71-74 - [c93]Christian J. Dietrich, Christian Rossow, Felix C. Freiling, Herbert Bos
, Maarten van Steen
, Norbert Pohlmann:
On Botnets That Use DNS for Command and Control. EC2ND 2011: 9-16 - [c92]Alexander Knaus, Johannes Stüttgen, Jan Göbel, Markus Engelberth, Felix C. Freiling:
Säuberung eines infizierten Windows-Betriebssystems auf Basis von Malware-Analyse-Berichten. GI-Jahrestagung 2011: 114 - [c91]Marek Jawurek, Felix C. Freiling:
Privacy threat analysis of smart metering. GI-Jahrestagung 2011: 318 - [c90]Christian Moch, Felix C. Freiling:
Evaluating the Forensic Image Generator Generator. ICDF2C 2011: 238-252 - [c89]Andreas Dewald, Felix C. Freiling, Tim Weber:
Design and Implementation of a Documentation Tool for Interactive Commandline Sessions. IMF 2011: 62-80 - [c88]Felix C. Freiling, Sebastian Schinzel:
Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications. SEC 2011: 41-55 - [c87]Amir Alsbih, Felix C. Freiling, Christian Schindelhauer:
A Case Study in Practical Security of Cable Networks. SEC 2011: 92-103 - [c86]Michael Becher, Felix C. Freiling, Johannes Hoffmann, Thorsten Holz
, Sebastian Uellenbeck, Christopher Wolf:
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices. IEEE Symposium on Security and Privacy 2011: 96-111 - [c85]Christian Gorecki, Felix C. Freiling, Marc Kührer, Thorsten Holz
:
TrumanBox: Improving Dynamic Malware Analysis by Emulating the Internet. SSS 2011: 208-222 - [c84]Tilo Müller, Felix C. Freiling, Andreas Dewald:
TRESOR Runs Encryption Securely Outside RAM. USENIX Security Symposium 2011 - [i4]Felix C. Freiling, Dirk Heckmann, Radim Polcák, Joachim Posegga:
Forensic Computing (Dagstuhl Seminar 11401). Dagstuhl Reports 1(10): 1-13 (2011) - 2010
- [j24]Markus Bestehorn, Zinaida Benenson, Erik Buchmann, Marek Jawurek, Klemens Böhm, Felix C. Freiling:
Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption. Ad Hoc Sens. Wirel. Networks 9(1-2): 85-107 (2010) - [j23]Matthias Bäcker, Felix C. Freiling, Sven Schmitt:
Selektion vor der Sicherung - Methoden zur effizienten forensischen Sicherung von digitalen Speichermedien. Datenschutz und Datensicherheit 34(2): 80-85 (2010) - [j22]Zinaida Benenson, Erik-Oliver Blaß, Felix C. Freiling:
Attacker Models for Wireless Sensor Networks (Angreifermodelle für drahtlose Sensornetze). it Inf. Technol. 52(6): 320-324 (2010) - [j21]Ioannis Krontiris, Felix C. Freiling, Tassos Dimitriou:
Location privacy in urban sensing networks: research challenges and directions. IEEE Wirel. Commun. 17(5): 30-35 (2010) - [c83]Michael Müter, André Groll, Felix C. Freiling:
A structured approach to anomaly detection for in-vehicle networks. IAS 2010: 92-98 - [c82]Tilo Müller, Andreas Dewald, Felix C. Freiling:
AESSE: a cold-boot resistant implementation of AES. EUROSEC 2010: 42-47 - [c81]Ioannis Krontiris, Felix C. Freiling:
Integrating people-centric sensing with social networks: A privacy research agenda. PerCom Workshops 2010: 620-623 - [c80]Andreas Dewald, Thorsten Holz
, Felix C. Freiling:
ADSandbox: sandboxing JavaScript to fight malicious websites. SAC 2010: 1859-1864 - [e3]Felix C. Freiling:
Sicherheit 2010: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin. LNI P-170, GI 2010, ISBN 978-3-88579-264-2 [contents]
2000 – 2009
- 2009
- [j20]Felix C. Freiling:
Ein Blick auf IT-Sicherheit aus Angreiferperspektive - Vom Wert offensiver Methoden. Datenschutz und Datensicherheit 33(4): 214-217 (2009) - [j19]Marion Liegl, Martin Mink, Felix C. Freiling:
Datenschutz in digital-forensischen Lehrveranstaltungen - Sicherer Umgang mit persönlichen Daten. Datenschutz und Datensicherheit 33(4): 222-227 (2009) - [j18]Felix C. Freiling, Dennis Heinson:
Probleme des Verkehrsdatenbegriffs im Rahmen der Vorratsdatenspeicherung. Datenschutz und Datensicherheit 33(9): 547-552 (2009) - [j17]Joachim Wilke, Erik-Oliver Blaß, Felix C. Freiling, Martina Zitterbart:
A Framework for Probabilistic, Authentic Aggregation in Wireless Sensor Networks. PIK Prax. Informationsverarbeitung Kommun. 32(2): 116-126 (2009) - [j16]Neeraj Mittal, Kuppahalli L. Phaneesh, Felix C. Freiling:
Safe termination detection in an asynchronous distributed system when processes may crash and recover. Theor. Comput. Sci. 410(6-7): 614-628 (2009) - [c79]Thorsten Holz
, Markus Engelberth, Felix C. Freiling:
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones. ESORICS 2009: 1-18 - [c78]Ioannis Krontiris, Zinaida Benenson, Thanassis Giannetsos, Felix C. Freiling, Tassos Dimitriou:
Cooperative Intrusion Detection in Wireless Sensor Networks. EWSN 2009: 263-278 - [c77]Thorsten Holz, Markus Engelberth, Felix C. Freiling:
Eine Analyse von 33 Gigabyte gestohlener Keylogger-Daten. GI Jahrestagung 2009: 193 - [c76]Rainer Böhme, Felix C. Freiling, Thomas Gloe, Matthias Kirchner:
Multimedia-Forensik als Teildisziplin der digitalen Forensik. GI Jahrestagung 2009: 1537-1551 - [c75]Christian Moch, Felix C. Freiling:
The Forensic Image Generator Generator (Forensig2). IMF 2009: 78-93 - [c74]Carole Delporte-Gallet, Hugues Fauconnier, Andreas Tielmann, Felix C. Freiling, Mahir Kilic:
Message-efficient omission-tolerant consensus with limited synchrony. IPDPS 2009: 1-8 - [c73]Rainer Böhme, Felix C. Freiling, Thomas Gloe, Matthias Kirchner:
Multimedia Forensics Is Not Computer Forensics. IWCF 2009: 90-103 - [c72]Felix C. Freiling, Christian Lambertz, Mila E. Majster-Cederbaum:
Modular Consensus Algorithms for the Crash-Recovery Model. PDCAT 2009: 287-292 - [c71]Ralf Hund, Thorsten Holz, Felix C. Freiling:
Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms. USENIX Security Symposium 2009: 383-398 - [c70]Philipp Trinius, Thorsten Holz
, Jan Göbel, Felix C. Freiling:
Visual analysis of malware behavior using treemaps and thread graphs. VizSEC 2009: 33-38 - 2008
- [j15]Neeraj Mittal, Felix C. Freiling, Subbarayan Venkatesan, Lucia Draque Penso:
On termination detection in crash-prone distributed systems with failure detectors. J. Parallel Distributed Comput. 68(6): 855-875 (2008) - [c69]Zinaida Benenson, Markus Bestehorn, Erik Buchmann, Felix C. Freiling, Marek Jawurek:
Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks. ADHOC-NOW 2008: 279-292 - [c68]Felix C. Freiling, Thorsten Holz, Martin Mink:
Reconstructing People's Lives: A Case Study in Teaching Forensic Computing. IMF 2008: 125-141 - [c67]Thorsten Holz, Christian Gorecki, Konrad Rieck, Felix C. Freiling:
Measuring and Detecting Fast-Flux Service Networks. NDSS 2008 - [c66]Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix C. Freiling:
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. LEET 2008 - [c65]Ali Ikinci, Thorsten Holz, Felix C. Freiling:
Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients. Sicherheit 2008: 407-421 - [c64]Michael Becher, Felix C. Freiling:
Towards Dynamic Malware Analysis to Increase Mobile Device Security423. Sicherheit 2008: 423-433 - [c63]Felix C. Freiling, Jens Liebchen:
Iterative Kompromittierungsgraphverfeinerung als methodische Grundlage für Netzwerkpenetrationstests. Sicherheit 2008: 435-447 - [c62]Felix C. Freiling, Christian Lambertz, Mila E. Majster-Cederbaum:
Easy Consensus Algorithms for the Crash-Recovery Model. DISC 2008: 507-508 - [e2]Irene Eusgeld, Felix C. Freiling, Ralf H. Reussner:
Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30 - November 1, 2005]. Lecture Notes in Computer Science 4909, Springer 2008, ISBN 978-3-540-68946-1 [contents] - 2007
- [j14]Carsten Willems, Thorsten Holz
, Felix C. Freiling:
Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE Secur. Priv. 5(2): 32-39 (2007) - [c61]Felix C. Freiling, Matthias Majuntke, Neeraj Mittal:
On Detecting Termination in the Crash-Recovery Model. Euro-Par 2007: 629-638 - [c60]Felix C. Freiling, Bastian Schwittay:
A Common Process Model for Incident Response and Computer Forensics. IMF 2007: 19-39 - [c59]Harish Daiya, Maximillian Dornseif, Felix C. Freiling: