Felix C. Freiling
Orcid: 0000-0002-8279-8401Affiliations:
- University of Erlangen-Nuremberg, Germany
According to our database1,
Felix C. Freiling
authored at least 229 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2024
ACM Trans. Priv. Secur., 2024
DTRAP, 2024
Fit for Forensics: Taxonomy and Common Model for Forensic Analysis of Fitness Trackers.
DTRAP, 2024
Increasing Street Credibility: Cartography-Aware Forensic Analysis of GNSS Trace Validity.
DTRAP, 2024
Forensic Sci. Int. Digit. Investig., 2024
Forensic Sci. Int. Digit. Investig., 2024
Forensic Sci. Int. Digit. Investig., 2024
Beyond timestamps: Integrating implicit timing information into digital forensic timelines.
Forensic Sci. Int. Digit. Investig., 2024
CoRR, 2024
Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme.
Proceedings of the Sicherheit, 2024
Proceedings of the 2024 Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks, 2024
2023
Forensic Sci. Int. Digit. Investig., March, 2023
A Functional Classification of Forensic Access to Storage and its Legal Implications.
DTRAP, 2023
CoRR, 2023
2022
Foundations of cybercriminalistics: From general process models to case-specific concretizations in cybercrime investigations.
Digit. Investig., 2022
Fighting Evasive Malware: How to Pass the Reverse Turing Test By Utilizing a VMI-Based Human Interaction Simulator.
Proceedings of the Sicherheit, 2022
Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data.
Proceedings of the Secure IT Systems, 2022
2021
Datenschutz und Datensicherheit, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Digit. Investig., 2020
Digit. Investig., 2020
Digit. Investig., 2020
Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the Sicherheit 2020, Sicherheit, 2020
Proceedings of the 13th International Conference on Systematic Approaches to Digital Forensic Engineering, 2020
HyperLeech: Stealthy System Virtualization with Minimal Target Impact through DMA-Based Hypervisor Injection.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations.
Proceedings of the Digital Forensics and Cyber Crime - 11th EAI International Conference, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
Berufsbegleitendes Studieren an Universitäten - Ein Zukunftsfeld für die IT-Sicherheit.
Inform. Spektrum, 2019
Digit. Investig., 2019
Digit. Investig., 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
On the Feasibility of Secure Logging for Industrial Control Systems Using Blockchain.
Proceedings of the Third Central European Cybersecurity Conference, 2019
Proceedings of the Third Central European Cybersecurity Conference, 2019
2018
IEEE Trans. Computers, 2018
Opinion: Security Lifetime Labels - Overcoming Information Asymmetry in Security of IoT Consumer Products.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018
2017
ACM Trans. Priv. Secur., 2017
Do digital investigators have to program? A controlled experiment in digital investigation.
Digit. Investig., 2017
Digit. Investig., 2017
2016
Proc. Priv. Enhancing Technol., 2016
Staatliche Spähsoftware zur Strafverfolgung - Zur Verhältnismäßigkeit einer umstrittenen Maßnahme.
Inform. Spektrum, 2016
Digit. Investig., 2016
Design-Time/Run-Time Mapping of Security-Critical Applications in Heterogeneous MPSoCs.
Proceedings of the 19th International Workshop on Software and Compilers for Embedded Systems, 2016
Information leakage behind the curtain: Abusing anti-EMI features for covert communication.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
IEEE Trans. Dependable Secur. Comput., 2015
Secure garbage collection: Preventing malicious data harvesting from deallocated Java objects inside the Dalvik VM.
J. Inf. Secur. Appl., 2015
Proceedings of the Ninth International Conference on IT Security Incident Management & IT Forensics, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Inform. Spektrum, 2014
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Phishing still works: Erfahrungen und Lehren aus der Durchführung von Phishing-Experimenten.
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014
2013
Prax. Inf.verarb. Kommun., 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop 2013, 2013
Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, 2013
Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, 2013
Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Systematische Probleme und Grenzen der forensischen Informatik.
Proceedings of the Jenseits von 1984, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
it Inf. Technol., 2012
Datenschutz und Datensicherheit, 2012
Correctness, atomicity, and integrity: Defining criteria for forensically-sound memory acquisition.
Digit. Investig., 2012
Proceedings of the Sicherheit 2012: Sicherheit, 2012
Proceedings of the Sicherheit 2012: Sicherheit, 2012
Proceedings of the Advances in Digital Forensics VIII, 2012
Reducing the Incidence of Unintended, Human-Caused Information Flows in Enterprise Systems.
Proceedings of the 16th IEEE International Enterprise Distributed Object Computing Conference Workshops, 2012
Using memory management to detect and extract illegitimate code for malware analysis.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
TreVisor - OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks.
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Inf. Process. Lett., 2011
Das Internet-Malware-Analyse-System (InMAS) - Ein System zur großflächigen Sammlung und Analyse von Schadsoftware im Internet.
Datenschutz und Datensicherheit, 2011
A survey of main memory acquisition and analysis techniques for the windows operating system.
Digit. Investig., 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
Design and Implementation of a Documentation Tool for Interactive Commandline Sessions.
Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics, 2011
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011
Säuberung eines infizierten Windows-Betriebssystems auf Basis von Malware-Analyse-Berichten.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011
Proceedings of the Seventh European Conference on Computer Network Defense, 2011
Proceedings of the First SysSec Workshop 2011, 2011
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011
2010
IEEE Wirel. Commun., 2010
Attacker Models for Wireless Sensor Networks (Angreifermodelle für drahtlose Sensornetze).
it Inf. Technol., 2010
Selektion vor der Sicherung - Methoden zur effizienten forensischen Sicherung von digitalen Speichermedien.
Datenschutz und Datensicherheit, 2010
Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption.
Ad Hoc Sens. Wirel. Networks, 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010
Proceedings of the Third European Workshop on System Security, 2010
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
2009
Safe termination detection in an asynchronous distributed system when processes may crash and recover.
Theor. Comput. Sci., 2009
Prax. Inf.verarb. Kommun., 2009
Datenschutz in digital-forensischen Lehrveranstaltungen - Sicherer Umgang mit persönlichen Daten.
Datenschutz und Datensicherheit, 2009
Datenschutz und Datensicherheit, 2009
Datenschutz und Datensicherheit, 2009
Proceedings of the 6th International Workshop on Visualization for Cyber Security, 2009
Proceedings of the 18th USENIX Security Symposium, 2009
Proceedings of the 2009 International Conference on Parallel and Distributed Computing, 2009
Proceedings of the Computational Forensics, Third International Workshop, 2009
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009
Proceedings of the IMF 2009, 2009
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009
Proceedings of the Wireless Sensor Networks, 6th European Conference, 2009
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones.
Proceedings of the Computer Security, 2009
2008
J. Parallel Distributed Comput., 2008
Proceedings of the Distributed Computing, 22nd International Symposium, 2008
Proceedings of the Sicherheit 2008: Sicherheit, 2008
Iterative Kompromittierungsgraphverfeinerung als methodische Grundlage für Netzwerkpenetrationstests.
Proceedings of the Sicherheit 2008: Sicherheit, 2008
Proceedings of the Sicherheit 2008: Sicherheit, 2008
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the IT-Incidents Management & IT-Forensics, 2008
Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks.
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008
2007
From Crash-Stop to Permanent Omission: Automatic Transformation and Weakest Failure Detectors.
Proceedings of the Distributed Computing, 21st International Symposium, 2007
Proceedings of the Stabilization, 2007
Proceedings of the 8th International Conference on Mobile Data Management (MDM 2007), 2007
Proceedings of the IT-Incidents Management & IT-Forensics, 2007
Proceedings of the IT-Incidents Management & IT-Forensics, 2007
Proceedings of the IT-Incidents Management & IT-Forensics, 2007
Proceedings of the Euro-Par 2007, 2007
2006
ACM SIGOPS Oper. Syst. Rev., 2006
Brief Announcement: Termination Detection in an Asynchronous Distributed System with Crash-Recovery Failures.
Proceedings of the Stabilization, 2006
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), 2006
Proceedings of the Sicherheit 2006: Sicherheit, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, 2006
Proceedings of the IT-Incidents Management & IT-Forensics, 2006
Proceedings of the Computer Security, 2006
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006
Proceedings of the From Security to Dependability, 10.09. - 15.09.2006, 2006
Proceedings of the From Security to Dependability, 10.09. - 15.09.2006, 2006
Proceedings of the ARCS 2006, 2006
2005
Efficient Reduction for Wait-Free Termination Detection in a Crash-Prone Distributed System.
Proceedings of the Distributed Computing, 19th International Conference, 2005
Proceedings of the Sicherheit 2005: Sicherheit, 2005
Simple Evasive Data Storage in Sensor Networks.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005
Proceedings of the Principles of Distributed Systems, 9th International Conference, 2005
Proceedings of the Theoretical Aspects of Computing, 2005
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005
Proceedings of the Wireless Sensor Networks, Second European Workshop, 2005
Proceedings of the Euro-Par 2005, Parallel Processing, 11th International Euro-Par Conference, Lisbon, Portugal, August 30, 2005
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks.
Proceedings of the Computer Security, 2005
Proceedings of the Dependable Computing, 2005
Proceedings of the Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30, 2005
Proceedings of the Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30, 2005
Proceedings of the Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30, 2005
Proceedings of the Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30, 2005
2004
Proceedings of the 34. Jahrestagung der Gesellschaft für Informatik, 2004
Automating the Addition of Fail-Safe Fault-Tolerance: Beyond Fusion-Closed Specifications.
Proceedings of the Formal Techniques, 2004
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2004
Proceedings of the Architecting Systems with Trustworthy Components, 2004
Proceedings of the Architecting Systems with Trustworthy Components, 2004
DREAM: Distributed Reliable Event-Based Application Management.
Proceedings of the Web Dynamics - Adapting to Change in Content, Size, Topology and Use, 2004
2003
Supporting Fair Exchange in Mobile Environments.
Mob. Networks Appl., 2003
it Inf. Technol., 2003
Dependable Systems: Podsy Workshop Report - From Fault Tolerance to Security and Back.
IEEE Distributed Syst. Online, 2003
Proceedings of the Self-Stabilizing Systems, 6th International Symposium, SSS 2003, 2003
Proceedings of the Security in Pervasive Computing, 2003
Dealing with Uncertainty in Mobile Publish/Subscribe Middleware.
Proceedings of the International Middleware Conference, 2003
Proceedings of the Middleware 2003, 2003
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit", INFORMATIK 2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September 29, 2003
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003
2002
Failure Detection Sequencers: Necessary and Sufficient Information about Failures to Solve Predicate Detection.
Proceedings of the Distributed Computing, 16th International Conference, 2002
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002
Proceedings of the 10th International Workshop on Modeling, 2002
Proceedings of the Formal Aspects of Security, First International Conference, 2002
2001
Proceedings of the Self-Stabilizing Systems, 5th International Workshop, 2001
Proceedings of the Electronic Commerce, Second International Workshop, 2001
Proceedings of the Ausgezeichnete Informatikdissertationen 2001, 2001
2000
J. Exp. Theor. Artif. Intell., 2000
Proceedings of the 19th IEEE Symposium on Reliable Distributed Systems, 2000
Correctness Preserving Transformations for the Design of Parallelized Low-Power Systems.
Proceedings of the Informatik 2000, 2000
1999
Transformational Approaches to the Specification and Verification of Fault-Tolerant Systems: Formal Background and Classification.
J. Univers. Comput. Sci., 1999
ACM Comput. Surv., 1999
An exercise in proving convergence through transfer functions.
Proceedings of the 1999 ICDCS Workshop on Self-stabilizing Systems, 1999
Self-stabilizing load distribution for replicated servers on a per-access basis.
Proceedings of the 1999 ICDCS Workshop on Self-stabilizing Systems, 1999
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999
Proceedings of the Informatik '99, 1999
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
1998
Aller Jahre wieder ... Eine fiktive Leidensgeschichte.
Inform. Spektrum, 1998