Konrad Rieck
Orcid: 0000-0002-5054-8758Affiliations:
- TU Berlin, Germany
- TU Braunschweig, Institute of System Security, Germany (former)
- University of Göttingen, Institute of Computer Science, Germany (former)
According to our database1,
Konrad Rieck
authored at least 125 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on github.com
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., 2024
Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
Hunting for Truth: Analyzing Explanation Methods in Learning-based Vulnerability Discovery.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
Broken Promises: Measuring Confounding Effects in Learning-based Vulnerability Discovery.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023
Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Security and Privacy, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2021
Proc. Priv. Enhancing Technol., 2021
Proceedings of the EuroSec '21: Proceedings of the 14th European Workshop on Systems Security, 2021
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification.
CoRR, 2020
Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the 13th European Workshop on Systems Security, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
Political Elections Under (Social) Fire? Analysis and Detection of Propaganda on Twitter.
CoRR, 2019
CoRR, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
False Sense of Security: A Study on the Effectivity of Jailbreak Detection in Banking Apps.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 26th European Signal Processing Conference, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018
2017
CoRR, 2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the 10th European Workshop on Systems Security, 2017
Proceedings of the 10th European Workshop on Systems Security, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Proc. Priv. Enhancing Technol., 2016
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014
2013
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
A close look on <i>n</i>-grams in intrusion detection: anomaly detection vs. classification.
Proceedings of the AISec'13, 2013
Proceedings of the AISec'13, 2013
Proceedings of the AISec'13, 2013
2012
Prax. Inf.verarb. Kommun., 2012
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
J. Comput. Secur., 2011
Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine Learning.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011
Proceedings of the Seventh European Conference on Computer Network Defense, 2011
Proceedings of the First SysSec Workshop 2011, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the Sicherheit 2010: Sicherheit, 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the Privacy and Security Issues in Data Mining and Machine Learning, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009
2008
J. Mach. Learn. Res., 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the Principles, 2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
Proceedings of the Detection of Intrusions and Malware, 2008
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008
2007
J. Comput. Virol., 2007
Proceedings of the Mining Massive Data Sets for Security, 2007
2006
Computation of Similarity Measures for Sequential Data using Generalized Suffix Trees.
Proceedings of the Advances in Neural Information Processing Systems 19, 2006
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006
Efficient Algorithms for Similarity Measures over Sequential Data: A Look Beyond Kernels.
Proceedings of the Pattern Recognition, 2006
2005
Proceedings of the Sicherheit 2005: Sicherheit, 2005
Proceedings of the Image Analysis and Processing, 2005