Manuel Leithner

Orcid: 0000-0001-9433-1668

According to our database1, Manuel Leithner authored at least 35 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
State of the CArt: evaluating covering array generators at scale.
Int. J. Softw. Tools Technol. Transf., June, 2024

On Combinatorial Security Testing for the Tor Anonymity Network Client.
Proceedings of the IEEE International Conference on Software Testing, Verification and Validation, ICST 2024, 2024

Combinatorial Testing Methods for Reverse Engineering Undocumented CAN Bus Functionality.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Applying Pairwise Combinatorial Testing to Large Language Model Testing.
Proceedings of the Testing Software and Systems, 2023

Combinatorial Methods for HTML Sanitizer Security Testing.
Proceedings of the IEEE International Conference on Software Testing, Verification and Validation, ICST 2023, 2023

Summary of Combinatorial Methods for Dynamic Gray-Box SQL Injection Testing.
Proceedings of the IEEE International Conference on Software Testing, Verification and Validation, ICST 2023, 2023

2022
Combinatorial methods for dynamic gray-box SQL injection testing.
Softw. Test. Verification Reliab., 2022

A Two-Step TLS-Based Browser fingerprinting approach using combinatorial sequences.
Comput. Secur., 2022

Developing multithreaded techniques and improved constraint handling for the tool CAgen.
Proceedings of the 15th IEEE International Conference on Software Testing, 2022

CA<sup>2</sup>: Practical Archival and Compression of Covering Arrays.
Proceedings of the 15th IEEE International Conference on Software Testing, 2022

2021
HYDRA: Feedback-driven black-box exploitation of injection vulnerabilities.
Inf. Softw. Technol., 2021

Combinatorially XSSing Web Application Firewalls.
Proceedings of the 14th IEEE International Conference on Software Testing, 2021

2020
Sliced AETG: a memory-efficient variant of the AETG covering array generation algorithm.
Optim. Lett., 2020

XIEv: dynamic analysis for crawling and modeling of web applications.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

2019
Problems and algorithms for covering arrays via set covers.
Theor. Comput. Sci., 2019

Testing TLS using planning-based combinatorial methods and execution framework.
Softw. Qual. J., 2019

A Fault-Driven Combinatorial Process for Model Evolution in XSS Vulnerability Detection.
Proceedings of the Advances and Trends in Artificial Intelligence. From Theory to Practice, 2019

Applying Combinatorial Testing to Large-Scale Data Processing at Adobe.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

Practical Combinatorial Testing for XSS Detection using Locally Optimized Attack Models.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

Automated combinatorial testing for detecting SQL vulnerabilities in web applications.
Proceedings of the 14th International Workshop on Automation of Software Test, 2019

2018
DOMdiff: Identification and Classification of Inter-DOM Modifications.
Proceedings of the 2018 IEEE/WIC/ACM International Conference on Web Intelligence, 2018

CAMETRICS: A Tool for Advanced Combinatorial Analysis and Measurement of Test Sets.
Proceedings of the 2018 IEEE International Conference on Software Testing, 2018

2014
Covert Computation - Hiding code in code through compile-time obfuscation.
Comput. Secur., 2014

2013
Covert computation: hiding code in code for obfuscation purposes.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Enterprise Security for the Executive.
Comput. Secur., 2012

Low Tech Hacking.
Comput. Secur., 2012

XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts.
Comput. Secur., 2012

Thor's Microsoft Security Bible.
Comput. Secur., 2012

Coding for Penetration Testers.
Comput. Secur., 2012

Android forensics.
Comput. Secur., 2012

Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

A comparison of Web service technologies for smart meter data exchange.
Proceedings of the 3rd IEEE PES Innovative Smart Grid Technologies Europe, 2012

2011
Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.
Proceedings of the 20th USENIX Security Symposium, 2011

Social snapshots: digital forensics for online social networks.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010


  Loading...