Marc Ohm

Orcid: 0000-0002-2913-5270

According to our database1, Marc Ohm authored at least 15 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
You Can Run But You Can't Hide: Runtime Protection Against Malicious Package Updates For Node.js.
Proceedings of the Sicherheit, 2024

Using Pre-trained Transformers to Detect Malicious Source Code Within JavaScript Packages.
Proceedings of the 54. Jahrestagung der Gesellschaft für Informatik, 2024

Towards Robust, Explainable, and Privacy-Friendly Sybil Detection.
Proceedings of the 2024 Workshop on Artificial Intelligence and Security, 2024

Assessing the Impact of Large Language Models on Cybersecurity Education: A Study of ChatGPT's Influence on Student Performance.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
You Can Run But You Can't Hide: Runtime Protection Against Malicious Package Updates For Node.js.
CoRR, 2023

Measuring Resource Efficiency of LATEX Paper Templates.
Proceedings of the 37th International Conference on Informatics for Environmental Protection, 2023

Power Consumption of Common Symmetric Encryption Algorithms on Low-Cost Microchips.
Proceedings of the 37th International Conference on Informatics for Environmental Protection, 2023

SoK: Practical Detection of Software Supply Chain Attacks.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
On the Feasibility of Supervised Machine Learning for the Detection of Malicious Software Packages.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2020
If You've Seen One, You've Seen Them All: Leveraging AST Clustering Using MCL to Mimic Expertise to Detect Software Supply Chain Attacks.
CoRR, 2020

Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

An investigation on the feasibility of the bluetooth frequency hopping mechanism for the use as a covert channel technique.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Towards detection of software supply chain attacks by forensic artifacts.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Automated Pattern Inference Based on Repeatedly Observed Malware Artifacts.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Hunting Observable Objects for Indication of Compromise.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018


  Loading...