Martina Lindorfer
Orcid: 0000-0001-7001-4481Affiliations:
- TU Wien, Vienna, Austria
According to our database1,
Martina Lindorfer
authored at least 48 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
ADAPT it! Automating APT Campaign and Group Attribution by Leveraging and Linking Heterogeneous Files.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Comparing Apples to Androids: Discovery, Retrieval, and Matching of iOS and Android Apps for Cross-Platform Analyses.
Proceedings of the 21st IEEE/ACM International Conference on Mining Software Repositories, 2024
Exploring the Malicious Document Threat Landscape: Towards a Systematic Approach to Detection and Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Software Eng., April, 2023
Heads in the Clouds? Measuring Universities' Migration to Public Clouds: Implications for Privacy & Academic Freedom.
Proc. Priv. Enhancing Technol., April, 2023
Proc. Priv. Enhancing Technol., January, 2023
Back-to-the-Future Whois: An IP Address Attribution Service for Working with Historic Datasets.
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023
I Still Know What You Watched Last Sunday: Privacy of the HbbTV Protocol in the European Smart TV Landscape.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Connecting the .dotfiles: Checked-In Secret Exposure with Extra (Lateral Movement) Steps.
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023
Of Ahead Time: Evaluating Disassembly of Android Apps Compiled to Binary OATs Through the ART.
Proceedings of the 16th European Workshop on System Security, 2023
IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
CoRR, 2022
Proceedings of the 2022 USENIX Annual Technical Conference, 2022
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Proceedings of the 22nd ACM Internet Measurement Conference, 2022
No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Heads in the Clouds: Measuring the Implications of Universities Migrating to Public Clouds.
CoRR, 2021
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone.
Proceedings of the Checkmate@CCS 2021, 2021
2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
2018
Proc. Priv. Enhancing Technol., 2018
Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
2016
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016
CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes.
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
2014
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems, 2014
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014
2013
Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 9th International Conference on Information, 2013
2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011