Martina Lindorfer

Orcid: 0000-0001-7001-4481

Affiliations:
  • TU Wien, Vienna, Austria


According to our database1, Martina Lindorfer authored at least 48 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Introduction to the ACSAC'22 Special Issue.
DTRAP, 2024

Tabbed Out: Subverting the Android Custom Tab Security Model.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

ADAPT it! Automating APT Campaign and Group Attribution by Leveraging and Linking Heterogeneous Files.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

Comparing Apples to Androids: Discovery, Retrieval, and Matching of iOS and Android Apps for Cross-Platform Analyses.
Proceedings of the 21st IEEE/ACM International Conference on Mining Software Repositories, 2024

Exploring the Malicious Document Threat Landscape: Towards a Systematic Approach to Detection and Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

Are You Sure You Want To Do Coordinated Vulnerability Disclosure?
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

C2Miner: Tricking IoT Malware into Revealing Live Command & Control Servers.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Mixed Signals: Analyzing Software Attribution Challenges in the Android Ecosystem.
IEEE Trans. Software Eng., April, 2023

Heads in the Clouds? Measuring Universities' Migration to Public Clouds: Implications for Privacy & Academic Freedom.
Proc. Priv. Enhancing Technol., April, 2023

Not Your Average App: A Large-scale Privacy Analysis of Android Browsers.
Proc. Priv. Enhancing Technol., January, 2023

Back-to-the-Future Whois: An IP Address Attribution Service for Working with Historic Datasets.
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023

I Still Know What You Watched Last Sunday: Privacy of the HbbTV Protocol in the European Smart TV Landscape.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Connecting the .dotfiles: Checked-In Secret Exposure with Extra (Lateral Movement) Steps.
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023

Of Ahead Time: Evaluating Disassembly of Android Apps Compiled to Binary OATs Through the ART.
Proceedings of the 16th European Workshop on System Security, 2023

IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Introduction to the ACSAC'20 Special Issue.
DTRAP, 2022

We have to go back: A Historic IP Attribution Service for Network Measurement.
CoRR, 2022

Not that Simple: Email Delivery in the 21st Century.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

Comparing User Perceptions of Anti-Stalkerware Apps with the Technical Reality.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

A comparative analysis of certificate pinning in Android & iOS.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Introduction to the ACSAC'19 Special Issue - Vol. 2.
DTRAP, 2021

Heads in the Clouds: Measuring the Implications of Universities Migrating to Public Clouds.
CoRR, 2021

Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone.
Proceedings of the Checkmate@CCS 2021, 2021

2020
FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2018
Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications.
Proc. Priv. Enhancing Technol., 2018

Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
Demo: ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes.
Proceedings of the Financial Cryptography and Data Security, 2016

Drammer: Deterministic Rowhammer Attacks on Mobile Platforms.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
ReCon: Revealing and Controlling Privacy Leaks in Mobile Network Traffic.
CoRR, 2015

MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
Enter Sandbox: Android Sandbox Comparison.
CoRR, 2014

AndRadar: Fast Discovery of Android Applications in Alternative Markets.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

Skin sheriff: a machine learning solution for detecting explicit images.
Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems, 2014

ANDRUBIS - 1, 000, 000 Apps Later: A View on Current Android Malware Behaviors.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

2013
A View to a Kill: WebView Exploitation.
Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2013

Cross-platform malware: write once, infect everywhere.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Take a bite - Finding the worm in the Apple.
Proceedings of the 9th International Conference on Information, 2013

2012
Lines of malicious code: insights into the malicious software industry.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Detecting Environment-Sensitive Malware.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011


  Loading...