I am an Associate Professor in the Security and Privacy Research Unit at TU Wien (Technische Universität Wien, formerly known as Vienna University of Technology) heading the Secure Systems Lab (SecLab) in Vienna, Austria. I am also a key researcher at SBA Research, the largest research center in Austria which exclusively addresses information security.
Before that, I was a Postdoc in the Computer Security Group (SecLab) at UC Santa Barbara, working with Christopher Kruegel and Giovanni Vigna. I received my doctorate in 2016 with honors of the Austrian president (Promotio Sub Auspiciis Praesidentis), as well as the ERCIM Cor Baayen Young Researcher Award in 2018, the Hedy Lamarr Award from the City of Vienna in 2019, and the ACM Early Career Award for Women in Cybersecurity Research (CyberW) in 2020. During my PhD, I was advised by Edgar Weippl and worked as a research assistant at the International Secure Systems Lab (iSecLab).
In addition to my PhD, I hold a Master's degree in Software Engineering and Internet Computing from TU Wien and a Bachelor's degree in Computer and Media Security from the University of Applied Sciences in Hagenberg.
My research focuses on systems security and privacy, in particular the analysis of mobile apps, and all things malware analysis.
2024 | |
Sep 1 | Marco Squarcina and me are looking for a Postdoc on the intersection of web and mobile security. Ping us for details and expressions of interest. |
Apr 18 | We officially kicked off the new TU Wien Cybersecurity Center (CySec). Follow our activities at https://cysec.wien. |
Mar 13 | I had the honor to participate in a Dagstuhl Seminar on the EU Cyber Resilience Act: Socio-Technical and Research Challenges. Many thanks to the organizers for the comprehensive report! |
Jan 12 | Our textbook Introduction to Digital Humanism is now available. Excited to contribute a chapter on The Threat of Surveillance and the Need for Privacy Protections. |
2023 | |
Nov 26 | It was my pleasure to give a behind-the-scenes look on our ACM CCS'23 IoTFlow paper and participate in a panel on decision-making in security career planning at the co-located iMentor workshop. |
Oct 1 | Had a lovely time discussing the importance of privacy and challenging open questions with Walter Palmetshofer (filling in for Barbara Wimmer) at the Vienna Humanities Festival. |
Sep 1 | Happy to announce that I received tenure and am now an Associate Professor at TU Wien! |
Aug 8 | Honored to be recognized as one of the 10 N2Women: Rising Stars in Computer Networking and Communications! |
2022 | |
Oct 1 | Welcome Magdalena Steinböck! She just defended her Master thesis and will continue working on iOS vs. Android security and privacy as part of the FWF-funded SpyCode project. |
Apr 4 | Huge thank you to Christiane Noll for interviewing and featuring me in her book IT-Girls: Wie Frauen die digitale Welt prägen on Austrian role models in tech. |
Feb 11 | Honored be featured among other 100 inspiring role models in the Women4Cyber book "Hacking Gender Barriers: Europe’s Top Cyber Women”. |
2021 | |
Oct 1 | Welcome Carlotta Tagliaro! She will be working on IoT security and privacy as part of a WWTF-funded project. |
Sep 24 | The final week of our workshop on Digital Competences for the Austrian Parlament ended with a session on privacy, and a great discussion on the challenges and opportunities of digit(al)ization. |
Jul 6 | It was my great pleasure to give an introduction on security as part of a workshop on Digital Competences for the Austrian Parlament. |
Jul 1 | Welcome David Schmidt! He just defended his Masters thesis and will continue working on IoT security and privacy as part of a WWTF-funded project. |
Jun 1 | Welcome Aakanksha Saha! She just joined the SecInt doctoral college to work on machine learning for the detection of malicious and privacy-invasive behavior. |
Apr 22 | Happy Girls in ICT Day! To mark the occasion we organized a round of virtual Speedmentoring. Thanks to all the participants and role models! |
2020 | |
Oct 16 | TU Wien took part in the EU Code Week and organized a Week #4GoodAI, including a Hackathon and virtual Speedmentoring for school classes. |
Aug 27 | Jürgen Cito and me are looking for a student employee for a Master thesis at the intersection of software engineering and security. |
Jul 29 | I have 3 open positions for PhD students (2 related to mobile app analysis for IoT + 1 on machine learning for security). Ping me if you are interested! |
Jul 13 | Our Doctoral College for Secure and Intelligent Human-Centric Digital Technologies (SecInt) on the intersection of Security and Privacy, Machine Learning, and Formal Methods has been accepted! |
Jun 10 | Thanks Victoria Kirner for the nice interview (including stylish portraits!) and discussion about rubber boots for C/O Vienna Magazine. |
Apr 2 | I was featured in Die Zeit for their portrait series about Austrians! |
Mar 18 | Honored to receive the Early Career Award for Women in Cybersecurity Research at ACM CyberW. Special thanks to Daphne Yao: as last time at CCS 2017, it was a great workshop that hopefully continues! |
Jan 30 | Had the pleasure to talk to school girls as part of the Tagebuch der Informatikerin (Diary of a Computer Scientist) to clear up common misconceptions and stereotypes about careers in tech. |
Jan 11 | Recent press roundup: I was a guest on the Kleine Zeitung's Startgepräch Podcast, as well as got the chance to talk to Der Standard and Die Presse about my research and my career path. |
2019 | |
Nov 5 | Honored to receive this years Hedy Lamarr Award from the City of Vienna. Looking forward to being part of this network of innovative female researchers in computer science! |
Oct 15 | It was my honor and pleasure to be this years' keynote speaker at the finals of the European Cyber Security Challenge. Awesome and impactful initiative to follow at https://ecsc.eu! |
Oct 1 | Welcome to my first official PhD student Jakob Bleier, who will be working with me on mobile security and privacy topics! |
Jan 8 | Thanks Florian Aigner @ TU Wien for the nice profile about me and my research! |
2018 | |
Oct 9 | I am honored to receive the 2018 ERCIM Cor Baayen Young Researcher Award. |
Aug 6 | Rampage received a Pwnie nomination for Best Privilege Escalation Bug. |
Jun 19 | I am excited to officially announce that I will join TU Wien as an Assistant Professor (tenure track) in October. |
Marco Squarcina and me are looking for a Postdoc for our WWTF-funded project Fixing the Broken Bridge Between Mobile Apps and the Web, ideally with a background in static program analysis, but we are welcoming candidates in all areas related to web and mobile security. To get an idea about this project, take a look at our IEEE S&P'24 paper on CustomTabs and reach out to us if you have any questions!
Program Committee Member
External Reviewer
Journal Reviewer (excerpt)
Guest Editor
@inproceedings{backends:raid2024, title = {{Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols}}, author = {Tagliaro, Carlotta and Komsic, Martina and Continella, Andrea and Borgolte, Kevin and Lindorfer, Martina}, booktitle = {Proceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)}, location = {Padua, Italy}, year = {2024}, doi = {10.1145/3678890.3678899} }
@inproceedings{adapt:raid2024, title = {{ADAPT it! Automating APT Campaign and Group Attribution by Leveraging and Linking Heterogeneous Files}}, author = {Saha, Aakanksha and Blasco, Jorge and Cavallaro, Lorenzo and Lindorfer, Martina}, booktitle = {Proceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)}, location = {Padua, Italy}, year = {2024}, doi = {10.1145/3678890.3678909} }
@inproceedings{maldocs:worma2024, title = {{Exploring the Malicious Document Threat Landscape: Towards a Systematic Approach to Detection and Analysis}}, author = {Saha, Aakanksha and Blasco, Jorge and Lindorfer, Martina}, booktitle = {Proceedings of the 3rd Workshop on Rethinking Malware Analysis (WoRMA)}, location = {Vienna, Austria}, year = {2024}, doi = {10.1109/EuroSPW61312.2024.00065} }
@inproceedings{disclosure:wtmc2024, title = {{Are You Sure You Want To Do Coordinated Vulnerability Disclosure?}}, author = {Chen, Ting-Han and Tagliaro, Carlotta and Lindorfer, Martina and Borgolte, Kevin and van der Ham-de Vos, Jeroen}, booktitle = {Proceedings of the 9th International Workshop on Traffic Measurements for Cybersecurity (WTMC)}, location = {Vienna, Austria}, year = {2024}, doi = {10.1109/EuroSPW61312.2024.00039} }
@inproceedings{c2miner:asiaccs2024, title = {{C2Miner: Tricking IoT Malware into Revealing Live Command \& Control Servers}}, author = {Davanian, Ali and Faloutsos, Michalis and Lindorfer, Martina}, booktitle = {Proceedings of the 19th ACM ASIA Conference on Computer and Communications Security (ASIACCS)}, location = {Singapore, Singapore}, year = {2024}, doi = {10.1145/3634737.3644992} }
@inproceedings{customtabs:oakland2024, title = {{Tabbed Out: Subverting the Android Custom Tab Security Model}}, author = {Beer, Philipp and Squarcina, Marco and Veronese, Lorenzo and Lindorfer, Martina}, booktitle = {Proceedings of the 45th IEEE Symposium on Security and Privacy (S\&P)}, location = {San Francisco, CA, USA}, year = {2024}, doi = {10.1109/SP54263.2024.00105} }
@inproceedings{xplatformapps:msr2024, title = {{Comparing Apples to Androids: Discovery, Retrieval, and Matching of iOS and Android Apps for Cross-Platform Analyses}}, author = {Steinböck, Magdalena and Bleier, Jakob and Rainer, Mikka and Urban, Tobias and Utz, Christine and Lindorfer, Martina}, booktitle = {Proceedings of the 21st IEEE/ACM International Conference on Mining Software Repositories (MSR)}, location = {Lisbon, Portugal}, year = {2024}, doi = {10.1145/3643991.3644896} }
@inbook{privacy:digihumtextbook2024, title = {{The Threat of Surveillance and the Need for Privacy Protections}}, author = {Lindorfer, Martina}, booktitle = {Introduction to Digital Humanism: A Textbook}, editor = {Werthner, Hannes and Ghezzi, Carlo and Kramer, Jeff and Nida-Rümelin, Julian and Nuseibeh, Bashar and Prem, Erich and Stanger, Allison}, publisher = {Springer Nature Switzerland}, pages = {593--609}, year = {2024}, isbn = {978-3-031-45304-5}, doi = {10.1007/978-3-031-45304-5_37} }
@inproceedings{iotflow:ccs2023, title = {{IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis}}, author = {Schmidt, David and Tagliaro, Carlotta and Borgolte, Kevin and Lindorfer, Martina}, booktitle = {Proceedings of the 30th ACM SIGSAC Conference on Computer and Communications Security (CCS)}, location = {Copenhagen, Denmark}, year = {2023}, doi = {10.1145/3576915.3623211} }
@inproceedings{cloudheads:pets2023, title = {{Heads in the Clouds? Measuring Universities' Migration to Public Clouds: Implications for Privacy \& Academic Freedom}}, author = {Fiebig, Tobias and Gürses, Seda and Gañán, Carlos H. and Kotkam, Erna and Kuipers, Fernando and Lindorfer, Martina and Prisse, Menghua and Sari, Taritha}, booktitle = {Proceedings of the 23rd Privacy Enhancing Technologies Symposium (PETS)}, location = {Lausanne, Switzerland}, year = {2023}, doi = {10.56553/popets-2023-0044} }
@inproceedings{mobrowseres:pets2023, title = {{Not Your Average App: A Large-scale Privacy Analysis of Android Browsers}}, author = {Pradeep, Amogh and Feal, Álvaro and Gamba, Julien and Rao, Ashwin and Lindorfer, Martina and Vallina-Rodriguez, Narseo and Choffnes, David}, booktitle = {Proceedings of the 23rd Privacy Enhancing Technologies Symposium (PETS)}, location = {Lausanne, Switzerland}, year = {2023}, doi = {10.56553/popets-2023-0003} }
@inproceedings{oatmeal:eurosec2023, title = {{Of Ahead Time: Evaluating Disassembly of Android Apps Compiled to Binary OATs Through the ART}}, author = {Bleier, Bleier and Lindorfer, Martina}, booktitle = {Proceedings of the 16th European Workshop on Systems Security (EuroSec)}, location = {Rome, Italy}, year = {2023}, doi = {10.1145/3578357.3591219} }
@inproceedings{dotfiles:msr2023, title = {{Connecting the .dotfiles: Checked-In Secret Exposure with Extra (Lateral Movement) Steps}}, author = {Jungwirth, Gerhard and Saha, Aakanksha and Schröder, Michael and Fiebig, Tobias and Lindorfer, Martina and Cito, Jürgen}, booktitle = {Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories (MSR)}, location = {Melbourne, Australia}, year = {2023}, doi = {10.1109/MSR59073.2023.00051} }
@inproceedings{bttfwhois:pam2023, title = {{Back-to-the-Future Whois: An IP Address Attribution Service for Working with Historic Datasets}}, author = {Streibelt, Florian and Lindorfer, Martina and Gürses, Seda and Gañán, Carlos H.. and Fiebig, Tobias}, booktitle = {Proceedings of the 24th Passive and Active Measurement Conference (PAM)}, year = {2023}, doi = {10.1007/978-3-031-28486-1_10} }
@inproceedings{hbbtv:laser2023, title = {{Investigating HbbTV Privacy Invasiveness Across European Countries}}, author = {Tagliaro, Carlotta and Hahn, Florian and Sepe, Riccardo and Aceti, Alessio and Lindorfer, Martina}, booktitle = {Proceedings of the Workshop on Learning from Authoritative Security Experiment Results (LASER)}, location = {San Diego, CA, USA}, year = {2023}, doi = {10.14722/laser-ndss.2023.24102} }
@inproceedings{hbbtv:ndss2023, title = {{I Still Know What You Watched Last Sunday: Security and Privacy of the HbbTV Protocol in the European Smart TV Landscape}}, author = {Tagliaro, Carlotta and Hahn, Florian and Sepe, Riccardo and Aceti, Alessio and Lindorfer, Martina}, booktitle = {Proceedings of the 30th Network and Distributed System Security Symposium (NDSS)}, location = {San Diego, CA, USA}, year = {2023}, doi = {10.14722/ndss.2023.24102} }
@article{signals:tse2023, title = {{Mixed Signals: Analyzing Software Attribution Challenges in the Android Ecosystem}}, author = {Hageman, Kaspar and Feal, Álvaro and Gamba, Julien and Girish, Aniketh and Bleier, Jakob and Lindorfer, Martina and Tapiador, Juan and Vallina-Rodriguez, Narseo}, journal = {IEEE Transactions on Software Engineering}, volume = {49}, number = {4}, month = {April}, year = {2023}, doi = {10.1109/TSE.2023.3236582} }
@article{cloudheads:psj2022, title = {{Position Paper: Escaping Academic Cloudification to Preserve Academic Freedom}}, author = {Fiebig, Tobias and Gürses, Seda and Lindorfer, Martina}, journal = {Privacy Studies Journal}, volume = {1}, number = {1}, month = {December}, year = {2022}, doi = {10.7146/psj.vi.132713} }
@inproceedings{pinning:imc2022, title = {{A Comparative Analysis of Certificate Pinning in Android \& iOS}}, author = {Pradeep, Amogh and Paracha, Muhammad Talha and Bhowmick, Protick and Davanian, Ali and Razaghpanah, Abbas and Chung, Taejoong and Lindorfer, Martina and Vallina-Rodriguez, Narseo and Levin, Dave and Choffnes, David}, booktitle = {Proceedings of the 22nd ACM Internet Measurement Conference (IMC)}, location = {Nice, France}, year = {2022}, doi = {10.1145/3517745.3561439} }
@inproceedings{stalkerware:soups2022, title = {{Comparing User Perceptions of Anti-Stalkerware Apps with the Technical Reality}}, author = {Fassl, Matthias and Anell, Simon and Houy, Sabine and Lindorfer, Martina and Krombholz, Katharina}, booktitle = {Proceedings of the USENIX Symposium on Usable Privacy and Security (SOUPS)}, location = {Boston, MA, USA}, year = {2022}, url = {https://www.usenix.org/conference/soups2022/presentation/fassl} }
@inproceedings{email:atc2022, title = {{Not that Simple: Email Delivery in the 21st Century}}, author = {Holzbauer, Florian and Ullrich, Johanna and Lindorfer, Martina and Fiebig, Tobias}, booktitle = {Proceedings of the USENIX Annual Technical Conference (ATC)}, location = {Carlsbad, CA, USA}, year = {2022}, url = {https://www.usenix.org/conference/atc22/presentation/holzbauer} }
@inproceedings{iotmw:asiaccs2022, title = {{No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static \& Dynamic Analysis}}, author = {Al Alsadi, Arwa Abdulkarim and Sameshima, Kaichi and Bleier, Jakob and Yoshioka, Katsunari and Lindorfer, Martina and Van Eeten, Michel and Gañán, Carlos Hernandez}, booktitle = {Proceedings of the 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS)}, location = {Nagasaki, Japan}, year = {2022}, doi = {10.1145/3488932.3517408} }
@misc{customtabs:secweb2022, title = {{The Bridge between Web Applications and Mobile Platforms is Still Broken}}, author = {Beer, Philipp and Veronese, Lorenzo and Squarcina, Marco and Lindorfer, Martina}, booktitle = {3rd IEEE Workshop on Designing Security for the Web (SecWeb)}, location = {San Francisco, CA, USA}, year = {2022} }
@misc{oatmeal:oakland2022:poster, title = {{POSTER: ART-assisted Android App Diffing}}, author = {Bleier, Jakob and Lindorfer, Martina}, booktitle = {43rd IEEE Symposium on Security and Privacy (S\&P)}, location = {San Francisco, CA, USA}, year = {2022} }
@inproceedings{tarnhelm:checkmate2021, title = {{Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM’s TrustZone}}, author = {Quarta, Davide and Ianni, Michele and Machiry, Aravind and Fratantonio, Yanick and Gustafson, Eric and Balzarotti, Davide and Lindorfer, Martina and Vigna, Giovanni and Kruegel, Christopher}, booktitle = {Proceedings of the 1st Workshop on Research on offensive and defensive techniques in the Context of Man At The End Attacks (CheckMATE)}, location = {Seoul, South Korea}, year = {2021}, doi = {10.1145/3465413.348857} }
@inproceedings{txting:wtmc2020, title = {{TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records}}, author = {van der Toorn, Olivier and van Rijswijk-Deij, Roland and Fiebig, Tobias and Lindorfer, Martina and Sperotto, Anna}, booktitle = {Proceedings of the 5th International Workshop on Traffic Measurements for Cybersecurity (WTMC)}, location = {Genoa, Italy}, year = {2020}, doi = {10.1109/EuroSPW51379.2020.00080} }
@inproceedings{flowprint:ndss2020, title = {{FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic}}, author = {van Ede, Thijs and Bortolameotti, Riccardo and Continella, Andrea and Ren, Jingjing and Dubois, Daniel J. and Lindorfer, Martina and Choffnes, David and van Steen, Marten and Peter, Andreas}, booktitle = {Proceedings of the 27th Network and Distributed System Security Symposium (NDSS)}, location = {San Diego, CA, USA}, year = {2020}, doi = {10.14722/ndss.2020.24412} }
@inproceedings{packware:ndss2020, title = {{When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features}}, author = {Aghakhani, Hojjat and Gritti, Fabio and Mecca, Francesco and Lindorfer, Martina and Ortolani, Stefano and Balzarotti, Davide and Vigna, Giovanni and Kruegel, Christopher}, booktitle = {Proceedings of the 27th Network and Distributed System Security Symposium (NDSS)}, location = {San Diego, CA, USA}, year = {2020}, doi = {10.14722/ndss.2020.24310} }
@inproceedings{minesweeper:ccs2018, title = {{MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense}}, author = {Konoth, Radhesh Krishnan and Vineti, Emanuele and Moonsamy, Veelasha and Lindorfer, Martina and Kruegel, Christopher and Bos, Herbert and Vigna, Giovanni}, booktitle = {Proceedings of the 25th ACM SIGSAC Conference on Computer and Communications Security (CCS)}, location = {Toronto, Canada}, year = {2018}, doi = {10.1145/3243734.3243858} }
@inproceedings{panoptispy:pets2018, title = {{Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications}}, author = {Pan, Elleen and Ren, Jingjing and Lindorfer, Martina and Wilson, Christo and Choffnes, David}, booktitle = {Proceedings of the 18th Privacy Enhancing Technologies Symposium (PETS)}, location = {Barcelona, Spain}, year = {2018}, doi = {10.1515/popets-2018-0030} }
@inproceedings{guardion:dimva2018, title = {{GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM}}, author = {van der Veen, Victor and Lindorfer, Martina and Fratantonio, Yanick and Padmanabha Pillai, Harikrishnan and Vigna, Giovanni and Kruegel, Christopher and Bos, Herbert and Razavi, Kaveh}, booktitle = {Proceedings of the 15th Conference on Detection of Intrusions and Malware \& Vulnerability Assessment (DIMVA)}, location = {Saclay, France}, year = {2018}, doi = {10.1007/978-3-319-93411-2_5} }
@inproceedings{appversions:ndss2018, title = {{Bug Fixes, Improvements, ... and Privacy Leaks -- A Longitudinal Study of PII Leaks Across Android App Versions}}, author = {Ren, Jingjing and Lindorfer, Martina and Dubois, Daniel and Rao, Ashwin and Choffnes, David and Vallina-Rodriguez, Narseo}, booktitle = {Proceedings of the 25th Network and Distributed System Security Symposium (NDSS)}, location = {San Diego, CA, USA}, year = {2018}, doi = {10.14722/ndss.2018.23143} }
@inproceedings{agrigento:ndss2017, title = {{Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis}}, author = {Continella, Andrea and Fratantonio, Yanick and Lindorfer, Martina and Puccetti, Alessandro and Zand, Ali and Kruegel, Christopher and Vigna, Giovanni}, booktitle = {Proceedings of the 24th Network and Distributed System Security Symposium (NDSS)}, location = {San Diego, CA, USA}, year = {2017}, doi = {10.14722/ndss.2017.23465} }
@inproceedings{drammer:ccs2016, title = {{Drammer: Deterministic Rowhammer Attacks on Mobile Platforms}}, author = {van der Veen, Victor and Fratantonio, Yanick and Lindorfer, Martina and Gruss, Daniel and Maurice, Clémentine and Vigna, Giovanni and Bos, Herbert and Razavi, Kaveh and Giuffrida, Cristiano}, booktitle = {Proceedings of the 23rd ACM SIGSAC Conference on Computer and Communications Security (CCS)}, location = {Vienna, Austria}, year = {2016}, doi = {10.1145/2976749.2978406} }
@inproceedings{recon:mobisys2016, author = {Ren, Jingjing and Rao, Ashwin and Lindorfer, Martina and Legout, Arnaud and Choffnes, David}, title = {{ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic}}, booktitle = {Proceedings of the 14th Annual International Conference on Mobile Systems, Applications and Services (MobiSys)}, location = {Singapore, Singapore}, year = {2016}, doi = {10.1145/2906388.2906392} }
@inproceedings{curiousdroid:fc2016, title = {{CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes}}, author = {Carter, Patrick and Mulliner, Collin and Lindorfer, Martina and Robertson, William and Kirda, Engin}, booktitle = {Proceedings of the 20th International Conference on Financial Cryptography and Data Security (FC)}, location = {Christ Church, Barbados}, year = {2016}, doi = {10.1007/978-3-662-54970-4_13} }
@inproceedings{marvin:compsac2015, title = {{Marvin: Efficient and Comprehensive Mobile App Classification Through Static and Dynamic Analysis}}, author = {Lindorfer, Martina and Neugschwandtner, Matthias and Platzer, Christian}, booktitle = {Proceedings of the IEEE 39th Annual International Computers, Software \& Applications Conference (COMPSAC)}, location = {Taichung, Taiwan}, year = {2015}, doi = {10.1109/COMPSAC.2015.103} }
@inproceedings{andrubis:badgers2014, title = {{Andrubis - 1,000,000 Apps Later: A View on Current Android Malware Behaviors}}, author = {Lindorfer, Martina and Neugschwandtner, Matthias and Weichselbaum, Lukas and Fratantonio, Yanick and van der Veen, Victor and Platzer, Christian}, booktitle = {Proceedings of the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)}, location = {Wroclaw, Poland}, year = {2014}, doi = {10.1109/BADGERS.2014.7} }
@techreport{andrubis:tr2014, title = {{Andrubis: Android Malware Under The Magnifying Glass}}, author = {Weichselbaum, Lukas and Neugschwandtner, Matthias and Lindorfer, Martina and Fratantonio, Yanick and van der Veen, Victor and Platzer, Christian}, institution = {Vienna University of Technology}, number = {TR-ISECLAB-0414-001}, year = {2014} }
@inproceedings{andradar:dimva2014, title = {{AndRadar: Fast Discovery of Android Applications in Alternative Markets}}, author = {Lindorfer, Martina and Volanis, Stamatis and Sisto, Alessandro and Neugschwandtner, Matthias and Athanasopoulos, Elias and Maggi, Federico and Platzer, Christian and Zanero, Stefano and Ioannidis, Sotiris}, booktitle = {Proceedings of the 11th Conference on Detection of Intrusions and Malware \& Vulnerability Assessment (DIMVA)}, location = {Egham, UK}, year = {2014}, doi = {10.1007/978-3-319-08509-8_4} }
@inproceedings{skinsheriff:sfcs2014, title = {{Skin Sheriff: A Machine Learning Solution for Detecting Explicit Images}}, author = {Platzer, Christian and Stuetz, Martin and Lindorfer, Martina}, booktitle = {Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems (ASIACCS-SFCS)}, location = {Kyoto, Japan}, year = {2014}, doi = {10.1145/2598918.2598920} }
@inproceedings{sandboxcomparison:most2014, title = {{Enter Sandbox: Android Sandbox Comparison}}, author = {Neuner, Sebastian and van der Veen, Victor and Lindorfer, Martina and Huber, Markus and Merzdovnik, Georg and Mulazzani, Martin and Weippl, Edgar}, booktitle = {Proceedings of the 3rd Workshop on Mobile Security Technologies (MoST)}, location = {San Jose, CA, USA}, year = {2014} }
@inproceedings{macmal:icics2013, title = {{Take a Bite - Finding the Worm in the Apple}}, author = {Lindorfer, Martina and Miller, Bernhard and Neugschwandtner, Matthias and Platzer, Christian}, booktitle = {Proceedings of the 9th International Conference on Information, Communications and Signal Processing (ICICS)}, location = {Tainan, Taiwan}, year = {2013}, doi = {10.1109/ICICS.2013.6782846} }
@misc{xplatform:ccs2013:poster, title = {{POSTER: Cross-Platform Malware: Write Once, Infect Everywhere}}, author = {Lindorfer, Martina and Neumayr, Matthias and Caballero, Juan and Platzer, Christian}, booktitle = {20th ACM SIGSAC Conference on Computer \& Communications Security}, location = {Berlin, Germany}, year = {2013}, doi = {10.1145/2508859.2512517} }
@inproceedings{webview:leet2013, title = {{A View To A Kill: WebView Exploitation}}, author = {Neugschwandtner, Matthias and Lindorfer, Martina and Platzer, Christian}, booktitle = {Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)}, location = {Washington, D.C. USA}, year = {2013}, url = {https://www.usenix.org/conference/leet13/workshop-program/presentation/neugschwandtner} }
@inproceedings{beagle:acsac2012, title = {{Lines of Malicious Code: Insights Into the Malicious Software Industry}}, author = {Lindorfer, Martina and Di Federico, Alessandro and Maggi, Federico and Milani Comparetti, Paolo and Zanero, Stefano}, booktitle = {Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC)}, location = {Orlando, FL, USA}, year = {2012}, doi = {10.1145/2420950.2421001} }
@inproceedings{disarm:raid2011, title = {{Detecting Environment-Sensitive Malware}}, author = {Lindorfer, Martina and Kolbitsch, Clemens and Milani Comparetti, Paolo}, booktitle = {Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection (RAID)}, location = {Menlo Park, CA, USA}, year = {2011}, doi = {10.1007/978-3-642-23644-0_18} }