Martina Lindorfer

General Information

I am an Assistant Professor in the Security and Privacy group at the Institute of Logic and Computation at TU Wien (formerly known as Vienna University of Technology). Before that, I was a Postdoc in the Computer Science Department at UC Santa Barbara with Christopher Kruegel and Giovanni Vigna. I received my PhD from TU Wien, where I worked at the International Secure Systems Lab (iSecLab) and was supervised by Edgar Weippl. I also received a Master's degree in Software Engineering and Internet Computing from TU Wien and a Bachelor's degree in Computer and Media Security from the University of Applied Sciences in Hagenberg.

During my PhD studies I have also been a researcher at SBA Research and took part in several research exchanges: From January to May 2013 I visited the National Institute of Informatics (NII) in Tokyo. In November 2013 I visited FORTH-ICS in Crete. Most recently, I was a visiting researcher at the Systems Security Lab at Northeastern University in Boston from October 2014 to April 2015.

Finally, I was one of the recipients of the Google Anita Borg Memorial Scholarship for Europe, the Middle East and Africa in 2012.

You can download a copy of my CV here.

Research Interests

My main research interests are dynamic malware analysis, and mobile security and privacy. During my PhD, I worked on mobile malware analysis and was involved in the development and maintenance of Andrubis, which was the extension to Anubis for analyzing Android apps.

Currently, I am contributing to Drammer, the first attack that exploits the Rowhammer hardware vulnerability on Android devices. Furthermore, I am contributing to ReCon, a service for detecting and blocking private information leaks in mobile app traffic. Click here to see a list of data leaks ReCon found in iOS, Android, and Windows Phone apps.

Contact

mlindorfer (at) iseclab (dot) org
Technische Universität Wien
Institute of Logic and Computation (192/6)
Abteilung für Security & Privacy
Favoritenstrasse 9-11, Stiege 2, 1. Stock
A-1040 Wien

News

October 9, 2018 I am honored to receive the 2018 ERCIM Cor Baayen Young Researcher Award.
August 6, 2018 Rampage received a Pwnie nomination for Best Privilege Escalation Bug.
June 19, 2018 I am excited to officially announce that I will join TU Wien as an Assistant Professor (Tenure Track) in October.
November 11, 2017 Drammer received the Best Paper Award at the CSAW'17 Applied Research Competition.
October 2, 2017 I am excited to be selected as a mentor for Learn IT, Girl, a program that helps women around the globe to learn how to code.
July 26, 2017 Drammer received a Pwnie Award for Best Privilege Escalation Bug and was also nominated for Most Innovative Research.
May 20, 2017 I was interviewed by the Austrian daily newspaper Kurier on why more women should study computer science (print and online).
May 16, 2017 I am honored to be awarded my doctorate degree in a Promotio Sub Auspiciis Praesidentis (press release by TU Wien).
April 5, 2017 ReCon was used in the documentary Harvest to raise awareness about privacy risks of mobile apps.
March 21, 2017 Drammer received the Best Dutch Cyber Security Research Paper (DCSRP2017) award.
November 1, 2016 Drammer was recognized by the Android Security Rewards Program (CVE-2016-6728, critical).

Reviewer Service

Program Committee Member

  • USENIX Security Symposium (USENIX Security 2019)
  • ACM ASIA Conference on Computer and Communications Security (ASIACCS 2019)
  • Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2016 , 2017, 2018 & 2019)
  • European Workshop on Systems Security (EuroSec 2018 & 2019)
  • USENIX Workshop on Offensive Technologies (WOOT 2015 & 2018)
  • International Symposium on Engineering Secure Software and Systems (ESSoS 2018)
  • International Workshop on Innovations in Mobile Privacy and Security (IMPS 2017 & 2018)
  • Workshop on Formal Methods for Security Engineering (ForSE 2017 & 2018)
  • International Workshop on Emerging Cyberthreats and Countermeasures (ECTCM 2013, 2014 & 2015)

External Reviewer

  • Privacy Enhancing Technologies Symposium (PETS 2017 & 2018)
  • International Conference on emerging Networking EXperiments and Technologies (CoNEXT 2016)

Journal Reviewer

  • ACM Transactions on Privacy and Security
  • Computers & Security
  • EURASIP Journal on Information Security
  • IEEE Transactions on Computers
  • IEEE Transactions on Dependable and Secure Computing
  • IEEE Transactions on Information Forensics and Security
  • IEEE Transactions on Mobile Computing
  • International Journal of Information Security
  • Journal of Computer Virology and Hacking Techniques
  • Theoretical Computer Science

Publications

  • Radhesh Krishnan Konoth, Emanuele Vineti, Veelasha Moonsamy, Martina Lindorfer, Christopher Kruegel, Herbert Bos, Giovanni Vigna
    MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense
    ACM Conference on Computer and Communications Security (CCS), October 2018
           
    @inproceedings{minesweeper:ccs18,
       author = {Radhesh Krishnan Konoth and Emanuele Vineti and Veelasha Moonsamy and Martina Lindorfer and Christopher Kruegel and Herbert Bos and Giovanni Vigna},
       title = {{MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense}},
       booktitle = {Proceedings of the ACM Conference on Computer and Communications Security (CCS)},
       year = {2018}
    }
    
  • Elleen Pan, Jingjing Ren, Martina Lindorfer, Christo Wilson, David Choffnes
    Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications
    Privacy Enhancing Technologies Symposium (PETS), July 2018
         
    @inproceedings{panoptispy:pets18,
       author = {Elleen Pan and Jingjing Ren and Martina Lindorfer and Christo Wilson and David Choffnes},
       title = {{Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications}},
       booktitle = {Proceedings of the Privacy Enhancing Technologies Symposium (PETS)},
       year = {2018}
    }
    
     
    MEDIA: Gizmodo, Fortune, Engadget, Heise, amongst others.
  • Victor van der Veen, Martina Lindorfer, Yanick Fratantonio, Harikrishnan Padmanabha Pillai, Giovanni Vigna, Christopher Kruegel, Herbert Bos, Kaveh Razavi
    GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM
    Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), June 2018
             
    @inproceedings{guardion:dimva18,
       author = {Victor van der Veen and Martina Lindorfer and Yanick Fratantonio and Harikrishnan Padmanabha Pillai and Giovanni Vigna and Christopher Kruegel and Herbert Bos and Kaveh Razavi},
       title = {{GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM}},
       booktitle  = {Proceedings of the Conference on Detection of Intrusions and Malware \& Vulnerability Assessment (DIMVA)},
       year = {2018}
    }
     
    MEDIA: Ars Technica, Slashdot, Heise, amongst others.
     
    * Pwnie nomination for Best Privilege Escalation Bug
    * Best Research Award at the International Conference on Computing Systems (CompSys 2018)
  • Jingjing Ren, Martina Lindorfer, Daniel Dubois, Ashwin Rao, David Choffnes, Narseo Vallina-Rodriguez
    Bug Fixes, Improvements, ... and Privacy Leaks – A Longitudinal Study of PII Leaks Across Android App Versions
    Network and Distributed System Security Symposium (NDSS), February 2018
               
    @inproceedings{appversions:ndss18, 
       author = {Jingjing Ren and Martina Lindorfer and Daniel Dubois and Ashwin Rao and David Choffnes and Narseo Vallina-Rodriguez},
       title = {{Bug Fixes, Improvements, ... and Privacy Leaks -- A Longitudinal Study of PII Leaks Across Android App Versions}}, 
       booktitle = {Proceedings of the Network and Distributed System Security Symposium (NDSS)},
       year = {2018}
    }
  • Andrea Continella, Yanick Fratantonio, Martina Lindorfer, Alessandro Puccetti, Ali Zand, Christopher Kruegel, Giovanni Vigna
    Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis
    Network and Distributed System Security Symposium (NDSS), February 2017
             
    @inproceedings{agrigento:ndss17,
       author = {Andrea Continella and Yanick Fratantonio and Martina Lindorfer and Alessandro Puccetti and Ali Zand and Christopher Kruegel and Giovanni Vigna},
       title = {{Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis}},
       booktitle = {Proceedings of the Network and Distributed System Security Symposium (NDSS)},
       year = {2017}
    }
  • Victor van der Veen, Yanick Fratantonio, Martina Lindorfer, Daniel Gruss, Clémentine Maurice, Giovanni Vigna, Herbert Bos, Kaveh Razavi, Cristiano Giuffrida
    Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
    ACM Conference on Computer and Communications Security (CCS), October 2016
                 
    @inproceedings{drammer:ccs16,
       author = {Victor {van der Veen} and Yanick Fratantonio and Martina Lindorfer and Daniel Gruss and Cl{\'e}mentine Maurice and Giovanni Vigna and Herbert Bos and Kaveh Razavi and Cristiano Giuffrida},
       title = {{Drammer: Deterministic Rowhammer Attacks on Mobile Platforms}},
       booktitle = {Proceedings of the ACM Conference on Computer and Communications Security (CCS)},
       year = {2016}
    }
    
     
    MEDIA: WIRED, Ars Technica, Slashdot, amongst others.
     
    * Pwnie Award for Best Privilege Escalation Bug and nomination for Most Innovative Research
    * Best Dutch Cyber Security Research Paper
    * Best Paper Award at the CSAW'17 Applied Research Competition
  • Jingjing Ren, Ashwin Rao, Martina Lindorfer, Arnaud Legout, David Choffnes
    ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic
    International Conference on Mobile Systems, Applications and Services (MobiSys), June 2016
             
    @inproceedings{recon:mobisys16,
       author = {Jingjing Ren and Ashwin Rao and Martina Lindorfer and Arnaud Legout and David Choffnes},
       title = {{ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic}},
       booktitle = {Proceedings of the International Conference on Mobile Systems, Applications and Services (MobiSys)},
       year = {2016}
    }
    
     
    MEDIA: Boston Globe, NBC News, MSN News, Christian Science Monitor, amongst others.
  • Patrick Carter, Collin Mulliner, Martina Lindorfer, William Robertson, Engin Kirda
    CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes
    International Conference on Financial Cryptography and Data Security (FC), February 2016
           
    @inproceedings{curiousdroid:fc16,
       author = {Carter, Patrick and Mulliner, Collin and Lindorfer, Martina and Robertson, William and Kirda, Engin},
       title = {{CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes}},
       booktitle = {Proceedings of the International Conference on Financial Cryptography and Data Security (FC)},
       year = {2016}
    }
    
  • Martina Lindorfer, Matthias Neugschwandtner, Christian Platzer
    Marvin: Efficient and Comprehensive Mobile App Classification Through Static and Dynamic Analysis
    Annual International Computers, Software & Applications Conference (COMPSAC), July 2015
           
    @inproceedings{marvin:compsac2015,
       author = {Lindorfer, Martina and Neugschwandtner, Matthias and Platzer, Christian},
       title = {{Marvin: Efficient and Comprehensive Mobile App Classification Through Static and Dynamic Analysis}},
       booktitle = {Proceedings of the Annual International Computers, Software \& Applications Conference (COMPSAC)},
       year = {2015}
    }
     
    MEDIA: Futurezone, ORF Newton, SRF Kassensturz
  • Martina Lindorfer, Matthias Neugschwandtner, Lukas Weichselbaum, Yanick Fratantonio, Victor van der Veen, Christian Platzer
    Andrubis - 1,000,000 Apps Later: A View on Current Android Malware Behaviors
    International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), September 2014
           
    @inproceedings{andrubis:badgers14,
       author = {Martina Lindorfer and Matthias Neugschwandtner and Lukas Weichselbaum and Yanick Fratantonio and Victor {van der Veen} and Christian Platzer},
       title = {{Andrubis - 1,000,000 Apps Later: A View on Current Android Malware Behaviors}},
       booktitle = {Proceedings of the the International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)},
       year = {2014}
    }
    
  • Lukas Weichselbaum, Matthias Neugschwandtner, Martina Lindorfer, Yanick Fratantonio, Victor van der Veen, Christian Platzer
    Andrubis: Android Malware Under The Magnifying Glass
    Technical Report, TU Wien, TR-ISECLAB-0414-001, July 2014
       
  • Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, Sotiris Ioannidis
    AndRadar: Fast Discovery of Android Applications in Alternative Markets
    Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), July 2014
         
    @inproceedings{andradar:dimva14,
       author = {Lindorfer, Martina and Volanis, Stamatis and Sisto, Alessandro and Neugschwandtner, Matthias and Athanasopoulos, Elias and Maggi, Federico and Platzer, Christian and Zanero, Stefano and Ioannidis, Sotiris},
       title = {{AndRadar: Fast Discovery of Android Applications in Alternative Markets}},
       booktitle = {Proceedings of the Conference on Detection of Intrusions and Malware \& Vulnerability Assessment (DIMVA)},
       year = {2014}
    }
    
  • Christian Platzer, Martin Stuetz, Martina Lindorfer
    Skin Sheriff: A Machine Learning Solution for Detecting Explicit Images
    International Workshop on Security and Forensics in Communication Systems (ASIACCS-SFCS), June 2014
     
    @inproceedings{platzer2014:skinsheriff,
       author = {Platzer, Christian and Stuetz, Martin and Lindorfer, Martina},
       title = {{Skin Sheriff: A Machine Learning Solution for Detecting Explicit Images}},
       booktitle = {Proceedings of the International Workshop on Security and Forensics in Communication Systems (ASIACCS-SFCS)},
       year = {2014}
    }
    
  • Sebastian Neuner, Victor van der Veen, Martina Lindorfer, Markus Huber, Georg Merzdovnik, Martin Mulazzani, Edgar Weippl
    Enter Sandbox: Android Sandbox Comparison
    IEEE Mobile Security Technologies Workshop (MoST), May 2014
       
    @inproceedings{sandboxcomparison:most14,
       author = {Sebastian Neuner and Victor {van der Veen} and Martina Lindorfer and Markus Huber and Georg Merzdovnik and Martin Mulazzani and Edgar Weippl},
       title = {{Enter Sandbox: Android Sandbox Comparison}},
       booktitle = {Proceedings of the IEEE Mobile Security Technologies Workshop (MoST)},
       year = {2014}
    }
  • Martina Lindorfer, Bernhard Miller, Matthias Neugschwandtner, Christian Platzer
    Take a Bite - Finding the Worm in the Apple
    International Conference on Information, Communications and Signal Processing (ICICS), December 2013
       
    @inproceedings{lindorfer2013:macmal,
       author = {Lindorfer, Martina and Miller, Bernhard and Neugschwandtner, Matthias and Platzer, Christian},
       title = {{Take a Bite - Finding the Worm in the Apple}},
       booktitle = {Proceedings of the International Conference on Information, Communications and Signal Processing (ICICS)},
       year = {2013}
    }
    
  • Martina Lindorfer, Matthias Neumayr, Juan Caballero, Christian Platzer
    POSTER: Cross-Platform Malware: Write Once, Infect Everywhere
    ACM Conference on Computer and Communications Security (CCS), November 2013
       
  • Matthias Neugschwandtner, Martina Lindorfer, Christian Platzer
    A View to a Kill: WebView Exploitation
    USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), August 2013
       
    @inproceedings{webview:neugschwandtner2013,
       author = {Neugschwandtner, Matthias and Lindorfer, Martina and Platzer, Christian},
       title = {{A View To A Kill: WebView Exploitation}},
       booktitle = {Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)},
       year = {2013}
    }
  • Martina Lindorfer, Alessandro Di Federico, Federico Maggi, Paolo Milani Comparetti, Stefano Zanero
    Lines of Malicious Code: Insights Into the Malicious Software Industry
    Annual Computer Security Applications Conference (ACSAC), December 2012
       
    @inproceedings{lindorfer2012:beagle,
       author = {Lindorfer, Martina and Di Federico, Alessandro and Maggi, Federico and Milani Comparetti, Paolo and Zanero, Stefano},
       title = {{Lines of Malicious Code: Insights Into the Malicious Software Industry}},
       booktitle = {Proceedings of the Annual Computer Security Applications Conference (ACSAC)},
       year = {2012}
    }
    
  • Martina Lindorfer, Clemens Kolbitsch, Paolo Milani Comparetti
    Detecting Environment-Sensitive Malware
    International Symposium on Recent Advances in Intrusion Detection (RAID), September 2011
         
    @inproceedings{lindorfer2011:disarm,
       author = {Lindorfer, Martina and Kolbitsch, Clemens and Milani Comparetti, Paolo},
       title = {{Detecting Environment-Sensitive Malware}},
       booktitle = {Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID)},
       year = {2011}
    }
    

Theses

  • Malware Through the Looking Glass: Malware Analysis in an Evolving Threat Landscape
    Dissertation, TU Wien, November 2015
     
  • Detecting Environment-Sensitive Malware
    Master's thesis, TU Wien, April 2011