Publications
2014
- Mobile-Sandbox: Combining Static and Dynamic
Analysis with Machine Learning Techniques.
Michael Spreitzenbarth, Thomas Schreck, Florian Echtler, Daniel Arp and Johannes Hoffmann.
International Journal of Information Security, July 2014. - Modeling and Discovering Vulnerabilities
with Code Property
Graphs. [pdf]
Fabian Yamaguchi, Nico Golde, Daniel Arp, and Konrad Rieck.
Proc. of 35th IEEE Symposium on Security and Privacy (S&P), May 2014. - Continuous Authentication on Mobile Devices
by Analysis of Typing Motion
Behavior. [pdf]
Hugo Gascon, Sebastian Uellenbeck, Christopher Wolf, and Konrad Rieck.
Proc. of GI Conference “Sicherheit” (Sicherheit, Schutz und Verlässlichkeit) , March 2014. - Drebin: Efficient and Explainable Detection
of Android Malware in Your Pocket.
[pdf]
Daniel Arp, Michael Spreitzenbarth, Malte Hübner, Hugo Gascon, and Konrad Rieck.
Proc. of 17th Network and Distributed System Security Symposium (NDSS), February 2014.
2013
- Chucky: Exposing Missing Checks in Source Code for
Vulnerability Discovery. [pdf]
Fabian Yamaguchi, Christian Wressnegger, Hugo Gascon, and Konrad Rieck.
Proc. of 20th ACM Conference on Computer and Communications Security (CCS), November 2013. - A Close Look on n-Grams in Intrusion
Detection: Anomaly Detection vs. Classification.
[pdf]
Christian Wressnegger, Guido Schwenk, Daniel Arp, and Konrad Rieck.
Proc. of 6th ACM CCS Workshop on Artificial Intelligence and Security (AISEC), November 2013. - Structural Detection of Android Malware
using Embedded Call Graphs.
[pdf]
Hugo Gascon, Fabian Yamaguchi, Daniel Arp, and Konrad Rieck.
Proc. of 6th ACM CCS Workshop on Artificial Intelligence and Security (AISEC), November 2013. - Deobfuscating Embedded Malware using
Probable-Plaintext Attacks.
[pdf]
Christian Wressnegger, Frank Boldewin, and Konrad Rieck.
Proc. of 16th Symposium on Research in Attacks, Intrusions and Defenses (RAID), October 2013. - Toward Supervised Anomaly Detection.
[pdf]
Nico Görnitz, Marius Kloft, Konrad Rieck, and Ulf Brefeld.
Journal of Artificial Intelligence Research (JAIR) , February 2013
2012
- Generalized Vulnerability Extrapolation using Abstract Syntax
Trees. [pdf]
Fabian Yamaguchi, Markus Lottmann, and Konrad Rieck.
Annual Computer Security Applications Conference (ACSAC), December 2012. - Sally: A Tool for Embedding Strings in Vector
Spaces. [pdf]
Konrad Rieck, Christian Wressnegger, and Alexander Bikadorov
Journal of Machine Learning Research (JMLR), November 2012 - Autonomous Learning for Detection of JavaScript
Attacks: Vision or Reality? [pdf]
Guido Schwenk, Alexander Bikadorov, Tammo Krueger, and Konrad Rieck.
ACM Workshop on Security and Artificial Intelligence (AISEC) October 2012 - Early Detection of Malicious Behavior in
JavaScript Code. [pdf]
Kristof Schütt, Alexander Bikadorov, Marius Kloft, and Konrad Rieck.
ACM Workshop on Security and Artificial Intelligence (AISEC) October 2012 - Learning Stateful Models for Network Honeypots.
[pdf]
Tammo Krueger, Hugo Gascon, Nicole Kraemer, and Konrad Rieck.
ACM Workshop on Security and Artificial Intelligence (AISEC) October 2012 - Intelligent Defense against Malicious JavaScript Code.
[pdf]
Tammo Krueger and Konrad Rieck.
Praxis der Informationsverarbeitung und Kommunikation (PIK) , de Gruyter, January, 2012
2011
- Adaptive Detection of Covert Communication in HTTP
Requests. [pdf]
Guido Schwenk and Konrad Rieck.
7th European Conference on Computer Network Defense (EC2ND), September, 2011 - Vulnerability Extrapolation: Assisted Discovery of
Vulnerabilities using Machine Learning. [pdf]
Fabian Yamaguchi, Felix 'FX' Lindner and Konrad Rieck.
5th USENIX Workshop on Offensive Technologies (WOOT), August, 2011 -
Computer Security and Machine Learning: Worst Enemies
or Best Friends? [pdf]
Konrad Rieck.
1st DIMVA Workshop on Systems Security (SYSSEC), July, 2011. -
Self-Learning Network Intrusion Detection. [pdf]
Konrad Rieck.
Information Technology (IT), 53 (3) 152–156, Oldenbourg, May, 2011.