Christian Wressnegger

Orcid: 0009-0007-1493-9552

According to our database1, Christian Wressnegger authored at least 46 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Large-Scale Study of Cookie Banner Interaction Tools and their Impact on Users' Privacy.
Proc. Priv. Enhancing Technol., January, 2024

2023
Lessons Learned on Machine Learning for Computer Security.
IEEE Secur. Priv., 2023

Randomness is the Root of All Evil: More Reliable Evaluation of Deep Active Learning.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023

Disguising Attacks with Explanation-Aware Backdoors.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Machine Unlearning of Features and Labels.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Load-and-Act: Increasing Page Coverage of Web Applications.
Proceedings of the Information Security - 26th International Conference, 2023

On the Similarity of Web Measurements Under Different Experimental Setups.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Holistic Adversarially Robust Pruning.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Poster: Fooling XAI with Explanation-Aware Backdoors.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Backdooring Explainable Machine Learning.
CoRR, 2022

Reproducibility and Replicability of Web Measurement Studies.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Dos and Don'ts of Machine Learning in Computer Security.
Proceedings of the 31st USENIX Security Symposium, 2022

to Protect the Public Opinion Against New Types of Bots?
Proceedings of the IEEE International Conference on Big Data, 2022

Non-Uniform Adversarially Robust Pruning.
Proceedings of the International Conference on Automated Machine Learning, 2022

2021
Plausible Deniability for Anonymous Communication.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021

TagVet: Vetting Malware Tags using Explainable Machine Learning.
Proceedings of the EuroSec '21: Proceedings of the 14th European Workshop on Systems Security, 2021

Adversarial Robust Model Compression Using In-Train Pruning.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2021

LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Efficient machine learning for attack detection.
it Inf. Technol., 2020

Evaluating Explanation Methods for Deep Learning in Security.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Aim low, shoot high: evading aimbot detectors by mimicking user behavior.
Proceedings of the 13th European Workshop on Systems Security, 2020

What's all that noise: analysis and detection of propaganda on Twitter.
Proceedings of the 13th European Workshop on Systems Security, 2020

2019
Efficient Machine Learning for Attack Detection.
PhD thesis, 2019

Political Elections Under (Social) Fire? Analysis and Detection of Propaganda on Twitter.
CoRR, 2019

Don't Paint It Black: White-Box Explanations for Deep Learning in Computer Security.
CoRR, 2019

False Sense of Security: A Study on the Effectivity of Jailbreak Detection in Banking Apps.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Security Analysis of Devolo HomePIug Devices.
Proceedings of the 12th European Workshop on Systems Security, 2019

New Kid on the Web: A Study on the Prevalence of WebAssembly in the Wild.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

TypeMiner: Recovering Types in Binary Programs Using Machine Learning.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

Thieves in the Browser: Web-based Cryptojacking in the Wild.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Web-based Cryptojacking in the Wild.
CoRR, 2018

ZOE: Content-Based Anomaly Detection for Industrial Control Systems.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
64-Bit Migration Vulnerabilities.
it Inf. Technol., 2017

Privacy Threats through Ultrasonic Side Channels on Mobile Devices.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Looking Back on Three Years of Flash-based Malware.
Proceedings of the 10th European Workshop on Systems Security, 2017

Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Harry: A Tool for Measuring String Similarity.
J. Mach. Learn. Res., 2016

From Malware Signatures to Anti-Virus Assisted Attacks.
CoRR, 2016

Comprehensive Analysis and Detection of Flash-Based Malware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols.
Proceedings of the Security and Privacy in Communication Networks, 2015

2014
Poisoning behavioral malware clustering.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

2013
Deobfuscating Embedded Malware Using Probable-Plaintext Attacks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Chucky: exposing missing checks in source code for vulnerability discovery.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

A close look on <i>n</i>-grams in intrusion detection: anomaly detection vs. classification.
Proceedings of the AISec'13, 2013

2012
Sally: a tool for embedding strings in vector spaces.
J. Mach. Learn. Res., 2012


  Loading...