Georg Merzdovnik

Orcid: 0000-0002-9955-7284

According to our database1, Georg Merzdovnik authored at least 21 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
An extended view on measuring tor AS-level adversaries.
Comput. Secur., September, 2023

2020
Actively Probing Routes for Tor AS-Level Adversaries with RIPE Atlas.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

AVRS: emulating AVR microcontrollers for reverse engineering and security testing.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
ISaFe - Injecting Security Features into Constrained Embedded Firmware.
ERCIM News, 2019

AutoHoney(I)IoT - Automated Device Independent Honeypot Generation of IoT and Industrial IoT Devices.
ERCIM News, 2019

From Hack to Elaborate Technique - A Survey on Binary Rewriting.
ACM Comput. Surv., 2019

Measuring Cookies and Web Privacy in a Post-GDPR World.
Proceedings of the Passive and Active Measurement - 20th International Conference, 2019

2017
u'smile - Secure Mobile Environments.
ERCIM News, 2017

Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

A Performance Assessment of Network Address Shuffling in IoT Systems.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2017, 2017

Lightweight Address Hopping for Defending the IPv6 IoT.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?
ACM Comput. Surv., 2016

Browser History Stealing with Captive Wi-Fi Portals.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Pin it! Improving Android network security at runtime.
Proceedings of the 2016 IFIP Networking Conference, 2016

Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Notary-Assisted Certificate Pinning for Improved Security of Android Apps.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Network Security Challenges in Android Applications.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Enter Sandbox: Android Sandbox Comparison.
CoRR, 2014

Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

AES-SEC: Improving Software Obfuscation through Hardware-Assistance.
Proceedings of the Ninth International Conference on Availability, 2014


  Loading...