Hanno Langweg

Orcid: 0000-0002-4156-5775

According to our database1, Hanno Langweg authored at least 33 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Insecurity Refactoring: Automated Injection of Vulnerabilities in Source Code.
Comput. Secur., May, 2023

2022
Systematic Generation of XSS and SQLi Vulnerabilities in PHP as Test Cases for Static Code Analysis.
Proceedings of the 15th IEEE International Conference on Software Testing, 2022

2020
A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the GDPR and Common Criteria.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
Difficult XSS Code Patterns for Static Code Analysis Tools.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

2018
Source Code Patterns of Buffer Overflow Vulnerabilities in Firefox.
Proceedings of the Sicherheit 2018, 2018

Requirements for Legally Compliant Software Based on the GDPR.
Proceedings of the On the Move to Meaningful Internet Systems. OTM 2018 Conferences, 2018

Fingerprint Presentation Attack Detection using Laser Speckle Contrast Imaging.
Proceedings of the 2018 International Conference of the Biometrics Special Interest Group, 2018

2017
One Click Privacy for Online Social Networks.
Proceedings of the Computer Safety, Reliability, and Security, 2017

Determining security requirements for cloud-supported routing of physical goods.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Source Code Patterns of SQL Injection Vulnerabilities.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Evidential Reasoning for Forensic Readiness.
J. Digit. Forensics Secur. Law, 2016

2015
Events and causal factors charting of kernel traces for root cause analysis.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Privacy Points as a Method to Support Privacy Impact Assessments.
Proceedings of the 1st IEEE/ACM International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, 2015

Developing Metrics for Surveillance Impact Assessment.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
AccountabilityFS: A File System Monitor for Forensic Readiness.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Resource-Based Event Reconstruction of Digital Crime Scenes.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Cost-benefit analysis of kernel tracing systems for forensic readiness.
Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems, 2014

2012
Flexible Regulation with Privacy Points.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Security Add-Ons for Mobile Platforms.
Proceedings of the Secure IT Systems - 17th Nordic Conference, 2012

Information Security Aspects of the 22/7 Attacks.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

OOXML File Analysis of the July 22nd Terrorist Manual.
Proceedings of the Communications and Multimedia Security, 2012

2008
Software security metrics for malware resilience.
PhD thesis, 2008

2006
Extending the Trusted Path in Client-Server Interaction
CoRR, 2006

Malware Attacks on Electronic Signatures Revisited.
Proceedings of the Sicherheit 2006: Sicherheit, 2006

Framework for malware resistance metrics.
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006

2004
A classification of malicious software attacks.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

2003
Sichere Benutzeroberflächen mittels DirektX.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit", INFORMATIK 2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September 29, 2003

2002
Trojan horse attacks on software for electronic signatures.
Informatica (Slovenia), 2002

Protecting Java Component Integrity Against Trojan Horse Programs.
Proceedings of the Integrity and Internal Control in Information Systems V, 2002

Notes on Application-Orientated Access Control.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

Protecting the User from the Data: Security and Privacy Aspects of Public Web Access.
Proceedings of the Adaptive Hypermedia and Adaptive Web-Based Systems, 2002

With Gaming Technology towards Secure User Interfaces.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs.
Proceedings of the Trusted Information: The New Decade Challenge, 2001


  Loading...