Manuel Leithner

According to our database1, Manuel Leithner authored at least 25 papers between 2010 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




HYDRA: Feedback-driven black-box exploitation of injection vulnerabilities.
Inf. Softw. Technol., 2021

Combinatorially XSSing Web Application Firewalls.
Proceedings of the 14th IEEE International Conference on Software Testing, 2021

Sliced AETG: a memory-efficient variant of the AETG covering array generation algorithm.
Optim. Lett., 2020

XIEv: dynamic analysis for crawling and modeling of web applications.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Problems and algorithms for covering arrays via set covers.
Theor. Comput. Sci., 2019

Testing TLS using planning-based combinatorial methods and execution framework.
Softw. Qual. J., 2019

A Fault-Driven Combinatorial Process for Model Evolution in XSS Vulnerability Detection.
Proceedings of the Advances and Trends in Artificial Intelligence. From Theory to Practice, 2019

Applying Combinatorial Testing to Large-Scale Data Processing at Adobe.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

Practical Combinatorial Testing for XSS Detection using Locally Optimized Attack Models.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

Automated combinatorial testing for detecting SQL vulnerabilities in web applications.
Proceedings of the 14th International Workshop on Automation of Software Test, 2019

DOMdiff: Identification and Classification of Inter-DOM Modifications.
Proceedings of the 2018 IEEE/WIC/ACM International Conference on Web Intelligence, 2018

CAMETRICS: A Tool for Advanced Combinatorial Analysis and Measurement of Test Sets.
Proceedings of the 2018 IEEE International Conference on Software Testing, 2018

Covert Computation - Hiding code in code through compile-time obfuscation.
Comput. Secur., 2014

Covert computation: hiding code in code for obfuscation purposes.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Enterprise Security for the Executive.
Comput. Secur., 2012

Low Tech Hacking.
Comput. Secur., 2012

XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts.
Comput. Secur., 2012

Thor's Microsoft Security Bible.
Comput. Secur., 2012

Coding for Penetration Testers.
Comput. Secur., 2012

Android forensics.
Comput. Secur., 2012

Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

A comparison of Web service technologies for smart meter data exchange.
Proceedings of the 3rd IEEE PES Innovative Smart Grid Technologies Europe, 2012

Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.
Proceedings of the 20th USENIX Security Symposium, 2011

Social snapshots: digital forensics for online social networks.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011