BibTeX records: Collin Mulliner

download as .bib file

@inproceedings{DBLP:conf/dbsec/NeunerVFMW18,
  author       = {Sebastian Neuner and
                  Artemios G. Voyiatzis and
                  Spiros Fotopoulos and
                  Collin Mulliner and
                  Edgar R. Weippl},
  editor       = {Florian Kerschbaum and
                  Stefano Paraboschi},
  title        = {USBlock: Blocking USB-Based Keypress Injection Attacks},
  booktitle    = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10980},
  pages        = {278--295},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-95729-6\_18},
  doi          = {10.1007/978-3-319-95729-6\_18},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/NeunerVFMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/MullinerRK17,
  author       = {Collin Mulliner and
                  William K. Robertson and
                  Engin Kirda},
  title        = {On the misuse of graphical user interface elements to implement security
                  controls},
  journal      = {it Inf. Technol.},
  volume       = {59},
  number       = {2},
  pages        = {59},
  year         = {2017},
  url          = {https://doi.org/10.1515/itit-2016-0036},
  doi          = {10.1515/ITIT-2016-0036},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/it/MullinerRK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/woot/2017,
  editor       = {William Enck and
                  Collin Mulliner},
  title        = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver,
                  BC, Canada, August 14-15, 2017},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/woot17},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CarterMLRK16,
  author       = {Patrick Carter and
                  Collin Mulliner and
                  Martina Lindorfer and
                  William K. Robertson and
                  Engin Kirda},
  editor       = {Jens Grossklags and
                  Bart Preneel},
  title        = {CuriousDroid: Automated User Interface Interaction for Android Application
                  Analysis Sandboxes},
  booktitle    = {Financial Cryptography and Data Security - 20th International Conference,
                  {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  pages        = {231--249},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-54970-4\_13},
  doi          = {10.1007/978-3-662-54970-4\_13},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/CarterMLRK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MambrettiOMRKMZ16,
  author       = {Andrea Mambretti and
                  Kaan Onarlioglu and
                  Collin Mulliner and
                  William Robertson and
                  Engin Kirda and
                  Federico Maggi and
                  Stefano Zanero},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Trellis: Privilege Separation for Multi-user Applications Made Easy},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {437--456},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_20},
  doi          = {10.1007/978-3-319-45719-2\_20},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MambrettiOMRKMZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Neugschwandtner16,
  author       = {Matthias Neugschwandtner and
                  Collin Mulliner and
                  William K. Robertson and
                  Engin Kirda},
  editor       = {Michael Franz and
                  Panos Papadimitratos},
  title        = {Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded
                  Devices},
  booktitle    = {Trust and Trustworthy Computing - 9th International Conference, {TRUST}
                  2016, Vienna, Austria, August 29-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9824},
  pages        = {60--81},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45572-3\_4},
  doi          = {10.1007/978-3-319-45572-3\_4},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Neugschwandtner16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KharrazAMRK16,
  author       = {Amin Kharraz and
                  Sajjad Arshad and
                  Collin Mulliner and
                  William K. Robertson and
                  Engin Kirda},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {{UNVEIL:} {A} Large-Scale, Automated Approach to Detecting Ransomware},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {757--772},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/kharaz},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KharrazAMRK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/OzcanGOWMRK15,
  author       = {Ahmet Talha Ozcan and
                  Can Gemicioglu and
                  Kaan Onarlioglu and
                  Michael Weissbacher and
                  Collin Mulliner and
                  William K. Robertson and
                  Engin Kirda},
  editor       = {Rainer B{\"{o}}hme and
                  Tatsuaki Okamoto},
  title        = {BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications},
  booktitle    = {Financial Cryptography and Data Security - 19th International Conference,
                  {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8975},
  pages        = {355--369},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47854-7\_21},
  doi          = {10.1007/978-3-662-47854-7\_21},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/OzcanGOWMRK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MullinerRK14,
  author       = {Collin Mulliner and
                  William K. Robertson and
                  Engin Kirda},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {VirtualSwindle: an automated attack against in-app billing on android},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {459--470},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590335},
  doi          = {10.1145/2590296.2590335},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MullinerRK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MullinerRK14,
  author       = {Collin Mulliner and
                  William K. Robertson and
                  Engin Kirda},
  title        = {Hidden GEMs: Automated Discovery of Access Control Vulnerabilities
                  in Graphical User Interfaces},
  booktitle    = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  pages        = {149--162},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SP.2014.17},
  doi          = {10.1109/SP.2014.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MullinerRK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MullinerORK13,
  author       = {Collin Mulliner and
                  Jon Oberheide and
                  William K. Robertson and
                  Engin Kirda},
  editor       = {Charles N. Payne Jr.},
  title        = {PatchDroid: scalable third-party security patches for Android devices},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {259--268},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523679},
  doi          = {10.1145/2523649.2523679},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MullinerORK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/MullinerBSS13,
  author       = {Collin Mulliner and
                  Ravishankar Borgaonkar and
                  Patrick Stewin and
                  Jean{-}Pierre Seifert},
  editor       = {Konrad Rieck and
                  Patrick Stewin and
                  Jean{-}Pierre Seifert},
  title        = {SMS-Based One-Time Passwords: Attacks and Defense - (Short Paper)},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 10th International Conference, {DIMVA} 2013, Berlin, Germany, July
                  18-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7967},
  pages        = {150--159},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39235-1\_9},
  doi          = {10.1007/978-3-642-39235-1\_9},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/MullinerBSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/OnarliogluMRK13,
  author       = {Kaan Onarlioglu and
                  Collin Mulliner and
                  William K. Robertson and
                  Engin Kirda},
  title        = {PrivExec: Private Execution as an Operating System Service},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {206--220},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.24},
  doi          = {10.1109/SP.2013.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/OnarliogluMRK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Mulliner12,
  author       = {Collin Mulliner},
  title        = {On the Impact of the Cellular Modem on the Security of Mobile Phones},
  school       = {Berlin Institute of Technology},
  year         = {2012},
  url          = {http://opus.kobv.de/tuberlin/volltexte/2012/3432/},
  urn          = {urn:nbn:de:kobv:83-opus-34320},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Mulliner12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mulliner12,
  author       = {Collin Mulliner},
  title        = {Pers{\"{o}}nliche Datenspuren bei der mobilen Internetnutzung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {180--184},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0061-2},
  doi          = {10.1007/S11623-012-0061-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mulliner12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/MullinerLLS12,
  author       = {Collin Mulliner and
                  Steffen Liebergeld and
                  Matthias Lange and
                  Jean{-}Pierre Seifert},
  editor       = {Robert S. Swarz and
                  Philip Koopman and
                  Michel Cukier},
  title        = {Taming Mr Hayes: Mitigating signaling based attacks on smartphones},
  booktitle    = {{IEEE/IFIP} International Conference on Dependable Systems and Networks,
                  {DSN} 2012, Boston, MA, USA, June 25-28, 2012},
  pages        = {1--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/DSN.2012.6263943},
  doi          = {10.1109/DSN.2012.6263943},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/MullinerLLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/MullinerM12,
  author       = {Collin Mulliner and
                  Benjamin Mich{\'{e}}le},
  editor       = {Elie Bursztein and
                  Thomas Dullien},
  title        = {Read It Twice! {A} Mass-Storage-Based {TOCTTOU} Attack},
  booktitle    = {6th {USENIX} Workshop on Offensive Technologies, WOOT'12, August 6-7,
                  2012, Bellevue, WA, USA, Proceedings},
  pages        = {105--112},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {http://www.usenix.org/conference/woot12/read-it-twice-mass-storage-based-tocttou-attack},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/MullinerM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tinytocs/Mulliner12,
  author       = {Collin Mulliner},
  title        = {Fake Emulation Environment to Prevent Malware from Executing},
  journal      = {Tiny Trans. Comput. Sci.},
  volume       = {1},
  year         = {2012},
  url          = {http://tinytocs.org/vol1/papers/tinytocs-v1-mulliner.pdf},
  timestamp    = {Tue, 14 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tinytocs/Mulliner12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/StewinSM11,
  author       = {Patrick Stewin and
                  Jean{-}Pierre Seifert and
                  Collin Mulliner},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Poster: Towards detecting {DMA} malware},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {857--860},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2093511},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/StewinSM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MullinerGS11,
  author       = {Collin Mulliner and
                  Nico Golde and
                  Jean{-}Pierre Seifert},
  title        = {{SMS} of Death: From Analyzing to Attacking Mobile Phones on a Large
                  Scale},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Mulliner.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MullinerGS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/MullinerS10,
  author       = {Collin Mulliner and
                  Jean{-}Pierre Seifert},
  title        = {Rise of the iBots: Owning a telco network},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {71--80},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665790},
  doi          = {10.1109/MALWARE.2010.5665790},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/MullinerS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Mulliner09,
  author       = {Collin Mulliner},
  title        = {Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {695--700},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.46},
  doi          = {10.1109/ARES.2009.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Mulliner09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/MullinerM09,
  author       = {Collin Mulliner and
                  Charlie Miller},
  editor       = {Dan Boneh and
                  Alexander Sotirov},
  title        = {Injecting {SMS} Messages into Smart Phones for Security Analysis},
  booktitle    = {3rd {USENIX} Workshop on Offensive Technologies, {WOOT} 2009, Montreal,
                  Canada, August 10, 2009},
  pages        = {1--7},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {https://www.usenix.org/legacy/events/woot09/tech/full\_papers/mulliner.pdf},
  timestamp    = {Wed, 24 May 2023 10:25:04 +0200},
  biburl       = {https://dblp.org/rec/conf/woot/MullinerM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MullinerV06,
  author       = {Collin Mulliner and
                  Giovanni Vigna},
  title        = {Vulnerability Analysis of {MMS} User Agents},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {77--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.55},
  doi          = {10.1109/ACSAC.2006.55},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MullinerV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/MullinerVDL06,
  author       = {Collin Mulliner and
                  Giovanni Vigna and
                  David Dagon and
                  Wenke Lee},
  editor       = {Roland B{\"{u}}schkes and
                  Pavel Laskov},
  title        = {Using Labeling to Prevent Cross-Service Attacks Against Smart Phones},
  booktitle    = {Detection of Intrusions and Malware {\&} Vulnerability Assessment,
                  Third International Conference, {DIMVA} 2006, Berlin, Germany, July
                  13-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4064},
  pages        = {91--108},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11790754\_6},
  doi          = {10.1007/11790754\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/MullinerVDL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics