Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Collin Mulliner
@inproceedings{DBLP:conf/dbsec/NeunerVFMW18, author = {Sebastian Neuner and Artemios G. Voyiatzis and Spiros Fotopoulos and Collin Mulliner and Edgar R. Weippl}, editor = {Florian Kerschbaum and Stefano Paraboschi}, title = {USBlock: Blocking USB-Based Keypress Injection Attacks}, booktitle = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP} {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10980}, pages = {278--295}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-95729-6\_18}, doi = {10.1007/978-3-319-95729-6\_18}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/NeunerVFMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/MullinerRK17, author = {Collin Mulliner and William K. Robertson and Engin Kirda}, title = {On the misuse of graphical user interface elements to implement security controls}, journal = {it Inf. Technol.}, volume = {59}, number = {2}, pages = {59}, year = {2017}, url = {https://doi.org/10.1515/itit-2016-0036}, doi = {10.1515/ITIT-2016-0036}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/it/MullinerRK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/woot/2017, editor = {William Enck and Collin Mulliner}, title = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver, BC, Canada, August 14-15, 2017}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/woot17}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/woot/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/CarterMLRK16, author = {Patrick Carter and Collin Mulliner and Martina Lindorfer and William K. Robertson and Engin Kirda}, editor = {Jens Grossklags and Bart Preneel}, title = {CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {231--249}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_13}, doi = {10.1007/978-3-662-54970-4\_13}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/CarterMLRK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MambrettiOMRKMZ16, author = {Andrea Mambretti and Kaan Onarlioglu and Collin Mulliner and William Robertson and Engin Kirda and Federico Maggi and Stefano Zanero}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Trellis: Privilege Separation for Multi-user Applications Made Easy}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {437--456}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_20}, doi = {10.1007/978-3-319-45719-2\_20}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MambrettiOMRKMZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Neugschwandtner16, author = {Matthias Neugschwandtner and Collin Mulliner and William K. Robertson and Engin Kirda}, editor = {Michael Franz and Panos Papadimitratos}, title = {Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices}, booktitle = {Trust and Trustworthy Computing - 9th International Conference, {TRUST} 2016, Vienna, Austria, August 29-30, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9824}, pages = {60--81}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45572-3\_4}, doi = {10.1007/978-3-319-45572-3\_4}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/trust/Neugschwandtner16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KharrazAMRK16, author = {Amin Kharraz and Sajjad Arshad and Collin Mulliner and William K. Robertson and Engin Kirda}, editor = {Thorsten Holz and Stefan Savage}, title = {{UNVEIL:} {A} Large-Scale, Automated Approach to Detecting Ransomware}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {757--772}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/kharaz}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/KharrazAMRK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/OzcanGOWMRK15, author = {Ahmet Talha Ozcan and Can Gemicioglu and Kaan Onarlioglu and Michael Weissbacher and Collin Mulliner and William K. Robertson and Engin Kirda}, editor = {Rainer B{\"{o}}hme and Tatsuaki Okamoto}, title = {BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications}, booktitle = {Financial Cryptography and Data Security - 19th International Conference, {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8975}, pages = {355--369}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47854-7\_21}, doi = {10.1007/978-3-662-47854-7\_21}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/OzcanGOWMRK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MullinerRK14, author = {Collin Mulliner and William K. Robertson and Engin Kirda}, editor = {Shiho Moriai and Trent Jaeger and Kouichi Sakurai}, title = {VirtualSwindle: an automated attack against in-app billing on android}, booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014}, pages = {459--470}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2590296.2590335}, doi = {10.1145/2590296.2590335}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MullinerRK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MullinerRK14, author = {Collin Mulliner and William K. Robertson and Engin Kirda}, title = {Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {149--162}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.17}, doi = {10.1109/SP.2014.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/MullinerRK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MullinerORK13, author = {Collin Mulliner and Jon Oberheide and William K. Robertson and Engin Kirda}, editor = {Charles N. Payne Jr.}, title = {PatchDroid: scalable third-party security patches for Android devices}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {259--268}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523679}, doi = {10.1145/2523649.2523679}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MullinerORK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/MullinerBSS13, author = {Collin Mulliner and Ravishankar Borgaonkar and Patrick Stewin and Jean{-}Pierre Seifert}, editor = {Konrad Rieck and Patrick Stewin and Jean{-}Pierre Seifert}, title = {SMS-Based One-Time Passwords: Attacks and Defense - (Short Paper)}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, {DIMVA} 2013, Berlin, Germany, July 18-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7967}, pages = {150--159}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39235-1\_9}, doi = {10.1007/978-3-642-39235-1\_9}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/MullinerBSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/OnarliogluMRK13, author = {Kaan Onarlioglu and Collin Mulliner and William K. Robertson and Engin Kirda}, title = {PrivExec: Private Execution as an Operating System Service}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {206--220}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.24}, doi = {10.1109/SP.2013.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/OnarliogluMRK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Mulliner12, author = {Collin Mulliner}, title = {On the Impact of the Cellular Modem on the Security of Mobile Phones}, school = {Berlin Institute of Technology}, year = {2012}, url = {http://opus.kobv.de/tuberlin/volltexte/2012/3432/}, urn = {urn:nbn:de:kobv:83-opus-34320}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Mulliner12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mulliner12, author = {Collin Mulliner}, title = {Pers{\"{o}}nliche Datenspuren bei der mobilen Internetnutzung}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {180--184}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0061-2}, doi = {10.1007/S11623-012-0061-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mulliner12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/MullinerLLS12, author = {Collin Mulliner and Steffen Liebergeld and Matthias Lange and Jean{-}Pierre Seifert}, editor = {Robert S. Swarz and Philip Koopman and Michel Cukier}, title = {Taming Mr Hayes: Mitigating signaling based attacks on smartphones}, booktitle = {{IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2012, Boston, MA, USA, June 25-28, 2012}, pages = {1--12}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/DSN.2012.6263943}, doi = {10.1109/DSN.2012.6263943}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/MullinerLLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/MullinerM12, author = {Collin Mulliner and Benjamin Mich{\'{e}}le}, editor = {Elie Bursztein and Thomas Dullien}, title = {Read It Twice! {A} Mass-Storage-Based {TOCTTOU} Attack}, booktitle = {6th {USENIX} Workshop on Offensive Technologies, WOOT'12, August 6-7, 2012, Bellevue, WA, USA, Proceedings}, pages = {105--112}, publisher = {{USENIX} Association}, year = {2012}, url = {http://www.usenix.org/conference/woot12/read-it-twice-mass-storage-based-tocttou-attack}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/woot/MullinerM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tinytocs/Mulliner12, author = {Collin Mulliner}, title = {Fake Emulation Environment to Prevent Malware from Executing}, journal = {Tiny Trans. Comput. Sci.}, volume = {1}, year = {2012}, url = {http://tinytocs.org/vol1/papers/tinytocs-v1-mulliner.pdf}, timestamp = {Tue, 14 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tinytocs/Mulliner12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StewinSM11, author = {Patrick Stewin and Jean{-}Pierre Seifert and Collin Mulliner}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Poster: Towards detecting {DMA} malware}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {857--860}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2093511}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/StewinSM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MullinerGS11, author = {Collin Mulliner and Nico Golde and Jean{-}Pierre Seifert}, title = {{SMS} of Death: From Analyzing to Attacking Mobile Phones on a Large Scale}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Mulliner.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MullinerGS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/MullinerS10, author = {Collin Mulliner and Jean{-}Pierre Seifert}, title = {Rise of the iBots: Owning a telco network}, booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE} 2010, Nancy, France, October 19-20, 2010}, pages = {71--80}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MALWARE.2010.5665790}, doi = {10.1109/MALWARE.2010.5665790}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/MullinerS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Mulliner09, author = {Collin Mulliner}, title = {Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {695--700}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.46}, doi = {10.1109/ARES.2009.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Mulliner09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/MullinerM09, author = {Collin Mulliner and Charlie Miller}, editor = {Dan Boneh and Alexander Sotirov}, title = {Injecting {SMS} Messages into Smart Phones for Security Analysis}, booktitle = {3rd {USENIX} Workshop on Offensive Technologies, {WOOT} 2009, Montreal, Canada, August 10, 2009}, pages = {1--7}, publisher = {{USENIX} Association}, year = {2009}, url = {https://www.usenix.org/legacy/events/woot09/tech/full\_papers/mulliner.pdf}, timestamp = {Wed, 24 May 2023 10:25:04 +0200}, biburl = {https://dblp.org/rec/conf/woot/MullinerM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MullinerV06, author = {Collin Mulliner and Giovanni Vigna}, title = {Vulnerability Analysis of {MMS} User Agents}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {77--88}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.55}, doi = {10.1109/ACSAC.2006.55}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MullinerV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/MullinerVDL06, author = {Collin Mulliner and Giovanni Vigna and David Dagon and Wenke Lee}, editor = {Roland B{\"{u}}schkes and Pavel Laskov}, title = {Using Labeling to Prevent Cross-Service Attacks Against Smart Phones}, booktitle = {Detection of Intrusions and Malware {\&} Vulnerability Assessment, Third International Conference, {DIMVA} 2006, Berlin, Germany, July 13-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4064}, pages = {91--108}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11790754\_6}, doi = {10.1007/11790754\_6}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/MullinerVDL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.