default search action
Hanno Langweg
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j3]Felix Schuckert, Basel Katt, Hanno Langweg:
Insecurity Refactoring: Automated Injection of Vulnerabilities in Source Code. Comput. Secur. 128: 103121 (2023) - 2022
- [c28]Felix Schuckert, Hanno Langweg, Basel Katt:
Systematic Generation of XSS and SQLi Vulnerabilities in PHP as Test Cases for Static Code Analysis. ICST Workshops 2022: 261-268 - 2020
- [c27]Sandra Domenique Zinsmaier, Hanno Langweg, Marcel Waldvogel:
A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the GDPR and Common Criteria. ICISSP 2020: 473-480 - [e2]Delphine Reinhardt, Hanno Langweg, Bernhard C. Witt, Mathias Fischer:
Sicherheit 2020, Sicherheit, Schutz und Zuverlässigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 17.-20. März 2020, Göttingen. LNI P-301, Gesellschaft für Informatik e.V. 2020, ISBN 978-3-88579-695-4 [contents]
2010 – 2019
- 2019
- [c26]Felix Schuckert, Basel Katt, Hanno Langweg:
Difficult XSS Code Patterns for Static Code Analysis Tools. IOSec/MSTEC/FINSEC@ESORICS 2019: 123-139 - 2018
- [c25]Pascal Keilbach, Jascha Kolberg, Marta Gomez-Barrero, Christoph Busch, Hanno Langweg:
Fingerprint Presentation Attack Detection using Laser Speckle Contrast Imaging. BIOSIG 2018: 1-6 - [c24]Sandra Domenique Ringmann, Hanno Langweg, Marcel Waldvogel:
Requirements for Legally Compliant Software Based on the GDPR. OTM Conferences (2) 2018: 258-276 - [c23]Felix Schuckert, Max Hildner, Basel Katt, Hanno Langweg:
Source Code Patterns of Buffer Overflow Vulnerabilities in Firefox. Sicherheit 2018: 107-118 - [e1]Hanno Langweg, Michael Meier, Bernhard C. Witt, Delphine Reinhardt:
Sicherheit 2018, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27.4.2018, Konstanz. LNI P-281, Gesellschaft für Informatik e.V. 2018, ISBN 978-3-88579-675-6 [contents] - 2017
- [c22]Felix Schuckert, Basel Katt, Hanno Langweg:
Source Code Patterns of SQL Injection Vulnerabilities. ARES 2017: 72:1-72:7 - [c21]Sandra Domenique Ringmann, Hanno Langweg:
Determining security requirements for cloud-supported routing of physical goods. CNS 2017: 514-521 - [c20]Philipp Hehnle, Pascal Keilbach, Hyun-Jin Lee, Sabrina Lejn, Daniel Steidinger, Marina Weinbrenner, Hanno Langweg:
One Click Privacy for Online Social Networks. SAFECOMP Workshops 2017: 435-442 - 2016
- [j2]Yi-Ching Liao, Hanno Langweg:
Evidential Reasoning for Forensic Readiness. J. Digit. Forensics Secur. Law 11(1): 37-52 (2016) - 2015
- [c19]Yi-Ching Liao, Hanno Langweg:
Developing Metrics for Surveillance Impact Assessment. COMPSAC Workshops 2015: 297-302 - [c18]Julia Himmel, Nikolas Siebler, Felix Laegeler, Marco Grupe, Hanno Langweg:
Privacy Points as a Method to Support Privacy Impact Assessments. TELERISE@ICSE 2015: 50-53 - [c17]Yi-Ching Liao, Hanno Langweg:
Events and causal factors charting of kernel traces for root cause analysis. ISCC 2015: 245-250 - 2014
- [c16]Yi-Ching Liao, Hanno Langweg:
Cost-benefit analysis of kernel tracing systems for forensic readiness. SFCS@ASIACCS 2014: 25-36 - [c15]Yi-Ching Liao, Hanno Langweg:
Resource-Based Event Reconstruction of Digital Crime Scenes. JISIC 2014: 129-136 - [c14]Rune Nordvik, Yi-Ching Liao, Hanno Langweg:
AccountabilityFS: A File System Monitor for Forensic Readiness. JISIC 2014: 308-311 - 2012
- [c13]Hanno Langweg:
OOXML File Analysis of the July 22nd Terrorist Manual. Communications and Multimedia Security 2012: 195-197 - [c12]Hanno Langweg:
Information Security Aspects of the 22/7 Attacks. EISIC 2012: 286 - [c11]Benjamin Adolphi, Hanno Langweg:
Security Add-Ons for Mobile Platforms. NordSec 2012: 17-30 - [c10]Hanno Langweg, Lisa Rajbhandari:
Flexible Regulation with Privacy Points. TrustBus 2012: 161-166
2000 – 2009
- 2008
- [b1]Hanno Langweg:
Software security metrics for malware resilience. University of Bonn, Germany, 2008, pp. 1-253 - 2006
- [c9]Hanno Langweg:
Framework for malware resistance metrics. QoP 2006: 39-44 - [c8]Hanno Langweg:
Malware Attacks on Electronic Signatures Revisited. Sicherheit 2006: 244-255 - [i1]Hanno Langweg, Tommy Kristiansen:
Extending the Trusted Path in Client-Server Interaction. CoRR abs/cs/0611102 (2006) - 2004
- [c7]Hanno Langweg, Einar Snekkenes:
A classification of malicious software attacks. IPCCC 2004: 827-832 - 2003
- [c6]Hanno Langweg:
Sichere Benutzeroberflächen mittels DirektX. GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") 2003: 227-236 - 2002
- [j1]Adrian Spalka, Armin B. Cremers, Hanno Langweg:
Trojan horse attacks on software for electronic signatures. Informatica (Slovenia) 26(2) (2002) - [c5]Hanno Langweg:
With Gaming Technology towards Secure User Interfaces. ACSAC 2002: 44-50 - [c4]Adrian Spalka, Hanno Langweg:
Protecting the User from the Data: Security and Privacy Aspects of Public Web Access. AH 2002: 440-443 - [c3]Adrian Spalka, Hanno Langweg:
Notes on Application-Orientated Access Control. DEXA Workshops 2002: 451-455 - [c2]Marcel Winandy, Armin B. Cremers, Hanno Langweg, Adrian Spalka:
Protecting Java Component Integrity Against Trojan Horse Programs. IICIS 2002: 99-113 - 2001
- [c1]Adrian Spalka, Armin B. Cremers, Hanno Langweg:
Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs. SEC 2001: 403-420
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint