Slideshow Image 1 Slideshow Image 3 Slideshow Image 4 Slideshow Image 5 Slideshow Image 7 Slideshow Image 8 Slideshow Image 9 Slideshow Image 10 Slideshow Image 11 Slideshow Image 15 Slideshow Image 16 Slideshow Image 17 Slideshow Image 18 Slideshow Image 20 Slideshow Image 23 Slideshow Image 24 Slideshow Image 25 Slideshow Image 26 Slideshow Image 27 Slideshow Image 28 Slideshow Image 29 Slideshow Image 30 Slideshow Image 31 Slideshow Image 32 Slideshow Image 33

Publications

2014

  • Mobile-Sandbox: Combining Static and Dynamic Analysis with Machine Learning Techniques.
    Michael Spreitzenbarth, Thomas Schreck, Florian Echtler, Daniel Arp and Johannes Hoffmann.
    International Journal of Information Security, July 2014.
  • Modeling and Discovering Vulnerabilities with Code Property Graphs. [pdf]
    Fabian Yamaguchi, Nico Golde, Daniel Arp, and Konrad Rieck.
    Proc. of 35th IEEE Symposium on Security and Privacy (S&P), May 2014.
  • Continuous Authentication on Mobile Devices by Analysis of Typing Motion Behavior. [pdf]
    Hugo Gascon, Sebastian Uellenbeck, Christopher Wolf, and Konrad Rieck.
    Proc. of GI Conference “Sicherheit” (Sicherheit, Schutz und Verlässlichkeit) , March 2014.
  • Drebin: Efficient and Explainable Detection of Android Malware in Your Pocket. [pdf]
    Daniel Arp, Michael Spreitzenbarth, Malte Hübner, Hugo Gascon, and Konrad Rieck.
    Proc. of 17th Network and Distributed System Security Symposium (NDSS), February 2014.

2013

  • Chucky: Exposing Missing Checks in Source Code for Vulnerability Discovery. [pdf]
    Fabian Yamaguchi, Christian Wressnegger, Hugo Gascon, and Konrad Rieck.
    Proc. of 20th ACM Conference on Computer and Communications Security (CCS), November 2013.
  • A Close Look on n-Grams in Intrusion Detection: Anomaly Detection vs. Classification. [pdf]
    Christian Wressnegger, Guido Schwenk, Daniel Arp, and Konrad Rieck.
    Proc. of 6th ACM CCS Workshop on Artificial Intelligence and Security (AISEC), November 2013.
  • Structural Detection of Android Malware using Embedded Call Graphs. [pdf]
    Hugo Gascon, Fabian Yamaguchi, Daniel Arp, and Konrad Rieck.
    Proc. of 6th ACM CCS Workshop on Artificial Intelligence and Security (AISEC), November 2013.
  • Deobfuscating Embedded Malware using Probable-Plaintext Attacks. [pdf]
    Christian Wressnegger, Frank Boldewin, and Konrad Rieck.
    Proc. of 16th Symposium on Research in Attacks, Intrusions and Defenses (RAID), October 2013.
  • Toward Supervised Anomaly Detection. [pdf]
    Nico Görnitz, Marius Kloft, Konrad Rieck, and Ulf Brefeld.
    Journal of Artificial Intelligence Research (JAIR) , February 2013

2012

  • Generalized Vulnerability Extrapolation using Abstract Syntax Trees. [pdf]
    Fabian Yamaguchi, Markus Lottmann, and Konrad Rieck.
    Annual Computer Security Applications Conference (ACSAC), December 2012.
  • Sally: A Tool for Embedding Strings in Vector Spaces. [pdf]
    Konrad Rieck, Christian Wressnegger, and Alexander Bikadorov
    Journal of Machine Learning Research (JMLR), November 2012
  • Autonomous Learning for Detection of JavaScript Attacks: Vision or Reality? [pdf]
    Guido Schwenk, Alexander Bikadorov, Tammo Krueger, and Konrad Rieck.
    ACM Workshop on Security and Artificial Intelligence (AISEC) October 2012
  • Early Detection of Malicious Behavior in JavaScript Code. [pdf]
    Kristof Schütt, Alexander Bikadorov, Marius Kloft, and Konrad Rieck.
    ACM Workshop on Security and Artificial Intelligence (AISEC) October 2012
  • Learning Stateful Models for Network Honeypots. [pdf]
    Tammo Krueger, Hugo Gascon, Nicole Kraemer, and Konrad Rieck.
    ACM Workshop on Security and Artificial Intelligence (AISEC) October 2012
  • Intelligent Defense against Malicious JavaScript Code. [pdf]
    Tammo Krueger and Konrad Rieck.
    Praxis der Informationsverarbeitung und Kommunikation (PIK) , de Gruyter, January, 2012

2011

  • Adaptive Detection of Covert Communication in HTTP Requests. [pdf]
    Guido Schwenk and Konrad Rieck.
    7th European Conference on Computer Network Defense (EC2ND), September, 2011
  • Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities using Machine Learning. [pdf]
    Fabian Yamaguchi, Felix 'FX' Lindner and Konrad Rieck.
    5th USENIX Workshop on Offensive Technologies (WOOT), August, 2011
  • Computer Security and Machine Learning: Worst Enemies or Best Friends? [pdf]
    Konrad Rieck.
    1st DIMVA Workshop on Systems Security (SYSSEC), July, 2011.
  • Self-Learning Network Intrusion Detection. [pdf]
    Konrad Rieck.
    Information Technology (IT), 53 (3) 152–156, Oldenbourg, May, 2011.