Matthias Neugschwandtner  Matthias Neugschwandtner photo       

contact information

System & Software Security Research
Zurich Research Laboratory, Zurich, Switzerland
  +41dash44dash724dash84dash40

links



2017

Reconciling Security and Functional Requirements in Multi-tenant Clouds
Ghassan Karame, Matthias Neugschwandtner, Melek Onen, Hubert Ritzdorf
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, pp. 11--18, ACM, 2017


2016

Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices
Matthias Neugschwandtner, Collin Mulliner, William Robertson, Engin Kirda
Trust and Trustworthy Computing: 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings, pp. 60--81, Springer International Publishing

A Transparent Defense Against USB Eavesdropping Attacks
Matthias Neugschwandtner, Anton Beitler, Anil Kurmus
Proceedings of the 9th European Workshop on System Security, pp. 6:1--6:6, ACM, 2016


2015


The BORG: Nanoprobing Binaries for Buffer Overreads
M. Neugschwandtner, P. Milani Comparetti, I. Haller, H. Bos
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, pp. 87-97, 2015


2014

Lobotomy: An Architecture for JIT Spraying Mitigation
M. Jauernig, M. Neugschwandtner, C. Platzer, P. Milani Comparetti
9th International Conference on Availability, Reliability and Security (ARES), pp. 50-58, 2014

AndRadar: Fast Discovery of Android Applications in Alternative Markets
M. Lindorfer, S. Volanis, A. Sisto, M. Neugschwandtner, E. Athanasopoulos, F. Maggi, C. Platzer, S. Zanero, S. Ioannidis
In: Detection of Intrusions and Malware, and Vulnerability Assessment, Proc. 11th International Conference, DIMVA 2014, LNCS 8550, pp. 51-71

ANDRUBIS - 1,000,000 Apps Later: A View on Current Android Malware Behaviors
M. Lindorfer, M. Neugschwandtner, L. Weichselbaum, Y. Fratantonio, V. van der Veeny, C. Platzer
Technical Report, 2014

ANDRUBIS: Android Malware Under The Magnifying Glass
L. Weichselbaum, M. Neugschwandtner, M. Lindorfer, Y. Fratantonio, V. van der Veeny, C. Platzer
Technical Report TR-ISECLAB-0414-001, 2014


2013

A Static, Packer-Agnostic Filter to Detect Similar Malware Samples
G. Jacob, P. Milani Comparetti, M. Neugschwandtner, C. Kruegel, G. Vigna
In Detection of Intrusions and Malware, and Vulnerability Assessment, U. Flegel, E. Markatos, W. Robertson (Eds.), Proc. 9th International Conference, DIMVA 2012, LNCS 7591, pp. 102-122, 2013


Take a bite - Finding the worm in the Apple
M. Lindorfer, B. Miller, M. Neugschwandtner, C. Platzer
9th IEEE International Conference on Information, Communications and Signal Processing (ICICS), 2013

Dowsing for overflows: A guided fuzzer to find buffer boundary violations
I. Haller, A. Slowinska, M. Neugschwandtner, H. Bos
Usenix Security Conference, pp. 49-64, 2013


2011

FORECAST: Skimming off the malware cream
M. Neugschwandtner, P. Milani Comparetti, G. Jacob, C. Kruegel
Proceedings of the 27th Annual Computer Security Applications Conference ACSAC '11 , 2011

Detecting malware's failover C&C strategies with squeeze
M. Neugschwandtner, P. Milani Comparetti, C. Platzer
Proceedings of the 27th Annual Computer Security Applications Conference ACSAC '11 , 2011


2010

d Anubis — Dynamic Device Driver Analysis Based on Virtual Machine Introspection
M. Neugschwandtner, C. Platzer, P. Milani Comparetti, U. Bayer
Detection of Intrusions and Malware, and Vulnerability Assessment, LNCS 6201, pp. 41-60, 2010


2007

Web Services in Building Automation: Mapping KNX to oBIX
M. Neugschwandtner, G. Neugschwandtner, W. Kastner
5th IEEE International Conference on Industrial Informatics , pp. 87-92, 2007