Hugo Gascón
Hugo Gascón
German Edge Cloud, ICAI School of Engineering
Verified email at - Homepage
Cited by
Cited by
Drebin: Effective and explainable detection of android malware in your pocket.
D Arp, M Spreitzenbarth, M Hubner, H Gascon, K Rieck, C Siemens
Ndss 14, 23-26, 2014
Structural detection of android malware using embedded call graphs
H Gascon, F Yamaguchi, D Arp, K Rieck
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
Chucky: Exposing missing checks in source code for vulnerability discovery
F Yamaguchi, C Wressnegger, H Gascon, K Rieck
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Automatic inference of search patterns for taint-style vulnerabilities
F Yamaguchi, A Maier, H Gascon, K Rieck
2015 IEEE Symposium on Security and Privacy, 797-812, 2015
Continuous authentication on mobile devices by analysis of typing motion behavior
H Gascon, S Uellenbeck, C Wolf, K Rieck
Sicherheit 2014–Sicherheit, Schutz und Zuverlässigkeit, 2014
Fingerprinting mobile devices using personalized configurations
A Kurtz, H Gascon, T Becker, K Rieck, F Freiling
Proceedings on Privacy Enhancing Technologies 2016 (1), 4-19, 2016
Learning stateful models for network honeypots
T Krueger, H Gascon, N Krämer, K Rieck
Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012
Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols
H Gascon, C Wressnegger, F Yamaguchi, D Arp, K Rieck
International Conference on Security and Privacy in Communication Systems …, 2015
Analysis of update delays in signature-based network intrusion detection systems
H Gascon, A Orfila, J Blasco
Computers & Security 30 (8), 613-624, 2011
Mining attributed graphs for threat intelligence
H Gascon, B Grobauer, T Schreck, L Rist, D Arp, K Rieck
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
Reading Between The Lines: Content-Agnostic Detection of Spear-Phishing Emails
H Gascon, S Ulrich, B Stritter, K Rieck
Proc. of 21st International Symposium on Research in Attacks, Intrusions and …, 2018
TypeMiner: Recovering types in binary programs using machine learning
A Maier, H Gascon, C Wressnegger, K Rieck
International Conference on Detection of Intrusions and Malware, and …, 2019
Designing a broadband residential gateway using click! modular router
H Gascón, D Diez, J Garcia, F Valera, C Guerrero, A Azcorra
IFIP EUNICE (Networked applications), 2005
Designing a broadband residential gateway using Click! modular router. EUNICE'05
H Gascón, D Díez, J García, F Valera, C Guerrero, A Azcorra
July, 2005
Estudio de un Router Software para la implementación de una Pasarela Residencial
J García, F Valera, D Díez, H Gascón, C Guerrero, A Azcorra
Universidad Carlos III de Madrid. España, 0
Technical Report IFI-TB-2013-02 DREBIN: Efficient and Explainable Detection of Android Malware in Your Pocket
D Arp, M Spreitzenbarth, M Hübner, H Gascon, K Rieck
Secure Smartphone Online Authentication using Softkeyboards
S Uellenbeck, H Gascon, C Wolf, K Rieck
7. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit, 19, 2012
Estudio de un IDS Open Source frente a herramientas de análisis y explotación de vulnerabilidades
H Gascón Polanco
Structural Detection of Android Malware using Embedded Call Graphs
F Yamaguchi, H Gascon
Designing a Broadband Residential Gateway using Click! Modular Router
J Garcıa, F Valera, D Dıez, H Gascón, C Guerrero, A Azcorra
The system can't perform the operation now. Try again later.
Articles 1–20