Adversarial examples for malware detection K Grosse, N Papernot, P Manoharan, M Backes, P McDaniel European symposium on research in computer security, 62-79, 2017 | 533* | 2017 |
On the (statistical) detection of adversarial examples K Grosse, P Manoharan, N Papernot, M Backes, P McDaniel arXiv preprint arXiv:1702.06280, 2017 | 364 | 2017 |
A composable cryptographic library with nested operations M Backes, B Pfitzmann, M Waidner Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 331 | 2003 |
Appguard–enforcing user requirements on android apps M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky International Conference on TOOLS and Algorithms for the Construction and …, 2013 | 294* | 2013 |
The reactive simulatability (RSIM) framework for asynchronous systems M Backes, B Pfitzmann, M Waidner Information and Computation 205 (12), 1685-1720, 2007 | 283* | 2007 |
Automatic discovery and quantification of information leaks M Backes, B Köpf, A Rybalchenko 2009 30th IEEE Symposium on Security and Privacy, 141-153, 2009 | 234 | 2009 |
Automated verification of remote electronic voting protocols in the applied pi-calculus M Backes, C Hritcu, M Maffei 2008 21st IEEE Computer Security Foundations Symposium, 195-209, 2008 | 233 | 2008 |
Reliable third-party library detection in android and its security applications M Backes, S Bugiel, E Derr Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 213 | 2016 |
Acoustic Side-Channel Attacks on Printers. M Backes, M Dürmuth, S Gerling, M Pinkal, C Sporleder USENIX Security symposium 10, 307-322, 2010 | 210 | 2010 |
Verifiable delegation of computation on outsourced data M Backes, D Fiore, RM Reischuk Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 193 | 2013 |
Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol M Backes, M Maffei, D Unruh 2008 IEEE Symposium on Security and Privacy (sp 2008), 202-215, 2008 | 192 | 2008 |
You can run but you can't read: Preventing disclosure exploits in executable code M Backes, T Holz, B Kollenda, P Koppe, S Nürnberger, J Pewny Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 181 | 2014 |
Oxymoron: Making fine-grained memory randomization practical by allowing code sharing M Backes, S Nürnberger 23rd {USENIX} Security Symposium ({USENIX} Security 14), 433-447, 2014 | 180 | 2014 |
You get where you're looking for: The impact of information sources on code security Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky 2016 IEEE Symposium on Security and Privacy (SP), 289-305, 2016 | 176 | 2016 |
Symmetric encryption in a simulatable Dolev-Yao style cryptographic library M Backes, B Pfitzmann Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 204-218, 2004 | 170 | 2004 |
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ... Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006 | 169* | 2006 |
Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models A Salem, Y Zhang, M Humbert, P Berrang, M Fritz, M Backes arXiv preprint arXiv:1806.01246, 2018 | 165 | 2018 |
Efficient comparison of enterprise privacy policies M Backes, G Karjoth, W Bagga, M Schunter Proceedings of the 2004 ACM symposium on Applied computing, 375-382, 2004 | 152 | 2004 |
Comparing the usability of cryptographic apis Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky 2017 IEEE Symposium on Security and Privacy (SP), 154-171, 2017 | 144 | 2017 |
A Universally Composable Cryptographic Library. M Backes, B Pfitzmann, M Waidner IACR Cryptol. ePrint Arch. 2003, 15, 2003 | 144 | 2003 |