Published in: LIPIcs, Volume 333, 39th European Conference on Object-Oriented Programming (ECOOP 2025)
Francisco Handrick Tomaz da Costa, Ismael Medeiros, Leandro Oliveira, João Calássio, Rodrigo Bonifácio, Krishna Narasimhan, Mira Mezini, and Márcio Ribeiro. Scaling Up: Revisiting Mining Android Sandboxes at Scale for Malware Classification (Replication Paper). In 39th European Conference on Object-Oriented Programming (ECOOP 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 333, pp. 40:1-40:26, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025)
@InProceedings{handricktomazdacosta_et_al:LIPIcs.ECOOP.2025.40,
author = {Handrick Tomaz da Costa, Francisco and Medeiros, Ismael and Oliveira, Leandro and Cal\'{a}ssio, Jo\~{a}o and Bonif\'{a}cio, Rodrigo and Narasimhan, Krishna and Mezini, Mira and Ribeiro, M\'{a}rcio},
title = {{Scaling Up: Revisiting Mining Android Sandboxes at Scale for Malware Classification}},
booktitle = {39th European Conference on Object-Oriented Programming (ECOOP 2025)},
pages = {40:1--40:26},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-373-7},
ISSN = {1868-8969},
year = {2025},
volume = {333},
editor = {Aldrich, Jonathan and Silva, Alexandra},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ECOOP.2025.40},
URN = {urn:nbn:de:0030-drops-233320},
doi = {10.4230/LIPIcs.ECOOP.2025.40},
annote = {Keywords: Android Malware Detection, Dynamic Analysis, Mining Android Sandboxes}
}
Published in: Dagstuhl Reports, Volume 4, Issue 12 (2015)
Dieter Gollmann, Cormac Herley, Vincent Koenig, Wolter Pieters, and Martina Angela Sasse. Socio-Technical Security Metrics (Dagstuhl Seminar 14491). In Dagstuhl Reports, Volume 4, Issue 12, pp. 1-28, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2015)
@Article{gollmann_et_al:DagRep.4.12.1,
author = {Gollmann, Dieter and Herley, Cormac and Koenig, Vincent and Pieters, Wolter and Sasse, Martina Angela},
title = {{Socio-Technical Security Metrics (Dagstuhl Seminar 14491)}},
pages = {1--28},
journal = {Dagstuhl Reports},
ISSN = {2192-5283},
year = {2015},
volume = {4},
number = {12},
editor = {Gollmann, Dieter and Herley, Cormac and Koenig, Vincent and Pieters, Wolter and Sasse, Martina Angela},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.4.12.1},
URN = {urn:nbn:de:0030-drops-49744},
doi = {10.4230/DagRep.4.12.1},
annote = {Keywords: Security risk management, security metrics, socio-technical security, social engineering, multi-step attacks, return on security investment}
}
Published in: OASIcs, Volume 36, 5th Workshop on Medical Cyber-Physical Systems (2014)
Xintao Ma, Jonas Rinast, Sibylle Schupp, and Dieter Gollmann. Evaluating On-line Model Checking in UPPAAL-SMC using a Laser Tracheotomy Case Study. In 5th Workshop on Medical Cyber-Physical Systems. Open Access Series in Informatics (OASIcs), Volume 36, pp. 100-112, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2014)
@InProceedings{ma_et_al:OASIcs.MCPS.2014.100,
author = {Ma, Xintao and Rinast, Jonas and Schupp, Sibylle and Gollmann, Dieter},
title = {{Evaluating On-line Model Checking in UPPAAL-SMC using a Laser Tracheotomy Case Study}},
booktitle = {5th Workshop on Medical Cyber-Physical Systems},
pages = {100--112},
series = {Open Access Series in Informatics (OASIcs)},
ISBN = {978-3-939897-66-8},
ISSN = {2190-6807},
year = {2014},
volume = {36},
editor = {Turau, Volker and Kwiatkowska, Marta and Mangharam, Rahul and Weyer, Christoph},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.MCPS.2014.100},
URN = {urn:nbn:de:0030-drops-45279},
doi = {10.4230/OASIcs.MCPS.2014.100},
annote = {Keywords: On-line Model Checking, Laser Tracheotomy, UPPAAL-SMC, Patient-in-the-loop}
}
Published in: Dagstuhl Reports, Volume 2, Issue 12 (2013)
Lizzie Coles-Kemp, Carrie Gates, Dieter Gollmann, Sean Peisert, and Christian Probst. Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501). In Dagstuhl Reports, Volume 2, Issue 12, pp. 37-48, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2013)
@Article{coleskemp_et_al:DagRep.2.12.37,
author = {Coles-Kemp, Lizzie and Gates, Carrie and Gollmann, Dieter and Peisert, Sean and Probst, Christian},
title = {{Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501)}},
pages = {37--48},
journal = {Dagstuhl Reports},
ISSN = {2192-5283},
year = {2013},
volume = {2},
number = {12},
editor = {Coles-Kemp, Lizzie and Gates, Carrie and Gollmann, Dieter and Peisert, Sean and Probst, Christian},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.12.37},
URN = {urn:nbn:de:0030-drops-39881},
doi = {10.4230/DagRep.2.12.37},
annote = {Keywords: Insider threat, Organizational Process, Resilience, Security Policy}
}
Published in: Dagstuhl Seminar Proceedings, Volume 10341, Insider Threats: Strategies for Prevention, Mitigation, and Response (2010)
Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, and Christian W. Probst. 10341 Abstracts Collection – Insider Threats: Strategies for Prevention, Mitigation, and Response. In Insider Threats: Strategies for Prevention, Mitigation, and Response. Dagstuhl Seminar Proceedings, Volume 10341, pp. 1-12, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)
@InProceedings{bishop_et_al:DagSemProc.10341.1,
author = {Bishop, Matt and Coles-Kemp, Lizzie and Gollmann, Dieter and Hunker, Jeffrey and Probst, Christian W.},
title = {{10341 Abstracts Collection – Insider Threats: Strategies for Prevention, Mitigation, and Response}},
booktitle = {Insider Threats: Strategies for Prevention, Mitigation, and Response},
pages = {1--12},
series = {Dagstuhl Seminar Proceedings (DagSemProc)},
ISSN = {1862-4405},
year = {2010},
volume = {10341},
editor = {Matt Bishop and Lizzie Coles-Kemp and Dieter Gollmann and Jeff Hunker and Christian W. Probst},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.10341.1},
URN = {urn:nbn:de:0030-drops-29046},
doi = {10.4230/DagSemProc.10341.1},
annote = {Keywords: Insider Threat, Security Policies, Threat Modelling}
}
Published in: Dagstuhl Seminar Proceedings, Volume 10341, Insider Threats: Strategies for Prevention, Mitigation, and Response (2010)
Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, and Christian W. Probst. 10341 Report – Insider Threats: Strategies for Prevention, Mitigation, and Response. In Insider Threats: Strategies for Prevention, Mitigation, and Response. Dagstuhl Seminar Proceedings, Volume 10341, pp. 1-13, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)
@InProceedings{bishop_et_al:DagSemProc.10341.2,
author = {Bishop, Matt and Coles-Kemp, Lizzie and Gollmann, Dieter and Hunker, Jeffrey and Probst, Christian W.},
title = {{10341 Report – Insider Threats: Strategies for Prevention, Mitigation, and Response}},
booktitle = {Insider Threats: Strategies for Prevention, Mitigation, and Response},
pages = {1--13},
series = {Dagstuhl Seminar Proceedings (DagSemProc)},
ISSN = {1862-4405},
year = {2010},
volume = {10341},
editor = {Matt Bishop and Lizzie Coles-Kemp and Dieter Gollmann and Jeff Hunker and Christian W. Probst},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.10341.2},
URN = {urn:nbn:de:0030-drops-29033},
doi = {10.4230/DagSemProc.10341.2},
annote = {Keywords: Insider Threat, Security Policies, Threat Modelling}
}
Published in: Dagstuhl Seminar Proceedings, Volume 8302, Countering Insider Threats (2008)
Matt Bishop, Dieter Gollmann, Jeffrey Hunker, and Christian W. Probst. 08302 Abstracts Collection – Countering Insider Threats. In Countering Insider Threats. Dagstuhl Seminar Proceedings, Volume 8302, pp. 1-10, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{bishop_et_al:DagSemProc.08302.1,
author = {Bishop, Matt and Gollmann, Dieter and Hunker, Jeffrey and Probst, Christian W.},
title = {{08302 Abstracts Collection – Countering Insider Threats}},
booktitle = {Countering Insider Threats},
pages = {1--10},
series = {Dagstuhl Seminar Proceedings (DagSemProc)},
ISSN = {1862-4405},
year = {2008},
volume = {8302},
editor = {Matt Bishop and Dieter Gollmann and Jeffrey Hunke and Christian W. Probst},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08302.1},
URN = {urn:nbn:de:0030-drops-17960},
doi = {10.4230/DagSemProc.08302.1},
annote = {Keywords: Insider Threat, Security Policies, Threat Modelling}
}
Published in: Dagstuhl Seminar Proceedings, Volume 8302, Countering Insider Threats (2008)
Christian W. Probst, Jeffrey Hunker, Matt Bishop, and Dieter Gollmann. 08302 Summary – Countering Insider Threats. In Countering Insider Threats. Dagstuhl Seminar Proceedings, Volume 8302, pp. 1-18, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{probst_et_al:DagSemProc.08302.2,
author = {Probst, Christian W. and Hunker, Jeffrey and Bishop, Matt and Gollmann, Dieter},
title = {{08302 Summary – Countering Insider Threats}},
booktitle = {Countering Insider Threats},
pages = {1--18},
series = {Dagstuhl Seminar Proceedings (DagSemProc)},
ISSN = {1862-4405},
year = {2008},
volume = {8302},
editor = {Matt Bishop and Dieter Gollmann and Jeffrey Hunke and Christian W. Probst},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08302.2},
URN = {urn:nbn:de:0030-drops-17937},
doi = {10.4230/DagSemProc.08302.2},
annote = {Keywords: Insider threat, workshop report}
}
Published in: Dagstuhl Seminar Proceedings, Volume 8302, Countering Insider Threats (2008)
Ulrich Flegel, Florian Kerschbaum, and Richard Wacker. Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality. In Countering Insider Threats. Dagstuhl Seminar Proceedings, Volume 8302, pp. 1-5, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{flegel_et_al:DagSemProc.08302.3,
author = {Flegel, Ulrich and Kerschbaum, Florian and Wacker, Richard},
title = {{Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality}},
booktitle = {Countering Insider Threats},
pages = {1--5},
series = {Dagstuhl Seminar Proceedings (DagSemProc)},
ISSN = {1862-4405},
year = {2008},
volume = {8302},
editor = {Matt Bishop and Dieter Gollmann and Jeffrey Hunke and Christian W. Probst},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08302.3},
URN = {urn:nbn:de:0030-drops-17947},
doi = {10.4230/DagSemProc.08302.3},
annote = {Keywords: Insider threat; occupational fraud; privacy law; PET; logical clocks, pseudonyms,}
}
Published in: Dagstuhl Seminar Proceedings, Volume 8302, Countering Insider Threats (2008)
Ulrich Flegel, Julien Vayssière, and Gunter Bitz. Fraud Detection from a Business Perspective: Future Directions and Challenges. In Countering Insider Threats. Dagstuhl Seminar Proceedings, Volume 8302, pp. 1-3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{flegel_et_al:DagSemProc.08302.4,
author = {Flegel, Ulrich and Vayssi\`{e}re, Julien and Bitz, Gunter},
title = {{Fraud Detection from a Business Perspective: Future Directions and Challenges}},
booktitle = {Countering Insider Threats},
pages = {1--3},
series = {Dagstuhl Seminar Proceedings (DagSemProc)},
ISSN = {1862-4405},
year = {2008},
volume = {8302},
editor = {Matt Bishop and Dieter Gollmann and Jeffrey Hunke and Christian W. Probst},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08302.4},
URN = {urn:nbn:de:0030-drops-17956},
doi = {10.4230/DagSemProc.08302.4},
annote = {Keywords: Insider threat, occupational fraud, privacy law, PET, logical clocks, pseudonyms}
}