Follow
Michael Spreitzenbarth
Michael Spreitzenbarth
University of Erlangen-Nuremberg
Verified email at spreitzenbarth.de - Homepage
Title
Cited by
Cited by
Year
Drebin: Effective and explainable detection of android malware in your pocket
D Arp, M Spreitzenbarth, M Hübner, H Gascon, K Rieck
Proc. of NDSS, 2014
22742014
Mobile-sandbox: having a deeper look into android applications
M Spreitzenbarth, F Freiling, F Echtler, T Schreck, J Hoffmann
Proceedings of the 28th annual ACM symposium on applied computing, 1808-1815, 2013
4042013
FROST: Forensic recovery of scrambled telephones
T Müller, M Spreitzenbarth
Applied Cryptography and Network Security: 11th International Conference …, 2013
1592013
Slicing droids: program slicing for smali code
J Hoffmann, M Ussath, T Holz, M Spreitzenbarth
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 1844-1851, 2013
1342013
Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques
M Spreitzenbarth, T Schreck, F Echtler, D Arp, J Hoffmann
International Journal of Information Security 14, 141-153, 2015
1242015
Post-mortem memory analysis of cold-booted android devices
C Hilgers, H Macht, T Müller, M Spreitzenbarth
2014 Eighth International Conference on IT Security Incident Management & IT …, 2014
482014
„Forensic Analysis of Smartphones: The Android Data Extractor Lite (ADEL)” in Conference on Digital Forensics
F Freiling, S Schmitt, M Spreitzenbarth
Security and Law, 2011
21*2011
Forensic analysis of YAFFS2
C Zimmermann, M Spreitzenbarth, S Schmitt, FC Freiling
SICHERHEIT 2012–Sicherheit, Schutz und Zuverlässigkeit, 2012
202012
Android Malware on the Rise
M Spreitzenbarth, F Freiling
Universitätsbibliothek der Universität, 2012
182012
Comparing sources of location data from android smartphones
M Spreitzenbarth, S Schmitt, F Freiling
Advances in Digital Forensics VIII: 8th IFIP WG 11.9 International …, 2012
142012
Mastering Python Forensics
M Spreitzenbarth, J Uhrmann
Packt Publishing, 2015
132015
Dissecting the Droid: Forensic analysis of android and its malicious applications
M Spreitzenbarth
PQDT-Global, 2013
112013
The Evil Inside a Droid—Android Malware: past, present and future
M Spreitzenbarth
Proceedings of the 1st Baltic Conference on Network Security & Forensics, 41-59, 2012
92012
Analysis and Comparison of BckR2D2-I and II
A Dewald, FC Freiling, T Schreck, M Spreitzenbarth, J Stüttgen, S Vömel, ...
8*2011
Mobile Phone Forensics: Analysis of the Android Filesystem (YAFFS2)
C Zimmermann, M Spreitzenbarth, S Schmitt
7*2011
Defeating the secrets of otp apps
P Polleit, M Spreitzenbarth
IEEE, 76-88, 2018
62018
Exploring the Landscape of Cybercrime
Z Benenson, A Dewald, HG Eßer, FC Freiling, T Müller, C Moch, S Vömel, ...
Deliverable D2. 3: 1st Project Workshop Proceedings, 70, 2011
52011
Tools and Processes for Forensic Analyses of Smartphones and Mobile Malware
M Spreitzenbarth
42011
Reverse Engineering of the Android File System (YAFFS2)
M Spreitzenbarth, S Schmitt, C Zimmermann
32011
Mobile phone forensics
M Spreitzenbarth
University of Mannheim, 2009
32009
The system can't perform the operation now. Try again later.
Articles 1–20