default search action
Manuel Leithner
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Manuel Leithner, Andrea Bombarda, Michael Wagner, Angelo Gargantini, Dimitris E. Simos:
State of the CArt: evaluating covering array generators at scale. Int. J. Softw. Tools Technol. Transf. 26(3): 301-326 (2024) - [c21]Christoph Wech, Reinhard Kugler, Manuel Leithner, Dimitris E. Simos:
Combinatorial Testing Methods for Reverse Engineering Undocumented CAN Bus Functionality. ARES 2024: 37:1-37:7 - [c20]Dimitris E. Simos, Bernhard Garn, Dominik Schreiber, Manuel Leithner, D. Richard Kuhn, Raghu Kacker:
On Combinatorial Security Testing for the Tor Anonymity Network Client. ICSTW 2024: 207-210 - 2023
- [c19]Jovan Zivanovic, Manuel Leithner, Dimitris E. Simos, Michael Pitzer, Peter J. Slanina:
Combinatorial Methods for HTML Sanitizer Security Testing. ICSTW 2023: 255-259 - [c18]Bernhard Garn, Jovan Zivanovic, Manuel Leithner, Dimitris E. Simos:
Summary of Combinatorial Methods for Dynamic Gray-Box SQL Injection Testing. ICSTW 2023: 263-265 - [c17]Bernhard Garn, Ludwig Kampel, Manuel Leithner, Berina Celic, Ceren Çulha, Irene Hiess, Klaus Kieseberg, Marlene Koelbing, Dominik-Philip Schreiber, Michael Wagner, Christoph Wech, Jovan Zivanovic, Dimitris E. Simos:
Applying Pairwise Combinatorial Testing to Large Language Model Testing. ICTSS 2023: 247-256 - 2022
- [j13]Bernhard Garn, Stefan Zauner, Dimitris E. Simos, Manuel Leithner, D. Richard Kuhn, Raghu Kacker:
A Two-Step TLS-Based Browser fingerprinting approach using combinatorial sequences. Comput. Secur. 114: 102575 (2022) - [j12]Bernhard Garn, Jovan Zivanovic, Manuel Leithner, Dimitris E. Simos:
Combinatorial methods for dynamic gray-box SQL injection testing. Softw. Test. Verification Reliab. 32(6) (2022) - [c16]Manuel Leithner, Dimitris E. Simos:
CA2: Practical Archival and Compression of Covering Arrays. ICST Workshops 2022: 63-67 - [c15]Michael Wagner, Manuel Leithner, Dimitris E. Simos, Rick Kuhn, Raghu Kacker:
Developing multithreaded techniques and improved constraint handling for the tool CAgen. ICST Workshops 2022: 87-93 - 2021
- [j11]Manuel Leithner, Bernhard Garn, Dimitris E. Simos:
HYDRA: Feedback-driven black-box exploitation of injection vulnerabilities. Inf. Softw. Technol. 140: 106703 (2021) - [c14]Bernhard Garn, Daniel Sebastian Lang, Manuel Leithner, D. Richard Kuhn, Raghu Kacker, Dimitris E. Simos:
Combinatorially XSSing Web Application Firewalls. ICST Workshops 2021: 85-94 - 2020
- [j10]Ludwig Kampel, Manuel Leithner, Dimitris E. Simos:
Sliced AETG: a memory-efficient variant of the AETG covering array generation algorithm. Optim. Lett. 14(6): 1543-1556 (2020) - [c13]Manuel Leithner, Dimitris E. Simos:
XIEv: dynamic analysis for crawling and modeling of web applications. SAC 2020: 2201-2210
2010 – 2019
- 2019
- [j9]Dimitris E. Simos, Josip Bozic, Bernhard Garn, Manuel Leithner, Feng Duan, Kristoffer Kleine, Yu Lei, Franz Wotawa:
Testing TLS using planning-based combinatorial methods and execution framework. Softw. Qual. J. 27(2): 703-729 (2019) - [j8]Ludwig Kampel, Manuel Leithner, Bernhard Garn, Dimitris E. Simos:
Problems and algorithms for covering arrays via set covers. Theor. Comput. Sci. 800: 90-106 (2019) - [c12]Dimitris E. Simos, Jovan Zivanovic, Manuel Leithner:
Automated combinatorial testing for detecting SQL vulnerabilities in web applications. AST@ICSE 2019: 55-61 - [c11]Dimitris E. Simos, Bernhard Garn, Jovan Zivanovic, Manuel Leithner:
Practical Combinatorial Testing for XSS Detection using Locally Optimized Attack Models. ICST Workshops 2019: 122-130 - [c10]Riley Smith, Darryl C. Jarman, Raghu Kacker, D. Richard Kuhn, Dimitris E. Simos, Ludwig Kampel, Manuel Leithner, Gabe Gosney:
Applying Combinatorial Testing to Large-Scale Data Processing at Adobe. ICST Workshops 2019: 190-193 - [c9]Bernhard Garn, Marco Radavelli, Angelo Gargantini, Manuel Leithner, Dimitris E. Simos:
A Fault-Driven Combinatorial Process for Model Evolution in XSS Vulnerability Detection. IEA/AIE 2019: 207-215 - 2018
- [c8]Manuel Leithner, Kristoffer Kleine, Dimitris E. Simos:
CAMETRICS: A Tool for Advanced Combinatorial Analysis and Measurement of Test Sets. ICST Workshops 2018: 318-327 - [c7]Manuel Leithner, Dimitris E. Simos:
DOMdiff: Identification and Classification of Inter-DOM Modifications. WI 2018: 262-269 - 2014
- [j7]Sebastian Schrittwieser, Stefan Katzenbeisser, Peter Kieseberg, Markus Huber, Manuel Leithner, Martin Mulazzani, Edgar R. Weippl:
Covert Computation - Hiding code in code through compile-time obfuscation. Comput. Secur. 42: 13-26 (2014) - 2013
- [c6]Sebastian Schrittwieser, Stefan Katzenbeisser, Peter Kieseberg, Markus Huber, Manuel Leithner, Martin Mulazzani, Edgar R. Weippl:
Covert computation: hiding code in code for obfuscation purposes. AsiaCCS 2013: 529-534 - 2012
- [j6]Manuel Leithner, Edgar R. Weippl:
Android forensics. Comput. Secur. 31(1): 3 (2012) - [j5]Manuel Leithner, Edgar R. Weippl:
Coding for Penetration Testers. Comput. Secur. 31(2): 252 (2012) - [j4]Edgar R. Weippl, Manuel Leithner:
Enterprise Security for the Executive. Comput. Secur. 31(4): 636 (2012) - [j3]Manuel Leithner, Edgar R. Weippl:
Thor's Microsoft Security Bible. Comput. Secur. 31(4): 638 (2012) - [j2]Manuel Leithner, Edgar R. Weippl:
XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts. Comput. Secur. 31(4): 639 (2012) - [j1]Manuel Leithner, Edgar R. Weippl:
Low Tech Hacking. Comput. Secur. 31(5): 738 (2012) - [c5]Markus Jung, Wolfgang Kastner, Georg Kienesberger, Manuel Leithner:
A comparison of Web service technologies for smart meter data exchange. ISGT Europe 2012: 1-8 - [c4]Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar R. Weippl:
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications. NDSS 2012 - 2011
- [c3]Markus Huber, Martin Mulazzani, Manuel Leithner, Sebastian Schrittwieser, Gilbert Wondracek, Edgar R. Weippl:
Social snapshots: digital forensics for online social networks. ACSAC 2011: 113-122 - [c2]Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar R. Weippl:
Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space. USENIX Security Symposium 2011 - 2010
- [c1]Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Lindsay Munroe, Sebastian Schrittwieser, Mayank Sinha, Edgar R. Weippl:
QR code security. MoMM 2010: 430-435
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint