Follow
Felix Gröbert
Felix Gröbert
Google
Verified email at groebert.org
Title
Cited by
Cited by
Year
Automated identification of cryptographic primitives in binary programs
F Gröbert, C Willems, T Holz
Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011
1372011
Automatic identification of cryptographic primitives in software
F Gröbert
Ruhr-University Bochum 115, 2010
272010
Infiltrate the vault: Security analysis and decryption of lion full disk encryption
O Choudary, F Grobert, J Metz
Cryptology ePrint Archive, 2012
192012
Software distribution as a malware infection vector
F Gröbert, AR Sadeghi, M Winandy
2009 International Conference for Internet Technology and Secured …, 2009
72009
Web 2.0: Freund oder Feind?
D Birk, F Gröbert
Praxis Web 2, 35-50, 2007
62007
Security analysis and decryption of filevault 2
O Choudary, F Grobert, J Metz
Advances in Digital Forensics IX: 9th IFIP WG 11.9 International Conference …, 2013
52013
A forensic framework for tracing phishers
D Birk, S Gajek, F Gröbert, AR Sadeghi
IFIP Summer School on The Future of Identity in the Information Society, 2007
52007
Phishing phishers-tracing identity thieves and money launderer
D Birk, M Dornseif, S Gajek, F Gröbert
Horst Görtz Institute for IT Security, Ruhr University Bochum, Tech. Rep. TR …, 2006
52006
Is Teaching Hacking in Academia Ethical
F Grobert, T Kornau, L Pimenidis
32008
Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits: (Short Paper)
D Bußmeyer, F Gröbert, J Schwenk, C Wegener
Financial Cryptography and Data Security: 14th International Conference, FC …, 2010
12010
Datenschutz in Sozialen Netzwerken: Freund oder Feind?
D Birk, F Gröbert, C Wegener
GI Jahrestagung, 1688-1702, 2009
2009
Attacking of SmartCard-based Banking Applications with JavaScript-based Rootkits (short paper)
D Bußmeyer, F Gröbert, J Schwenk, C Wegener
The system can't perform the operation now. Try again later.
Articles 1–12