@article{WenzlMerzdovnikWeippl, author = {Wenzl, Matthias and Merzdovnik, Georg and Weippl, Edgar}, title = {ISaFe - Injecting Security Features into Constrained Embedded Firmware}, series = {ERCIM News}, volume = {2019}, journal = {ERCIM News}, number = {119 (2019)}, pages = {25 -- 26}, subject = {Binary rewriting}, language = {en} } @article{WenzlMerzdovnikUllrichetal., author = {Wenzl, Matthias and Merzdovnik, Georg and Ullrich, Johann and Weippl, Edgar}, title = {From Hack to Elaborate Technique - A Survey on Binary Rewriting}, series = {ACM Computing Surveys (CSUR)}, volume = {Volume 52}, journal = {ACM Computing Surveys (CSUR)}, number = {Number 3 (2019)}, pages = {49:1 -- 49:37}, subject = {Binary rewriting}, language = {en} } @article{MulazzaniHuberWeippl, author = {Mulazzani, Martin and Huber, Markus and Weippl, Edgar}, title = {Anonymity \& Monitoring: How to Monitor the Infrastructure of an Anonymity System}, series = {IEEE Transactions on Systems Man and Cybernetics Part C}, journal = {IEEE Transactions on Systems Man and Cybernetics Part C}, subject = {Anonymity System}, language = {en} } @article{Weippl, author = {Weippl, Edgar}, title = {Exploiting Ontology for Software License Agreements}, series = {International Journal of Software and Informatics}, journal = {International Journal of Software and Informatics}, subject = {Ontology}, language = {en} } @article{TabatabaiIraniWeippl, author = {Tabatabai Irani, Mohammad and Weippl, Edgar}, title = {Automation Of Post-Exploitation}, series = {International Journal of Web Information Systems (IJWIS)}, volume = {2009}, journal = {International Journal of Web Information Systems (IJWIS)}, number = {Vol 5(4)}, pages = {518 -- 536}, subject = {Automation}, language = {en} }