TY - JOUR A1 - Wenzl, Matthias A1 - Merzdovnik, Georg A1 - Weippl, Edgar T1 - ISaFe - Injecting Security Features into Constrained Embedded Firmware JF - ERCIM News KW - Binary rewriting KW - Binary Hardening KW - Embedded Systems KW - Embedded Firmware Y1 - 2019 VL - 2019 IS - 119 (2019) SP - 25 EP - 26 ER - TY - JOUR A1 - Wenzl, Matthias A1 - Merzdovnik, Georg A1 - Ullrich, Johann A1 - Weippl, Edgar T1 - From Hack to Elaborate Technique - A Survey on Binary Rewriting JF - ACM Computing Surveys (CSUR) KW - Binary rewriting KW - Binary Hardening KW - Dynamic Rewriting KW - Reassembly KW - Static Rewriting Y1 - 2019 VL - Volume 52 IS - Number 3 (2019) SP - 49:1 EP - 49:37 ER - TY - JOUR A1 - Mulazzani, Martin A1 - Huber, Markus A1 - Weippl, Edgar T1 - Anonymity & Monitoring: How to Monitor the Infrastructure of an Anonymity System JF - IEEE Transactions on Systems Man and Cybernetics Part C KW - Anonymity System Y1 - 2019 ER - TY - JOUR A1 - Weippl, Edgar T1 - Exploiting Ontology for Software License Agreements JF - International Journal of Software and Informatics KW - Ontology KW - Software License KW - Intellectual Property Y1 - 2019 ER - TY - JOUR A1 - Tabatabai Irani, Mohammad A1 - Weippl, Edgar T1 - Automation Of Post-Exploitation JF - International Journal of Web Information Systems (IJWIS) KW - Automation KW - Post-Exploitation Y1 - 2019 VL - 2009 IS - Vol 5(4) SP - 518 EP - 536 ER -