Follow
Michael Spreitzenbarth
Michael Spreitzenbarth
University of Erlangen-Nuremberg
Verified email at spreitzenbarth.de - Homepage
Title
Cited by
Cited by
Year
Drebin: Effective and explainable detection of android malware in your pocket
D Arp, M Spreitzenbarth, M Hübner, H Gascon, K Rieck
Proc. of NDSS, 2014
27672014
Mobile-sandbox: having a deeper look into android applications
M Spreitzenbarth, F Freiling, F Echtler, T Schreck, J Hoffmann
Proceedings of the 28th annual ACM symposium on applied computing, 1808-1815, 2013
4412013
FROST: Forensic recovery of scrambled telephones
T Müller, M Spreitzenbarth
Applied Cryptography and Network Security: 11th International Conference …, 2013
1712013
Slicing droids: program slicing for smali code
J Hoffmann, M Ussath, T Holz, M Spreitzenbarth
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 1844-1851, 2013
1442013
Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques
M Spreitzenbarth, T Schreck, F Echtler, D Arp, J Hoffmann
International Journal of Information Security 14, 141-153, 2015
1412015
Post-mortem memory analysis of cold-booted android devices
C Hilgers, H Macht, T Müller, M Spreitzenbarth
2014 Eighth International Conference on IT Security Incident Management & IT …, 2014
522014
„Forensic Analysis of Smartphones: The Android Data Extractor Lite (ADEL)” in Conference on Digital Forensics
F Freiling, S Schmitt, M Spreitzenbarth
Security and Law, 2011
22*2011
Forensic analysis of YAFFS2
C Zimmermann, M Spreitzenbarth, S Schmitt, FC Freiling
Gesellschaft für Informatik eV, 2012
212012
Android Malware on the Rise
M Spreitzenbarth, F Freiling
Universitätsbibliothek der Universität, 2012
182012
Comparing sources of location data from android smartphones
M Spreitzenbarth, S Schmitt, F Freiling
Advances in Digital Forensics VIII: 8th IFIP WG 11.9 International …, 2012
142012
Mastering Python Forensics
M Spreitzenbarth, J Uhrmann
Packt Publishing, 2015
132015
Dissecting the Droid: Forensic analysis of android and its malicious applications
M Spreitzenbarth
PQDT-Global, 2013
122013
Defeating the secrets of otp apps
P Polleit, M Spreitzenbarth
Proceedings of the 2018 11th International Conference on IT Security …, 2018
112018
The Evil Inside a Droid—Android Malware: past, present and future
M Spreitzenbarth
Proceedings of the 1st Baltic Conference on Network Security & Forensics, 41-59, 2012
112012
Analysis and Comparison of BckR2D2-I and II
A Dewald, FC Freiling, T Schreck, M Spreitzenbarth, J Stüttgen, S Vömel, ...
9*2011
Mobile Phone Forensics: Analysis of the Android Filesystem (YAFFS2)
C Zimmermann, M Spreitzenbarth, S Schmitt
8*2011
Exploring the Landscape of Cybercrime
Z Benenson, A Dewald, HG Eßer, FC Freiling, T Müller, C Moch, S Vömel, ...
Deliverable D2. 3: 1st Project Workshop Proceedings, 70, 2011
62011
Tools and Processes for Forensic Analyses of Smartphones and Mobile Malware
M Spreitzenbarth
62011
Reverse Engineering of the Android File System (YAFFS2)
M Spreitzenbarth, S Schmitt, C Zimmermann
32011
Mobile phone forensics
M Spreitzenbarth
Diplomarbeit, Universität Mannheim, 2009. Retrieved 2012-04-04 from http …, 2009
32009
The system can't perform the operation now. Try again later.
Articles 1–20