default search action
Mykolai Protsenko
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c18]Sebastian N. Peters, Nikolai Puch, Michael P. Heinl, Philipp Zieris, Mykolai Protsenko, Thorsten Larsen-Vefring, Marcel Ely Gomes, Aliza Maftun, Thomas Zeschg:
Gateway to the Danger Zone: Secure and Authentic Remote Reset in Machine Safety. ARES 2024: 150:1-150:9 - 2021
- [c17]Jonas Röckl, Mykolai Protsenko, Monika Huber, Tilo Müller, Felix C. Freiling:
Advanced System Resiliency Based on Virtualization Techniques for IoT Devices. ACSAC 2021: 455-467
2010 – 2019
- 2018
- [c16]Anatoli Kalysch, Oskar Milisterfer, Mykolai Protsenko, Tilo Müller:
Tackling Androids Native Library Malware with Robust, Efficient and Accurate Similarity Measures. ARES 2018: 58:1-58:10 - [c15]Gerd Stefan Brost, Manuel Huber, Michael Weiß, Mykolai Protsenko, Julian Schütte, Sascha Wessel:
An Ecosystem and IoT Device Architecture for Building Trust in the Industrial Data Space. CPSS@AsiaCCS 2018: 39-50 - [c14]Norman Hänsch, Andrea Schankin, Mykolai Protsenko, Felix C. Freiling, Zinaida Benenson:
Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently. SOUPS @ USENIX Security Symposium 2018: 341-356 - 2017
- [b1]Mykolai Protsenko:
Securing the android app ecosystem: obfuscation, tamperproofing, and malware detection = Absicherung des Android App Ökosystems. University of Erlangen-Nuremberg, Germany, 2017, pp. 1-142 - [j2]Noëlle Rakotondravony, Benjamin Taubmann, Waseem Mandarawi, Eva Weishäupl, Peng Xu, Bojan Kolosnjaji, Mykolai Protsenko, Hermann de Meer, Hans P. Reiser:
Classifying malware attacks in IaaS cloud environments. J. Cloud Comput. 6: 26 (2017) - [c13]Marcel Busch, Mykolai Protsenko, Tilo Müller:
A Cloud-Based Compilation and Hardening Platform for Android Apps. ARES 2017: 37:1-37:6 - [c12]Richard Baumann, Mykolai Protsenko, Tilo Müller:
Anti-ProGuard: Towards Automated Deobfuscation of Android Apps. SHCIS@DAIS 2017: 7-12 - 2016
- [c11]Lukas Dresel, Mykolai Protsenko, Tilo Müller:
ARTIST: The Android Runtime Instrumentation Toolkit. ARES 2016: 107-116 - [c10]Sebastian Hahn, Mykola Protsenko, Tilo Müller:
Comparative evaluation of machine learning-based malware detection on Android. Sicherheit 2016: 79-88 - 2015
- [j1]Dominik Christian Maier, Mykola Protsenko, Tilo Müller:
A game of Droid and Mouse: The threat of split-personality malware on Android. Comput. Secur. 54: 2-15 (2015) - [c9]Mykola Protsenko, Sebastien Kreuter, Tilo Müller:
Dynamic Self-Protection and Tamperproofing for Android Apps Using Native Code. ARES 2015: 129-138 - [c8]Andreas Fischer, Thomas Kittel, Bojan Kolosnjaji, Tamas K. Lengyel, Waseem Mandarawi, Hermann de Meer, Tilo Müller, Mykola Protsenko, Hans P. Reiser, Benjamin Taubmann, Eva Weishäupl:
CloudIDEA: A Malware Defense Architecture for Cloud Data Centers. OTM Conferences 2015: 594-611 - [c7]Mykola Protsenko, Tilo Müller:
Protecting Android Apps Against Reverse Engineering by the Use of the Native Code. TrustBus 2015: 99-110 - 2014
- [c6]Dominik Christian Maier, Tilo Müller, Mykola Protsenko:
Divide-and-Conquer: Why Android Malware Cannot Be Stopped. ARES 2014: 30-39 - [c5]Yan Zhuang, Mykola Protsenko, Tilo Müller, Felix C. Freiling:
An(other) Exercise in Measuring the Strength of Source Code Obfuscation. DEXA Workshops 2014: 313-317 - [c4]Felix C. Freiling, Mykola Protsenko, Yan Zhuang:
An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs. SecureComm (2) 2014: 315-328 - [c3]Mykola Protsenko, Tilo Müller:
Android Malware Detection Based on Software Complexity Metrics. TrustBus 2014: 24-35 - [c2]David Eckhoff, Mykola Protsenko, Reinhard German:
Toward an Open Source Location Privacy Evaluation Framework for Vehicular Networks. VTC Fall 2014: 1-2 - 2013
- [c1]Mykola Protsenko, Tilo Müller:
PANDORA applies non-deterministic obfuscation randomly to Android. MALWARE 2013: 59-67
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint