Follow
Tobias Fiebig
Tobias Fiebig
Max-Planck-Institut für Informatik, FG INET
Verified email at fiebig.nl - Homepage
Title
Cited by
Cited by
Year
Investigating System Operators’ Perspective on Security Misconfigurations
C Dietrich, K Krombholz, K Borgolte, T Fiebig
Proceedings ACM Conference on Computer and Communications Security (CCS), 2018
1342018
Taking Control of SDN-based Cloud Systems via the Data Plane
K Thimmaraju, B Shastry, T Fiebig, F Hetzelt, JP Seifert, A Feldmann, ...
ACM Symposium on SDN Research (SOSR), 2018
71*2018
Something from nothing (There): collecting global IPv6 datasets from DNS
T Fiebig, K Borgolte, S Hao, C Kruegel, G Vigna
Passive and Active Measurement: 18th International Conference, PAM 2017 …, 2017
712017
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates
K Borgolte, T Fiebig, S Hao, C Kruegel, G Vigna
Network and Distributed Systems Security Symposium, 2018
662018
Enumerating active IPv6 hosts for large-scale security scans via DNSSEC-signed reverse zones
K Borgolte, S Hao, T Fiebig, G Vigna
2018 IEEE Symposium on Security and Privacy (SP), 770-784, 2018
562018
Heads in the Clouds? Measuring Universities' Migration to Public Clouds: Implications for Privacy & Academic Freedom
T Fiebig, S Gürses, CH Gañán, E Kotkamp, F Kuipers, M Lindorfer, ...
Proceedings on Privacy Enhancing Technologies Symposium 2023 (2), 2022
54*2022
Security Impact of High Resolution Smartphone Cameras
T Fiebig, J Krissler, R Hänsch
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014
432014
Static Program Analysis as a Fuzzing Aid
B Shastry, M Leutner, T Fiebig, K Thimmaraju, F Yamaguchi, K Rieck, ...
International Symposium on Research in Attacks, Intrusions, and Defenses, 2017
382017
In rDNS We Trust: Revisiting a Common Data-Source’s Reliability
T Fiebig, K Borgolte, S Hao, C Kruegel, G Vgina, A Feldmann
Passive and Active Measurement Conference, 2018
362018
Human factors in security research: Lessons learned from 2008-2018
M Kaur, M van Eeten, M Janssen, K Borgolte, T Fiebig
arXiv preprint arXiv:2103.13287, 2021
302021
Security at the End of the Tunnel: The Anatomy of {VPN} Mental Models Among Experts and {Non-Experts} in a Corporate Context
V Binkhorst, T Fiebig, K Krombholz, W Pieters, K Labunets
31st USENIX Security Symposium (USENIX Security 22), 3433-3450, 2022
282022
Learning from the past: designing secure network protocols
T Fiebig, F Lichtblau, F Streibelt, T Krüger, P Lexis, R Bush, A Feldmann
Cybersecurity Best Practices: Lösungen zur Erhöhung der Cyberresilienz für …, 2018
22*2018
Analyzing End-Users’ Knowledge and Feelings Surrounding Smartphone Security and Privacy
L Kraus, T Fiebig, V Miruchna, S Möller, A Shabtai
Security & Privacy Workshops 2015 - Mobile Security Technologies (MoST) 2015, 2015
192015
Governance Challenges for European CyberSecurity Policy: Stakeholders Views
P Sterlini, F Massacci, N Kadenko, T Fiebig, M van Eeten
IEEE Security & Privacy, 2020
162020
TXTing 101: finding security issues in the long tail of DNS TXT records
O Van Der Toorn, R van Rijswijk-Deij, T Fiebig, M Lindorfer, A Sperotto
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
142020
Pushing boundaries: An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions
B Jansen, N Kadenko, D Broeders, M van Eeten, K Borgolte, T Fiebig
Government Information Quarterly 40 (4), 101862, 2023
122023
A One-Year Perspective on Exposed In-memory Key-Value Stores
T Fiebig, A Feldmann, M Petschick
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active …, 2016
122016
SoK: a framework for asset discovery: systematizing advances in network measurements for protecting organizations
M Vermeer, J West, A Cuevas, S Niu, N Christin, M Van Eeten, T Fiebig, ...
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 440-456, 2021
112021
The vamp attack: Taking control of cloud systems via the unified packet parser
K Thimmaraju, B Shastry, T Fiebig, F Hetzelt, JP Seifert, A Feldmann, ...
Proceedings of the 2017 on Cloud Computing Security Workshop, 11-15, 2017
112017
A Metric for the Evaluation and Comparison of Keylogger Performance
T Fiebig, J Danisevskis, M Piekarska
7th Workshop on Cyber Security Experimentation and Test (CSET '14), 2014
112014
The system can't perform the operation now. Try again later.
Articles 1–20