Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2019Automated security testing for web applications on industrial automation and control systems
Pfrang, Steffen; Borcherding, Anne; Meier, David; Beyerer, Jürgen
Journal Article
2018Advancing protocol fuzzing for industrial automation and control systems
Pfrang, Steffen; Meier, David; Friedrich, M.; Beyerer, Jürgen
Conference Paper
2017The trouble with security requirements
Türpe, Sven
Conference Paper
2016Empirical susceptibility, vulnerability and risk analysis for resilience enhancement of urban areas to terrorist events
Vogelbacher, Georg; Häring, Ivo; Fischer, Kai; Riedel, Werner
Journal Article
2016A framework for a uniform quantitative description of risk with respect to safety and security
Beyerer, Jürgen; Geisler, Jürgen
Journal Article
2016Google - das Schweizer Messer zur Verwundbarkeitsanalyse?
Simon, Kai; Moucha, Cornelius
Journal Article
2016HPEM vulnerability of substation control systems as components of the Smart Grid
Lanzrath, Marian; Suhrke, Michael; Pusch, Thorsten; Adami, Christian; Jöster, Michael
Conference Paper
2016Influence of buildings on HPEM vulnerability of it infrastructures
Jöster, Michael; Bausen, André; Pohlenz, Stefan; Pusch, Thorsten; Schaarschmidt, Martin; Suhrke, Michael
Conference Paper
2016Preventing pass-the-hash and similar impersonation attacks in enterprise infrastructures
Oberle, Alexander; Larbig, Pedro; Marx, Ronald; Weber, Frank G.; Scheuermann, Dirk; Fages, Daniel; Thomas, Fabien
Conference Paper
2016Risks of Industrie 4.0 - an information technology perspective
Usländer, Thomas; Thomalla, Christoph
Abstract
2016Taking the step towards a more dynamic view on raw material criticality: An indicator based analysis for Germany and Japan
Glöser-Chahoud, Simon; Tercero Espinoza, Luis A.; Walz, Rainer; Faulstich, Martin
Journal Article
2016Verwundbarkeitsprüfungen mit Shodan
Simon, Kai; Moucha, Cornelius
Journal Article
2015Generation dependence of communication device vulnerability to intentional electromagnetic interference (IEMI)
Adami, Christian; Jöster, Michael; Pusch, Thorsten; Suhrke, Michael; Taenzer, Achim
Conference Paper
2015How current android malware seeks to evade automated code analysis
Rasthofer, Siegfried; Asrar, Irfan; Huber, Stephan; Bodden, Eric
Conference Paper
2015An investigation of the Android/BadAccents malware which exploits a new Android tapjacking attack
Rasthofer, Siegfried; Asrar, Irfan; Huber, Stephan; Bodden, Eric
Report
2015A quantitative risk model for a uniform description of safety and security
Beyerer, Jürgen; Geisler, Jürgen
Conference Paper
2014Schwachstellenanalyse mittels klassischer Internet-Suchmaschinen
Opp, Axel
: Diehl, Norbert (Supervisor); Simon, Kai (Supervisor)
Master Thesis
2011Model-based security testing. Selected considerations
Schieferdecker, I.; Großmann, J.; Rennoch, A.
Presentation
2011Search-based application security testing: Towards a structured search space
Türpe, S.
Conference Paper
2010Quantifying the attack surface of a web application
Heumann, T.; Keller, J.; Türpe, S.
Conference Paper
2009Security inspection scenarios - a facet of security
Klaus, Alexander; Elberzhager, Frank
Conference Paper
2009Security inspection scenarios - a facet of security
Klaus, Alexander; Elberzhager, Frank
Report
2008Supporting security testers in discovering injection flaws
Türpe, S.; Poller, A.; Trukenmüller, J.; Repp, J.; Bornmann, C.
Conference Paper
2001Vulnerabilities and security limitations of current IP telephony systems
Ackermann, R.; Schumacher, M.; Roedig, U.; Steinmetz, R.
Conference Paper
1994GAP a binder for LOVA Gun Propellants? A Comparison between HTPB and GAP
Schedlbauer, F.
Conference Paper
1994Insensitive Energetic Materials and Environmental Awareness - A challenge for Research
Schubert, H.
Conference Paper
1991The influence of particle size on the sensitivity of PBX's with the same young's-modulus.
Kretschmer, A.; Schedlbauer, F.
Conference Paper