Georg Merzdovnik
Univ.Lektor Dipl.-Ing. Dr.techn. / BSc
Role
-
External Lecturer
Logic and Computation, E192
Courses
Publications
- From Hack to Elaborate Technique—A Survey on Binary Rewriting / Wenzl, M., Merzdovnik, G., Ullrich, J. M. M., & Weippl, E. (2019). From Hack to Elaborate Technique—A Survey on Binary Rewriting. ACM Computing Surveys, 52(3), 1–37. https://doi.org/10.1145/3316415
- Measuring Cookies and Web Privacy in a Post-GDPR World / Dabrowski, A., Merzdovnik, G., Ullrich, J., Sendera, G., & Weippl, E. (2019). Measuring Cookies and Web Privacy in a Post-GDPR World. In Passive and Active Measurement (pp. 258–270). Springer, Cham. http://hdl.handle.net/20.500.12708/58117
-
Security and privacy in mobile environments
/
Merzdovnik, G. (2017). Security and privacy in mobile environments [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2017.45068
Download: PDF (2.54 MB) - Lightweight Address Hopping for Defending the IPv6 IoT / Judmayer, A., Ullrich, J., Merzdovnik, G., Voyiatzis, A. G., & Weippl, E. (2017). Lightweight Address Hopping for Defending the IPv6 IoT. In Proceedings of ARES 2017 (ACM International Conference Proceedings Series). 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio Calabria, Italy, EU. http://hdl.handle.net/20.500.12708/56973
- Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools / Merzdovnik, G., Huber, M., Buhov, D., Nikiforakis, N., Neuner, S., Schmiedecker, M., & Weippl, E. (2017). Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools. In Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P). 2nd IEEE European Symposium on Security and Privacy (EuroS&P), Paris, France, EU. http://hdl.handle.net/20.500.12708/56974
- Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? / Schrittwieser, S., Katzenbeisser, S., Kinder, J., Merzdovnik, G., & Weippl, E. (2016). Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? ACM Computing Surveys, 49(1), 1–37. https://doi.org/10.1145/2886012
- Network Security Challenges in Android Applications / Buhov, D., Huber, M., Merzdovnik, G., Weippl, E., & Dimitrova, V. (2015). Network Security Challenges in Android Applications. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 327–332). IEEE. http://hdl.handle.net/20.500.12708/56236
- Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations / Aufner, P., Merzdovnik, G., Huber, M., & Weippl, E. (2014). Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations. In Proceedings of the 7th International Conference on Security of Information and Networks (pp. 434–440). ACM Digital Library. http://hdl.handle.net/20.500.12708/56238
- Automated analysis and clustering of Windows shellcodes / Merzdovnik, G. (2012). Automated analysis and clustering of Windows shellcodes [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/160581
Supervisions
-
Internet of things testbed - A modular framework to find vulnerabilities
/
Gufler, K. (2024). Internet of things testbed - A modular framework to find vulnerabilities [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2024.105441
Download: PDF (1.09 MB) -
Scanning for IoT devices using a mobile android application: Detecting devices in IP-based networks and the bluetooth environment
/
Stöger, M. B. (2023). Scanning for IoT devices using a mobile android application: Detecting devices in IP-based networks and the bluetooth environment [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2023.105402
Download: PDF (1.79 MB) -
Identification of obfuscated function clones in binaries using machine learning
/
Pucher, M. (2021). Identification of obfuscated function clones in binaries using machine learning [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2022.87962
Download: PDF (3.15 MB) -
Privacy-preserving remote attestation protocol
/
George, D. R. (2021). Privacy-preserving remote attestation protocol [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2021.86825
Download: PDF (3.94 MB) -
Cruel intentions : enhancing androids intent firewall
/
Klepp, T. (2020). Cruel intentions : enhancing androids intent firewall [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2020.33840
Download: PDF (4.63 MB) -
Towards a scalable secure element cluster : a recommendation on hardware configuration
/
Hinterleitner, T. (2020). Towards a scalable secure element cluster : a recommendation on hardware configuration [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2020.72905
Download: PDF (1.61 MB) -
Security and privacy of secure messaging services : a case study of wire
/
Boll, A. (2020). Security and privacy of secure messaging services : a case study of wire [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2020.41015
Download: PDF (872 KB) -
Human assisted information extraction through Bluetooth low energy on android
/
Szivos, G. Z. (2019). Human assisted information extraction through Bluetooth low energy on android [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2019.53964
Download: PDF (2.38 MB) -
Automated XSS vulnerability detection through context aware fuzzing and dynamic analysis
/
Fink, T. (2018). Automated XSS vulnerability detection through context aware fuzzing and dynamic analysis [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2018.44740
Download: PDF (1.11 MB) -
Straightjacket: tightening process execution policies at runtime
/
Gadllah, A. (2015). Straightjacket: tightening process execution policies at runtime [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2015.27913
Download: PDF (666 KB)