Martina Lindorfer
Assistant Prof. Dipl.-Ing. Dr.in techn. / BSc
Roles
-
Assistant Professor
Security and Privacy, E192-06 -
Women in Informatics
Coordinator -
Faculty Council
Principal Member
Courses
2022W
- Bachelor Thesis / 192.061 / PR
- Project in Computer Science 1 / 192.075 / PR
- Project in Computer Science 2 / 192.076 / PR
- Seminar for Master Students in Software Engineering & Internet Computing / 180.777 / SE
- Seminar for PhD Students / 192.060 / SE
- Systems and Applications Security / 192.112 / VU
2023S
- Bachelor Thesis / 192.061 / PR
- Project in Computer Science 1 / 192.075 / PR
- Project in Computer Science 2 / 192.076 / PR
- Selected Topics in Information Security / 188.985 / VU
- Seminar for PhD Students / 192.060 / SE
Projects
-
IoTIO: Analyzing and Understanding the Internet of Insecure Things
2020 – 2024 / Vienna Science and Technology Fund (WWTF) -
A European Network of Excellence in Managing Threats and
Vulnerabilities in the Future Internet: Europe for the World
2010 – 2014 / European Commission -
i-Code: Real-time Malicious Code Identification
2010 – 2012 / European Commission -
TRUDIE - Trust Relationships in Underground IT Economies
2009 – 2012 / Austrian Research Promotion Agency (FFG)
Publications
Note: Due to the rollout of TU Wien’s new publication database, the list below may be slightly outdated. Once APIs for the new database have been released, everything will be up to date again.
- Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM´s TrustZone / D. Quarta, M. Ianni, A. Machiry, Y. Fratantonio, E. Gustafson, D. Balzarotti, M. Lindorfer, G. Vigna, C. Krügel / in: "Research on offensive and defensive techniques in the Context of Man At The End (MATE) Attacks (Checkmate ´21)", ACM (ed.); issued by: ACM; ACM, New York, 2021, ISBN: 978-1-4503-8552-7
- FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic / T. van Ede, R. Bortolameotti, A. Continella, J. Ren, D. Dubois, M. Lindorfer, D. Choffnes, M. van Steen, A. Peter / in: "Network and Distributed System Security Symposium (NDSS)", Internet Society, 2020, ISBN: 1-891562-61-4
- TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records / O. van der Toorn, R. van Rijswijk-Deij, T. Fiebig, M. Lindorfer, A. Sperotto / in: "International Workshop on Traffic Measurements for Cybersecurity (WTMC)", IEEE, 2020, ISBN: 978-1-7281-8598-9
- When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features / H. Aghakhani, F. Gritti, F. Mecca, M. Lindorfer, S. Ortolani, D. Balzarotti, G. Vigna, C. Krügel / in: "Network and Distributed System Security Symposium (NDSS)", Internet Society, 2020, ISBN: 1-891562-61-4
- MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense / R. Konoth, E. Vineti, V. Moonsamy, M. Lindorfer, C. Krügel, H. Bos, G. Vigna / in: "Proceedings of the 2018 ACM Conference on Computer and Communications Security (CCS)", ACM (ed.); ACM, 2018, ISBN: 978-1-4503-5693-0, 1714 - 1730
- Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications / E. Pan, J. Ren, M. Lindorfer, C. Wilson, D. Choffnes / in: "Privacy Enhancing Technologies Symposium (PETS)", DeGruyter, 4, 2018, 33 - 50
- GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM / V. van der Veen, M. Lindorfer, Y. Fratantonio, H. Padmanabha Pillai, G. Vigna, C. Krügel, H. Bos, K. Razavi / in: "Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)", Springer, 2018, ISBN: 978-3-319-93410-5, 92 - 113
- Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions / J. Ren, M. Lindorfer, D. Dubois, A. Rao, D. Choffnes, N. Vallina-Rodriguez / in: "Network and Distributed System Security Symposium (NDSS)", Internet Society, 2018
- Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis / A. Continella, Y. Fratantonio, M. Lindorfer, A. Puccetti, A. Zand, C. Krügel, G. Vigna / in: "Network and Distributed System Security Symposium (NDSS)", Internet Society, 2017
- Malware Through the Looking Glass: Malware Analysis in an Evolving Threat Landscape / Doctoral Thesis by M. Lindorfer / Supervisor, Reviewer: E. Weippl, T. Holz, E. Kirda; Institut für Rechnergestützte Automation, 2016; oral examination: 2016-02-02
- Drammer: Deterministic Rowhammer Attacks on Mobile Platforms / V. van der Veen, Y. Fratantonio, M. Lindorfer, D. Gruss, C. Maurice, G. Vigna, H. Bos, K. Razavi, C. Giuffrida / in: "ACM Conference on Computer and Communications Security (CCS)", ACM, 2016, ISBN: 978-1-4503-4139-4, 1675 - 1689
- ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic / J. Ren, A. Rao, M. Lindorfer, A. Legout, D. Choffnes / in: "International Conference on Mobile Systems, Applications and Services (MobiSys)", ACM, 2016, 361 - 374
- CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes / P. Carter, C. Mulliner, M. Lindorfer, W. Robertson, E. Kirda / in: "International Conference on Financial Cryptography and Data Security (FC)", Springer, 2016, ISBN: 978-3-662-54969-8, 231 - 249
- Marvin: Efficient and Comprehensive Mobile App Classification Through Static and Dynamic Analysis / M. Lindorfer, M. Neugschwandtner, Ch. Platzer / in: "Proceedings of the IEEE 39th Annual Computer Software and Applications Conference (COMPSAC)", IEEE, 2015, ISBN: 978-1-4673-6564-2, 422 - 433
- Enter Sandbox: Android Sandbox Comparison / S. Neuner, v. Victor, M. Lindorfer, M. Huber, M. Georg, M. Mulazzani, E. Weippl / in: "Proceedings of the IEEE Mobile Security Technologies Workshop (MoST)", IEEE, 2014
- Skin Sheriff: A Machine Learning Solution for Detecting Explicit Images / Ch. Platzer, M. Stütz, M. Lindorfer / in: "Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems (ASIACCS-SFCS)", IEEE, 2014, ISBN: 978-1-4503-2802-9, 45 - 56
- AndRadar: Fast Discovery of Android Applications in Alternative Markets / M. Lindorfer, V. Volanis, A. Sisto, M. Neugschwandtner, E. Athanasopoulos, F. Maggi, Ch. Platzer, S. Zanero, S. Ioannidis / in: "Proceedings of the 11th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)", Springer, LNCS 8550, 2014, ISBN: 978-3-319-08508-1, 51 - 71
- Andrubis - 1,000,000 Apps Later: A View on Current Android Malware Behaviors / M. Lindorfer, M. Neugschwandtner, L. Weichselbaum, Y. Fratantonio, V. van der Veen, Ch. Platzer / in: "Proceedings of the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)", IEEE, 2014, ISBN: 978-1-4799-8308-7, 3 - 17
- POSTER: Cross-Platform Malware: Write Once, Infect Everywhere / M. Lindorfer, M. Neumayr, J. Caballero, Ch. Platzer / Poster: ACM Conference on Computer and Communications Security (CCS), Berlin; 2013-11-04 - 2013-11-08; in: "ACM Conference on Computer and Communications Security (CCS)", (2013)
- A View to a Kill: WebView Exploitation / M. Neugschwandtner, M. Lindorfer, Ch. Platzer / in: "USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)", USENIX, 2013
- Take a Bite - Finding the Worm in the Apple / M. Lindorfer, B. Miller, M. Neugschwandtner, Ch. Platzer / in: "International Conference on Information, Communications and Signal Processing (ICICS)", IEEE, 2013
- Lines of Malicious Code: Insights Into the Malicious Software Industry / M. Lindorfer, A. Di Federico, F. Maggi, P. Milani Comparetti, S. Zanero / in: "Proceedings of the 28th Annual Computer Security Applications Conference", ACM, New York, 2012, ISBN: 978-1-4503-1312-4, 349 - 358
- Detecting Environment-Sensitive Malware / M. Lindorfer, C. Kolbitsch, P. Milani Comparetti / in: "Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection (2011)", Springer, 2011, ISBN: 978-3-642-23643-3
- Detecting Environment-Sensitive Malware / Master Thesis by M. Lindorfer / Supervisor: E. Kirda, P. Milani Comparetti, C. Kolbitsch; Institut für Rechnergestützte Automation, 2011
Supervisions
Note: Due to the rollout of TU Wien’s new publication database, the list below may be slightly outdated. Once APIs for the new database have been released, everything will be up to date again.
- Current State of Browser Extension Security and Extension-based Malware / Master Thesis by M. Neumayr / Supervisor: W. Kastner, M. Lindorfer; Rechnergestützte Automation, 2015; final examination: 2015-04-14