Personal information

No personal information available

Activities

Employment (1)

SBA Research: Vienna, AT

Employment
Source: Self-asserted source
Manuel Leithner

Works (47)

Annotation-Based Input Modeling for Combinatorial Testing

2025 | Book chapter
Contributors: Markus Fugger; Manuel Leithner; Dimitris E. Simos
Source: check_circle
Crossref

Combinatorial Testing Methods for Reverse Engineering Undocumented CAN Bus Functionality

2024-07-30 | Conference paper
Contributors: Christoph Wech; Reinhard Kugler; Manuel Leithner; Dimitris E. Simos
Source: check_circle
Crossref

A Two-Step TLS-Based Browser fingerprinting approach using combinatorial sequences

Computers & Security
2022 | Journal article
Source: Self-asserted source
Manuel Leithner

CA 2: Practical Archival and Compression of Covering Arrays

2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)
2022 | Conference paper
Source: Self-asserted source
Manuel Leithner

Combinatorial methods for dynamic gray-box SQL injection testing

Software Testing, Verification and Reliability
2022 | Journal article
Source: Self-asserted source
Manuel Leithner

Developing multithreaded techniques and improved constraint handling for the tool CAgen

2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)
2022 | Conference paper
Source: Self-asserted source
Manuel Leithner

CHIEv: concurrent hybrid analysis for crawling and modeling of web applications

ACM SIGAPP Applied Computing Review
2021 | Journal article
Source: Self-asserted source
Manuel Leithner

HYDRA: Feedback-driven black-box exploitation of injection vulnerabilities

Information and Software Technology
2021-12 | Journal article
Part of ISSN: 0950-5849
Source: Self-asserted source
Manuel Leithner
grade
Preferred source (of 3)‎

Combinatorially XSSing Web Application Firewalls

2021 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)
2021-04 | Conference paper
Source: Self-asserted source
Manuel Leithner
grade
Preferred source (of 2)‎

CHIEv

ACM SIGAPP Applied Computing Review
2021-03 | Journal article
Part of ISSN: 1559-6915
Part of ISSN: 1931-0161
Source: Self-asserted source
Manuel Leithner

Sliced AETG: a memory-efficient variant of the AETG covering array generation algorithm

Optim. Lett.
2020 | Journal article
Source: Self-asserted source
Manuel Leithner
grade
Preferred source (of 2)‎

XIEv: dynamic analysis for crawling and modeling of web applications

SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30 - April 3, 2020
2020 | Conference paper
Source: Self-asserted source
Manuel Leithner
grade
Preferred source (of 3)‎

A Fault-Driven Combinatorial Process for Model Evolution in XSS Vulnerability Detection

Advances and Trends in Artificial Intelligence. From Theory to Practice - 32nd International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2019, Graz, Austria, July 9-11, 2019, Proceedings
2019 | Conference paper
Source: Self-asserted source
Manuel Leithner
grade
Preferred source (of 2)‎

Applying Combinatorial Testing to Large-Scale Data Processing at Adobe

2019 IEEE International Conference on Software Testing, Verification and Validation Workshops, ICST Workshops 2019, Xi'an, China, April 22-23, 2019
2019 | Conference paper
Source: Self-asserted source
Manuel Leithner
grade
Preferred source (of 2)‎

Automated combinatorial testing for detecting SQL vulnerabilities in web applications

Proceedings of the 14th International Workshop on Automation of Software Test, AST@ICSE 2019, May 27, 2019, Montreal, QC, Canada
2019 | Conference paper
Source: Self-asserted source
Manuel Leithner
grade
Preferred source (of 2)‎

Practical Combinatorial Testing for XSS Detection using Locally Optimized Attack Models

2019 IEEE International Conference on Software Testing, Verification and Validation Workshops, ICST Workshops 2019, Xi'an, China, April 22-23, 2019
2019 | Conference paper
Source: Self-asserted source
Manuel Leithner
grade
Preferred source (of 2)‎

Problems and algorithms for covering arrays via set covers

Theor. Comput. Sci.
2019 | Journal article
Source: Self-asserted source
Manuel Leithner
grade
Preferred source (of 2)‎

Testing TLS using planning-based combinatorial methods and execution framework

Softw. Qual. J.
2019 | Journal article
Source: Self-asserted source
Manuel Leithner
grade
Preferred source (of 2)‎

CAMETRICS: A Tool for Advanced Combinatorial Analysis and Measurement of Test Sets

2018 IEEE International Conference on Software Testing, Verification and Validation Workshops, ICST Workshops, Västerås, Sweden, April 9-13, 2018
2018 | Conference paper
Source: Self-asserted source
Manuel Leithner
grade
Preferred source (of 2)‎

DOMdiff: Identification and Classification of Inter-DOM Modifications

2018 IEEE/WIC/ACM International Conference on Web Intelligence, WI 2018, Santiago, Chile, December 3-6, 2018
2018 | Conference paper
Source: Self-asserted source
Manuel Leithner
grade
Preferred source (of 2)‎

Covert Computation — Hiding code in code through compile-time obfuscation

Computers & Security
2014-05 | Journal article
Part of ISSN: 0167-4048
Source: Self-asserted source
Manuel Leithner
grade
Preferred source (of 2)‎

Covert computation

Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13
2013 | Conference paper
Source: Self-asserted source
Manuel Leithner

Covert computation: Hiding code in code for obfuscation purposes

Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
2013 | Conference paper
Source: Self-asserted source
Manuel Leithner

Fast and reliable browser identification with javascript engine fingerprinting

Web 2.0 Workshop on Security and Privacy (W2SP)
2013 | Conference paper
Source: Self-asserted source
Manuel Leithner

Book review: Android forensics

Computers and Security
2012 | Journal article
Source: Self-asserted source
Manuel Leithner

Book review: Coding for Penetration Testers

Computers and Security
2012 | Journal article
Source: Self-asserted source
Manuel Leithner

Book review: Enterprise Security for the Executive

Computers and Security
2012 | Journal article
Source: Self-asserted source
Manuel Leithner

Book review: Low Tech Hacking

Computers and Security
2012 | Journal article
Source: Self-asserted source
Manuel Leithner

Book review: Thor's Microsoft Security Bible

Computers and Security
2012 | Journal article
Source: Self-asserted source
Manuel Leithner

Book review: XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts

Computers and Security
2012 | Journal article
Source: Self-asserted source
Manuel Leithner

Guess who is texting you? evaluating the security of smartphone messaging applications

2012 | Journal article
Source: Self-asserted source
Manuel Leithner

Guess who’s texting you

Evaluating the Security of Smartphone Messaging Applications. SBA Research gGmbH
2012 | Journal article
Source: Self-asserted source
Manuel Leithner

Malicious Pixels Using QR Codes as Attack Vector

Atlantis Ambient and Pervasive Intelligence
2012 | Book chapter
Part of ISSN: 1875-7669
Source: Self-asserted source
Manuel Leithner
grade
Preferred source (of 2)‎

A comparison of Web service technologies for smart meter data exchange

2012 3rd IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe)
2012-10 | Conference paper
Source: Self-asserted source
Manuel Leithner
grade
Preferred source (of 2)‎

Cloud Speicherdienste als Angriffsvektoren

9. Sicherheitskonferenz Krems
2011 | Journal article
Source: Self-asserted source
Manuel Leithner

Dark clouds on the horizon: Using cloud storage as attack vector and online slack space

20th USENIX Security Symposium (USENIX Security 11)
2011 | Conference paper
Source: Self-asserted source
Manuel Leithner

Social snapshots

Proceedings of the 27th Annual Computer Security Applications Conference on - ACSAC '11
2011 | Conference paper
Source: Self-asserted source
Manuel Leithner
grade
Preferred source (of 2)‎

Social snapshots: Digital forensics for online social networks

Proceedings of the 27th annual computer security applications conference
2011 | Conference paper
Source: Self-asserted source
Manuel Leithner

Weippl,“Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and

Online Slack Space”, Proceedings of the 20th USENIX conference on Security
2011 | Conference paper
Source: Self-asserted source
Manuel Leithner

QR code security

Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia - MoMM '10
2010 | Conference paper
Source: Self-asserted source
Manuel Leithner
grade
Preferred source (of 3)‎

" Covert Computation-Hiding Code in Code for Obfuscation Purposes"; Vortrag: ASIA CCS'13 8th ACM Symposium on Information, Computer and Communications Security, Hangzhou; 08.05. 2013-10.05. 2013; in:" Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security", 1 (2013), ISBN: 978-1-4503-1767-2.

Journal article
Source: Self-asserted source
Manuel Leithner

2021 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)| 978-1-6654-4456-9/20/$31.00̧opyright 2021 IEEE| DOI: 10.1109/ICSTW52544. 2021.00056

Journal article
Source: Self-asserted source
Manuel Leithner

2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)| 978-1-6654-9628-5/22/$31.00̧opyright 2022 IEEE| DOI: 10.1109/ICSTW55395. 2022.00060

Journal article
Source: Self-asserted source
Manuel Leithner

A Call for more Automata Theory in Sequential Combinatorial Testing

Program Committee Chair
Journal article
Source: Self-asserted source
Manuel Leithner

Editorial 641 Incident response teams--Challenges in supporting the organisational security function

Journal article
Source: Self-asserted source
Manuel Leithner

Fast and Efficient Browser Identification with JavaScript Engine Fingerprinting

Journal article
Source: Self-asserted source
Manuel Leithner

Vorträge und Posterpräsentationen (ohne Tagungsband-Eintrag)

Journal article
Source: Self-asserted source
Manuel Leithner