default search action
Benjamin Taubmann
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j5]Florian Menges, Tobias Latzo, Manfred Vielberth, Sabine Sobola, Henrich C. Pöhls, Benjamin Taubmann, Johannes Köstler, Alexander Puchta, Felix C. Freiling, Hans P. Reiser, Günther Pernul:
Towards GDPR-compliant data processing in modern SIEM systems. Comput. Secur. 103: 102165 (2021) - [c16]Thomas Dangl, Benjamin Taubmann, Hans P. Reiser:
RapidVMI: Fast and multi-core aware active virtual machine introspection. ARES 2021: 19:1-19:10 - [c15]Ahmed Abdelraoof, Benjamin Taubmann, Thomas Dangl, Hans P. Reiser:
Introspect Virtual Machines Like It Is the Linux Kernel! DIMVA 2021: 258-277 - 2020
- [b1]Benjamin Taubmann:
Improving Digital Forensics and Incident Analysis in Production Environments by Using Virtual Machine Introspection. University of Passau, Germany, 2020 - [c14]Benjamin Taubmann, Hans P. Reiser:
Towards Hypervisor Support for Enhancing the Performance of Virtual Machine Introspection. DAIS 2020: 41-54 - [c13]Thomas Dangl, Benjamin Taubmann, Hans P. Reiser:
Agent-Based File Extraction Using Virtual Machine Introspection. NordSec 2020: 174-191
2010 – 2019
- 2019
- [c12]Stewart Sentanoe, Benjamin Taubmann, Hans P. Reiser:
VMIGuard: Detecting and Preventing Service Integrity Violations by Malicious Insiders Using Virtual Machine Introspection. NordSec 2019: 271-282 - [c11]Benjamin Taubmann, Alexander Böhm, Hans P. Reiser:
TwinPorter - An Architecture For Enabling the Live Migration of VMI-Based Monitored Virtual Machines. TrustCom/BigDataSE 2019: 427-434 - 2018
- [j4]Benjamin Taubmann, Omar Alabduljaleel, Hans P. Reiser:
DroidKex: Fast extraction of ephemeral TLS keys from the memory of Android apps. Digit. Investig. 26 Supplement: S67-S76 (2018) - [c10]Stewart Sentanoe, Benjamin Taubmann, Hans P. Reiser:
Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection. NordSec 2018: 255-271 - [c9]Miguel Guerra, Benjamin Taubmann, Hans P. Reiser, Sileshi Demesie Yalew, Miguel Correia:
Introspection for ARM TrustZone with the ITZ Library. QRS 2018: 123-134 - [c8]Florian Menges, Fabian Böhm, Manfred Vielberth, Alexander Puchta, Benjamin Taubmann, Noëlle Rakotondravony, Tobias Latzo:
Introducing DINGfest: An architecture for next generation SIEM systems. Sicherheit 2018: 257-260 - 2017
- [j3]Noëlle Rakotondravony, Benjamin Taubmann, Waseem Mandarawi, Eva Weishäupl, Peng Xu, Bojan Kolosnjaji, Mykolai Protsenko, Hermann de Meer, Hans P. Reiser:
Classifying malware attacks in IaaS cloud environments. J. Cloud Comput. 6: 26 (2017) - [c7]Stewart Sentanoe, Benjamin Taubmann, Hans P. Reiser:
Virtual Machine Introspection Based SSH Honeypot. SHCIS@DAIS 2017: 13-18 - [c6]Benjamin Taubmann, Bojan Kolosnjaji:
Architecture for Resource-Aware VMI-based Cloud Malware Analysis. SHCIS@DAIS 2017: 43-48 - 2016
- [j2]Benjamin Taubmann, Christoph Frädrich, Dominik Dusold, Hans P. Reiser:
TLSkex: Harnessing virtual machine introspection for decrypting TLS communication. Digit. Investig. 16 Supplement: S114-S123 (2016) - [j1]Manuel Huber, Benjamin Taubmann, Sascha Wessel, Hans P. Reiser, Georg Sigl:
A flexible framework for mobile device forensics based on cold boot attacks. EURASIP J. Inf. Secur. 2016: 17 (2016) - [c5]Alexander Böhm, Benjamin Taubmann, Hans P. Reiser:
Geographic Localization of an Anonymous Social Network Message Data Set. ARES 2016: 844-850 - [c4]Benjamin Taubmann, Noëlle Rakotondravony, Hans P. Reiser:
CloudPhylactor: Harnessing Mandatory Access Control for Virtual Machine Introspection in Cloud Data Centers. Trustcom/BigDataSE/ISPA 2016: 957-964 - 2015
- [c3]Benjamin Taubmann, Manuel Huber, Sascha Wessel, Lukas Heim, Hans Peter Reiser, Georg Sigl:
A Lightweight Framework for Cold Boot Based Forensics on Mobile Devices. ARES 2015: 120-128 - [c2]Andreas Fischer, Thomas Kittel, Bojan Kolosnjaji, Tamas K. Lengyel, Waseem Mandarawi, Hermann de Meer, Tilo Müller, Mykola Protsenko, Hans P. Reiser, Benjamin Taubmann, Eva Weishäupl:
CloudIDEA: A Malware Defense Architecture for Cloud Data Centers. OTM Conferences 2015: 594-611 - 2012
- [c1]Tilo Müller, Benjamin Taubmann, Felix C. Freiling:
TreVisor - OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks. ACNS 2012: 66-83
Coauthor Index
aka: Hans Peter Reiser
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint