Julian Schütte
Julian Schütte
Verified email at aisec.fraunhofer.de - Homepage
TitleCited byYear
On the effectiveness of malware protection on android
R Fedler, J Schütte, M Kulicke
Fraunhofer AISEC 45, 2013
442013
Condroid: Targeted dynamic analysis of android applications
J Schütte, R Fedler, D Titze
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
322015
AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking Into Android Apps
J Schütte, D Titze, JM de Fuentes
282014
Blockchain for education: lifelong learning passport
W Gräther, S Kolvenbach, R Ruland, J Schütte, C Torres, F Wendland
Proceedings of 1st ERCIM Blockchain Workshop 2018, 2018
232018
Towards semantic resolution of security in ambient environments
M Hoffmann, A Badii, S Engberg, R Nair, D Thiemert, M Matthess, ...
Developing Ambient Intelligence, 13-22, 2008
222008
Reference architecture model for the Industrial Data Space
B Otto, S Lohmann, S Auer, G Brost, J Cirullies, A Eitel, T Ernst, C Haas, ...
Fraunhofer-Gesellschaft, Munich, 2017
212017
App-Ray: User-driven and Fully Automated Android App Security Assessment
D Titze, P Stephanow, J Schütte
202013
Native Code Execution Control for Attack Mitigation on Android
R Fedler, M Kulicke, J Schütte
ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2013
192013
An antivirus API for Android malware recognition
R Fedler, M Kulicke, J Schütte
Malicious and Unwanted Software:" The Americas"(MALWARE), 2013 8th …, 2013
182013
On the effectiveness of malware protection on android: An evaluation of android antivirus apps
R Fedler, J Schütte, M Kulicke
Applied and integrated security, 2013
182013
simTD security architecture: Deployment of a security and privacy architecture in field operational tests
N Bißmeyer, H Stübing, M Mattheß, JP Stotz, J Schütte, M Gerlach, ...
7th ESCAR Embedded Security in Cars Conference, Düsseldorf, 2009
182009
Osiris: Hunting for integer bugs in ethereum smart contracts
CF Torres, J Schütte
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
142018
Test-based cloud service certification of opportunistic providers
P Stephanow, G Srivastava, J Schütte
2016 IEEE 9th International Conference on Cloud Computing (CLOUD), 843-848, 2016
142016
Model-based security event management
J Schütte, R Rieke, T Winkelvos
International Conference on Mathematical Methods, Models, and Architectures …, 2012
132012
A Configurable and Extensible Security Service Architecture for Smartphones
D Titze, P Stephanow, J Schütte
Advanced Information Networking and Applications Workshops (WAINA), 2013 …, 2013
122013
A genetic algorithms-based approach for optimized self-protection in a pervasive service middleware
W Zhang, J Schütte, M Ingstrup, KM Hansen
Service-Oriented Computing, 404-419, 2009
122009
Generating threat profiles for cloud service certification systems
P Stephanow, C Banse, J Schütte
2016 IEEE 17th International Symposium on High Assurance Systems Engineering …, 2016
112016
A data usage control system using dynamic taint tracking
J Schütte, GS Brost
2016 IEEE 30th International Conference on Advanced Information Networking …, 2016
92016
Blockchain–Technologien, Forschungsfragen und Anwendungen
J Schütte, G Fridgen, W Prinz, T Tose, N Urbach
Blockchain Positionspapier. Fraunhofer, München, S, 1-39, 2017
82017
Blockchain und Smart Contracts: Technologien, Forschungsfragen und Anwendungen
J Schütte, G Fridgen, W Prinz, T Rose, N Urbach, T Hoeren, ...
82017
The system can't perform the operation now. Try again later.
Articles 1–20