Zurück

Damjan Buhov MSc

  • Junior Researcher
    Josef Ressel-Zentrum für konsolidierte Erkennung gezielter Angriffe
  • Department Informatik und Security
Arbeitsplatz: D - Heinrich Schneidmadl-Straße 15

Studiengänge

  • IT Security (BA)

Departments

  • Informatik und Security

Kurzprofil

  • 2007 - 2012 Bachelor Degree in Informatics – Computer Architecrute and Networks, Ss. Cyril and Methodius University – Faculty of Computer Science and Engineering
  • 2013 - 2015 Master's Degree in Informatics – Coding and Cryptography, Ss. Cyril and Methodius University – Faculty of Computer Science and Engineering
  • October 2013 – Feb 2014 Scholarship from the Scholarship Foundation of Republic of Austria
  • 2011 – 2013 Software Engineer, Ein-Sof, Skopje, Macedonia
  • 2013 – 2015 Security Researcher, SBA Research gGmbH, Vienna, Austria

Projekte

Publikationen

Schrittwieser, S., Rauchberger, J., Dam, T., & Buhov, D. (2019, April). Coineater: Automatisierte Erkennung Von Krypto-Mining Im Webbrowser. Presented at the FFH Forum, Wiener Neustadt, Österreich.
Dam, T., Klausner, L. D., Buhov, D., & Schrittwieser, S. (2019). Large-Scale Analysis of Pop-Up Scam on Typosquatting URLs. In Proceedings of the 14th International Conference on Availability, Reliability and Security (pp. 53:1–53:9). Canterbury, United Kingdom: ACM.
Buhov, D., Rauchberger, J., & Schrittwieser, S. (2018). FLASH: Is the 20th Century Hero Really Gone? Large-Scale Evaluation on Flash Usage & Its Security and Privacy Implications. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 9(4), 15. https://doi.org/http://dx.doi.org/10.22667/JOWUA.2018.12.31.026
Rauchberger, J., Schrittwieser, S., Dam, T., Luh, R., Buhov, D., Pötzelsberger, G., & Kim, H. (2018). The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns. In Proceedings of the 13th International Conference on Availability, Reliability and Security. Hamburg, Deutschland: ACM.
Merzdovnik, G., Huber, M., Buhov, D., Nikiforakis, N., Neuner, S., & Weippl, E. (2017). Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools. Presented at the IEEE European Symposium on Security and Privacy, IEEE.
Buhov, D., Huber, M., Merzdovnik, G., & Weippl, E. (2016). Pin it! Improving Android network security at runtime. Presented at the IFIP Networking Conference (IFIP Networking) and Workshops, IEEE.
Buhov, D., Thron, R., & Schrittwieser, S. (2016). Catch Me If You Can! Transparent Detection Of Shellcode. Presented at the the 2016 International Conference on Software Security and Assurance (ICSSA), IEEE.
Buhov, D., Huber, M., Merzdovnik, G., Weippl, E., & Dimitrova, V. (2015). Network Security Challenges in Android Applications. In Availability, Reliability and Security (ARES), 2015 10th International Conference.