Scholar
Andreas Happe
Google Scholar ID: Xy_UZUUAAAAJ
TU Wien
web security
application security
penetration testing
machine learning
Follow
Homepage
↗
Google Scholar
↗
Citations & Impact
All-time
Citations
949
H-index
9
i10-index
8
Publications
20
Co-authors
9
list available
Contact
Twitter
Open ↗
GitHub
Open ↗
LinkedIn
Open ↗
Publications
4 items
Post-Training Local LLM Agents for Linux Privilege Escalation with Verifiable Rewards
2026
Cited
0
Can LLMs Hack Enterprise Networks? -- Replicated Computational Results (RCR) Report
2026
Cited
0
Adversarial Bug Reports as a Security Risk in Language Model-Based Automated Program Repair
2025
Cited
0
On the Surprising Efficacy of LLMs for Penetration-Testing
2025
Cited
0
Resume (English only)
Academic Achievements
- Paper Published: LLMs as Hackers: Autonomous Linux Privilege Escalation Attacks
- Paper Published: Can LLMs Hack Enterprise Networks? Autonomous Assumed Breach Penetration-Testing Active Directory Networks
Research Experience
- Research Project: LLMs as Hackers: Autonomous Linux Privilege Escalation Attacks
- Research Project: Can LLMs Hack Enterprise Networks? Autonomous Assumed Breach Penetration-Testing Active Directory Networks
Background
Research interests include cybersecurity, application of language models in security fields, etc.
Miscellany
Interested in technical writing, such as sharing experiences on installing LineageOS.
Co-authors
9 total
Jürgen Cito
TU Wien
Co-author 2
Co-author 3
Co-author 4
Momtchil Peev
Huawei Technologies Duesseldorf GmbH
Daniel Slamanig
Professor @ Universität der Bundeswehr München
Co-author 7
Stephan Krenn
AIT Austrian Institute of Technology GmbH
×
Welcome back
Sign in to Agora
Welcome back! Please sign in to continue.
Email address
Password
Forgot password?
Continue
Do not have an account?
Sign up