BibTeX records: Sebastian Schrittwieser

download as .bib file

@article{DBLP:journals/compsec/CoppaS24,
  author       = {Emilio Coppa and
                  Sebastian Schrittwieser},
  title        = {Editorial: Special issue on {ARES} 2022},
  journal      = {Comput. Secur.},
  volume       = {138},
  pages        = {103662},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103662},
  doi          = {10.1016/J.COSE.2023.103662},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/CoppaS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TavolatoLEGS24,
  author       = {Paul Tavolato and
                  Robert Luh and
                  Sebastian Eresheim and
                  Simon Gmeiner and
                  Sebastian Schrittwieser},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Comparing the Effectivity of Planned Cyber Defense Controls in Order
                  to Support the Selection Process},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {211--218},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012421800003648},
  doi          = {10.5220/0012421800003648},
  timestamp    = {Tue, 02 Apr 2024 14:37:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/TavolatoLEGS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SchrittwieserWMKLRW23,
  author       = {Sebastian Schrittwieser and
                  Elisabeth Wimmer and
                  Kevin Mallinger and
                  Patrick Kochberger and
                  Caroline Lawitschka and
                  Sebastian Raubitzek and
                  Edgar R. Weippl},
  editor       = {Sokratis K. Katsikas and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Rita Maria Ugarelli and
                  Isabel Pra{\c{c}}a and
                  Wenjuan Li and
                  Weizhi Meng and
                  Steven Furnell and
                  Basel Katt and
                  Sandeep Pirbhulal and
                  Ankur Shukla and
                  Michele Ianni and
                  Mila Dalla Preda and
                  Kim{-}Kwang Raymond Choo and
                  Miguel Pupo Correia and
                  Abhishta Abhishta and
                  Giovanni Sileno and
                  Mina Alishahi and
                  Harsha K. Kalutarage and
                  Naoto Yanai},
  title        = {Modeling Obfuscation Stealth Through Code Complexity},
  booktitle    = {Computer Security. {ESORICS} 2023 International Workshops - CPS4CIP,
                  ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The
                  Netherlands, September 25-29, 2023, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14399},
  pages        = {392--408},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-54129-2\_23},
  doi          = {10.1007/978-3-031-54129-2\_23},
  timestamp    = {Mon, 25 Mar 2024 20:43:51 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/SchrittwieserWMKLRW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KochbergerGSLW23,
  author       = {Patrick Kochberger and
                  Maximilian Gramberger and
                  Sebastian Schrittwieser and
                  Caroline Lawitschka and
                  Edgar R. Weippl},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Large Language Models for Code Obfuscation Evaluation of the Obfuscation
                  Capabilities of OpenAI's {GPT-3.5} on {C} Source Code},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {7--19},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012167000003555},
  doi          = {10.5220/0012167000003555},
  timestamp    = {Mon, 31 Jul 2023 15:34:21 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KochbergerGSLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-07300,
  author       = {Patrick Kochberger and
                  Sebastian Schrittwieser and
                  Bart Coppens and
                  Bjorn De Sutter},
  title        = {Evaluation Methodologies in Software Protection Research},
  journal      = {CoRR},
  volume       = {abs/2307.07300},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.07300},
  doi          = {10.48550/ARXIV.2307.07300},
  eprinttype    = {arXiv},
  eprint       = {2307.07300},
  timestamp    = {Mon, 24 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-07300.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/educon/LuhEGPMTS22,
  author       = {Robert Luh and
                  Sebastian Eresheim and
                  Stefanie Gr{\"{o}}{\ss}bacher and
                  Thomas Petelin and
                  Florian Mayr and
                  Paul Tavolato and
                  Sebastian Schrittwieser},
  editor       = {Ilhem Kallel and
                  Habib M. Kammoun and
                  Lobna Hsairi},
  title        = {PenQuest Reloaded: {A} Digital Cyber Defense Game for Technical Education},
  booktitle    = {{IEEE} Global Engineering Education Conference, {EDUCON} 2022, Tunis,
                  Tunisia, March 28-31, 2022},
  pages        = {906--914},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/EDUCON52537.2022.9766700},
  doi          = {10.1109/EDUCON52537.2022.9766700},
  timestamp    = {Tue, 17 May 2022 10:02:27 +0200},
  biburl       = {https://dblp.org/rec/conf/educon/LuhEGPMTS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/SchrittwieserKP22,
  author       = {Sebastian Schrittwieser and
                  Patrick Kochberger and
                  Michael Pucher and
                  Caroline Lawitschka and
                  Philip K{\"{o}}nig and
                  Edgar R. Weippl},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {Obfuscation-Resilient Semantic Functionality Identification Through
                  Program Simulation},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {273--291},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_15},
  doi          = {10.1007/978-3-031-22295-5\_15},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/SchrittwieserKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/KochbergerSW22,
  author       = {Patrick Kochberger and
                  Sebastian Schrittwieser and
                  Edgar R. Weippl},
  title        = {Meta-framework for Automating Static Malware Analysis},
  journal      = {{ERCIM} News},
  volume       = {2022},
  number       = {129},
  pages        = {0},
  year         = {2022},
  url          = {https://ercim-news.ercim.eu/en129/special/meta-framework-for-automating-static-malware-analysis},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/KochbergerSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/KiesebergSW21,
  author       = {Peter Kieseberg and
                  Sebastian Schrittwieser and
                  Edgar R. Weippl},
  title        = {Secure Internal Data Markets},
  journal      = {Future Internet},
  volume       = {13},
  number       = {8},
  pages        = {208},
  year         = {2021},
  url          = {https://doi.org/10.3390/fi13080208},
  doi          = {10.3390/FI13080208},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/KiesebergSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KochbergerSSKW21,
  author       = {Patrick Kochberger and
                  Sebastian Schrittwieser and
                  Stefan Schweighofer and
                  Peter Kieseberg and
                  Edgar R. Weippl},
  editor       = {Delphine Reinhardt and
                  Tilo M{\"{u}}ller},
  title        = {SoK: Automatic Deobfuscation of Virtualization-protected Applications},
  booktitle    = {{ARES} 2021: The 16th International Conference on Availability, Reliability
                  and Security, Vienna, Austria, August 17-20, 2021},
  pages        = {6:1--6:15},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3465481.3465772},
  doi          = {10.1145/3465481.3465772},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KochbergerSSKW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ei/LuhS20,
  author       = {Robert Luh and
                  Sebastian Schrittwieser},
  title        = {Advanced threat intelligence: detection and classification of anomalous
                  behavior in system processes},
  journal      = {Elektrotech. Informationstechnik},
  volume       = {137},
  number       = {1},
  pages        = {38--44},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00502-019-00780-x},
  doi          = {10.1007/S00502-019-00780-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ei/LuhS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/DamKS20,
  author       = {Tobias Dam and
                  Lukas Daniel Klausner and
                  Sebastian Schrittwieser},
  title        = {Typosquatting for Fun and Profit: Cross-Country Analysis of Pop-Up
                  Scam},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {2},
  pages        = {265--300},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.924},
  doi          = {10.13052/JCSM2245-1439.924},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/DamKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/LuhTTSJ20,
  author       = {Robert Luh and
                  Marlies Temper and
                  Simon Tjoa and
                  Sebastian Schrittwieser and
                  Helge Janicke},
  title        = {PenQuest: a gamified attacker/defender meta model for cyber security
                  assessment and education},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {16},
  number       = {1},
  pages        = {19--61},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11416-019-00342-x},
  doi          = {10.1007/S11416-019-00342-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/LuhTTSJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/JudtKKS20,
  author       = {Daniel Judt and
                  Patrick Kochberger and
                  Peter Kieseberg and
                  Sebastian Schrittwieser},
  title        = {Compiling and Analyzing Open Source Malware for Research Purposes},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2020, Altoona, PA, USA, October 28-30, 2020},
  pages        = {32--37},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICSSA51305.2020.00013},
  doi          = {10.1109/ICSSA51305.2020.00013},
  timestamp    = {Fri, 20 Aug 2021 15:45:41 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/JudtKKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-01749,
  author       = {Tobias Dam and
                  Lukas Daniel Klausner and
                  Sebastian Schrittwieser},
  title        = {Typosquatting for Fun and Profit: Cross-Country Analysis of Pop-Up
                  Scam},
  journal      = {CoRR},
  volume       = {abs/2004.01749},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.01749},
  eprinttype    = {arXiv},
  eprint       = {2004.01749},
  timestamp    = {Wed, 08 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-01749.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LuhJS19,
  author       = {Robert Luh and
                  Helge Janicke and
                  Sebastian Schrittwieser},
  title        = {{AIDIS:} Detecting and classifying anomalous behavior in ubiquitous
                  kernel processes},
  journal      = {Comput. Secur.},
  volume       = {84},
  pages        = {120--147},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.03.015},
  doi          = {10.1016/J.COSE.2019.03.015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LuhJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DamKBS19,
  author       = {Tobias Dam and
                  Lukas Daniel Klausner and
                  Damjan Buhov and
                  Sebastian Schrittwieser},
  title        = {Large-Scale Analysis of Pop-Up Scam on Typosquatting URLs},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {53:1--53:9},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340332},
  doi          = {10.1145/3339252.3340332},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DamKBS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/KiesebergSW19,
  author       = {Peter Kieseberg and
                  Sebastian Schrittwieser and
                  Edgar R. Weippl},
  title        = {Fingerprinting using database steganography},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2019, St. P{\"{o}}lten, Austria, July 25-26, 2019},
  pages        = {16--20},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICSSA48308.2019.00009},
  doi          = {10.1109/ICSSA48308.2019.00009},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/KiesebergSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/KiesebergSFW19,
  author       = {Peter Kieseberg and
                  Sebastian Schrittwieser and
                  Peter Fr{\"{u}}hwirt and
                  Edgar R. Weippl},
  title        = {Analysis of the Internals of MySQL/InnoDB {B+} Tree Index Navigation
                  from a Forensic Perspective},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2019, St. P{\"{o}}lten, Austria, July 25-26, 2019},
  pages        = {46--51},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICSSA48308.2019.00013},
  doi          = {10.1109/ICSSA48308.2019.00013},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/KiesebergSFW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/KochbergerTS19,
  author       = {Patrick Kochberger and
                  Alexander Tauber and
                  Sebastian Schrittwieser},
  title        = {Assessment of the Transparency of the Windows Subsystem for Linux
                  {(WSL)}},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2019, St. P{\"{o}}lten, Austria, July 25-26, 2019},
  pages        = {60--69},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICSSA48308.2019.00015},
  doi          = {10.1109/ICSSA48308.2019.00015},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/KochbergerTS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-10762,
  author       = {Tobias Dam and
                  Lukas Daniel Klausner and
                  Damjan Buhov and
                  Sebastian Schrittwieser},
  title        = {Large-Scale Analysis of Pop-Up Scam on Typosquatting URLs},
  journal      = {CoRR},
  volume       = {abs/1906.10762},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.10762},
  eprinttype    = {arXiv},
  eprint       = {1906.10762},
  timestamp    = {Thu, 27 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-10762.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BuhovRS18,
  author       = {Damjan Buhov and
                  Julian Rauchberger and
                  Sebastian Schrittwieser},
  title        = {{FLASH:} Is the 20th Century Hero Really Gone? Large-Scale Evaluation
                  on Flash Usage {\&} Its Security and Privacy Implications},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {4},
  pages        = {26--40},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.12.31.026},
  doi          = {10.22667/JOWUA.2018.12.31.026},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BuhovRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/LuhSWJS18,
  author       = {Robert Luh and
                  Gregor Schramm and
                  Markus Wagner and
                  Helge Janicke and
                  Sebastian Schrittwieser},
  title        = {{SEQUIN:} a grammar inference framework for analyzing malicious system
                  behavior},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {14},
  number       = {4},
  pages        = {291--311},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11416-018-0318-x},
  doi          = {10.1007/S11416-018-0318-X},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/LuhSWJS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/RauchbergerSDLB18,
  author       = {Julian Rauchberger and
                  Sebastian Schrittwieser and
                  Tobias Dam and
                  Robert Luh and
                  Damjan Buhov and
                  Gerhard P{\"{o}}tzelsberger and
                  Hyoungshick Kim},
  editor       = {Sebastian Doerr and
                  Mathias Fischer and
                  Sebastian Schrittwieser and
                  Dominik Herrmann},
  title        = {The Other Side of the Coin: {A} Framework for Detecting and Analyzing
                  Web-based Cryptocurrency Mining Campaigns},
  booktitle    = {Proceedings of the 13th International Conference on Availability,
                  Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30,
                  2018},
  pages        = {18:1--18:10},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230833.3230869},
  doi          = {10.1145/3230833.3230869},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/RauchbergerSDLB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cecc/KiesebergSW18,
  author       = {Peter Kieseberg and
                  Sebastian Schrittwieser and
                  Edgar R. Weippl},
  title        = {Structural Limitations of B+-Tree forensics},
  booktitle    = {Proceedings of the Central European Cybersecurity Conference 2018,
                  {CECC} 2018, Ljubljana, Slovenia, November 15-16, 2018},
  pages        = {9:1--9:4},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3277570.3277579},
  doi          = {10.1145/3277570.3277579},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cecc/KiesebergSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LuhTTS18,
  author       = {Robert Luh and
                  Marlies Temper and
                  Simon Tjoa and
                  Sebastian Schrittwieser},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {{APT} {RPG:} Design of a Gamified Attacker/Defender Meta Model},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {526--537},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006717805260537},
  doi          = {10.5220/0006717805260537},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/LuhTTS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEares/2018,
  editor       = {Sebastian Doerr and
                  Mathias Fischer and
                  Sebastian Schrittwieser and
                  Dominik Herrmann},
  title        = {Proceedings of the 13th International Conference on Availability,
                  Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30,
                  2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {http://dl.acm.org/citation.cfm?id=3230833},
  isbn         = {978-1-4503-6448-5},
  timestamp    = {Thu, 17 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/EresheimLS17,
  author       = {Sebastian Eresheim and
                  Robert Luh and
                  Sebastian Schrittwieser},
  title        = {The Evolution of Process Hiding Techniques in Malware - Current Threats
                  and Possible Countermeasures},
  journal      = {J. Inf. Process.},
  volume       = {25},
  pages        = {866--874},
  year         = {2017},
  url          = {https://doi.org/10.2197/ipsjjip.25.866},
  doi          = {10.2197/IPSJJIP.25.866},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/EresheimLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/LuhMKJS17,
  author       = {Robert Luh and
                  Stefan Marschalek and
                  Manfred Kaiser and
                  Helge Janicke and
                  Sebastian Schrittwieser},
  title        = {Semantics-aware detection of targeted attacks: a survey},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {13},
  number       = {1},
  pages        = {47--85},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11416-016-0273-3},
  doi          = {10.1007/S11416-016-0273-3},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/LuhMKJS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/LuhSM17,
  author       = {Robert Luh and
                  Sebastian Schrittwieser and
                  Stefan Marschalek},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Tomoya Enokido and
                  Hui{-}Huang Hsu and
                  Chi{-}Yi Lin},
  title        = {LLR-Based Sentiment Analysis for Kernel Event Sequences},
  booktitle    = {31st {IEEE} International Conference on Advanced Information Networking
                  and Applications, {AINA} 2017, Taipei, Taiwan, March 27-29, 2017},
  pages        = {764--771},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/AINA.2017.47},
  doi          = {10.1109/AINA.2017.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/LuhSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/KiesebergNSSW17,
  author       = {Peter Kieseberg and
                  Sebastian Neuner and
                  Sebastian Schrittwieser and
                  Martin Schmiedecker and
                  Edgar R. Weippl},
  editor       = {Petr Matousek and
                  Martin Schmiedecker},
  title        = {Real-Time Forensics Through Endpoint Visibility},
  booktitle    = {Digital Forensics and Cyber Crime - 9th International Conference,
                  {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {216},
  pages        = {18--32},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73697-6\_2},
  doi          = {10.1007/978-3-319-73697-6\_2},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/KiesebergNSSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/RauchbergerLS17,
  author       = {Julian Rauchberger and
                  Robert Luh and
                  Sebastian Schrittwieser},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Longkit - {A} Universal Framework for {BIOS/UEFI} Rootkits in System
                  Management Mode},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {346--353},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006165603460353},
  doi          = {10.5220/0006165603460353},
  timestamp    = {Thu, 18 May 2017 14:22:34 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/RauchbergerLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LuhSMJ17,
  author       = {Robert Luh and
                  Sebastian Schrittwieser and
                  Stefan Marschalek and
                  Helge Janicke},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Design of an Anomaly-based Threat Detection {\&} Explication System},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {397--402},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006205203970402},
  doi          = {10.5220/0006205203970402},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LuhSMJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LuhS0S17,
  author       = {Robert Luh and
                  Gregor Schramm and
                  Markus Wagner and
                  Sebastian Schrittwieser},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Sequitur-based Inference and Analysis Framework for Malicious System
                  Behavior},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {632--643},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006250206320643},
  doi          = {10.5220/0006250206320643},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/LuhS0S17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/EresheimLS17,
  author       = {Sebastian Eresheim and
                  Robert Luh and
                  Sebastian Schrittwieser},
  title        = {On the Impact of Kernel Code Vulnerabilities in IoT Devices},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2017, Altoona, PA, USA, July 24-25, 2017},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2017.16},
  doi          = {10.1109/ICSSA.2017.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/EresheimLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/ValicekSPS17,
  author       = {Martin Valicek and
                  Gregor Schramm and
                  Martin Pirker and
                  Sebastian Schrittwieser},
  title        = {Creation and Integration of Remote High Interaction Honeypots},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2017, Altoona, PA, USA, July 24-25, 2017},
  pages        = {50--55},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2017.21},
  doi          = {10.1109/ICSSA.2017.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/ValicekSPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/MarschalekLS17,
  author       = {Stefan Marschalek and
                  Robert Luh and
                  Sebastian Schrittwieser},
  title        = {Endpoint Data Classification Using Markov Chains},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2017, Altoona, PA, USA, July 24-25, 2017},
  pages        = {56--59},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2017.17},
  doi          = {10.1109/ICSSA.2017.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/MarschalekLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/BuhovKTS17,
  author       = {Damjan Buhov and
                  Patrick Kochberger and
                  Richard Thron and
                  Sebastian Schrittwieser},
  title        = {Discovering Cryptographic Algorithms in Binary Code Through Loop Enumeration},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2017, Altoona, PA, USA, July 24-25, 2017},
  pages        = {80--86},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2017.22},
  doi          = {10.1109/ICSSA.2017.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/BuhovKTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/KimKCKS17,
  author       = {Jinwoo Kim and
                  Kuyju Kim and
                  Junsung Cho and
                  Hyoungshick Kim and
                  Sebastian Schrittwieser},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis
                  of Enumeration Attack Using Phone Numbers on Facebook},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {663--677},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_41},
  doi          = {10.1007/978-3-319-72359-4\_41},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/KimKCKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/LuhSMJW17,
  author       = {Robert Luh and
                  Sebastian Schrittwieser and
                  Stefan Marschalek and
                  Helge Janicke and
                  Edgar R. Weippl},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Edgar R. Weippl},
  title        = {Poster: Design of an Anomaly-based Threat Detection {\&} Explication
                  System},
  booktitle    = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models
                  and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23,
                  2017},
  pages        = {119--120},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3078861.3084162},
  doi          = {10.1145/3078861.3084162},
  timestamp    = {Tue, 09 Feb 2021 08:50:30 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/LuhSMJW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/KiesebergWS17,
  author       = {Peter Kieseberg and
                  Edgar R. Weippl and
                  Sebastian Schrittwieser},
  title        = {Forensics using Internal Database Structures},
  journal      = {{ERCIM} News},
  volume       = {2017},
  number       = {108},
  year         = {2017},
  url          = {http://ercim-news.ercim.eu/en108/r-i/forensics-using-internal-database-structures},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/KiesebergWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/KiesebergFS17,
  author       = {Peter Kieseberg and
                  Peter Fr{\"{u}}hwirt and
                  Sebastian Schrittwieser},
  title        = {Security Testing for Mobile Applications},
  journal      = {{ERCIM} News},
  volume       = {2017},
  number       = {109},
  year         = {2017},
  url          = {https://ercim-news.ercim.eu/en109/r-i/security-testing-for-mobile-applications},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/KiesebergFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/SchrittwieserKK16,
  author       = {Sebastian Schrittwieser and
                  Stefan Katzenbeisser and
                  Johannes Kinder and
                  Georg Merzdovnik and
                  Edgar R. Weippl},
  title        = {Protecting Software through Obfuscation: Can It Keep Pace with Progress
                  in Code Analysis?},
  journal      = {{ACM} Comput. Surv.},
  volume       = {49},
  number       = {1},
  pages        = {4:1--4:37},
  year         = {2016},
  url          = {https://doi.org/10.1145/2886012},
  doi          = {10.1145/2886012},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/SchrittwieserKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WeipplSR16,
  author       = {Edgar R. Weippl and
                  Sebastian Schrittwieser and
                  Sylvi Rennert},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Empirical Research and Research Ethics in Information Security},
  booktitle    = {Information Systems Security and Privacy - Second International Conference,
                  {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {14--22},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54433-5\_2},
  doi          = {10.1007/978-3-319-54433-5\_2},
  timestamp    = {Thu, 16 May 2019 16:58:10 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/WeipplSR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/BuhovTS16,
  author       = {Damjan Buhov and
                  Richard Thron and
                  Sebastian Schrittwieser},
  title        = {Catch Me if You Can! Transparent Detection of Shellcode},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2016, St. P{\"{o}}lten, Austria, August 24-25, 2016},
  pages        = {60--63},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.18},
  doi          = {10.1109/ICSSA.2016.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/BuhovTS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiwas/LuhSM16,
  author       = {Robert Luh and
                  Sebastian Schrittwieser and
                  Stefan Marschalek},
  editor       = {Gabriele Anderst{-}Kotsis},
  title        = {{TAON:} an ontology-based approach to mitigating targeted attacks},
  booktitle    = {Proceedings of the 18th International Conference on Information Integration
                  and Web-based Applications and Services, iiWAS 2016, Singapore, November
                  28-30, 2016},
  pages        = {303--312},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3011141.3011157},
  doi          = {10.1145/3011141.3011157},
  timestamp    = {Tue, 06 Nov 2018 16:58:39 +0100},
  biburl       = {https://dblp.org/rec/conf/iiwas/LuhSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/MarschalekKLS16,
  author       = {Stefan Marschalek and
                  Manfred Kaiser and
                  Robert Luh and
                  Sebastian Schrittwieser},
  editor       = {Jacqueline Bourdeau and
                  Jim Hendler and
                  Roger Nkambou and
                  Ian Horrocks and
                  Ben Y. Zhao},
  title        = {Empirical Malware Research through Observation of System Behaviour},
  booktitle    = {Proceedings of the 25th International Conference on World Wide Web,
                  {WWW} 2016, Montreal, Canada, April 11-15, 2016, Companion Volume},
  pages        = {467--469},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2872518.2888609},
  doi          = {10.1145/2872518.2888609},
  timestamp    = {Tue, 12 Apr 2022 14:46:29 +0200},
  biburl       = {https://dblp.org/rec/conf/www/MarschalekKLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/KiesebergWS16,
  author       = {Peter Kieseberg and
                  Edgar R. Weippl and
                  Sebastian Schrittwieser},
  title        = {Detection of Data Leaks in Collaborative Data Driven Research},
  journal      = {{ERCIM} News},
  volume       = {2016},
  number       = {105},
  year         = {2016},
  url          = {http://ercim-news.ercim.eu/en105/r-i/detection-of-data-leaks-in-collaborative-data-driven-research},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/KiesebergWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/MalleKSH16,
  author       = {Bernd Malle and
                  Peter Kieseberg and
                  Sebastian Schrittwieser and
                  Andreas Holzinger},
  title        = {Privacy Aware Machine Learning and the "Right to be Forgotten"},
  journal      = {{ERCIM} News},
  volume       = {2016},
  number       = {107},
  year         = {2016},
  url          = {http://ercim-news.ercim.eu/en107/special/privacy-aware-machine-learning-and-the-right-to-be-forgotten},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/MalleKSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpcc/MuellerSFKW15,
  author       = {Robin Mueller and
                  Sebastian Schrittwieser and
                  Peter Fr{\"{u}}hwirt and
                  Peter Kieseberg and
                  Edgar R. Weippl},
  title        = {Security and privacy of smartphone messaging applications},
  journal      = {Int. J. Pervasive Comput. Commun.},
  volume       = {11},
  number       = {2},
  pages        = {132--150},
  year         = {2015},
  url          = {https://doi.org/10.1108/IJPCC-04-2015-0020},
  doi          = {10.1108/IJPCC-04-2015-0020},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijpcc/MuellerSFKW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/FadaiSKM15,
  author       = {Tariq Fadai and
                  Sebastian Schrittwieser and
                  Peter Kieseberg and
                  Martin Mulazzani},
  title        = {Trust me, I'm a Root CA! Analyzing {SSL} Root CAs in Modern Browsers
                  and Operating Systems},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {174--179},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.93},
  doi          = {10.1109/ARES.2015.93},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/FadaiSKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/NeunerMSW15,
  author       = {Sebastian Neuner and
                  Martin Mulazzani and
                  Sebastian Schrittwieser and
                  Edgar R. Weippl},
  title        = {Gradually Improving the Forensic Process},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {404--410},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.32},
  doi          = {10.1109/ARES.2015.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/NeunerMSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/KiesebergFSW15,
  author       = {Peter Kieseberg and
                  Peter Fr{\"{u}}hwirt and
                  Sebastian Schrittwieser and
                  Edgar R. Weippl},
  title        = {Security tests for mobile applications - Why using {TLS/SSL} is not
                  enough},
  booktitle    = {Eighth {IEEE} International Conference on Software Testing, Verification
                  and Validation, {ICST} 2015 Workshops, Graz, Austria, April 13-17,
                  2015},
  pages        = {1--2},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICSTW.2015.7107416},
  doi          = {10.1109/ICSTW.2015.7107416},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/KiesebergFSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiwas/MarschalekLKS15,
  author       = {Stefan Marschalek and
                  Robert Luh and
                  Manfred Kaiser and
                  Sebastian Schrittwieser},
  editor       = {Gabriele Anderst{-}Kotsis and
                  Maria Indrawan{-}Santiago},
  title        = {Classifying malicious system behavior using event propagation trees},
  booktitle    = {Proceedings of the 17th International Conference on Information Integration
                  and Web-based Applications {\&} Services, iiWAS 2015, Brussels,
                  Belgium, December 11-13, 2015},
  pages        = {23:1--23:10},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2837185.2837199},
  doi          = {10.1145/2837185.2837199},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iiwas/MarschalekLKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiwas/RottermannerKHS15,
  author       = {Christoph Rottermanner and
                  Peter Kieseberg and
                  Markus Huber and
                  Martin Schmiedecker and
                  Sebastian Schrittwieser},
  editor       = {Gabriele Anderst{-}Kotsis and
                  Maria Indrawan{-}Santiago},
  title        = {Privacy and data protection in smartphone messengers},
  booktitle    = {Proceedings of the 17th International Conference on Information Integration
                  and Web-based Applications {\&} Services, iiWAS 2015, Brussels,
                  Belgium, December 11-13, 2015},
  pages        = {83:1--83:10},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2837185.2837202},
  doi          = {10.1145/2837185.2837202},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iiwas/RottermannerKHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SchrittwieserKKHLMW14,
  author       = {Sebastian Schrittwieser and
                  Stefan Katzenbeisser and
                  Peter Kieseberg and
                  Markus Huber and
                  Manuel Leithner and
                  Martin Mulazzani and
                  Edgar R. Weippl},
  title        = {Covert Computation - Hiding code in code through compile-time obfuscation},
  journal      = {Comput. Secur.},
  volume       = {42},
  pages        = {13--26},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2013.12.006},
  doi          = {10.1016/J.COSE.2013.12.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SchrittwieserKKHLMW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/electronicmarkets/KiesebergSMEW14,
  author       = {Peter Kieseberg and
                  Sebastian Schrittwieser and
                  Martin Mulazzani and
                  Isao Echizen and
                  Edgar R. Weippl},
  title        = {An algorithm for collusion-resistant anonymization and fingerprinting
                  of sensitive microdata},
  journal      = {Electron. Mark.},
  volume       = {24},
  number       = {2},
  pages        = {113--124},
  year         = {2014},
  url          = {https://doi.org/10.1007/s12525-014-0154-x},
  doi          = {10.1007/S12525-014-0154-X},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/electronicmarkets/KiesebergSMEW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HochreinerFMKSW14,
  author       = {Christoph Hochreiner and
                  Peter Fr{\"{u}}hwirt and
                  Zhendong Ma and
                  Peter Kieseberg and
                  Sebastian Schrittwieser and
                  Edgar R. Weippl},
  title        = {Genie in a Model? Why Model Driven Security will not secure your Web
                  Application},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {3},
  pages        = {44--62},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.09.31.044},
  doi          = {10.22667/JOWUA.2014.09.31.044},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HochreinerFMKSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Schrittwieser0M14,
  author       = {Sebastian Schrittwieser and
                  Stefan Katzenbeisser and
                  Georg Merzdovnik and
                  Peter Kieseberg and
                  Edgar R. Weippl},
  title        = {{AES-SEC:} Improving Software Obfuscation through Hardware-Assistance},
  booktitle    = {Ninth International Conference on Availability, Reliability and Security,
                  {ARES} 2014, Fribourg, Switzerland, September 8-12, 2014},
  pages        = {184--191},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ARES.2014.32},
  doi          = {10.1109/ARES.2014.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Schrittwieser0M14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/HochreinerMKSW14,
  author       = {Christoph Hochreiner and
                  Zhendong Ma and
                  Peter Kieseberg and
                  Sebastian Schrittwieser and
                  Edgar R. Weippl},
  editor       = {Linawati and
                  Made Sudiana Mahendra and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Ilsun You},
  title        = {Using Model Driven Security Approaches in Web Application Development},
  booktitle    = {Information and Communication Technology - Second {IFIP} {TC5/8} International
                  Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8407},
  pages        = {419--431},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55032-4\_42},
  doi          = {10.1007/978-3-642-55032-4\_42},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/HochreinerMKSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/BeyerMSHW14,
  author       = {Stefanie Beyer and
                  Martin Mulazzani and
                  Sebastian Schrittwieser and
                  Markus Huber and
                  Edgar R. Weippl},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Towards Fully Automated Digital Alibis with Social Interaction},
  booktitle    = {Advances in Digital Forensics {X} - 10th {IFIP} {WG} 11.9 International
                  Conference, Vienna, Austria, January 8-10, 2014, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {433},
  pages        = {297--307},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44952-3\_20},
  doi          = {10.1007/978-3-662-44952-3\_20},
  timestamp    = {Sun, 25 Oct 2020 23:10:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/BeyerMSHW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiwas/MuellerSFKW14,
  author       = {Robin Mueller and
                  Sebastian Schrittwieser and
                  Peter Fr{\"{u}}hwirt and
                  Peter Kieseberg and
                  Edgar R. Weippl},
  editor       = {Maria Indrawan{-}Santiago and
                  Matthias Steinbauer and
                  Hong{-}Quang Nguyen and
                  A Min Tjoa and
                  Ismail Khalil and
                  Gabriele Anderst{-}Kotsis},
  title        = {What's new with WhatsApp {\&} Co.? Revisiting the Security of
                  Smartphone Messaging Applications},
  booktitle    = {Proceedings of the 16th International Conference on Information Integration
                  and Web-based Applications {\&} Services, Hanoi, Vietnam, December
                  4-6, 2014},
  pages        = {142--151},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2684200.2684328},
  doi          = {10.1145/2684200.2684328},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iiwas/MuellerSFKW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/WinterKMHSLW14,
  author       = {Philipp Winter and
                  Richard K{\"{o}}wer and
                  Martin Mulazzani and
                  Markus Huber and
                  Sebastian Schrittwieser and
                  Stefan Lindskog and
                  Edgar R. Weippl},
  editor       = {Emiliano De Cristofaro and
                  Steven J. Murdoch},
  title        = {Spoiled Onions: Exposing Malicious Tor Exit Relays},
  booktitle    = {Privacy Enhancing Technologies - 14th International Symposium, {PETS}
                  2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8555},
  pages        = {304--331},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08506-7\_16},
  doi          = {10.1007/978-3-319-08506-7\_16},
  timestamp    = {Sat, 09 Apr 2022 12:39:29 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/WinterKMHSLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/FruhwirtKHSW14,
  author       = {Peter Fr{\"{u}}hwirt and
                  Peter Kieseberg and
                  Christoph Hochreiner and
                  Sebastian Schrittwieser and
                  Edgar R. Weippl},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {InnoDB Datenbank Forensik Rekonstruktion von Abfragen {\"{u}}ber
                  Datenbank-interne Logfiles},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {363--374},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20056},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/FruhwirtKHSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/KiesebergHSWH14,
  author       = {Peter Kieseberg and
                  Heidelinde Hobel and
                  Sebastian Schrittwieser and
                  Edgar R. Weippl and
                  Andreas Holzinger},
  editor       = {Andreas Holzinger and
                  Igor Jurisica},
  title        = {Protecting Anonymity in Data-Driven Biomedical Science},
  booktitle    = {Interactive Knowledge Discovery and Data Mining in Biomedical Informatics
                  - State-of-the-Art and Future Challenges},
  series       = {Lecture Notes in Computer Science},
  volume       = {8401},
  pages        = {301--316},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43968-5\_17},
  doi          = {10.1007/978-3-662-43968-5\_17},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/KiesebergHSWH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwis/KiesebergSMMHW13,
  author       = {Peter Kieseberg and
                  Sebastian Schrittwieser and
                  Lorcan Morgan and
                  Martin Mulazzani and
                  Markus Huber and
                  Edgar R. Weippl},
  title        = {Using the structure of B+-trees for enhancing logging mechanisms of
                  databases},
  journal      = {Int. J. Web Inf. Syst.},
  volume       = {9},
  number       = {1},
  pages        = {53--68},
  year         = {2013},
  url          = {https://doi.org/10.1108/17440081311316389},
  doi          = {10.1108/17440081311316389},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwis/KiesebergSMMHW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FruhwirtKSHW13,
  author       = {Peter Fr{\"{u}}hwirt and
                  Peter Kieseberg and
                  Sebastian Schrittwieser and
                  Markus Huber and
                  Edgar R. Weippl},
  title        = {InnoDB database forensics: Enhanced reconstruction of data manipulation
                  queries from redo logs},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {4},
  pages        = {227--238},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2013.02.003},
  doi          = {10.1016/J.ISTR.2013.02.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FruhwirtKSHW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/UngerMFHSW13,
  author       = {Thomas Unger and
                  Martin Mulazzani and
                  Dominik Fruhwirt and
                  Markus Huber and
                  Sebastian Schrittwieser and
                  Edgar R. Weippl},
  title        = {{SHPF:} Enhancing {HTTP(S)} Session Security with Browser Fingerprinting},
  booktitle    = {2013 International Conference on Availability, Reliability and Security,
                  {ARES} 2013, Regensburg, Germany, September 2-6, 2013},
  pages        = {255--261},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ARES.2013.33},
  doi          = {10.1109/ARES.2013.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/UngerMFHSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchrittwieserKKHLMW13,
  author       = {Sebastian Schrittwieser and
                  Stefan Katzenbeisser and
                  Peter Kieseberg and
                  Markus Huber and
                  Manuel Leithner and
                  Martin Mulazzani and
                  Edgar R. Weippl},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Covert computation: hiding code in code for obfuscation purposes},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {529--534},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484384},
  doi          = {10.1145/2484313.2484384},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SchrittwieserKKHLMW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosn/HuberMSW13,
  author       = {Markus Huber and
                  Martin Mulazzani and
                  Sebastian Schrittwieser and
                  Edgar R. Weippl},
  editor       = {S. Muthu Muthukrishnan and
                  Amr El Abbadi and
                  Balachander Krishnamurthy},
  title        = {Appinspect: large-scale evaluation of social networking apps},
  booktitle    = {Conference on Online Social Networks, COSN'13, Boston, MA, USA, October
                  7-8, 2013},
  pages        = {143--154},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2512938.2512942},
  doi          = {10.1145/2512938.2512942},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cosn/HuberMSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/MulazzaniNKHSW13,
  author       = {Martin Mulazzani and
                  Sebastian Neuner and
                  Peter Kieseberg and
                  Markus Huber and
                  Sebastian Schrittwieser and
                  Edgar R. Weippl},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Quantifying Windows File Slack Size and Stability},
  booktitle    = {Advances in Digital Forensics {IX} - 9th {IFIP} {WG} 11.9 International
                  Conference on Digital Forensics, Orlando, FL, USA, January 28-30,
                  2013, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {410},
  pages        = {183--193},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41148-9\_13},
  doi          = {10.1007/978-3-642-41148-9\_13},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/MulazzaniNKHSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/FruhwirtKSHW12,
  author       = {Peter Fr{\"{u}}hwirt and
                  Peter Kieseberg and
                  Sebastian Schrittwieser and
                  Markus Huber and
                  Edgar R. Weippl},
  title        = {InnoDB Database Forensics: Reconstructing Data Manipulation Queries
                  from Redo Logs},
  booktitle    = {Seventh International Conference on Availability, Reliability and
                  Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012},
  pages        = {625--633},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ARES.2012.50},
  doi          = {10.1109/ARES.2012.50},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/FruhwirtKSHW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiwas/SchrittwieserKW12,
  author       = {Sebastian Schrittwieser and
                  Peter Kieseberg and
                  Edgar R. Weippl},
  editor       = {Eric Pardede},
  title        = {Digital forensics for enterprise rights management systems},
  booktitle    = {The 14th International Conference on Information Integration and Web-based
                  Applications {\&} Services, {IIWAS} '12, Bali, Indonesia - December
                  3-5, 2012},
  pages        = {111--120},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2428736.2428756},
  doi          = {10.1145/2428736.2428756},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iiwas/SchrittwieserKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SchrittwieserFKLMHW12,
  author       = {Sebastian Schrittwieser and
                  Peter Fr{\"{u}}hwirt and
                  Peter Kieseberg and
                  Manuel Leithner and
                  Martin Mulazzani and
                  Markus Huber and
                  Edgar R. Weippl},
  title        = {Guess Who's Texting You? Evaluating the Security of Smartphone Messaging
                  Applications},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/guess-whos-texting-you-evaluating-security-smartphone-messaging-applications},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/SchrittwieserFKLMHW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SchrittwieserKEWS11,
  author       = {Sebastian Schrittwieser and
                  Peter Kieseberg and
                  Isao Echizen and
                  Sven Wohlgemuth and
                  Noboru Sonehara},
  title        = {Using Generalization Patterns for Fingerprinting Sets of Partially
                  Anonymized Microdata in the Course of Disasters},
  booktitle    = {Sixth International Conference on Availability, Reliability and Security,
                  {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  pages        = {645--649},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ARES.2011.101},
  doi          = {10.1109/ARES.2011.101},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SchrittwieserKEWS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HuberMLSWW11,
  author       = {Markus Huber and
                  Martin Mulazzani and
                  Manuel Leithner and
                  Sebastian Schrittwieser and
                  Gilbert Wondracek and
                  Edgar R. Weippl},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Social snapshots: digital forensics for online social networks},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {113--122},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076748},
  doi          = {10.1145/2076732.2076748},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HuberMLSWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KiesebergSMHW11,
  author       = {Peter Kieseberg and
                  Sebastian Schrittwieser and
                  Martin Mulazzani and
                  Markus Huber and
                  Edgar R. Weippl},
  title        = {Trees Cannot Lie: Using Data Structures for Forensics Purposes},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {282--285},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.18},
  doi          = {10.1109/EISIC.2011.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/KiesebergSMHW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/SchrittwieserK11,
  author       = {Sebastian Schrittwieser and
                  Stefan Katzenbeisser},
  editor       = {Tom{\'{a}}s Filler and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Scott Craver and
                  Andrew D. Ker},
  title        = {Code Obfuscation against Static and Dynamic Reverse Engineering},
  booktitle    = {Information Hiding - 13th International Conference, {IH} 2011, Prague,
                  Czech Republic, May 18-20, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6958},
  pages        = {270--284},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24178-9\_19},
  doi          = {10.1007/978-3-642-24178-9\_19},
  timestamp    = {Sun, 25 Jul 2021 11:46:22 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/SchrittwieserK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiwas/KiesebergSMMHW11,
  author       = {Peter Kieseberg and
                  Sebastian Schrittwieser and
                  Lorcan Morgan and
                  Martin Mulazzani and
                  Markus Huber and
                  Edgar R. Weippl},
  editor       = {David Taniar and
                  Eric Pardede and
                  Hong{-}Quang Nguyen and
                  J. Wenny Rahayu and
                  Ismail Khalil},
  title        = {Using the structure of B+-trees for enhancing logging mechanisms of
                  databases},
  booktitle    = {iiWAS'2011 - The 13th International Conference on Information Integration
                  and Web-based Applications and Services, 5-7 December 2011, Ho Chi
                  Minh City, Vietnam},
  pages        = {301--304},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2095536.2095588},
  doi          = {10.1145/2095536.2095588},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iiwas/KiesebergSMMHW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ithings/SalferWSBE11,
  author       = {Martin Salfer and
                  Sven Wohlgemuth and
                  Sebastian Schrittwieser and
                  Bernhard Bauer and
                  Isao Echizen},
  title        = {Data Provenance with Watermarks for Usage Control Monitors at Disaster
                  Recovery},
  booktitle    = {2011 {IEEE} International Conference on Internet of Things (iThings)
                  {\&} 4th {IEEE} International Conference on Cyber, Physical and
                  Social Computing (CPSCom), Dalian, China, October 19-22, 2011},
  pages        = {514--519},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/iThings/CPSCom.2011.129},
  doi          = {10.1109/ITHINGS/CPSCOM.2011.129},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ithings/SalferWSBE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SchrittwieserKEWSW11,
  author       = {Sebastian Schrittwieser and
                  Peter Kieseberg and
                  Isao Echizen and
                  Sven Wohlgemuth and
                  Noboru Sonehara and
                  Edgar R. Weippl},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {An Algorithm for k-Anonymity-Based Fingerprinting},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {439--452},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_35},
  doi          = {10.1007/978-3-642-32205-1\_35},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SchrittwieserKEWSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MulazzaniSLHW11,
  author       = {Martin Mulazzani and
                  Sebastian Schrittwieser and
                  Manuel Leithner and
                  Markus Huber and
                  Edgar R. Weippl},
  title        = {Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and
                  Online Slack Space},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Mulazzani6-24-11.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MulazzaniSLHW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuberMSW10,
  author       = {Markus Huber and
                  Martin Mulazzani and
                  Sebastian Schrittwieser and
                  Edgar R. Weippl},
  editor       = {Rachel Greenstadt},
  title        = {Cheap and automated socio-technical attacks based on social networking
                  sites},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2010, Chicago, Illinois, USA, October 8, 2010},
  pages        = {61--64},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866423.1866435},
  doi          = {10.1145/1866423.1866435},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HuberMSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/momm/KiesebergLMMSSW10,
  author       = {Peter Kieseberg and
                  Manuel Leithner and
                  Martin Mulazzani and
                  Lindsay Munroe and
                  Sebastian Schrittwieser and
                  Mayank Sinha and
                  Edgar R. Weippl},
  editor       = {Gabriele Kotsis and
                  David Taniar and
                  Eric Pardede and
                  Irfan Awan and
                  Imad Saleh and
                  Ismail Khalil},
  title        = {{QR} code security},
  booktitle    = {MoMM'2010 - The Eighth International Conference on Advances in Mobile
                  Computing and Multimedia, 8-10 November 2010, Paris, France},
  pages        = {430--435},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1971519.1971593},
  doi          = {10.1145/1971519.1971593},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/momm/KiesebergLMMSSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics