Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Sebastian Schrittwieser
@article{DBLP:journals/compsec/CoppaS24, author = {Emilio Coppa and Sebastian Schrittwieser}, title = {Editorial: Special issue on {ARES} 2022}, journal = {Comput. Secur.}, volume = {138}, pages = {103662}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103662}, doi = {10.1016/J.COSE.2023.103662}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/CoppaS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TavolatoLEGS24, author = {Paul Tavolato and Robert Luh and Sebastian Eresheim and Simon Gmeiner and Sebastian Schrittwieser}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {211--218}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012421800003648}, doi = {10.5220/0012421800003648}, timestamp = {Tue, 02 Apr 2024 14:37:52 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TavolatoLEGS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SchrittwieserWMKLRW23, author = {Sebastian Schrittwieser and Elisabeth Wimmer and Kevin Mallinger and Patrick Kochberger and Caroline Lawitschka and Sebastian Raubitzek and Edgar R. Weippl}, editor = {Sokratis K. Katsikas and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Rita Maria Ugarelli and Isabel Pra{\c{c}}a and Wenjuan Li and Weizhi Meng and Steven Furnell and Basel Katt and Sandeep Pirbhulal and Ankur Shukla and Michele Ianni and Mila Dalla Preda and Kim{-}Kwang Raymond Choo and Miguel Pupo Correia and Abhishta Abhishta and Giovanni Sileno and Mina Alishahi and Harsha K. Kalutarage and Naoto Yanai}, title = {Modeling Obfuscation Stealth Through Code Complexity}, booktitle = {Computer Security. {ESORICS} 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14399}, pages = {392--408}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-54129-2\_23}, doi = {10.1007/978-3-031-54129-2\_23}, timestamp = {Mon, 25 Mar 2024 20:43:51 +0100}, biburl = {https://dblp.org/rec/conf/esorics/SchrittwieserWMKLRW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KochbergerGSLW23, author = {Patrick Kochberger and Maximilian Gramberger and Sebastian Schrittwieser and Caroline Lawitschka and Edgar R. Weippl}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI's {GPT-3.5} on {C} Source Code}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {7--19}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012167000003555}, doi = {10.5220/0012167000003555}, timestamp = {Mon, 31 Jul 2023 15:34:21 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KochbergerGSLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-07300, author = {Patrick Kochberger and Sebastian Schrittwieser and Bart Coppens and Bjorn De Sutter}, title = {Evaluation Methodologies in Software Protection Research}, journal = {CoRR}, volume = {abs/2307.07300}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.07300}, doi = {10.48550/ARXIV.2307.07300}, eprinttype = {arXiv}, eprint = {2307.07300}, timestamp = {Mon, 24 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-07300.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/educon/LuhEGPMTS22, author = {Robert Luh and Sebastian Eresheim and Stefanie Gr{\"{o}}{\ss}bacher and Thomas Petelin and Florian Mayr and Paul Tavolato and Sebastian Schrittwieser}, editor = {Ilhem Kallel and Habib M. Kammoun and Lobna Hsairi}, title = {PenQuest Reloaded: {A} Digital Cyber Defense Game for Technical Education}, booktitle = {{IEEE} Global Engineering Education Conference, {EDUCON} 2022, Tunis, Tunisia, March 28-31, 2022}, pages = {906--914}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/EDUCON52537.2022.9766700}, doi = {10.1109/EDUCON52537.2022.9766700}, timestamp = {Tue, 17 May 2022 10:02:27 +0200}, biburl = {https://dblp.org/rec/conf/educon/LuhEGPMTS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/SchrittwieserKP22, author = {Sebastian Schrittwieser and Patrick Kochberger and Michael Pucher and Caroline Lawitschka and Philip K{\"{o}}nig and Edgar R. Weippl}, editor = {Hans P. Reiser and Marcel Kyas}, title = {Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {273--291}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_15}, doi = {10.1007/978-3-031-22295-5\_15}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/SchrittwieserKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/KochbergerSW22, author = {Patrick Kochberger and Sebastian Schrittwieser and Edgar R. Weippl}, title = {Meta-framework for Automating Static Malware Analysis}, journal = {{ERCIM} News}, volume = {2022}, number = {129}, pages = {0}, year = {2022}, url = {https://ercim-news.ercim.eu/en129/special/meta-framework-for-automating-static-malware-analysis}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/KochbergerSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/KiesebergSW21, author = {Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl}, title = {Secure Internal Data Markets}, journal = {Future Internet}, volume = {13}, number = {8}, pages = {208}, year = {2021}, url = {https://doi.org/10.3390/fi13080208}, doi = {10.3390/FI13080208}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/KiesebergSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KochbergerSSKW21, author = {Patrick Kochberger and Sebastian Schrittwieser and Stefan Schweighofer and Peter Kieseberg and Edgar R. Weippl}, editor = {Delphine Reinhardt and Tilo M{\"{u}}ller}, title = {SoK: Automatic Deobfuscation of Virtualization-protected Applications}, booktitle = {{ARES} 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021}, pages = {6:1--6:15}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3465481.3465772}, doi = {10.1145/3465481.3465772}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KochbergerSSKW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ei/LuhS20, author = {Robert Luh and Sebastian Schrittwieser}, title = {Advanced threat intelligence: detection and classification of anomalous behavior in system processes}, journal = {Elektrotech. Informationstechnik}, volume = {137}, number = {1}, pages = {38--44}, year = {2020}, url = {https://doi.org/10.1007/s00502-019-00780-x}, doi = {10.1007/S00502-019-00780-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ei/LuhS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/DamKS20, author = {Tobias Dam and Lukas Daniel Klausner and Sebastian Schrittwieser}, title = {Typosquatting for Fun and Profit: Cross-Country Analysis of Pop-Up Scam}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {2}, pages = {265--300}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.924}, doi = {10.13052/JCSM2245-1439.924}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/DamKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/LuhTTSJ20, author = {Robert Luh and Marlies Temper and Simon Tjoa and Sebastian Schrittwieser and Helge Janicke}, title = {PenQuest: a gamified attacker/defender meta model for cyber security assessment and education}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {16}, number = {1}, pages = {19--61}, year = {2020}, url = {https://doi.org/10.1007/s11416-019-00342-x}, doi = {10.1007/S11416-019-00342-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/LuhTTSJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/JudtKKS20, author = {Daniel Judt and Patrick Kochberger and Peter Kieseberg and Sebastian Schrittwieser}, title = {Compiling and Analyzing Open Source Malware for Research Purposes}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2020, Altoona, PA, USA, October 28-30, 2020}, pages = {32--37}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICSSA51305.2020.00013}, doi = {10.1109/ICSSA51305.2020.00013}, timestamp = {Fri, 20 Aug 2021 15:45:41 +0200}, biburl = {https://dblp.org/rec/conf/icssa/JudtKKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-01749, author = {Tobias Dam and Lukas Daniel Klausner and Sebastian Schrittwieser}, title = {Typosquatting for Fun and Profit: Cross-Country Analysis of Pop-Up Scam}, journal = {CoRR}, volume = {abs/2004.01749}, year = {2020}, url = {https://arxiv.org/abs/2004.01749}, eprinttype = {arXiv}, eprint = {2004.01749}, timestamp = {Wed, 08 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-01749.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LuhJS19, author = {Robert Luh and Helge Janicke and Sebastian Schrittwieser}, title = {{AIDIS:} Detecting and classifying anomalous behavior in ubiquitous kernel processes}, journal = {Comput. Secur.}, volume = {84}, pages = {120--147}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.03.015}, doi = {10.1016/J.COSE.2019.03.015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LuhJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/DamKBS19, author = {Tobias Dam and Lukas Daniel Klausner and Damjan Buhov and Sebastian Schrittwieser}, title = {Large-Scale Analysis of Pop-Up Scam on Typosquatting URLs}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {53:1--53:9}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340332}, doi = {10.1145/3339252.3340332}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/DamKBS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/KiesebergSW19, author = {Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl}, title = {Fingerprinting using database steganography}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2019, St. P{\"{o}}lten, Austria, July 25-26, 2019}, pages = {16--20}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICSSA48308.2019.00009}, doi = {10.1109/ICSSA48308.2019.00009}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/KiesebergSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/KiesebergSFW19, author = {Peter Kieseberg and Sebastian Schrittwieser and Peter Fr{\"{u}}hwirt and Edgar R. Weippl}, title = {Analysis of the Internals of MySQL/InnoDB {B+} Tree Index Navigation from a Forensic Perspective}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2019, St. P{\"{o}}lten, Austria, July 25-26, 2019}, pages = {46--51}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICSSA48308.2019.00013}, doi = {10.1109/ICSSA48308.2019.00013}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/KiesebergSFW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/KochbergerTS19, author = {Patrick Kochberger and Alexander Tauber and Sebastian Schrittwieser}, title = {Assessment of the Transparency of the Windows Subsystem for Linux {(WSL)}}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2019, St. P{\"{o}}lten, Austria, July 25-26, 2019}, pages = {60--69}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICSSA48308.2019.00015}, doi = {10.1109/ICSSA48308.2019.00015}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/KochbergerTS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-10762, author = {Tobias Dam and Lukas Daniel Klausner and Damjan Buhov and Sebastian Schrittwieser}, title = {Large-Scale Analysis of Pop-Up Scam on Typosquatting URLs}, journal = {CoRR}, volume = {abs/1906.10762}, year = {2019}, url = {http://arxiv.org/abs/1906.10762}, eprinttype = {arXiv}, eprint = {1906.10762}, timestamp = {Thu, 27 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-10762.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BuhovRS18, author = {Damjan Buhov and Julian Rauchberger and Sebastian Schrittwieser}, title = {{FLASH:} Is the 20th Century Hero Really Gone? Large-Scale Evaluation on Flash Usage {\&} Its Security and Privacy Implications}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {4}, pages = {26--40}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.12.31.026}, doi = {10.22667/JOWUA.2018.12.31.026}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BuhovRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/LuhSWJS18, author = {Robert Luh and Gregor Schramm and Markus Wagner and Helge Janicke and Sebastian Schrittwieser}, title = {{SEQUIN:} a grammar inference framework for analyzing malicious system behavior}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {14}, number = {4}, pages = {291--311}, year = {2018}, url = {https://doi.org/10.1007/s11416-018-0318-x}, doi = {10.1007/S11416-018-0318-X}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/LuhSWJS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/RauchbergerSDLB18, author = {Julian Rauchberger and Sebastian Schrittwieser and Tobias Dam and Robert Luh and Damjan Buhov and Gerhard P{\"{o}}tzelsberger and Hyoungshick Kim}, editor = {Sebastian Doerr and Mathias Fischer and Sebastian Schrittwieser and Dominik Herrmann}, title = {The Other Side of the Coin: {A} Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns}, booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30, 2018}, pages = {18:1--18:10}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3230833.3230869}, doi = {10.1145/3230833.3230869}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/RauchbergerSDLB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cecc/KiesebergSW18, author = {Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl}, title = {Structural Limitations of B+-Tree forensics}, booktitle = {Proceedings of the Central European Cybersecurity Conference 2018, {CECC} 2018, Ljubljana, Slovenia, November 15-16, 2018}, pages = {9:1--9:4}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3277570.3277579}, doi = {10.1145/3277570.3277579}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cecc/KiesebergSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LuhTTS18, author = {Robert Luh and Marlies Temper and Simon Tjoa and Sebastian Schrittwieser}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {{APT} {RPG:} Design of a Gamified Attacker/Defender Meta Model}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {526--537}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006717805260537}, doi = {10.5220/0006717805260537}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/LuhTTS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/IEEEares/2018, editor = {Sebastian Doerr and Mathias Fischer and Sebastian Schrittwieser and Dominik Herrmann}, title = {Proceedings of the 13th International Conference on Availability, Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30, 2018}, publisher = {{ACM}}, year = {2018}, url = {http://dl.acm.org/citation.cfm?id=3230833}, isbn = {978-1-4503-6448-5}, timestamp = {Thu, 17 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/EresheimLS17, author = {Sebastian Eresheim and Robert Luh and Sebastian Schrittwieser}, title = {The Evolution of Process Hiding Techniques in Malware - Current Threats and Possible Countermeasures}, journal = {J. Inf. Process.}, volume = {25}, pages = {866--874}, year = {2017}, url = {https://doi.org/10.2197/ipsjjip.25.866}, doi = {10.2197/IPSJJIP.25.866}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/EresheimLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/LuhMKJS17, author = {Robert Luh and Stefan Marschalek and Manfred Kaiser and Helge Janicke and Sebastian Schrittwieser}, title = {Semantics-aware detection of targeted attacks: a survey}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {13}, number = {1}, pages = {47--85}, year = {2017}, url = {https://doi.org/10.1007/s11416-016-0273-3}, doi = {10.1007/S11416-016-0273-3}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/LuhMKJS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/LuhSM17, author = {Robert Luh and Sebastian Schrittwieser and Stefan Marschalek}, editor = {Leonard Barolli and Makoto Takizawa and Tomoya Enokido and Hui{-}Huang Hsu and Chi{-}Yi Lin}, title = {LLR-Based Sentiment Analysis for Kernel Event Sequences}, booktitle = {31st {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2017, Taipei, Taiwan, March 27-29, 2017}, pages = {764--771}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/AINA.2017.47}, doi = {10.1109/AINA.2017.47}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/LuhSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/KiesebergNSSW17, author = {Peter Kieseberg and Sebastian Neuner and Sebastian Schrittwieser and Martin Schmiedecker and Edgar R. Weippl}, editor = {Petr Matousek and Martin Schmiedecker}, title = {Real-Time Forensics Through Endpoint Visibility}, booktitle = {Digital Forensics and Cyber Crime - 9th International Conference, {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {216}, pages = {18--32}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73697-6\_2}, doi = {10.1007/978-3-319-73697-6\_2}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/KiesebergNSSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RauchbergerLS17, author = {Julian Rauchberger and Robert Luh and Sebastian Schrittwieser}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Longkit - {A} Universal Framework for {BIOS/UEFI} Rootkits in System Management Mode}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {346--353}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006165603460353}, doi = {10.5220/0006165603460353}, timestamp = {Thu, 18 May 2017 14:22:34 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RauchbergerLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LuhSMJ17, author = {Robert Luh and Sebastian Schrittwieser and Stefan Marschalek and Helge Janicke}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Design of an Anomaly-based Threat Detection {\&} Explication System}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {397--402}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006205203970402}, doi = {10.5220/0006205203970402}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LuhSMJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LuhS0S17, author = {Robert Luh and Gregor Schramm and Markus Wagner and Sebastian Schrittwieser}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Sequitur-based Inference and Analysis Framework for Malicious System Behavior}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {632--643}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006250206320643}, doi = {10.5220/0006250206320643}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/LuhS0S17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/EresheimLS17, author = {Sebastian Eresheim and Robert Luh and Sebastian Schrittwieser}, title = {On the Impact of Kernel Code Vulnerabilities in IoT Devices}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2017, Altoona, PA, USA, July 24-25, 2017}, pages = {1--5}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2017.16}, doi = {10.1109/ICSSA.2017.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/EresheimLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/ValicekSPS17, author = {Martin Valicek and Gregor Schramm and Martin Pirker and Sebastian Schrittwieser}, title = {Creation and Integration of Remote High Interaction Honeypots}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2017, Altoona, PA, USA, July 24-25, 2017}, pages = {50--55}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2017.21}, doi = {10.1109/ICSSA.2017.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/ValicekSPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/MarschalekLS17, author = {Stefan Marschalek and Robert Luh and Sebastian Schrittwieser}, title = {Endpoint Data Classification Using Markov Chains}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2017, Altoona, PA, USA, July 24-25, 2017}, pages = {56--59}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2017.17}, doi = {10.1109/ICSSA.2017.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/MarschalekLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/BuhovKTS17, author = {Damjan Buhov and Patrick Kochberger and Richard Thron and Sebastian Schrittwieser}, title = {Discovering Cryptographic Algorithms in Binary Code Through Loop Enumeration}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2017, Altoona, PA, USA, July 24-25, 2017}, pages = {80--86}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2017.22}, doi = {10.1109/ICSSA.2017.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/BuhovKTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/KimKCKS17, author = {Jinwoo Kim and Kuyju Kim and Junsung Cho and Hyoungshick Kim and Sebastian Schrittwieser}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {663--677}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_41}, doi = {10.1007/978-3-319-72359-4\_41}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/KimKCKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/LuhSMJW17, author = {Robert Luh and Sebastian Schrittwieser and Stefan Marschalek and Helge Janicke and Edgar R. Weippl}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Poster: Design of an Anomaly-based Threat Detection {\&} Explication System}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {119--120}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3084162}, doi = {10.1145/3078861.3084162}, timestamp = {Tue, 09 Feb 2021 08:50:30 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/LuhSMJW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/KiesebergWS17, author = {Peter Kieseberg and Edgar R. Weippl and Sebastian Schrittwieser}, title = {Forensics using Internal Database Structures}, journal = {{ERCIM} News}, volume = {2017}, number = {108}, year = {2017}, url = {http://ercim-news.ercim.eu/en108/r-i/forensics-using-internal-database-structures}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/KiesebergWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/KiesebergFS17, author = {Peter Kieseberg and Peter Fr{\"{u}}hwirt and Sebastian Schrittwieser}, title = {Security Testing for Mobile Applications}, journal = {{ERCIM} News}, volume = {2017}, number = {109}, year = {2017}, url = {https://ercim-news.ercim.eu/en109/r-i/security-testing-for-mobile-applications}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/KiesebergFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/SchrittwieserKK16, author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Johannes Kinder and Georg Merzdovnik and Edgar R. Weippl}, title = {Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?}, journal = {{ACM} Comput. Surv.}, volume = {49}, number = {1}, pages = {4:1--4:37}, year = {2016}, url = {https://doi.org/10.1145/2886012}, doi = {10.1145/2886012}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/SchrittwieserKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WeipplSR16, author = {Edgar R. Weippl and Sebastian Schrittwieser and Sylvi Rennert}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Empirical Research and Research Ethics in Information Security}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {14--22}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54433-5\_2}, doi = {10.1007/978-3-319-54433-5\_2}, timestamp = {Thu, 16 May 2019 16:58:10 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WeipplSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/BuhovTS16, author = {Damjan Buhov and Richard Thron and Sebastian Schrittwieser}, title = {Catch Me if You Can! Transparent Detection of Shellcode}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2016, St. P{\"{o}}lten, Austria, August 24-25, 2016}, pages = {60--63}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/ICSSA.2016.18}, doi = {10.1109/ICSSA.2016.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/BuhovTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiwas/LuhSM16, author = {Robert Luh and Sebastian Schrittwieser and Stefan Marschalek}, editor = {Gabriele Anderst{-}Kotsis}, title = {{TAON:} an ontology-based approach to mitigating targeted attacks}, booktitle = {Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, iiWAS 2016, Singapore, November 28-30, 2016}, pages = {303--312}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3011141.3011157}, doi = {10.1145/3011141.3011157}, timestamp = {Tue, 06 Nov 2018 16:58:39 +0100}, biburl = {https://dblp.org/rec/conf/iiwas/LuhSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/MarschalekKLS16, author = {Stefan Marschalek and Manfred Kaiser and Robert Luh and Sebastian Schrittwieser}, editor = {Jacqueline Bourdeau and Jim Hendler and Roger Nkambou and Ian Horrocks and Ben Y. Zhao}, title = {Empirical Malware Research through Observation of System Behaviour}, booktitle = {Proceedings of the 25th International Conference on World Wide Web, {WWW} 2016, Montreal, Canada, April 11-15, 2016, Companion Volume}, pages = {467--469}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2872518.2888609}, doi = {10.1145/2872518.2888609}, timestamp = {Tue, 12 Apr 2022 14:46:29 +0200}, biburl = {https://dblp.org/rec/conf/www/MarschalekKLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/KiesebergWS16, author = {Peter Kieseberg and Edgar R. Weippl and Sebastian Schrittwieser}, title = {Detection of Data Leaks in Collaborative Data Driven Research}, journal = {{ERCIM} News}, volume = {2016}, number = {105}, year = {2016}, url = {http://ercim-news.ercim.eu/en105/r-i/detection-of-data-leaks-in-collaborative-data-driven-research}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/KiesebergWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/MalleKSH16, author = {Bernd Malle and Peter Kieseberg and Sebastian Schrittwieser and Andreas Holzinger}, title = {Privacy Aware Machine Learning and the "Right to be Forgotten"}, journal = {{ERCIM} News}, volume = {2016}, number = {107}, year = {2016}, url = {http://ercim-news.ercim.eu/en107/special/privacy-aware-machine-learning-and-the-right-to-be-forgotten}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/MalleKSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpcc/MuellerSFKW15, author = {Robin Mueller and Sebastian Schrittwieser and Peter Fr{\"{u}}hwirt and Peter Kieseberg and Edgar R. Weippl}, title = {Security and privacy of smartphone messaging applications}, journal = {Int. J. Pervasive Comput. Commun.}, volume = {11}, number = {2}, pages = {132--150}, year = {2015}, url = {https://doi.org/10.1108/IJPCC-04-2015-0020}, doi = {10.1108/IJPCC-04-2015-0020}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijpcc/MuellerSFKW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/FadaiSKM15, author = {Tariq Fadai and Sebastian Schrittwieser and Peter Kieseberg and Martin Mulazzani}, title = {Trust me, I'm a Root CA! Analyzing {SSL} Root CAs in Modern Browsers and Operating Systems}, booktitle = {10th International Conference on Availability, Reliability and Security, {ARES} 2015, Toulouse, France, August 24-27, 2015}, pages = {174--179}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ARES.2015.93}, doi = {10.1109/ARES.2015.93}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/FadaiSKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/NeunerMSW15, author = {Sebastian Neuner and Martin Mulazzani and Sebastian Schrittwieser and Edgar R. Weippl}, title = {Gradually Improving the Forensic Process}, booktitle = {10th International Conference on Availability, Reliability and Security, {ARES} 2015, Toulouse, France, August 24-27, 2015}, pages = {404--410}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ARES.2015.32}, doi = {10.1109/ARES.2015.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/NeunerMSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/KiesebergFSW15, author = {Peter Kieseberg and Peter Fr{\"{u}}hwirt and Sebastian Schrittwieser and Edgar R. Weippl}, title = {Security tests for mobile applications - Why using {TLS/SSL} is not enough}, booktitle = {Eighth {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2015 Workshops, Graz, Austria, April 13-17, 2015}, pages = {1--2}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICSTW.2015.7107416}, doi = {10.1109/ICSTW.2015.7107416}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/KiesebergFSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiwas/MarschalekLKS15, author = {Stefan Marschalek and Robert Luh and Manfred Kaiser and Sebastian Schrittwieser}, editor = {Gabriele Anderst{-}Kotsis and Maria Indrawan{-}Santiago}, title = {Classifying malicious system behavior using event propagation trees}, booktitle = {Proceedings of the 17th International Conference on Information Integration and Web-based Applications {\&} Services, iiWAS 2015, Brussels, Belgium, December 11-13, 2015}, pages = {23:1--23:10}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2837185.2837199}, doi = {10.1145/2837185.2837199}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiwas/MarschalekLKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiwas/RottermannerKHS15, author = {Christoph Rottermanner and Peter Kieseberg and Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser}, editor = {Gabriele Anderst{-}Kotsis and Maria Indrawan{-}Santiago}, title = {Privacy and data protection in smartphone messengers}, booktitle = {Proceedings of the 17th International Conference on Information Integration and Web-based Applications {\&} Services, iiWAS 2015, Brussels, Belgium, December 11-13, 2015}, pages = {83:1--83:10}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2837185.2837202}, doi = {10.1145/2837185.2837202}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iiwas/RottermannerKHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SchrittwieserKKHLMW14, author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and Edgar R. Weippl}, title = {Covert Computation - Hiding code in code through compile-time obfuscation}, journal = {Comput. Secur.}, volume = {42}, pages = {13--26}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2013.12.006}, doi = {10.1016/J.COSE.2013.12.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SchrittwieserKKHLMW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/electronicmarkets/KiesebergSMEW14, author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Mulazzani and Isao Echizen and Edgar R. Weippl}, title = {An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata}, journal = {Electron. Mark.}, volume = {24}, number = {2}, pages = {113--124}, year = {2014}, url = {https://doi.org/10.1007/s12525-014-0154-x}, doi = {10.1007/S12525-014-0154-X}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/electronicmarkets/KiesebergSMEW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HochreinerFMKSW14, author = {Christoph Hochreiner and Peter Fr{\"{u}}hwirt and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl}, title = {Genie in a Model? Why Model Driven Security will not secure your Web Application}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {3}, pages = {44--62}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.09.31.044}, doi = {10.22667/JOWUA.2014.09.31.044}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HochreinerFMKSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Schrittwieser0M14, author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Georg Merzdovnik and Peter Kieseberg and Edgar R. Weippl}, title = {{AES-SEC:} Improving Software Obfuscation through Hardware-Assistance}, booktitle = {Ninth International Conference on Availability, Reliability and Security, {ARES} 2014, Fribourg, Switzerland, September 8-12, 2014}, pages = {184--191}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ARES.2014.32}, doi = {10.1109/ARES.2014.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Schrittwieser0M14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/HochreinerMKSW14, author = {Christoph Hochreiner and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl}, editor = {Linawati and Made Sudiana Mahendra and Erich J. Neuhold and A Min Tjoa and Ilsun You}, title = {Using Model Driven Security Approaches in Web Application Development}, booktitle = {Information and Communication Technology - Second {IFIP} {TC5/8} International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8407}, pages = {419--431}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55032-4\_42}, doi = {10.1007/978-3-642-55032-4\_42}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ict-eurasia/HochreinerMKSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/BeyerMSHW14, author = {Stefanie Beyer and Martin Mulazzani and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Towards Fully Automated Digital Alibis with Social Interaction}, booktitle = {Advances in Digital Forensics {X} - 10th {IFIP} {WG} 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {433}, pages = {297--307}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44952-3\_20}, doi = {10.1007/978-3-662-44952-3\_20}, timestamp = {Sun, 25 Oct 2020 23:10:14 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-9/BeyerMSHW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiwas/MuellerSFKW14, author = {Robin Mueller and Sebastian Schrittwieser and Peter Fr{\"{u}}hwirt and Peter Kieseberg and Edgar R. Weippl}, editor = {Maria Indrawan{-}Santiago and Matthias Steinbauer and Hong{-}Quang Nguyen and A Min Tjoa and Ismail Khalil and Gabriele Anderst{-}Kotsis}, title = {What's new with WhatsApp {\&} Co.? Revisiting the Security of Smartphone Messaging Applications}, booktitle = {Proceedings of the 16th International Conference on Information Integration and Web-based Applications {\&} Services, Hanoi, Vietnam, December 4-6, 2014}, pages = {142--151}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2684200.2684328}, doi = {10.1145/2684200.2684328}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iiwas/MuellerSFKW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/WinterKMHSLW14, author = {Philipp Winter and Richard K{\"{o}}wer and Martin Mulazzani and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and Edgar R. Weippl}, editor = {Emiliano De Cristofaro and Steven J. Murdoch}, title = {Spoiled Onions: Exposing Malicious Tor Exit Relays}, booktitle = {Privacy Enhancing Technologies - 14th International Symposium, {PETS} 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8555}, pages = {304--331}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08506-7\_16}, doi = {10.1007/978-3-319-08506-7\_16}, timestamp = {Sat, 09 Apr 2022 12:39:29 +0200}, biburl = {https://dblp.org/rec/conf/pet/WinterKMHSLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/FruhwirtKHSW14, author = {Peter Fr{\"{u}}hwirt and Peter Kieseberg and Christoph Hochreiner and Sebastian Schrittwieser and Edgar R. Weippl}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {InnoDB Datenbank Forensik Rekonstruktion von Abfragen {\"{u}}ber Datenbank-interne Logfiles}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {363--374}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20056}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/FruhwirtKHSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/KiesebergHSWH14, author = {Peter Kieseberg and Heidelinde Hobel and Sebastian Schrittwieser and Edgar R. Weippl and Andreas Holzinger}, editor = {Andreas Holzinger and Igor Jurisica}, title = {Protecting Anonymity in Data-Driven Biomedical Science}, booktitle = {Interactive Knowledge Discovery and Data Mining in Biomedical Informatics - State-of-the-Art and Future Challenges}, series = {Lecture Notes in Computer Science}, volume = {8401}, pages = {301--316}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43968-5\_17}, doi = {10.1007/978-3-662-43968-5\_17}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/KiesebergHSWH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwis/KiesebergSMMHW13, author = {Peter Kieseberg and Sebastian Schrittwieser and Lorcan Morgan and Martin Mulazzani and Markus Huber and Edgar R. Weippl}, title = {Using the structure of B+-trees for enhancing logging mechanisms of databases}, journal = {Int. J. Web Inf. Syst.}, volume = {9}, number = {1}, pages = {53--68}, year = {2013}, url = {https://doi.org/10.1108/17440081311316389}, doi = {10.1108/17440081311316389}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwis/KiesebergSMMHW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FruhwirtKSHW13, author = {Peter Fr{\"{u}}hwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl}, title = {InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {4}, pages = {227--238}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2013.02.003}, doi = {10.1016/J.ISTR.2013.02.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FruhwirtKSHW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/UngerMFHSW13, author = {Thomas Unger and Martin Mulazzani and Dominik Fruhwirt and Markus Huber and Sebastian Schrittwieser and Edgar R. Weippl}, title = {{SHPF:} Enhancing {HTTP(S)} Session Security with Browser Fingerprinting}, booktitle = {2013 International Conference on Availability, Reliability and Security, {ARES} 2013, Regensburg, Germany, September 2-6, 2013}, pages = {255--261}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ARES.2013.33}, doi = {10.1109/ARES.2013.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/UngerMFHSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchrittwieserKKHLMW13, author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and Edgar R. Weippl}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Covert computation: hiding code in code for obfuscation purposes}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {529--534}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484384}, doi = {10.1145/2484313.2484384}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SchrittwieserKKHLMW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosn/HuberMSW13, author = {Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and Edgar R. Weippl}, editor = {S. Muthu Muthukrishnan and Amr El Abbadi and Balachander Krishnamurthy}, title = {Appinspect: large-scale evaluation of social networking apps}, booktitle = {Conference on Online Social Networks, COSN'13, Boston, MA, USA, October 7-8, 2013}, pages = {143--154}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2512938.2512942}, doi = {10.1145/2512938.2512942}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cosn/HuberMSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/MulazzaniNKHSW13, author = {Martin Mulazzani and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and Edgar R. Weippl}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Quantifying Windows File Slack Size and Stability}, booktitle = {Advances in Digital Forensics {IX} - 9th {IFIP} {WG} 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {410}, pages = {183--193}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41148-9\_13}, doi = {10.1007/978-3-642-41148-9\_13}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/MulazzaniNKHSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/FruhwirtKSHW12, author = {Peter Fr{\"{u}}hwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl}, title = {InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs}, booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012}, pages = {625--633}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ARES.2012.50}, doi = {10.1109/ARES.2012.50}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/FruhwirtKSHW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiwas/SchrittwieserKW12, author = {Sebastian Schrittwieser and Peter Kieseberg and Edgar R. Weippl}, editor = {Eric Pardede}, title = {Digital forensics for enterprise rights management systems}, booktitle = {The 14th International Conference on Information Integration and Web-based Applications {\&} Services, {IIWAS} '12, Bali, Indonesia - December 3-5, 2012}, pages = {111--120}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2428736.2428756}, doi = {10.1145/2428736.2428756}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iiwas/SchrittwieserKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SchrittwieserFKLMHW12, author = {Sebastian Schrittwieser and Peter Fr{\"{u}}hwirt and Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Markus Huber and Edgar R. Weippl}, title = {Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/guess-whos-texting-you-evaluating-security-smartphone-messaging-applications}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/SchrittwieserFKLMHW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SchrittwieserKEWS11, author = {Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara}, title = {Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters}, booktitle = {Sixth International Conference on Availability, Reliability and Security, {ARES} 2011, Vienna, Austria, August 22-26, 2011}, pages = {645--649}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARES.2011.101}, doi = {10.1109/ARES.2011.101}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/SchrittwieserKEWS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HuberMLSWW11, author = {Markus Huber and Martin Mulazzani and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and Edgar R. Weippl}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Social snapshots: digital forensics for online social networks}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {113--122}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076748}, doi = {10.1145/2076732.2076748}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HuberMLSWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KiesebergSMHW11, author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Mulazzani and Markus Huber and Edgar R. Weippl}, title = {Trees Cannot Lie: Using Data Structures for Forensics Purposes}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {282--285}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.18}, doi = {10.1109/EISIC.2011.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/KiesebergSMHW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/SchrittwieserK11, author = {Sebastian Schrittwieser and Stefan Katzenbeisser}, editor = {Tom{\'{a}}s Filler and Tom{\'{a}}s Pevn{\'{y}} and Scott Craver and Andrew D. Ker}, title = {Code Obfuscation against Static and Dynamic Reverse Engineering}, booktitle = {Information Hiding - 13th International Conference, {IH} 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6958}, pages = {270--284}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24178-9\_19}, doi = {10.1007/978-3-642-24178-9\_19}, timestamp = {Sun, 25 Jul 2021 11:46:22 +0200}, biburl = {https://dblp.org/rec/conf/ih/SchrittwieserK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiwas/KiesebergSMMHW11, author = {Peter Kieseberg and Sebastian Schrittwieser and Lorcan Morgan and Martin Mulazzani and Markus Huber and Edgar R. Weippl}, editor = {David Taniar and Eric Pardede and Hong{-}Quang Nguyen and J. Wenny Rahayu and Ismail Khalil}, title = {Using the structure of B+-trees for enhancing logging mechanisms of databases}, booktitle = {iiWAS'2011 - The 13th International Conference on Information Integration and Web-based Applications and Services, 5-7 December 2011, Ho Chi Minh City, Vietnam}, pages = {301--304}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2095536.2095588}, doi = {10.1145/2095536.2095588}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iiwas/KiesebergSMMHW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ithings/SalferWSBE11, author = {Martin Salfer and Sven Wohlgemuth and Sebastian Schrittwieser and Bernhard Bauer and Isao Echizen}, title = {Data Provenance with Watermarks for Usage Control Monitors at Disaster Recovery}, booktitle = {2011 {IEEE} International Conference on Internet of Things (iThings) {\&} 4th {IEEE} International Conference on Cyber, Physical and Social Computing (CPSCom), Dalian, China, October 19-22, 2011}, pages = {514--519}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/iThings/CPSCom.2011.129}, doi = {10.1109/ITHINGS/CPSCOM.2011.129}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ithings/SalferWSBE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/SchrittwieserKEWSW11, author = {Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara and Edgar R. Weippl}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {An Algorithm for k-Anonymity-Based Fingerprinting}, booktitle = {Digital Forensics and Watermarking - 10th International Workshop, {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7128}, pages = {439--452}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32205-1\_35}, doi = {10.1007/978-3-642-32205-1\_35}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/SchrittwieserKEWSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MulazzaniSLHW11, author = {Martin Mulazzani and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl}, title = {Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Mulazzani6-24-11.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MulazzaniSLHW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuberMSW10, author = {Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and Edgar R. Weippl}, editor = {Rachel Greenstadt}, title = {Cheap and automated socio-technical attacks based on social networking sites}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010}, pages = {61--64}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866423.1866435}, doi = {10.1145/1866423.1866435}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HuberMSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/momm/KiesebergLMMSSW10, author = {Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and Edgar R. Weippl}, editor = {Gabriele Kotsis and David Taniar and Eric Pardede and Irfan Awan and Imad Saleh and Ismail Khalil}, title = {{QR} code security}, booktitle = {MoMM'2010 - The Eighth International Conference on Advances in Mobile Computing and Multimedia, 8-10 November 2010, Paris, France}, pages = {430--435}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1971519.1971593}, doi = {10.1145/1971519.1971593}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/momm/KiesebergLMMSSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.