Edgar Weippl

is research director of SBA Research and Associate Professor (Privatdozent) at the Vienna University Edgar WEIPPL
of Technology.

  • E-Mail
  • Phone: +43 (1) 505 36 88
  • Fax: +43 (1) 505 88 88

Research Interests

His research focuses on applied concepts of IT-security and e-learning.

Bio

After graduating with a Ph.D. from the Vienna University of Technology, Edgar worked in a re-search startup for two years. He then spent one year teaching as an assistant professor at Beloit College, WI. From 2002 to 2004, while with the software vendor ISIS Papyrus, he worked as a consultant in New York, NY and Albany, NY, and in Frankfurt, Germany. In 2004 he joined the Vienna University of Technology and founded the research center SBA Re-search together with A Min Tjoa and Markus Klemen.

Edgar R. Weippl (CISSP, CISA, CISM, CRISC, CSSLP, CMC) is member of the editorial board of Computers & Security (COSE) and he organizes the ARES conference.

Publications

  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and Edgar R. Weippl, "Covert Computation – Hiding Code in Code Through Compile-Time Obfuscation," Computers & Security, 2014. BibTeX
    @ARTICLE{Schrittwieser2014Covert,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation},
      journal = {Computers & Security},
      year = {2014},
      month = {5},
      publisher = {Elsevier Advanced Technology},
      }
  • Shareeful Islam and Haralambos Mouratidis and Edgar R. Weippl, "An Empirical Study on the Implementation and Evaluation of a Goal-driven Software Development Risk Management Model," Information and Software Technology (Elsevier), 2014. BibTeX
    @ARTICLE{Islam2014Empirical,
      Author = {Shareeful Islam and Haralambos Mouratidis and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {An Empirical Study on the Implementation and Evaluation of a Goal-driven Software Development Risk Management Model},
      journal = {Information and Software Technology (Elsevier)},
      year = {2014},
      month = {2},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Martin Mulazzani and Isao Echizen and Edgar R. Weippl, "An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata," Electronic Markets – The International Journal on Networked Business, 2014. BibTeX
    @ARTICLE{Kieseberg2014algorithm,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Mulazzani and Isao Echizen and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata},
      journal = {Electronic Markets - The International Journal on Networked Business},
      year = {2014},
      month = {0},
      }
  • Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and Edgar R. Weippl, "Hardware Malware," Synthesis Lectures on Information Security, Privacy, and Trust, vol. 4, pp. 1-115, 2013. BibTeX
    @ARTICLE{Krieg2013Hardware,
      Author = {Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and {Edgar R.} Weippl},
      title = {Hardware Malware},
      journal = {Synthesis Lectures on Information Security, Privacy, and Trust},
      year = {2013},
      month = {11},
      volume = {4},
      pages = {1-115},
      }
  • Amir Herzberg and Haya Shulman and Johanna Ullrich and Edgar R. Weippl, "Cloudoscopy: Services Discovery and Topology Mapping," in Proceedings of the ACM Cloud Computing Security Workshop (CCSW) at ACM CCS 2013, 2013. BibTeX | PDF
    @INPROCEEDINGS{cv_workshop_229_2013_Cloudoscopy_weippl,
      Author = {Amir Herzberg and Haya Shulman and Johanna Ullrich and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Cloudoscopy: Services Discovery and Topology Mapping },
      booktitle = {Proceedings of the ACM Cloud Computing Security Workshop (CCSW) at ACM CCS 2013},
      year = {2013},
      month = {11},
      pdf = {cv_workshop_229_2013_Cloudoscopy_weippl.pdf},
      }
  • Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and Edgar R. Weippl, "Appinspect: large-scale evaluation of social networking apps," in Proceedings of the first ACM conference on Online social networks, 2013, pp. 143-154. BibTeX | PDF | Slides
    @INPROCEEDINGS{huber2013appinspect,
      Author = {Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Appinspect: large-scale evaluation of social networking apps},
      booktitle = {Proceedings of the first ACM conference on Online social networks},
      year = {2013},
      month = {10},
      pdf = {AppInspect_peprint.pdf},
      pages = {143--154},
      publisher = {ACM},
      link_slides = {http://cosn.acm.org/2013/files/Session6/Session6Paper1.pdf},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Markus Huber and Edgar R. Weippl, "Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications," in Network and Distributed System Security Symposium (NDSS 2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Guess_Who_s_Texting_You_Evalua_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Markus Huber and {Edgar R.} Weippl},
      title = {Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications},
      booktitle = {Network and Distributed System Security Symposium (NDSS 2012)},
      year = {2012},
      month = {2},
      pdf = {ndss2012_final.pdf},
      }
  • Markus Huber and Martin Mulazzani and Edgar R. Weippl and Gerhard Kitzler and Sigrun Goluch, "Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam," IEEE Internet Computing: Special Issue on Security and Privacy in Social Networks, 2011. BibTeX | PDF
    @ARTICLE{Huber_Friend_in_the_middle_Attacks_E_2011,
      Author = {Markus Huber and Martin Mulazzani and {Edgar R.} Weippl and Gerhard Kitzler and Sigrun Goluch},
      title = {Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam},
      journal = {IEEE Internet Computing: Special Issue on Security and Privacy in Social Networks},
      year = {2011},
      month = {5},
      pdf = {FITM_InternetComputing_preprint.pdf},
      note = {Pre Print},
      }
  • Markus Huber and Martin Mulazzani and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and Edgar R. Weippl, "Social Snapshots: Digital Forensics for Online Social Networks," in Annual Computer Security Applications Conference (ACSAC), 2011. BibTeX | PDF
    @INPROCEEDINGS{_Social_Snapshots_Digital_Foren_2011,
      Author = {Markus Huber and Martin Mulazzani and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and {Edgar R.} Weippl},
      title = {Social Snapshots: Digital Forensics for Online Social Networks},
      booktitle = {Annual Computer Security Applications Conference (ACSAC)},
      year = {2011},
      month = {12},
      pdf = {social_snapshots_preprint.pdf},
      acm = {6519720},
      }
  • Martin Mulazzani and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl, "Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space," in USENIX Security, 2011. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Dark_Clouds_on_the_Horizon_Usi_2011,
      Author = {Martin Mulazzani and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
      title = {Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space},
      booktitle = {USENIX Security},
      year = {2011},
      month = {8},
      pdf = {dropboxUSENIX2011.pdf},
      }
  • Stefan Fenz and Edgar R. Weippl and Andreas Ekelhart and Gernot Goluch and Markus Steinkellner, "XML Security – A comparative literature review," Journal of Systems and Software, vol. 81, pp. 1715-1724, 2008. BibTeX
    @ARTICLE{Ekelhart_XMLSecurity_2008,
      Author = {Stefan Fenz and {Edgar R.} Weippl and Andreas Ekelhart and Gernot Goluch and Markus Steinkellner},
      title = {XML Security - A comparative literature review},
      journal = {Journal of Systems and Software},
      year = {2008},
      month = {1},
      abstract = {Since the turn of the millenium, Working Groups of the W3C have been concentrating on the development of XML based security standards, which are paraphrased as XML Security. XML Security consists of three recommendations: XML (Digital) Signature, XML Encryption and XML Key Management Specification (XKMS), all of them published by the W3C. By means of a review of the available literature the authors draw several conclusions about the status quo of XML Security. Furthermore the current state and focuses of research as well as the existing challenges are derived. Trends to different application areas - e.g. use of XML Security for Mobile Computing - are also outlined. Based on this information the analyzed results are discussed and a future outlook is predicted.},
      volume = {81},
      pages = {1715-1724},
      note = {ISSN: 0164-1212},
      }

View all publications

List of publications as PDF