Manuel Leithner

was researcher at SBA Research.Manuel Leithner

Research Interest

Manuel has done research in the areas of mobile security, cloud computing and compile-time obfuscation. Further interests include privacy enhancing technologies, resilient distributed systems, censorship circumvention, anti-forensics, hardened operating systems and language-theoretic security.

Bio

Manuel was introduced to information security while graduating from a technical college. He likes to collect bugs, other people’s credentials and wireless handshakes.

Publications

  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl, "Covert Computation – Hiding Code in Code Through Compile-Time Obfuscation," Computers & Security, 2014. BibTeX | PDF
    @ARTICLE{Schrittwieser2014Covert,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation},
      journal = {Computers & Security},
      year = {2014},
      month = {5},
      pdf = {http://www.sciencedirect.com/science/article/pii/S0167404814000030},
      publisher = {Elsevier Advanced Technology},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Edgar R. Weippl, "Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications," in Network and Distributed System Security Symposium (NDSS 2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Guess_Who_s_Texting_You_Evalua_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
      title = {Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications},
      booktitle = {Network and Distributed System Security Symposium (NDSS 2012)},
      year = {2012},
      month = {2},
      pdf = {ndss2012_final.pdf},
      }
  • Markus Huber and Martin Schmiedecker and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and Edgar R. Weippl, "Social Snapshots: Digital Forensics for Online Social Networks," in Annual Computer Security Applications Conference (ACSAC), 2011. BibTeX | PDF
    @INPROCEEDINGS{_Social_Snapshots_Digital_Foren_2011,
      Author = {Markus Huber and Martin Schmiedecker and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and {Edgar R.} Weippl},
      title = {Social Snapshots: Digital Forensics for Online Social Networks},
      booktitle = {Annual Computer Security Applications Conference (ACSAC)},
      year = {2011},
      month = {12},
      pdf = {social_snapshots_preprint.pdf},
      }
  • Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl, "Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space," in USENIX Security, 2011. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Dark_Clouds_on_the_Horizon_Usi_2011,
      Author = {Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
      title = {Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space},
      booktitle = {USENIX Security},
      year = {2011},
      month = {8},
      pdf = {dropboxUSENIX2011.pdf},
      }
  • Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and Edgar R. Weippl, "QR Code Security," in Fourth International Workshop on Trustworthy Ubiquitous Computing (TwUC 2010), 2010. BibTeX | PDF
    @INPROCEEDINGS{twuc_2010,
      Author = {Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and {Edgar R.} Weippl},
      title = {QR Code Security},
      booktitle = {Fourth International Workshop on Trustworthy Ubiquitous Computing (TwUC 2010)},
      year = {2010},
      month = {11},
      pdf = {QR_Code_Security.pdf},
      }

View all publications

  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl, "Covert Computation – Hiding Code in Code Through Compile-Time Obfuscation," Computers & Security, 2014. BibTeX | PDF
    @ARTICLE{Schrittwieser2014Covert,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation},
      journal = {Computers & Security},
      year = {2014},
      month = {5},
      pdf = {http://www.sciencedirect.com/science/article/pii/S0167404814000030},
      publisher = {Elsevier Advanced Technology},
      }
  • Martin Schmiedecker and Philipp Reschl and Markus Huber and Manuel Leithner and Sebastian Schrittwieser and Edgar R. Weippl, "Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting," in Web 2.0 Workshop on Security and Privacy (W2SP), 2013. BibTeX | PDF | Slides
    @INPROCEEDINGS{_Fast_and_Reliable_Browser_Iden_2013,
      Author = {Martin Schmiedecker and Philipp Reschl and Markus Huber and Manuel Leithner and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting},
      booktitle = {Web 2.0 Workshop on Security and Privacy (W2SP)},
      year = {2013},
      month = {5},
      pdf = {jsfingerprinting.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/fast-and-efficient-browser-identification-with-javascript-engine-fingerprinting},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl, "Covert Computation – Hiding Code in Code for Obfuscation Purposes," in Proceedings of the 8th International Symposium on ACM Symposium on Information , Computer and Communications Security (ASIACCS 2013), 2013. BibTeX | PDF
    @INPROCEEDINGS{schrittwieser-covertcomputation-2013,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
      title = {Covert Computation - Hiding Code in Code for Obfuscation Purposes},
      booktitle = {Proceedings of the 8th International Symposium on ACM Symposium on Information , Computer and Communications Security (ASIACCS 2013)},
      year = {2013},
      month = {5},
      pdf = {p529-schrittwieser.pdf},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl and Lindsay Munroe and Mayank Sinha, "Malicious Pixels Using QR Codes as Attack Vector," in Trustworthy Ubiquitous Computing, 2012, pp. 21-38. BibTeX
    @INPROCEEDINGS{_Malicious_Pixels_Using_QR_Code_2012,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl and Lindsay Munroe and Mayank Sinha},
      title = {Malicious Pixels Using QR Codes as Attack Vector},
      booktitle = {Trustworthy Ubiquitous Computing},
      year = {2012},
      month = {9},
      pages = {21-38},
      }
  • Martin Schmiedecker and Philipp Reschl and Markus Huber and Manuel Leithner and Edgar R. Weippl, "Fast and Efficient Browser Identification with JavaScript Engine Fingerprinting," 2012. BibTeX | PDF
    @TECHREPORT{_Fast_and_Efficient_Browser_Ide_2012,
      Author = {Martin Schmiedecker and Philipp Reschl and Markus Huber and Manuel Leithner and {Edgar R.} Weippl},
      title = {Fast and Efficient Browser Identification with JavaScript Engine Fingerprinting},
      booktitle = {Technical Report TR-SBA-Research-0512-01},
      year = {2012},
      month = {5},
      pdf = {jsfingerprinting_Tech_Report.pdf},
      }
  • Manuel Leithner and Edgar R. Weippl, "Book Review: Xbox360 Forensics by Steven Bolt," 2012. BibTeX
    @TECHREPORT{_Book_Review_Xbox360_Forensics__2012,
      Author = {Manuel Leithner and {Edgar R.} Weippl},
      title = {Book Review: Xbox360 Forensics by Steven Bolt},
      booktitle = {Computers & Security},
      year = {2012},
      month = {5},
      note = {Not Peer Reviewed},
      }
  • Manuel Leithner and Edgar R. Weippl, "Book Review: Thors Microsoft Security Bible by Timothy Thor Mullen," 2012. BibTeX
    @TECHREPORT{_Book_Review_Thor_s_Microsoft_S_2012,
      Author = {Manuel Leithner and {Edgar R.} Weippl},
      title = {Book Review: Thors Microsoft Security Bible by Timothy Thor Mullen},
      booktitle = {Computers & Security},
      year = {2012},
      month = {5},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Gilbert Wondracek and Sylvi Rennert and Edgar R. Weippl, "Secure Software in der Cloud," in Tagungsband Cloud und Klein: IT im Spannungsfeld zwischen Servercluster und Sensornetz, 2012. BibTeX
    @INPROCEEDINGS{Schrittwieser_Secure_Software_in_der_Cloud_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Gilbert Wondracek and Sylvi Rennert and {Edgar R.} Weippl},
      title = {Secure Software in der Cloud},
      booktitle = {Tagungsband Cloud und Klein: IT im Spannungsfeld zwischen Servercluster und Sensornetz},
      year = {2012},
      month = {4},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Edgar R. Weippl, "Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications," in Network and Distributed System Security Symposium (NDSS 2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Guess_Who_s_Texting_You_Evalua_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
      title = {Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications},
      booktitle = {Network and Distributed System Security Symposium (NDSS 2012)},
      year = {2012},
      month = {2},
      pdf = {ndss2012_final.pdf},
      }
  • Markus Huber and Martin Schmiedecker and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and Edgar R. Weippl, "Social Snapshots: Digital Forensics for Online Social Networks," in Annual Computer Security Applications Conference (ACSAC), 2011. BibTeX | PDF
    @INPROCEEDINGS{_Social_Snapshots_Digital_Foren_2011,
      Author = {Markus Huber and Martin Schmiedecker and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and {Edgar R.} Weippl},
      title = {Social Snapshots: Digital Forensics for Online Social Networks},
      booktitle = {Annual Computer Security Applications Conference (ACSAC)},
      year = {2011},
      month = {12},
      pdf = {social_snapshots_preprint.pdf},
      }
  • Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl, "Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space," in USENIX Security, 2011. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Dark_Clouds_on_the_Horizon_Usi_2011,
      Author = {Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
      title = {Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space},
      booktitle = {USENIX Security},
      year = {2011},
      month = {8},
      pdf = {dropboxUSENIX2011.pdf},
      }
  • Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl, "Cloud Speicherdienste als Angriffsvektoren," in 9th Information Security Konferenz in Krems, 2011. BibTeX | PDF
    @INPROCEEDINGS{DropboxKrems2011,
      Author = {Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
      title = {Cloud Speicherdienste als Angriffsvektoren},
      booktitle = {9th Information Security Konferenz in Krems},
      year = {2011},
      month = {10},
      pdf = {DunkleWolken.pdf},
      }
  • Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and Edgar R. Weippl, "QR Code Security," in Fourth International Workshop on Trustworthy Ubiquitous Computing (TwUC 2010), 2010. BibTeX | PDF
    @INPROCEEDINGS{twuc_2010,
      Author = {Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and {Edgar R.} Weippl},
      title = {QR Code Security},
      booktitle = {Fourth International Workshop on Trustworthy Ubiquitous Computing (TwUC 2010)},
      year = {2010},
      month = {11},
      pdf = {QR_Code_Security.pdf},
      }

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close