Sebastian Schrittwieser

Schrittwieseris senior researcher at SBA Research and  Lecturer the University of Applied Sciences St. Pölten.

  • E-Mail
  • Phone: +43 (1) 505 36 88
  • Fax: +43 (1) 505 88 88

Research Interest

His research interests include, among others, digital forensics, software protection, code obfuscation, and mobile security.

Bio

Sebastian Schrittwieser is a Lecturer and researcher at the University of Applied Sciences St. Pölten, Austria. He received a doctoral degree in informatics with focus on information security from the TU Wien in 2014. Since April 2015, Sebastian heads the Josef-Ressel Research Centre TARGET which researches on the detection and mitigation of targeted attack scenarios against IT systems. He is the Co-Founder of Kibosec, a company targeting the development of services in the area of digital forensics and advanced trainings.

Top Publications:

  • SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting (2013)
    • INPROCEEDINGS--
    • Thomas Unger and Martin Schmiedecker and Dominik Frühwirt and Markus Huber and Sebastian Schrittwieser and Edgar R. Weippl
    • Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES)
    @INPROCEEDINGS{ARES_SHPF_short_2013,
       author = {Thomas Unger and Martin Schmiedecker and Dominik Frühwirt and Markus Huber and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting},
       booktitle = {Proceedings of the Eighth International Conference on Availability,
       Reliability and Security (ARES)},
       year = {2013},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/shpf_extendedPreprint.pdf},
       link_source = {https://github.com/mmulazzani/shpf},
       link_slides = {http://www.slideshare.net/SBAResearch/shpf-enhancing-https-session-security-with-browser-fingerprinting},
    }
  • Cloud Speicherdienste als Angriffsvektoren (2011)
    • INPROCEEDINGS--
    • Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl
    • 9th Information Security Konferenz in Krems
    @INPROCEEDINGS{DropboxKrems2011,
       author = {Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
       title = {Cloud Speicherdienste als Angriffsvektoren},
       booktitle = {9th Information Security Konferenz in Krems},
       year = {2011},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/DunkleWolken.pdf},
    }
  • Trust me, I am a Root CA! Analyzing SSL Root CAs in modern Browsers and Operating Systems (2015)
    • INPROCEEDINGS--
    • Tariq Fadai and Sebastian Schrittwieser and Peter Kieseberg and Martin Schmiedecker
    • International Conference on Availability, Reliability and Security (ARES)
    @INPROCEEDINGS{Fadai2015Trust,
       author = {Tariq Fadai and Sebastian Schrittwieser and Peter Kieseberg and Martin Schmiedecker},
       title = {Trust me,
       I am a Root CA! Analyzing SSL Root CAs in modern Browsers and Operating Systems},
       booktitle = {International Conference on Availability,
       Reliability and Security (ARES)},
       year = {2015},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/SSL.pdf},
    }
  • InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles (2014)
    • INPROCEEDINGS--
    • Peter Fruehwirt and Peter Kieseberg and Christoph Hochreiner and Sebastian Schrittwieser and Edgar R. Weippl
    • GI Sicherheit 2014
    @INPROCEEDINGS{Fruehwirt2014InnoDB,
       author = {Peter Fruehwirt and Peter Kieseberg and Christoph Hochreiner and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles },
       booktitle = {GI Sicherheit 2014 },
       year = {2014},
       month = {3},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/FRUEHWIRT-InnoDB Datenbank Forensik-Rekonstruktion.pdf},
    }
  • Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile (2014)
    • INPROCEEDINGS--
    • Peter Fruehwirt and Sebastian Schrittwieser and Edgar R. Weippl
    • International Conference on Privacy, Security, Risk and Trust
    @INPROCEEDINGS{Fruehwirt2014Using,
       author = {Peter Fruehwirt and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile},
       booktitle = {International Conference on Privacy,
       Security,
       Risk and Trust},
       year = {2014},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/using machine learning_paper.pdf},
    }
  • Research Challenges in the Security Design and Evaluation of an Engineering Service Bus Platform (2010)
    • INPROCEEDINGS--
    • C. Frühwirth and Stefan Biffl and Alexander Schatten and Sebastian Schrittwieser and Edgar R. Weippl
    • 36th Euromicro Conference Software Engineering and Advanced Applications (SEAA 2010
    @INPROCEEDINGS{Fruehwirth_Research_Challenges_in_the_Sec_2010,
       author = {C. Frühwirth and Stefan Biffl and Alexander Schatten and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Research Challenges in the Security Design and Evaluation of an Engineering Service Bus Platform},
       booktitle = {36th Euromicro Conference Software Engineering and Advanced Applications (SEAA 2010},
       year = {2010},
       month = {9},
    }
  • Genie in a Model? Why Model Driven Security will not secure your Web Application (2014)
    • ARTICLE--
    • Christoph Hochreiner and Peter Fruehwirt and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl
    • Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)
    @ARTICLE{Hochreiner2014Genie,
       author = {Christoph Hochreiner and Peter Fruehwirt and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Genie in a Model? Why Model Driven Security will not secure your Web Application},
       journal = {Journal of Wireless Mobile Networks,
       Ubiquitous Computing,
       and Dependable Applications (JoWUA)},
       year = {2014},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/jowua-v5n3-4.pdf},
       volume = {5},
       pages = {44-62},
    }
  • Using Model Driven Security Approaches in Web Application Development (2014)
    • INPROCEEDINGStrue-
    • Christoph Hochreiner and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl
    • AsiaARES (The 2014 Asian Conference on Availability, Reliability and Security)
    @INPROCEEDINGS{Hochreiner2014Using,
       author = {Christoph Hochreiner and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Using Model Driven Security Approaches in Web Application Development },
       booktitle = {AsiaARES (The 2014 Asian Conference on Availability,
       Reliability and Security)},
       year = {2014},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/UsingModelDrivenSecurityApproachesinWebApplicationDevelopment.pdf},
    }
  • Appinspect: large-scale evaluation of social networking apps (2013)
    • INPROCEEDINGS--
    • Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and Edgar R. Weippl
    • Proceedings of the first ACM conference on Online social networks
    @INPROCEEDINGS{huber2013appinspect,
       author = {Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Appinspect: large-scale evaluation of social networking apps},
       booktitle = {Proceedings of the first ACM conference on Online social networks},
       year = {2013},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/AppInspect_peprint.pdf},
       pages = {143--154},
       publisher = {ACM},
       link_slides = {http://cosn.acm.org/2013/files/Session6/Session6Paper1.pdf},
    }
  • Cheap and Automated Socio-Technical Attacks based on Social Networking Sites (2010)
    • INPROCEEDINGS--
    • Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and Edgar R. Weippl
    • 3rd Workshop on Artificial Intelligence and Security AISec 10
    @INPROCEEDINGS{Huber_Cheap_and_Automated_Socio_Tech_2010,
       author = {Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Cheap and Automated Socio-Technical Attacks based on Social Networking Sites},
       booktitle = {3rd Workshop on Artificial Intelligence and Security AISec 10},
       year = {2010},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/p61huber.pdf},
    }
  • Towards Fully Automated Digital Alibis with Social Interaction (2014)
    • INPROCEEDINGS--
    • Stefanie Beyer and Martin Schmiedecker and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl
    • Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics
    @INPROCEEDINGS{ifip119_2014_alibi,
       author = {Stefanie Beyer and Martin Schmiedecker and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
       title = {Towards Fully Automated Digital Alibis with Social Interaction},
       booktitle = {Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics},
       year = {2014},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/alibigenerator_preprint.pdf},
       link_source = {https://github.com/mmulazzani/alibiFramework},
       link_slides = {http://www.slideshare.net/SBAResearch/digitale-alibis-ifip},
    }
  • An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata (2014)
    • ARTICLEtruetrue
    • Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Isao Echizen and Edgar R. Weippl
    • Electronic Markets - The International Journal on Networked Business
    @ARTICLE{Kieseberg2014algorithm,
       author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Isao Echizen and {Edgar R.} Weippl},
       authorhotlist = {true},
       sbahotlist = {true},
       title = {An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata},
       journal = {Electronic Markets - The International Journal on Networked Business},
       year = {2014},
       month = {0},
       pdf = {http://link.springer.com/article/10.1007/s12525-014-0154-x},
    }
  • Protecting Anonymity in Data-Driven Biomedical Science (2014)
    • INBOOK--
    • Peter Kieseberg and Heidelinde Hobel and Sebastian Schrittwieser and Edgar R. Weippl and Andreas Holzinger
    • -
    @INBOOK{Kieseberg2014Protecting,
       author = {Peter Kieseberg and Heidelinde Hobel and Sebastian Schrittwieser and {Edgar R.} Weippl and Andreas Holzinger},
       title = {Protecting Anonymity in Data-Driven Biomedical Science},
       booktitle = {Interactive Knowledge Discovery and Data Mining in Biomedical Informatics - State-of-the-Art and Future Challenges},
       year = {2014},
       month = {0},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/1v0_KIESEBERG_bookchapter.pdf},
       pages = {301--316},
    }
  • Security tests for mobile applications - Why using TLS SSL is not enough (2015)
    • INPROCEEDINGS--
    • Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser and Edgar R. Weippl
    • 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW)
    @INPROCEEDINGS{Kieseberg2015Security,
       author = {Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Security tests for mobile applications - Why using TLS SSL is not enough},
       booktitle = {2015 IEEE Eighth International Conference on Software Testing,
       Verification and Validation Workshops (ICSTW)},
       year = {2015},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ASQT2015_cameraready_wo1stpage.pdf},
    }
  • Detection of Data Leaks in Collaborative Data Driven Research (2016)
    • ARTICLE--
    • Peter Kieseberg and Edgar R. Weippl and Sebastian Schrittwieser
    • ERCIM News
    @ARTICLE{Kieseberg2016Detection,
       author = {Peter Kieseberg and {Edgar R.} Weippl and Sebastian Schrittwieser},
       title = {Detection of Data Leaks in Collaborative Data Driven Research},
       journal = {ERCIM News},
       year = {2016},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Detection_EN105.pdf},
    }
  • Forensics using Internal Database Structures (2017)
    • ARTICLE--
    • Peter Kieseberg and Edgar R. Weippl and Sebastian Schrittwieser
    • ERCIM News
    @ARTICLE{Kieseberg2017Forensics,
       author = {Peter Kieseberg and {Edgar R.} Weippl and Sebastian Schrittwieser},
       title = {Forensics using Internal Database Structures},
       journal = {ERCIM News},
       year = {2017},
       month = {1},
       pdf = {http://ercim-news.ercim.eu/images/stories/EN108/EN108-web.pdf},
       volume = {108},
    }
  • Security Testing for Mobile Applications (2017)
    • ARTICLE--
    • Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser
    • ERCIM News
    @ARTICLE{Kieseberg2017Security,
       author = {Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser},
       title = {Security Testing for Mobile Applications},
       journal = {ERCIM News},
       year = {2017},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Pages from EN109-web.pdf},
       volume = {109},
       pages = {52--53},
    }
  • Trees Cannot Lie: Using Data Structures for Forensics Purposes (2011)
    • INPROCEEDINGS--
    • Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Markus Huber and Edgar R. Weippl
    • European Intelligence and Security Informatics Conference (EISIC 2011)
    @INPROCEEDINGS{Kieseberg_Trees_Cannot_Lie_Using_Data_St_2011,
       author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
       title = {Trees Cannot Lie: Using Data Structures for Forensics Purposes},
       booktitle = {European Intelligence and Security Informatics Conference (EISIC 2011)},
       year = {2011},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/btree_forensics_camera_ready.pdf},
    }
  • Privacy Aware Machine Learning and the “Right to be forgotten (2016)
    • ARTICLE--
    • Bernd Malle and Peter Kieseberg and Sebastian Schrittwieser and Andreas Holzinger
    • ERCIM News
    @ARTICLE{Malle2016Privacy,
       author = {Bernd Malle and Peter Kieseberg and Sebastian Schrittwieser and Andreas Holzinger},
       title = {Privacy Aware Machine Learning and the “Right to be forgotten},
       journal = {ERCIM News},
       year = {2016},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ERCIM_article_printed.pdf},
    }
  • What is new with whatsapp & co.? Revisiting the security of smartphone messaging applications (2014)
    • INPROCEEDINGS--
    • Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Edgar R. Weippl
    • iiWas 2014
    @INPROCEEDINGS{Mueller2014Whats,
       author = {Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and {Edgar R.} Weippl},
       title = {What is new with whatsapp & co.? Revisiting the security of smartphone messaging applications},
       booktitle = {iiWas 2014},
       year = {2014},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/WhatsApp-iiwas-paper_cameraready.pdf},
    }
  • Security and privacy of smartphone messaging applications (2015)
    • ARTICLE--
    • Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Edgar R. Weippl
    • International Journal of Pervasive Computing and Communications
    @ARTICLE{Mueller2015Security,
       author = {Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and {Edgar R.} Weippl},
       title = {Security and privacy of smartphone messaging applications},
       journal = {International Journal of Pervasive Computing and Communications},
       year = {2015},
       month = {6},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Draft.pdf},
       volume = {11},
    }
  • Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space (2011)
    • INPROCEEDINGS--
    • Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl
    • USENIX Security
    @INPROCEEDINGS{Mulazzani_Dark_Clouds_on_the_Horizon_Usi_2011,
       author = {Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
       title = {Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space},
       booktitle = {USENIX Security},
       year = {2011},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/dropboxUSENIX2011.pdf},
    }
  • Quantifying Windows File Slack in Size and Stability (2013)
    • INPROCEEDINGS--
    • Martin Schmiedecker and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and Edgar R. Weippl
    • Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics
    @INPROCEEDINGS{Mulazzani_Slackspace_Quantifiation_2013,
       author = {Martin Schmiedecker and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Quantifying Windows File Slack in Size and Stability},
       booktitle = {Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics},
       year = {2013},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ifipSlack_2013_preprint.pdf},
       link_data = {http://128.130.204.91/slackspaceDataset.7z},
       link_slides = {http://www.slideshare.net/SBAResearch/quantifying-windows-file-slack-in-size-and-stability},
    }
  • Gradually Improving the Forensic Process (2015)
    • INPROCEEDINGS--
    • Sebastian Neuner and Martin Schmiedecker and Sebastian Schrittwieser and Edgar R. Weippl
    • International Workshop on Cyber Crime (IWCC)
    @INPROCEEDINGS{Neuner2015Gradually,
       author = {Sebastian Neuner and Martin Schmiedecker and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Gradually Improving the Forensic Process},
       booktitle = {International Workshop on Cyber Crime (IWCC)},
       year = {2015},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Neuner_IWCC2015.pdf},
    }
  • Privacy and Data Protection in Smartphone Messengers (2015)
    • INPROCEEDINGS--
    • Christoph Rottermanner and Peter Kieseberg and Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser
    • Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services (iiWAS2015)
    @INPROCEEDINGS{Rottermanner2015Privacy,
       author = {Christoph Rottermanner and Peter Kieseberg and Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser},
       title = {Privacy and Data Protection in Smartphone Messengers},
       booktitle = {Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services (iiWAS2015)},
       year = {2015},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/paper_drafthp.pdf},
    }
  • Covert Computation - Hiding Code in Code for Obfuscation Purposes (2013)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl
    • Proceedings of the 8th International Symposium on ACM Symposium on Information , Computer and Communications Security (ASIACCS 2013)
    @INPROCEEDINGS{schrittwieser-covertcomputation-2013,
       author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
       title = {Covert Computation - Hiding Code in Code for Obfuscation Purposes},
       booktitle = {Proceedings of the 8th International Symposium on ACM Symposium on Information ,
       Computer and Communications Security (ASIACCS 2013)},
       year = {2013},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/p529-schrittwieser.pdf},
    }
  • Ethics in Security Research - Which Lines Should Not Be Crossed? (2013)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Martin Schmiedecker and Edgar R. Weippl
    • Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS 2013)
    @INPROCEEDINGS{schrittwieser-ethics-2013,
       author = {Sebastian Schrittwieser and Martin Schmiedecker and {Edgar R.} Weippl},
       title = {Ethics in Security Research - Which Lines Should Not Be Crossed?},
       booktitle = {Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS 2013)},
       year = {2013},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/creds2013_preprint.pdf},
    }
  • AES-SEC: Improving software obfuscation through hardware-assistance (2014)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Stefan Katzenbeisser and Georg Merzdovnik and Peter Kieseberg and Edgar R. Weippl
    • ARES 2014
    @INPROCEEDINGS{Schrittwieser2014AESSEC,
       author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Georg Merzdovnik and Peter Kieseberg and {Edgar R.} Weippl},
       title = {AES-SEC: Improving software obfuscation through hardware-assistance },
       booktitle = {ARES 2014},
       year = {2014},
       month = {9},
       pdf = {http://ieeexplore.ieee.org/document/6980281/},
    }
  • Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation (2014)
    • ARTICLEtrue-
    • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl
    • Computers & Security
    @ARTICLE{Schrittwieser2014Covert,
       author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation},
       journal = {Computers & Security},
       year = {2014},
       month = {5},
       pdf = {http://www.sciencedirect.com/science/article/pii/S0167404814000030},
       publisher = {Elsevier Advanced Technology},
    }
  • Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? (2016)
    • ARTICLEtrue-
    • Sebastian Schrittwieser and Stefan Katzenbeisser and Johannes Kinder and Georg Merzdovnik and Edgar R. Weippl
    • ACM Computing Survey (CSUR)
    @ARTICLE{Schrittwieser2016Protecting,
       author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Johannes Kinder and Georg Merzdovnik and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?},
       journal = {ACM Computing Survey (CSUR)},
       year = {2016},
       month = {0},
       pdf = {http://dl.acm.org/citation.cfm?id=2886012},
       volume = {49},
       publisher = {ACM},
    }
  • Code Obfuscation Against Static and Dynamic Reverse Engineering (2011)
    • INPROCEEDINGS-true
    • Sebastian Schrittwieser and Stefan Katzenbeisser
    • Information Hiding Conference 2011
    @INPROCEEDINGS{Schrittwieser_Code_Obfuscation_Against_Stati_2011,
       author = {Sebastian Schrittwieser and Stefan Katzenbeisser},
       authorhotlist = {true},
       title = {Code Obfuscation Against Static and Dynamic Reverse Engineering},
       booktitle = {Information Hiding Conference 2011},
       year = {2011},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Code_Obfuscation_CameraReady.pdf},
    }
  • Ethik in der Sicherheitsforschung (2013)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Martin Schmiedecker and Edgar R. Weippl and Sandra Panhans
    • DACH Security 2013
    @INPROCEEDINGS{Schrittwieser_Ethik_in_der_Sicherheitsforsch_2013,
       author = {Sebastian Schrittwieser and Martin Schmiedecker and {Edgar R.} Weippl and Sandra Panhans},
       title = {Ethik in der Sicherheitsforschung},
       booktitle = {DACH Security 2013},
       year = {2013},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/DACH-Camera Ready.pdf},
    }
  • Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications (2012)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Edgar R. Weippl
    • Network and Distributed System Security Symposium (NDSS 2012)
    @INPROCEEDINGS{Schrittwieser_Guess_Who_s_Texting_You_Evalua_2012,
       author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
       title = {Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications},
       booktitle = {Network and Distributed System Security Symposium (NDSS 2012)},
       year = {2012},
       month = {2},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ndss2012_final.pdf},
    }
  • Secure Software in der Cloud (2012)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Gilbert Wondracek and Sylvi Rennert and Edgar R. Weippl
    • Tagungsband Cloud und Klein: IT im Spannungsfeld zwischen Servercluster und Sensornetz
    @INPROCEEDINGS{Schrittwieser_Secure_Software_in_der_Cloud_2012,
       author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Gilbert Wondracek and Sylvi Rennert and {Edgar R.} Weippl},
       title = {Secure Software in der Cloud},
       booktitle = {Tagungsband Cloud und Klein: IT im Spannungsfeld zwischen Servercluster und Sensornetz},
       year = {2012},
       month = {4},
    }
  • Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters (2011)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara
    • Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2011)
    @INPROCEEDINGS{Schrittwieser_Using_Generalization_Patterns__2011,
       author = {Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara},
       title = {Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters},
       booktitle = {Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2011)},
       year = {2011},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/k-anonymity_fingerprinting_cameraReady.pdf},
    }
  • Defect Detection Using Event-Based Process Analysis in Software Engineering Projects (2010)
    • INPROCEEDINGS--
    • Wikan Danar Sunindyo and Stefan Biffl and C. Frühwirth and R. Mordinyi and Thomas Moser and Alexander Schatten and Sebastian Schrittwieser and Edgar R. Weippl
    • 36th Euromicro Conference Software Engineering and Advanced Applications SEAA 2010
    @INPROCEEDINGS{Sunindyo_Defect_Detection_Using_Event_B_2010,
       author = {Wikan Danar Sunindyo and Stefan Biffl and C. Frühwirth and R. Mordinyi and Thomas Moser and Alexander Schatten and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Defect Detection Using Event-Based Process Analysis in Software Engineering Projects},
       booktitle = {36th Euromicro Conference Software Engineering and Advanced Applications SEAA 2010},
       year = {2010},
       month = {9},
    }
  • QR Code Security (2010)
    • INPROCEEDINGS--
    • Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and Edgar R. Weippl
    • Fourth International Workshop on Trustworthy Ubiquitous Computing (TwUC 2010)
    @INPROCEEDINGS{twuc_2010,
       author = {Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and {Edgar R.} Weippl},
       title = {QR Code Security},
       booktitle = {Fourth International Workshop on Trustworthy Ubiquitous Computing (TwUC 2010)},
       year = {2010},
       month = {11},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/QR_Code_Security.pdf},
    }
  • Spoiled Onions: Exposing Malicious Tor Exit Relays (2014)
    • INPROCEEDINGS--
    • Philipp Winter and Richard Koewer and Martin Schmiedecker and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and Edgar R. Weippl
    • The 14th Privacy Enhancing Technologies Symposium (PETS)
    @INPROCEEDINGS{Winter2014Spoiled,
       author = {Philipp Winter and Richard Koewer and Martin Schmiedecker and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and {Edgar R.} Weippl},
       title = {Spoiled Onions: Exposing Malicious Tor Exit Relays},
       booktitle = {The 14th Privacy Enhancing Technologies Symposium (PETS)},
       year = {2014},
       month = {7},
       pdf = {http://www.sba-research.org/wp-content/uploads/publications/pets2014_preprint.pdf},
       link_slides = {http://www.slideshare.net/SBAResearch/spoiled-onions},
    }
  • An Algorithm for k-anonymity-based Fingerprinting (2011)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara and Edgar R. Weippl
    • International Workshop on Digital-forensics and Watermarking (IWDW 2011)
    @INPROCEEDINGS{_An_Algorithm_for_k_anonymity_b_2011,
       author = {Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara and {Edgar R.} Weippl},
       title = {An Algorithm for k-anonymity-based Fingerprinting},
       booktitle = {International Workshop on Digital-forensics and Watermarking (IWDW 2011)},
       year = {2011},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/k_anonymity_algorithm_2011.pdf},
    }
  • Digital Forensics for Enterprise Rights Management (2012)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Peter Kieseberg and Edgar R. Weippl
    • International Conference on Information Integration and Web-based Applications & Services (iiWAS2012)
    @INPROCEEDINGS{_Digital_Forensics_for_Enterpri_2012,
       author = {Sebastian Schrittwieser and Peter Kieseberg and {Edgar R.} Weippl},
       title = {Digital Forensics for Enterprise Rights Management},
       booktitle = {International Conference on Information Integration and Web-based Applications & Services (iiWAS2012)},
       year = {2012},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/16_schrittwieser.pdf},
    }
  • Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting (2013)
    • INPROCEEDINGS--
    • Martin Schmiedecker and Philipp Reschl and Markus Huber and Manuel Leithner and Sebastian Schrittwieser and Edgar R. Weippl
    • Web 2.0 Workshop on Security and Privacy (W2SP)
    @INPROCEEDINGS{_Fast_and_Reliable_Browser_Iden_2013,
       author = {Martin Schmiedecker and Philipp Reschl and Markus Huber and Manuel Leithner and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting},
       booktitle = {Web 2.0 Workshop on Security and Privacy (W2SP)},
       year = {2013},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/jsfingerprinting.pdf},
       link_slides = {http://www.slideshare.net/SBAResearch/fast-and-efficient-browser-identification-with-javascript-engine-fingerprinting},
    }
  • InnoDB Database Forensics: Enhanced Reconstruction of Data Manipulation Queries from Redo Logs (2013)
    • ARTICLE--
    • Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl
    • Information Security Technical Report (ISTR), Special Issue: ARES
    @ARTICLE{_InnoDB_Database_Forensics_Enha_2013,
       author = {Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
       title = {InnoDB Database Forensics: Enhanced Reconstruction of Data Manipulation Queries from Redo Logs},
       journal = {Information Security Technical Report (ISTR),
       Special Issue: ARES},
       year = {2013},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ARES2012_Journal.pdf},
    }
  • InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs (2012)
    • INPROCEEDINGS--
    • Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl
    • The Fifth International Workshop on Digital Forensics (WSDF)
    @INPROCEEDINGS{_InnoDB_Database_Forensics_Reco_2012,
       author = {Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
       title = {InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs},
       booktitle = {The Fifth International Workshop on Digital Forensics (WSDF)},
       year = {2012},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/WSDF2012_InnoDB.pdf},
    }
  • Malicious Pixels Using QR Codes as Attack Vector (2012)
    • INPROCEEDINGS--
    • Peter Kieseberg and Sebastian Schrittwieser and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl and Lindsay Munroe and Mayank Sinha
    • Trustworthy Ubiquitous Computing
    @INPROCEEDINGS{_Malicious_Pixels_Using_QR_Code_2012,
       author = {Peter Kieseberg and Sebastian Schrittwieser and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl and Lindsay Munroe and Mayank Sinha},
       title = {Malicious Pixels Using QR Codes as Attack Vector},
       booktitle = {Trustworthy Ubiquitous Computing},
       year = {2012},
       month = {9},
       pages = {21-38},
    }
  • Privacy, Anonymity, Pseudonymity and Data Disclosure in Data-Driven Science (2013)
    • INBOOK--
    • Heidelinde Hobel and Sebastian Schrittwieser and Peter Kieseberg and Edgar R. Weippl
    • -
    @INBOOK{_Privacy_Anonymity_Pseudonymity_2013,
       author = {Heidelinde Hobel and Sebastian Schrittwieser and Peter Kieseberg and {Edgar R.} Weippl},
       title = {Privacy,
       Anonymity,
       Pseudonymity and Data Disclosure in Data-Driven Science},
       booktitle = {Encyclopedia of Business Analytics and Optimization},
       year = {2013},
       month = {0},
    }
  • Social Snapshots: Digital Forensics for Online Social Networks (2011)
    • INPROCEEDINGS--
    • Markus Huber and Martin Schmiedecker and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and Edgar R. Weippl
    • Annual Computer Security Applications Conference (ACSAC)
    @INPROCEEDINGS{_Social_Snapshots_Digital_Foren_2011,
       author = {Markus Huber and Martin Schmiedecker and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and {Edgar R.} Weippl},
       title = {Social Snapshots: Digital Forensics for Online Social Networks},
       booktitle = {Annual Computer Security Applications Conference (ACSAC)},
       year = {2011},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/social_snapshots_preprint.pdf},
    }
  • Using the Structure of B plus Trees for Enhancing Logging Mechanisms of Databases (2011)
    • INPROCEEDINGS--
    • Peter Kieseberg and Sebastian Schrittwieser and Lorcan Morgan and Martin Schmiedecker and Markus Huber and Edgar R. Weippl
    • International Conference on Information Integration and Web-based Applications & Services (iiWAS2011)
    @INPROCEEDINGS{_Using_the_Structure_of_B_Trees_2011,
       author = {Peter Kieseberg and Sebastian Schrittwieser and Lorcan Morgan and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
       title = {Using the Structure of B plus Trees for Enhancing Logging Mechanisms of Databases},
       booktitle = {International Conference on Information Integration and Web-based Applications & Services (iiWAS2011)},
       year = {2011},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/iiWAS2011_133_Short_Kieseberg.pdf},
    }

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close