Sebastian Schrittwieser

Schrittwieseris senior researcher at SBA Research and  Lecturer the University of Applied Sciences St. Pölten.

  • E-Mail
  • Phone: +43 (1) 505 36 88
  • Fax: +43 (1) 505 88 88

Research Interest

His research interests include, among others, digital forensics, software protection, code obfuscation, and mobile security.

Bio

Sebastian Schrittwieser is a Lecturer and researcher at the University of Applied Sciences St. Pölten, Austria. He received a doctoral degree in informatics with focus on information security from the TU Wien in 2014. Since April 2015, Sebastian heads the Josef-Ressel Research Centre TARGET which researches on the detection and mitigation of targeted attack scenarios against IT systems. He is the Co-Founder of Kibosec, a company targeting the development of services in the area of digital forensics and advanced trainings.

Publications

  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl, "Covert Computation – Hiding Code in Code Through Compile-Time Obfuscation," Computers & Security, 2014. BibTeX | PDF
    @ARTICLE{Schrittwieser2014Covert,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation},
      journal = {Computers & Security},
      year = {2014},
      month = {5},
      pdf = {http://www.sciencedirect.com/science/article/pii/S0167404814000030},
      publisher = {Elsevier Advanced Technology},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Isao Echizen and Edgar R. Weippl, "An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata," Electronic Markets – The International Journal on Networked Business, 2014. BibTeX | PDF
    @ARTICLE{Kieseberg2014algorithm,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Isao Echizen and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata},
      journal = {Electronic Markets - The International Journal on Networked Business},
      year = {2014},
      month = {0},
      pdf = {http://link.springer.com/article/10.1007/s12525-014-0154-x},
      }
  • Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and Edgar R. Weippl, "Appinspect: large-scale evaluation of social networking apps," in Proceedings of the first ACM conference on Online social networks, 2013, pp. 143-154. BibTeX | PDF | Slides
    @INPROCEEDINGS{huber2013appinspect,
      Author = {Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Appinspect: large-scale evaluation of social networking apps},
      booktitle = {Proceedings of the first ACM conference on Online social networks},
      year = {2013},
      month = {10},
      pdf = {AppInspect_peprint.pdf},
      pages = {143--154},
      publisher = {ACM},
      link_slides = {http://cosn.acm.org/2013/files/Session6/Session6Paper1.pdf},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Edgar R. Weippl, "Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications," in Network and Distributed System Security Symposium (NDSS 2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Guess_Who_s_Texting_You_Evalua_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
      title = {Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications},
      booktitle = {Network and Distributed System Security Symposium (NDSS 2012)},
      year = {2012},
      month = {2},
      pdf = {ndss2012_final.pdf},
      }
  • Markus Huber and Martin Schmiedecker and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and Edgar R. Weippl, "Social Snapshots: Digital Forensics for Online Social Networks," in Annual Computer Security Applications Conference (ACSAC), 2011. BibTeX | PDF
    @INPROCEEDINGS{_Social_Snapshots_Digital_Foren_2011,
      Author = {Markus Huber and Martin Schmiedecker and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and {Edgar R.} Weippl},
      title = {Social Snapshots: Digital Forensics for Online Social Networks},
      booktitle = {Annual Computer Security Applications Conference (ACSAC)},
      year = {2011},
      month = {12},
      pdf = {social_snapshots_preprint.pdf},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser, "Code Obfuscation Against Static and Dynamic Reverse Engineering," in Information Hiding Conference 2011, 2011. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Code_Obfuscation_Against_Stati_2011,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser},
      title = {Code Obfuscation Against Static and Dynamic Reverse Engineering},
      booktitle = {Information Hiding Conference 2011},
      year = {2011},
      month = {5},
      pdf = {Code_Obfuscation_CameraReady.pdf},
      }
  • Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl, "Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space," in USENIX Security, 2011. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Dark_Clouds_on_the_Horizon_Usi_2011,
      Author = {Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
      title = {Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space},
      booktitle = {USENIX Security},
      year = {2011},
      month = {8},
      pdf = {dropboxUSENIX2011.pdf},
      }

View all publications

  • Peter Kieseberg and Sebastian Schrittwieser and Bernd Malle and Edgar R. Weippl and Andreas Holzinger, "Das Testen von Algorithmen in sensibler datengetriebener Forschung," Rundbrief des Fachausschusses Management der Anwendungsentwicklung und -wartung (WI-MAW), 2017. BibTeX | PDF
    @ARTICLE{Kieseberg2017Testen,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Bernd Malle and {Edgar R.} Weippl and Andreas Holzinger},
      title = {Das Testen von Algorithmen in sensibler datengetriebener Forschung},
      journal = {Rundbrief des Fachausschusses Management der Anwendungsentwicklung und -wartung (WI-MAW)},
      year = {2017},
      month = {4},
      pdf = {http://fa-wi-maw.gi.de/fileadmin/gliederungen/fg-maw/Rundbriefe/GI_Rundbrief_41_JG23_Online.pdf},
      }
  • Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser, "Security Testing for Mobile Applications," ERCIM News, vol. 109, pp. 52-53, 2017. BibTeX | PDF
    @ARTICLE{Kieseberg2017Security,
      Author = {Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser},
      title = {Security Testing for Mobile Applications},
      journal = {ERCIM News},
      year = {2017},
      month = {4},
      pdf = {Pages from EN109-web.pdf},
      volume = {109},
      pages = {52--53},
      }
  • Peter Kieseberg and Edgar R. Weippl and Sebastian Schrittwieser, "Forensics using Internal Database Structures," ERCIM News, vol. 108, 2017. BibTeX | PDF
    @ARTICLE{Kieseberg2017Forensics,
      Author = {Peter Kieseberg and {Edgar R.} Weippl and Sebastian Schrittwieser},
      title = {Forensics using Internal Database Structures},
      journal = {ERCIM News},
      year = {2017},
      month = {1},
      pdf = {http://ercim-news.ercim.eu/images/stories/EN108/EN108-web.pdf},
      volume = {108},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Johannes Kinder and Georg Merzdovnik and Edgar R. Weippl, "Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?," ACM Computing Survey (CSUR), vol. 49, 2016. BibTeX | PDF
    @ARTICLE{Schrittwieser2016Protecting,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Johannes Kinder and Georg Merzdovnik and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?},
      journal = {ACM Computing Survey (CSUR)},
      year = {2016},
      month = {0},
      pdf = {http://dl.acm.org/citation.cfm?id=2886012},
      volume = {49},
      publisher = {ACM},
      }
  • Bernd Malle and Peter Kieseberg and Sebastian Schrittwieser and Andreas Holzinger, "Privacy Aware Machine Learning and the “Right to be forgotten," ERCIM News, 2016. BibTeX | PDF
    @ARTICLE{Malle2016Privacy,
      Author = {Bernd Malle and Peter Kieseberg and Sebastian Schrittwieser and Andreas Holzinger},
      title = {Privacy Aware Machine Learning and the “Right to be forgotten},
      journal = {ERCIM News},
      year = {2016},
      month = {10},
      pdf = {ERCIM_article_printed.pdf},
      }
  • Peter Kieseberg and Edgar R. Weippl and Sebastian Schrittwieser, "Detection of Data Leaks in Collaborative Data Driven Research," ERCIM News, 2016. BibTeX | PDF
    @ARTICLE{Kieseberg2016Detection,
      Author = {Peter Kieseberg and {Edgar R.} Weippl and Sebastian Schrittwieser},
      title = {Detection of Data Leaks in Collaborative Data Driven Research},
      journal = {ERCIM News},
      year = {2016},
      month = {4},
      pdf = {Detection_EN105.pdf},
      }
  • Sebastian Neuner and Martin Schmiedecker and Sebastian Schrittwieser and Edgar R. Weippl, "Gradually Improving the Forensic Process," in International Workshop on Cyber Crime (IWCC), 2015. BibTeX | PDF
    @INPROCEEDINGS{Neuner2015Gradually,
      Author = {Sebastian Neuner and Martin Schmiedecker and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Gradually Improving the Forensic Process},
      booktitle = {International Workshop on Cyber Crime (IWCC)},
      year = {2015},
      month = {8},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/Neuner_IWCC2015.pdf},
      }
  • Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Edgar R. Weippl, "Security and privacy of smartphone messaging applications," International Journal of Pervasive Computing and Communications, vol. 11, 2015. BibTeX | PDF
    @ARTICLE{Mueller2015Security,
      Author = {Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and {Edgar R.} Weippl},
      title = {Security and privacy of smartphone messaging applications},
      journal = {International Journal of Pervasive Computing and Communications},
      year = {2015},
      month = {6},
      pdf = {Draft.pdf},
      volume = {11},
      }
  • Christoph Rottermanner and Peter Kieseberg and Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser, "Privacy and Data Protection in Smartphone Messengers," in Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services (iiWAS2015), 2015. BibTeX | PDF
    @INPROCEEDINGS{Rottermanner2015Privacy,
      Author = {Christoph Rottermanner and Peter Kieseberg and Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser},
      title = {Privacy and Data Protection in Smartphone Messengers},
      booktitle = {Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services (iiWAS2015)},
      year = {2015},
      month = {12},
      pdf = {paper_drafthp.pdf},
      }
  • Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser and Edgar R. Weippl, "Security tests for mobile applications – Why using TLS SSL is not enough," in 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2015. BibTeX | PDF
    @INPROCEEDINGS{Kieseberg2015Security,
      Author = {Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Security tests for mobile applications - Why using TLS SSL is not enough},
      booktitle = {2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW)},
      year = {2015},
      month = {4},
      pdf = {ASQT2015_cameraready_wo1stpage.pdf},
      }
  • Tariq Fadai and Sebastian Schrittwieser and Peter Kieseberg and Martin Schmiedecker, "Trust me, I am a Root CA! Analyzing SSL Root CAs in modern Browsers and Operating Systems," in International Conference on Availability, Reliability and Security (ARES), 2015. BibTeX | PDF
    @INPROCEEDINGS{Fadai2015Trust,
      Author = {Tariq Fadai and Sebastian Schrittwieser and Peter Kieseberg and Martin Schmiedecker},
      title = {Trust me, I am a Root CA! Analyzing SSL Root CAs in modern Browsers and Operating Systems},
      booktitle = {International Conference on Availability, Reliability and Security (ARES)},
      year = {2015},
      month = {8},
      pdf = {SSL.pdf},
      }
  • Peter Kieseberg and Heidelinde Hobel and Sebastian Schrittwieser and Edgar R. Weippl and Andreas Holzinger, "Protecting Anonymity in Data-Driven Biomedical Science." , 2014, pp. 301-316. BibTeX | PDF
    @INBOOK{Kieseberg2014Protecting,
      Author = {Peter Kieseberg and Heidelinde Hobel and Sebastian Schrittwieser and {Edgar R.} Weippl and Andreas Holzinger},
      title = {Protecting Anonymity in Data-Driven Biomedical Science},
      booktitle = {Interactive Knowledge Discovery and Data Mining in Biomedical Informatics - State-of-the-Art and Future Challenges},
      year = {2014},
      month = {0},
      pdf = {1v0_KIESEBERG_bookchapter.pdf},
      pages = {301--316},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Isao Echizen and Edgar R. Weippl, "An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata," Electronic Markets – The International Journal on Networked Business, 2014. BibTeX | PDF
    @ARTICLE{Kieseberg2014algorithm,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Isao Echizen and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata},
      journal = {Electronic Markets - The International Journal on Networked Business},
      year = {2014},
      month = {0},
      pdf = {http://link.springer.com/article/10.1007/s12525-014-0154-x},
      }
  • Stefanie Beyer and Martin Schmiedecker and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl, "Towards Fully Automated Digital Alibis with Social Interaction," in Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2014. BibTeX | PDF | Slides | Src
    @INPROCEEDINGS{ifip119_2014_alibi,
      Author = {Stefanie Beyer and Martin Schmiedecker and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
      title = {Towards Fully Automated Digital Alibis with Social Interaction},
      booktitle = {Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics},
      year = {2014},
      month = {1},
      pdf = {alibigenerator_preprint.pdf},
      link_source = {https://github.com/mmulazzani/alibiFramework},
      link_slides = {http://www.slideshare.net/SBAResearch/digitale-alibis-ifip},
      }
  • Christoph Hochreiner and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl, "Using Model Driven Security Approaches in Web Application Development," in AsiaARES (The 2014 Asian Conference on Availability, Reliability and Security), 2014. BibTeX | PDF
    @INPROCEEDINGS{Hochreiner2014Using,
      Author = {Christoph Hochreiner and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Using Model Driven Security Approaches in Web Application Development },
      booktitle = {AsiaARES (The 2014 Asian Conference on Availability, Reliability and Security)},
      year = {2014},
      month = {4},
      pdf = {UsingModelDrivenSecurityApproachesinWebApplicationDevelopment.pdf},
      }
  • Christoph Hochreiner and Peter Fruehwirt and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl, "Genie in a Model? Why Model Driven Security will not secure your Web Application," Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol. 5, pp. 44-62, 2014. BibTeX | PDF
    @ARTICLE{Hochreiner2014Genie,
      Author = {Christoph Hochreiner and Peter Fruehwirt and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Genie in a Model? Why Model Driven Security will not secure your Web Application},
      journal = {Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)},
      year = {2014},
      month = {9},
      pdf = {jowua-v5n3-4.pdf},
      volume = {5},
      pages = {44-62},
      }
  • Peter Fruehwirt and Sebastian Schrittwieser and Edgar R. Weippl, "Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile," in International Conference on Privacy, Security, Risk and Trust, 2014. BibTeX | PDF
    @INPROCEEDINGS{Fruehwirt2014Using,
      Author = {Peter Fruehwirt and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile},
      booktitle = {International Conference on Privacy, Security, Risk and Trust},
      year = {2014},
      month = {12},
      pdf = {using machine learning_paper.pdf},
      }
  • Peter Fruehwirt and Peter Kieseberg and Christoph Hochreiner and Sebastian Schrittwieser and Edgar R. Weippl, "InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles," in GI Sicherheit 2014, 2014. BibTeX | PDF
    @INPROCEEDINGS{Fruehwirt2014InnoDB,
      Author = {Peter Fruehwirt and Peter Kieseberg and Christoph Hochreiner and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles },
      booktitle = {GI Sicherheit 2014 },
      year = {2014},
      month = {3},
      pdf = {FRUEHWIRT-InnoDB Datenbank Forensik-Rekonstruktion.pdf},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl, "Covert Computation – Hiding Code in Code Through Compile-Time Obfuscation," Computers & Security, 2014. BibTeX | PDF
    @ARTICLE{Schrittwieser2014Covert,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation},
      journal = {Computers & Security},
      year = {2014},
      month = {5},
      pdf = {http://www.sciencedirect.com/science/article/pii/S0167404814000030},
      publisher = {Elsevier Advanced Technology},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Georg Merzdovnik and Peter Kieseberg and Edgar R. Weippl, "AES-SEC: Improving software obfuscation through hardware-assistance," in ARES 2014, 2014. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser2014AESSEC,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Georg Merzdovnik and Peter Kieseberg and {Edgar R.} Weippl},
      title = {AES-SEC: Improving software obfuscation through hardware-assistance },
      booktitle = {ARES 2014},
      year = {2014},
      month = {9},
      pdf = {http://ieeexplore.ieee.org/document/6980281/},
      }
  • Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Edgar R. Weippl, "What is new with whatsapp & co.? Revisiting the security of smartphone messaging applications," in iiWas 2014, 2014. BibTeX | PDF
    @INPROCEEDINGS{Mueller2014Whats,
      Author = {Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and {Edgar R.} Weippl},
      title = {What is new with whatsapp & co.? Revisiting the security of smartphone messaging applications},
      booktitle = {iiWas 2014},
      year = {2014},
      month = {12},
      pdf = {WhatsApp-iiwas-paper_cameraready.pdf},
      }
  • Philipp Winter and Richard Koewer and Martin Schmiedecker and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and Edgar R. Weippl, "Spoiled Onions: Exposing Malicious Tor Exit Relays," in The 14th Privacy Enhancing Technologies Symposium (PETS), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Winter2014Spoiled,
      Author = {Philipp Winter and Richard Koewer and Martin Schmiedecker and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and {Edgar R.} Weippl},
      title = {Spoiled Onions: Exposing Malicious Tor Exit Relays},
      booktitle = {The 14th Privacy Enhancing Technologies Symposium (PETS)},
      year = {2014},
      month = {7},
      pdf = {http://www.sba-research.org/wp-content/uploads/publications/pets2014_preprint.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/spoiled-onions},
      }
  • Martin Schmiedecker and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and Edgar R. Weippl, "Quantifying Windows File Slack in Size and Stability," in Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2013. BibTeX | PDF | Slides | Data
    @INPROCEEDINGS{Mulazzani_Slackspace_Quantifiation_2013,
      Author = {Martin Schmiedecker and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Quantifying Windows File Slack in Size and Stability},
      booktitle = {Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics},
      year = {2013},
      month = {1},
      pdf = {ifipSlack_2013_preprint.pdf},
      link_data = {http://128.130.204.91/slackspaceDataset.7z},
      link_slides = {http://www.slideshare.net/SBAResearch/quantifying-windows-file-slack-in-size-and-stability},
      }
  • Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and Edgar R. Weippl, "Appinspect: large-scale evaluation of social networking apps," in Proceedings of the first ACM conference on Online social networks, 2013, pp. 143-154. BibTeX | PDF | Slides
    @INPROCEEDINGS{huber2013appinspect,
      Author = {Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Appinspect: large-scale evaluation of social networking apps},
      booktitle = {Proceedings of the first ACM conference on Online social networks},
      year = {2013},
      month = {10},
      pdf = {AppInspect_peprint.pdf},
      pages = {143--154},
      publisher = {ACM},
      link_slides = {http://cosn.acm.org/2013/files/Session6/Session6Paper1.pdf},
      }
  • Thomas Unger and Martin Schmiedecker and Dominik Frühwirt and Markus Huber and Sebastian Schrittwieser and Edgar R. Weippl, "SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting," in Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES), 2013. BibTeX | PDF | Slides | Src
    @INPROCEEDINGS{ARES_SHPF_short_2013,
      Author = {Thomas Unger and Martin Schmiedecker and Dominik Frühwirt and Markus Huber and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting},
      booktitle = {Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES)},
      year = {2013},
      month = {9},
      pdf = {shpf_extendedPreprint.pdf},
      link_source = {https://github.com/mmulazzani/shpf},
      link_slides = {http://www.slideshare.net/SBAResearch/shpf-enhancing-https-session-security-with-browser-fingerprinting},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl, "Covert Computation – Hiding Code in Code for Obfuscation Purposes," in Proceedings of the 8th International Symposium on ACM Symposium on Information , Computer and Communications Security (ASIACCS 2013), 2013. BibTeX | PDF
    @INPROCEEDINGS{schrittwieser-covertcomputation-2013,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
      title = {Covert Computation - Hiding Code in Code for Obfuscation Purposes},
      booktitle = {Proceedings of the 8th International Symposium on ACM Symposium on Information , Computer and Communications Security (ASIACCS 2013)},
      year = {2013},
      month = {5},
      pdf = {p529-schrittwieser.pdf},
      }
  • Sebastian Schrittwieser and Martin Schmiedecker and Edgar R. Weippl, "Ethics in Security Research – Which Lines Should Not Be Crossed?," in Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS 2013), 2013. BibTeX | PDF
    @INPROCEEDINGS{schrittwieser-ethics-2013,
      Author = {Sebastian Schrittwieser and Martin Schmiedecker and {Edgar R.} Weippl},
      title = {Ethics in Security Research - Which Lines Should Not Be Crossed?},
      booktitle = {Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS 2013)},
      year = {2013},
      month = {5},
      pdf = {creds2013_preprint.pdf},
      }
  • Heidelinde Hobel and Sebastian Schrittwieser and Peter Kieseberg and Edgar R. Weippl, "Privacy, Anonymity, Pseudonymity and Data Disclosure in Data-Driven Science." , 2013. BibTeX
    @INBOOK{_Privacy_Anonymity_Pseudonymity_2013,
      Author = {Heidelinde Hobel and Sebastian Schrittwieser and Peter Kieseberg and {Edgar R.} Weippl},
      title = {Privacy, Anonymity, Pseudonymity and Data Disclosure in Data-Driven Science},
      booktitle = {Encyclopedia of Business Analytics and Optimization},
      year = {2013},
      month = {0},
      }
  • Sebastian Schrittwieser and Martin Schmiedecker and Edgar R. Weippl and Sandra Panhans, "Ethik in der Sicherheitsforschung," in DACH Security 2013, 2013. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Ethik_in_der_Sicherheitsforsch_2013,
      Author = {Sebastian Schrittwieser and Martin Schmiedecker and {Edgar R.} Weippl and Sandra Panhans},
      title = {Ethik in der Sicherheitsforschung},
      booktitle = {DACH Security 2013},
      year = {2013},
      month = {9},
      pdf = {DACH-Camera Ready.pdf},
      }
  • Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl, "InnoDB Database Forensics: Enhanced Reconstruction of Data Manipulation Queries from Redo Logs," Information Security Technical Report (ISTR), Special Issue: ARES, 2013. BibTeX | PDF
    @ARTICLE{_InnoDB_Database_Forensics_Enha_2013,
      Author = {Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
      title = {InnoDB Database Forensics: Enhanced Reconstruction of Data Manipulation Queries from Redo Logs},
      journal = {Information Security Technical Report (ISTR), Special Issue: ARES},
      year = {2013},
      month = {4},
      pdf = {ARES2012_Journal.pdf},
      }
  • Martin Schmiedecker and Philipp Reschl and Markus Huber and Manuel Leithner and Sebastian Schrittwieser and Edgar R. Weippl, "Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting," in Web 2.0 Workshop on Security and Privacy (W2SP), 2013. BibTeX | PDF | Slides
    @INPROCEEDINGS{_Fast_and_Reliable_Browser_Iden_2013,
      Author = {Martin Schmiedecker and Philipp Reschl and Markus Huber and Manuel Leithner and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting},
      booktitle = {Web 2.0 Workshop on Security and Privacy (W2SP)},
      year = {2013},
      month = {5},
      pdf = {jsfingerprinting.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/fast-and-efficient-browser-identification-with-javascript-engine-fingerprinting},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Edgar R. Weippl, "Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications," in Network and Distributed System Security Symposium (NDSS 2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Guess_Who_s_Texting_You_Evalua_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
      title = {Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications},
      booktitle = {Network and Distributed System Security Symposium (NDSS 2012)},
      year = {2012},
      month = {2},
      pdf = {ndss2012_final.pdf},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Gilbert Wondracek and Sylvi Rennert and Edgar R. Weippl, "Secure Software in der Cloud," in Tagungsband Cloud und Klein: IT im Spannungsfeld zwischen Servercluster und Sensornetz, 2012. BibTeX
    @INPROCEEDINGS{Schrittwieser_Secure_Software_in_der_Cloud_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Gilbert Wondracek and Sylvi Rennert and {Edgar R.} Weippl},
      title = {Secure Software in der Cloud},
      booktitle = {Tagungsband Cloud und Klein: IT im Spannungsfeld zwischen Servercluster und Sensornetz},
      year = {2012},
      month = {4},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl and Lindsay Munroe and Mayank Sinha, "Malicious Pixels Using QR Codes as Attack Vector," in Trustworthy Ubiquitous Computing, 2012, pp. 21-38. BibTeX
    @INPROCEEDINGS{_Malicious_Pixels_Using_QR_Code_2012,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl and Lindsay Munroe and Mayank Sinha},
      title = {Malicious Pixels Using QR Codes as Attack Vector},
      booktitle = {Trustworthy Ubiquitous Computing},
      year = {2012},
      month = {9},
      pages = {21-38},
      }
  • Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl, "InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs," in The Fifth International Workshop on Digital Forensics (WSDF), 2012. BibTeX | PDF
    @INPROCEEDINGS{_InnoDB_Database_Forensics_Reco_2012,
      Author = {Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
      title = {InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs},
      booktitle = {The Fifth International Workshop on Digital Forensics (WSDF)},
      year = {2012},
      month = {8},
      pdf = {WSDF2012_InnoDB.pdf},
      }
  • Sebastian Schrittwieser and Peter Kieseberg and Edgar R. Weippl, "Digital Forensics for Enterprise Rights Management," in International Conference on Information Integration and Web-based Applications & Services (iiWAS2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{_Digital_Forensics_for_Enterpri_2012,
      Author = {Sebastian Schrittwieser and Peter Kieseberg and {Edgar R.} Weippl},
      title = {Digital Forensics for Enterprise Rights Management},
      booktitle = {International Conference on Information Integration and Web-based Applications & Services (iiWAS2012)},
      year = {2012},
      month = {12},
      pdf = {16_schrittwieser.pdf},
      }
  • Markus Huber and Martin Schmiedecker and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and Edgar R. Weippl, "Social Snapshots: Digital Forensics for Online Social Networks," in Annual Computer Security Applications Conference (ACSAC), 2011. BibTeX | PDF
    @INPROCEEDINGS{_Social_Snapshots_Digital_Foren_2011,
      Author = {Markus Huber and Martin Schmiedecker and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and {Edgar R.} Weippl},
      title = {Social Snapshots: Digital Forensics for Online Social Networks},
      booktitle = {Annual Computer Security Applications Conference (ACSAC)},
      year = {2011},
      month = {12},
      pdf = {social_snapshots_preprint.pdf},
      }
  • Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl, "Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space," in USENIX Security, 2011. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Dark_Clouds_on_the_Horizon_Usi_2011,
      Author = {Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
      title = {Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space},
      booktitle = {USENIX Security},
      year = {2011},
      month = {8},
      pdf = {dropboxUSENIX2011.pdf},
      }
  • Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara and Edgar R. Weippl, "An Algorithm for k-anonymity-based Fingerprinting," in International Workshop on Digital-forensics and Watermarking (IWDW 2011), 2011. BibTeX | PDF
    @INPROCEEDINGS{_An_Algorithm_for_k_anonymity_b_2011,
      Author = {Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara and {Edgar R.} Weippl},
      title = {An Algorithm for k-anonymity-based Fingerprinting},
      booktitle = {International Workshop on Digital-forensics and Watermarking (IWDW 2011)},
      year = {2011},
      month = {10},
      pdf = {k_anonymity_algorithm_2011.pdf},
      }
  • Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl, "Cloud Speicherdienste als Angriffsvektoren," in 9th Information Security Konferenz in Krems, 2011. BibTeX | PDF
    @INPROCEEDINGS{DropboxKrems2011,
      Author = {Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
      title = {Cloud Speicherdienste als Angriffsvektoren},
      booktitle = {9th Information Security Konferenz in Krems},
      year = {2011},
      month = {10},
      pdf = {DunkleWolken.pdf},
      }
  • Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara, "Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters," in Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2011), 2011. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Using_Generalization_Patterns__2011,
      Author = {Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara},
      title = {Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters},
      booktitle = {Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2011)},
      year = {2011},
      month = {8},
      pdf = {k-anonymity_fingerprinting_cameraReady.pdf},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Markus Huber and Edgar R. Weippl, "Trees Cannot Lie: Using Data Structures for Forensics Purposes," in European Intelligence and Security Informatics Conference (EISIC 2011), 2011. BibTeX | PDF
    @INPROCEEDINGS{Kieseberg_Trees_Cannot_Lie_Using_Data_St_2011,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
      title = {Trees Cannot Lie: Using Data Structures for Forensics Purposes},
      booktitle = {European Intelligence and Security Informatics Conference (EISIC 2011)},
      year = {2011},
      month = {9},
      pdf = {btree_forensics_camera_ready.pdf},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser, "Code Obfuscation Against Static and Dynamic Reverse Engineering," in Information Hiding Conference 2011, 2011. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Code_Obfuscation_Against_Stati_2011,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser},
      title = {Code Obfuscation Against Static and Dynamic Reverse Engineering},
      booktitle = {Information Hiding Conference 2011},
      year = {2011},
      month = {5},
      pdf = {Code_Obfuscation_CameraReady.pdf},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Lorcan Morgan and Martin Schmiedecker and Markus Huber and Edgar R. Weippl, "Using the Structure of B plus Trees for Enhancing Logging Mechanisms of Databases," in International Conference on Information Integration and Web-based Applications & Services (iiWAS2011), 2011. BibTeX | PDF
    @INPROCEEDINGS{_Using_the_Structure_of_B_Trees_2011,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Lorcan Morgan and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
      title = {Using the Structure of B plus Trees for Enhancing Logging Mechanisms of Databases},
      booktitle = {International Conference on Information Integration and Web-based Applications & Services (iiWAS2011)},
      year = {2011},
      month = {12},
      pdf = {iiWAS2011_133_Short_Kieseberg.pdf},
      }
  • Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and Edgar R. Weippl, "QR Code Security," in Fourth International Workshop on Trustworthy Ubiquitous Computing (TwUC 2010), 2010. BibTeX | PDF
    @INPROCEEDINGS{twuc_2010,
      Author = {Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and {Edgar R.} Weippl},
      title = {QR Code Security},
      booktitle = {Fourth International Workshop on Trustworthy Ubiquitous Computing (TwUC 2010)},
      year = {2010},
      month = {11},
      pdf = {QR_Code_Security.pdf},
      }
  • Wikan Danar Sunindyo and Stefan Biffl and C. Frühwirth and R. Mordinyi and Thomas Moser and Alexander Schatten and Sebastian Schrittwieser and Edgar R. Weippl, "Defect Detection Using Event-Based Process Analysis in Software Engineering Projects," in 36th Euromicro Conference Software Engineering and Advanced Applications SEAA 2010, 2010. BibTeX
    @INPROCEEDINGS{Sunindyo_Defect_Detection_Using_Event_B_2010,
      Author = {Wikan Danar Sunindyo and Stefan Biffl and C. Frühwirth and R. Mordinyi and Thomas Moser and Alexander Schatten and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Defect Detection Using Event-Based Process Analysis in Software Engineering Projects},
      booktitle = {36th Euromicro Conference Software Engineering and Advanced Applications SEAA 2010},
      year = {2010},
      month = {9},
      }
  • C. Frühwirth and Stefan Biffl and Alexander Schatten and Sebastian Schrittwieser and Edgar R. Weippl, "Research Challenges in the Security Design and Evaluation of an Engineering Service Bus Platform," in 36th Euromicro Conference Software Engineering and Advanced Applications (SEAA 2010, 2010. BibTeX
    @INPROCEEDINGS{Fruehwirth_Research_Challenges_in_the_Sec_2010,
      Author = {C. Frühwirth and Stefan Biffl and Alexander Schatten and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Research Challenges in the Security Design and Evaluation of an Engineering Service Bus Platform},
      booktitle = {36th Euromicro Conference Software Engineering and Advanced Applications (SEAA 2010},
      year = {2010},
      month = {9},
      }
  • Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and Edgar R. Weippl, "Cheap and Automated Socio-Technical Attacks based on Social Networking Sites," in 3rd Workshop on Artificial Intelligence and Security AISec 10, 2010. BibTeX | PDF
    @INPROCEEDINGS{Huber_Cheap_and_Automated_Socio_Tech_2010,
      Author = {Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Cheap and Automated Socio-Technical Attacks based on Social Networking Sites},
      booktitle = {3rd Workshop on Artificial Intelligence and Security AISec 10},
      year = {2010},
      month = {10},
      pdf = {p61huber.pdf},
      }

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close