Stefan Katzenbeisser

Prof. Stefan Katzenbeisser

is key researcher at SBA Research and Professor at the Technische Universität Darmstadt.

  • E-Mail
  • Phone: +49 (6151) 165016
  • Fax: +49 (6151) 1672051

Research Interest

His main research activities are cryptographic protocols (design, analysis), cryptographic techniques for noisy and fuzzy data, Privacy enhancing technologies, software security, watermarking, digital rights management, copyright protection and malicious code detection.

Bio

Stefan received his Ph.D. in Computer Science at the Vienna University of Technology and is Full Professor at the Computer Science Department at the Technische Universität Darmstadt, Germany.

For more information please see http://www.seceng.informatik.tu-darmstadt.de/index.php?id=1107.

Publications

  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl, "Covert Computation – Hiding Code in Code Through Compile-Time Obfuscation," Computers & Security, 2014. BibTeX | PDF
    @ARTICLE{Schrittwieser2014Covert,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation},
      journal = {Computers & Security},
      year = {2014},
      month = {5},
      pdf = {http://www.sciencedirect.com/science/article/pii/S0167404814000030},
      publisher = {Elsevier Advanced Technology},
      }

View all publications
See also http://www.seceng.informatik.tu-darmstadt.de/index.php/selected-publications/

  • Sebastian Schrittwieser and Stefan Katzenbeisser and Johannes Kinder and Georg Merzdovnik and Edgar R. Weippl, "Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?," ACM Computing Survey (CSUR), vol. 49, 2016. BibTeX | PDF
    @ARTICLE{Schrittwieser2016Protecting,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Johannes Kinder and Georg Merzdovnik and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?},
      journal = {ACM Computing Survey (CSUR)},
      year = {2016},
      month = {0},
      pdf = {http://dl.acm.org/citation.cfm?id=2886012},
      volume = {49},
      publisher = {ACM},
      }
  • Sebastian Neuner and Artemios G. Voyiatzis and Martin Schmiedecker and Stefan Brunthaler and Stefan Katzenbeisser and Edgar R. Weippl, "Time is on my side: Steganography in filesystem metadata," in 16th Annual DFRWS Conference, 2016. BibTeX | PDF | Slides | Data
    @INPROCEEDINGS{Neuner2016Time,
      Author = {Sebastian Neuner and {Artemios G.} Voyiatzis and Martin Schmiedecker and Stefan Brunthaler and Stefan Katzenbeisser and {Edgar R.} Weippl},
      title = {Time is on my side: Steganography in filesystem metadata},
      booktitle = {16th Annual DFRWS Conference},
      year = {2016},
      month = {0},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/timestampStego_preprint.pdf},
      link_data = {https://www.sba-research.org/dfrws2016/},
      link_slides = {http://www.slideshare.net/SBAResearch/time-is-on-my-side-steganography-in-filesystem-metadata},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl, "Covert Computation – Hiding Code in Code Through Compile-Time Obfuscation," Computers & Security, 2014. BibTeX | PDF
    @ARTICLE{Schrittwieser2014Covert,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation},
      journal = {Computers & Security},
      year = {2014},
      month = {5},
      pdf = {http://www.sciencedirect.com/science/article/pii/S0167404814000030},
      publisher = {Elsevier Advanced Technology},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Georg Merzdovnik and Peter Kieseberg and Edgar R. Weippl, "AES-SEC: Improving software obfuscation through hardware-assistance," in ARES 2014, 2014. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser2014AESSEC,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Georg Merzdovnik and Peter Kieseberg and {Edgar R.} Weippl},
      title = {AES-SEC: Improving software obfuscation through hardware-assistance },
      booktitle = {ARES 2014},
      year = {2014},
      month = {9},
      pdf = {http://ieeexplore.ieee.org/document/6980281/},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl, "Covert Computation – Hiding Code in Code for Obfuscation Purposes," in Proceedings of the 8th International Symposium on ACM Symposium on Information , Computer and Communications Security (ASIACCS 2013), 2013. BibTeX | PDF
    @INPROCEEDINGS{schrittwieser-covertcomputation-2013,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
      title = {Covert Computation - Hiding Code in Code for Obfuscation Purposes},
      booktitle = {Proceedings of the 8th International Symposium on ACM Symposium on Information , Computer and Communications Security (ASIACCS 2013)},
      year = {2013},
      month = {5},
      pdf = {p529-schrittwieser.pdf},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser, "Code Obfuscation Against Static and Dynamic Reverse Engineering," in Information Hiding Conference 2011, 2011. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Code_Obfuscation_Against_Stati_2011,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser},
      title = {Code Obfuscation Against Static and Dynamic Reverse Engineering},
      booktitle = {Information Hiding Conference 2011},
      year = {2011},
      month = {5},
      pdf = {Code_Obfuscation_CameraReady.pdf},
      }

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close