Edgar Weippl

is research director of SBA Research and Associate Professor (Privatdozent) at the TU Wien.Edgar WEIPPL

  • E-Mail
  • Phone: +43 (1) 505 36 88
  • Fax: +43 (1) 505 88 88

Research Interests

His research focuses on applied concepts of IT-security and e-learning.

Bio

After graduating with a Ph.D. from the TU Wien, Edgar worked in a research startup for two years. He then spent one year teaching as an Assistant Professor at Beloit College, WI. From 2002 to 2004, while with the software vendor ISIS Papyrus, he worked as a consultant in New York, NY and Albany, NY, and in Frankfurt, Germany. In 2004 he joined the TU Wien and founded the research center SBA Research together with A Min Tjoa and Markus Klemen.

Edgar R. Weippl (CISSP, CISA, CISM, CRISC, CSSLP, CMC) is member of the editorial board of Computers & Security (COSE), organizes the ARES conference and is General Chair of SACMAT 2015, PC Chair of Esorics 2015, General Chair of ACM CCS 2016, and PC Chair of ACM SACMAT 2017.

Publications

  • Johanna Ullrich and Tanja Szeby and Joachim Fabini and Edgar R. Weippl, "Network-Based Secret Communication in Clouds: A Survey," IEEE Communications Surveys & Tutorials, 2017. BibTeX | PDF
    @ARTICLE{Ullrich2017NetworkBased,
      Author = {Johanna Ullrich and Tanja Szeby and Joachim Fabini and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Network-Based Secret Communication in Clouds: A Survey},
      journal = {IEEE Communications Surveys & Tutorials},
      year = {2017},
      month = {0},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/secretCloud_2017.pdf},
      }
  • Johanna Ullrich and Edgar R. Weippl, "The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor," in European Symposium on Research in Computer Security (ESORICS), 2016. BibTeX | PDF
    @INPROCEEDINGS{Ullrich2016Beauty,
      Author = {Johanna Ullrich and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor},
      booktitle = {European Symposium on Research in Computer Security (ESORICS)},
      year = {2016},
      month = {0},
      pdf = {botb paper.pdf},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Johannes Kinder and Georg Merzdovnik and Edgar R. Weippl, "Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?," ACM Computing Survey (CSUR), vol. 49, 2016. BibTeX | PDF
    @ARTICLE{Schrittwieser2016Protecting,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Johannes Kinder and Georg Merzdovnik and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?},
      journal = {ACM Computing Survey (CSUR)},
      year = {2016},
      month = {0},
      pdf = {http://dl.acm.org/citation.cfm?id=2886012},
      volume = {49},
      publisher = {ACM},
      }
  • Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and Edgar R. Weippl, "The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy," in International Conference on Financial Cryptography and Data Security (FC), 2016. BibTeX | PDF
    @INPROCEEDINGS{Krombholz2016Other,
      Author = {Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy},
      booktitle = {International Conference on Financial Cryptography and Data Security (FC)},
      year = {2016},
      month = {2},
      pdf = {TheOtherSideOfTheCoin_FC16preConf.pdf},
      }
  • Adrian Dabrowski and Georg Petzl and Edgar R. Weippl, "The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection," in 19th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2016), 2016. BibTeX | PDF
    @INPROCEEDINGS{Dabrowski2016Messenger,
      Author = {Adrian Dabrowski and Georg Petzl and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection},
      booktitle = {19th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2016)},
      year = {2016},
      month = {9},
      pdf = {providerICdetection.pdf},
      }
  • Damjan Buhov and Markus Huber and Georg Merzdovnik and Edgar R. Weippl, "Pin It! Improving Android Network Security At Runtime," in IFIP Networking 2016, 2016. BibTeX | PDF
    @INPROCEEDINGS{Buhov2016Improving,
      Author = {Damjan Buhov and Markus Huber and Georg Merzdovnik and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Pin It! Improving Android Network Security At Runtime},
      booktitle = {IFIP Networking 2016},
      year = {2016},
      month = {5},
      pdf = {Pin It! Improving Android Network Security at Runtime.pdf},
      }
  • Johanna Ullrich and Edgar R. Weippl, "Privacy is Not an Option: Attacking the IPv6 Privacy Extension," in International Symposium on Recent Advances in Intrusion Detection (RAID), 2015. BibTeX | PDF | Slides
    @INPROCEEDINGS{Ullrich2015Privacy,
      Author = {Johanna Ullrich and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Privacy is Not an Option: Attacking the IPv6 Privacy Extension},
      booktitle = {International Symposium on Recent Advances in Intrusion Detection (RAID)},
      year = {2015},
      month = {0},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/Ullrich2015Privacy.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/privacy-is-not-an-option-attacking-the-ipv6-privacy-extension},
      }

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close