Martin Schmiedecker

Martin Schmiedecker

is senior researcher at SBA Research.

Bio

Martin Schmiedecker received the master’s degree in Computer and Data Security in 2009 from the TU Wien. His research interest includes digital forensics, online privacy in general, browser fingerprinting, Tor, large-scale systems and applied security. He spent two semesters in 2010 as a visiting scholar at Purdue university in West Lafayette, IN. He is currently teaching graduate and undergraduate courses on computer security and digital forensics at TU Wien and multiple universities of applied sciences in Austria. He obtained the Ph.D. degree in 2014, his thesis about digital forensics of online services can be found here.

His research focuses on digital forensics, online privacy, Tor and TLS.

Publications

  • Georg Merzdovnik and Markus Huber and Damjan Buhov and Nick Nikiforakis and Sebastian Neuner and Martin Schmiedecker and Edgar R. Weippl, "Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools," in 2nd IEEE European Symposium on Security and Privacy (Euro S&P), 2017. BibTeX | PDF
    @INPROCEEDINGS{Merzdovnik2017,
      Author = {Georg Merzdovnik and Markus Huber and Damjan Buhov and Nick Nikiforakis and Sebastian Neuner and Martin Schmiedecker and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools},
      booktitle = {2nd IEEE European Symposium on Security and Privacy (Euro S&P)},
      year = {2017},
      month = {0},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/block_me_if_you_can.pdf},
      }
  • Wilfried Mayer and Martin Schmiedecker, "Turning Active TLS Scanning to Eleven," in IFIP International Information Security and Privacy Conference (IFIP Sec), 2017. BibTeX | PDF | Slides | Src
    @INPROCEEDINGS{Mayer2017Turning,
      Author = {Wilfried Mayer and Martin Schmiedecker},
      title = {Turning Active TLS Scanning to Eleven},
      booktitle = {IFIP International Information Security and Privacy Conference (IFIP Sec)},
      year = {2017},
      month = {0},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/ifipSec2017_preprint.pdf},
      link_source = {https://github.com/WilfriedMayer/turning-active-tls-scanning-to-eleven},
      link_slides = {https://www.slideshare.net/SBAResearch/turning-active-tls-scanning-to-eleven},
      }
  • Katharina Krombholz and Wilfried Mayer and Martin Schmiedecker and Edgar R. Weippl, ""I Have No Idea What I’m Doing" – On the Usability of Deploying HTTPS," in 26th USENIX Security Symposium (USENIX Security 2017), 2017. BibTeX
    @INPROCEEDINGS{Krombholz2017Have,
      Author = {Katharina Krombholz and Wilfried Mayer and Martin Schmiedecker and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS},
      booktitle = {26th USENIX Security Symposium (USENIX Security 2017)},
      year = {2017},
      month = {8},
      }
  • Sebastian Neuner and Martin Schmiedecker and Edgar R. Weippl, "PeekaTorrent: Leveraging P2P Hash Values for Digital Forensics," in 16th Annual DFRWS Conference, 2016. BibTeX | PDF | Slides | Src | Data
    @INPROCEEDINGS{Neuner2016PeekaTorrent,
      Author = {Sebastian Neuner and Martin Schmiedecker and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {PeekaTorrent: Leveraging P2P Hash Values for Digital Forensics},
      booktitle = {16th Annual DFRWS Conference},
      year = {2016},
      month = {0},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/peekatorrent_preprint.pdf},
      link_source = {https://github.com/schmiedecker/peekatorrent},
      link_data = {https://www.peekatorrent.org},
      link_slides = {http://www.slideshare.net/SBAResearch/peekatorrent-leveraging-p2p-hash-values-for-digital-forensics},
      }
  • Wilfried Mayer and Aaron Zauner and Martin Schmiedecker and Markus Huber, "No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large," in International Conference on Availability, Reliability and Security (ARES), 2016. BibTeX | PDF | Slides | Data
    @INPROCEEDINGS{Mayer2016Need,
      Author = {Wilfried Mayer and Aaron Zauner and Martin Schmiedecker and Markus Huber},
      title = {No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large},
      booktitle = {International Conference on Availability, Reliability and Security (ARES)},
      year = {2016},
      month = {0},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/scanTLS.pdf},
      link_data = {https://scans.io/study/sba-email},
      link_slides = {http://www.slideshare.net/SBAResearch/no-need-for-black-chambers},
      }
  • Robert Annessi and Martin Schmiedecker, "NavigaTor: Finding Faster Paths to Anonymity," in IEEE European Symposium on Security and Privacy (Euro S&P), 2016. BibTeX | PDF | Src | Data
    @INPROCEEDINGS{Annessi2016NavigaTor,
      Author = {Robert Annessi and Martin Schmiedecker},
      sbahotlist = {true},
      title = {NavigaTor: Finding Faster Paths to Anonymity},
      booktitle = {IEEE European Symposium on Security and Privacy (Euro S&P)},
      year = {2016},
      month = {3},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/NavigaTor_preprint.pdf},
      publisher = {IEEE},
      link_source = {https://naviga-tor.github.io/#source},
      link_data = {https://naviga-tor.github.io/#data},
      }

View all publications

  • Katharina Krombholz and Wilfried Mayer and Martin Schmiedecker and Edgar R. Weippl, ""I Have No Idea What I’m Doing" – On the Usability of Deploying HTTPS," in 26th USENIX Security Symposium (USENIX Security 2017), 2017. BibTeX
    @INPROCEEDINGS{Krombholz2017Have,
      Author = {Katharina Krombholz and Wilfried Mayer and Martin Schmiedecker and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS},
      booktitle = {26th USENIX Security Symposium (USENIX Security 2017)},
      year = {2017},
      month = {8},
      }
  • Wilfried Mayer and Martin Schmiedecker, "Turning Active TLS Scanning to Eleven," in IFIP International Information Security and Privacy Conference (IFIP Sec), 2017. BibTeX | PDF | Slides | Src
    @INPROCEEDINGS{Mayer2017Turning,
      Author = {Wilfried Mayer and Martin Schmiedecker},
      title = {Turning Active TLS Scanning to Eleven},
      booktitle = {IFIP International Information Security and Privacy Conference (IFIP Sec)},
      year = {2017},
      month = {0},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/ifipSec2017_preprint.pdf},
      link_source = {https://github.com/WilfriedMayer/turning-active-tls-scanning-to-eleven},
      link_slides = {https://www.slideshare.net/SBAResearch/turning-active-tls-scanning-to-eleven},
      }
  • Georg Merzdovnik and Markus Huber and Damjan Buhov and Nick Nikiforakis and Sebastian Neuner and Martin Schmiedecker and Edgar R. Weippl, "Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools," in 2nd IEEE European Symposium on Security and Privacy (Euro S&P), 2017. BibTeX | PDF
    @INPROCEEDINGS{Merzdovnik2017,
      Author = {Georg Merzdovnik and Markus Huber and Damjan Buhov and Nick Nikiforakis and Sebastian Neuner and Martin Schmiedecker and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools},
      booktitle = {2nd IEEE European Symposium on Security and Privacy (Euro S&P)},
      year = {2017},
      month = {0},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/block_me_if_you_can.pdf},
      }
  • Sebastian Neuner and Artemios G. Voyiatzis and Martin Schmiedecker and Edgar R. Weippl, "Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS," International Conference on Availability, Reliability and Security (ARES), 2017. BibTeX
    @ARTICLE{Neuner2017,
      Author = {Sebastian Neuner and {Artemios G.} Voyiatzis and Martin Schmiedecker and {Edgar R.} Weippl},
      title = {Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS},
      journal = {International Conference on Availability, Reliability and Security (ARES)},
      year = {2017},
      month = {0},
      }
  • Robert Annessi and Martin Schmiedecker, "NavigaTor: Finding Faster Paths to Anonymity," in IEEE European Symposium on Security and Privacy (Euro S&P), 2016. BibTeX | PDF | Src | Data
    @INPROCEEDINGS{Annessi2016NavigaTor,
      Author = {Robert Annessi and Martin Schmiedecker},
      sbahotlist = {true},
      title = {NavigaTor: Finding Faster Paths to Anonymity},
      booktitle = {IEEE European Symposium on Security and Privacy (Euro S&P)},
      year = {2016},
      month = {3},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/NavigaTor_preprint.pdf},
      publisher = {IEEE},
      link_source = {https://naviga-tor.github.io/#source},
      link_data = {https://naviga-tor.github.io/#data},
      }
  • Wilfried Mayer and Aaron Zauner and Martin Schmiedecker and Markus Huber, "No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large," in International Conference on Availability, Reliability and Security (ARES), 2016. BibTeX | PDF | Slides | Data
    @INPROCEEDINGS{Mayer2016Need,
      Author = {Wilfried Mayer and Aaron Zauner and Martin Schmiedecker and Markus Huber},
      title = {No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large},
      booktitle = {International Conference on Availability, Reliability and Security (ARES)},
      year = {2016},
      month = {0},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/scanTLS.pdf},
      link_data = {https://scans.io/study/sba-email},
      link_slides = {http://www.slideshare.net/SBAResearch/no-need-for-black-chambers},
      }
  • Wilfried Mayer and Martin Schmiedecker, "TLScompare: Crowdsourcing Rules for HTTPS Everywhere," in Workshop on Empirical Research Methods in Information Security (ERMIS), 2016. BibTeX | PDF | Slides
    @INPROCEEDINGS{Mayer2016TLScompare,
      Author = {Wilfried Mayer and Martin Schmiedecker},
      title = {TLScompare: Crowdsourcing Rules for HTTPS Everywhere},
      booktitle = {Workshop on Empirical Research Methods in Information Security (ERMIS)},
      year = {2016},
      month = {4},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/crowdsourcing_preprint.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/tlscompareorg-crowdsourcing-rules-for-https-everywhere},
      }
  • Georg Merzdovnik and Klaus Falb and Martin Schmiedecker and Artemios G. Voyiatzis and Edgar R. Weippl, "Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services," in 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016), 2016. BibTeX | PDF
    @INPROCEEDINGS{Merzdovnik2016Whom,
      Author = {Georg Merzdovnik and Klaus Falb and Martin Schmiedecker and {Artemios G.} Voyiatzis and {Edgar R.} Weippl},
      title = {Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services},
      booktitle = {30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016)},
      year = {2016},
      month = {0},
      pdf = {TLSnotaries_preprint.pdf},
      }
  • Sebastian Neuner and Martin Schmiedecker and Edgar R. Weippl, "PeekaTorrent: Leveraging P2P Hash Values for Digital Forensics," in 16th Annual DFRWS Conference, 2016. BibTeX | PDF | Slides | Src | Data
    @INPROCEEDINGS{Neuner2016PeekaTorrent,
      Author = {Sebastian Neuner and Martin Schmiedecker and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {PeekaTorrent: Leveraging P2P Hash Values for Digital Forensics},
      booktitle = {16th Annual DFRWS Conference},
      year = {2016},
      month = {0},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/peekatorrent_preprint.pdf},
      link_source = {https://github.com/schmiedecker/peekatorrent},
      link_data = {https://www.peekatorrent.org},
      link_slides = {http://www.slideshare.net/SBAResearch/peekatorrent-leveraging-p2p-hash-values-for-digital-forensics},
      }
  • Sebastian Neuner and Artemios G. Voyiatzis and Martin Schmiedecker and Stefan Brunthaler and Stefan Katzenbeisser and Edgar R. Weippl, "Time is on my side: Steganography in filesystem metadata," in 16th Annual DFRWS Conference, 2016. BibTeX | PDF | Slides | Data
    @INPROCEEDINGS{Neuner2016Time,
      Author = {Sebastian Neuner and {Artemios G.} Voyiatzis and Martin Schmiedecker and Stefan Brunthaler and Stefan Katzenbeisser and {Edgar R.} Weippl},
      title = {Time is on my side: Steganography in filesystem metadata},
      booktitle = {16th Annual DFRWS Conference},
      year = {2016},
      month = {0},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/timestampStego_preprint.pdf},
      link_data = {https://www.sba-research.org/dfrws2016/},
      link_slides = {http://www.slideshare.net/SBAResearch/time-is-on-my-side-steganography-in-filesystem-metadata},
      }
  • Martin Schmiedecker and Sebastian Neuner, "On Reducing Bottlenecks in Digital Forensics," ERCIM News, 2016. BibTeX | PDF
    @ARTICLE{Schmiedecker2016Reducing,
      Author = {Martin Schmiedecker and Sebastian Neuner},
      title = {On Reducing Bottlenecks in Digital Forensics},
      journal = {ERCIM News},
      year = {2016},
      month = {0},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/EN106-peekaTorrent.pdf},
      }
  • Sebastian Neuner and Martin Schmiedecker and Edgar R. Weippl, "Effectiveness of File‐based Deduplication in Digital Forensics," Security and Communication Networks, 2016. BibTeX | PDF
    @ARTICLE{Neuner2016Effectiveness,
      Author = {Sebastian Neuner and Martin Schmiedecker and {Edgar R.} Weippl},
      title = {Effectiveness of File‐based Deduplication in Digital Forensics},
      journal = {Security and Communication Networks},
      year = {2016},
      month = {0},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/Neuner2016Effectiveness_preprint.pdf},
      publisher = {Wiley},
      }
  • Christoph Rottermanner and Peter Kieseberg and Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser, "Privacy and Data Protection in Smartphone Messengers," in Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services (iiWAS2015), 2015. BibTeX | PDF
    @INPROCEEDINGS{Rottermanner2015Privacy,
      Author = {Christoph Rottermanner and Peter Kieseberg and Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser},
      title = {Privacy and Data Protection in Smartphone Messengers},
      booktitle = {Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services (iiWAS2015)},
      year = {2015},
      month = {12},
      pdf = {paper_drafthp.pdf},
      }
  • Wilfried Mayer and Aaron Zauner and Martin Schmiedecker and Markus Huber, "No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large," arXiv preprint, 2015. BibTeX | PDF | Data
    @ARTICLE{Mayer2015Need,
      Author = {Wilfried Mayer and Aaron Zauner and Martin Schmiedecker and Markus Huber},
      sbahotlist = {true},
      title = {No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large},
      journal = {arXiv preprint},
      year = {2015},
      month = {10},
      pdf = {http://arxiv.org/abs/1510.08646},
      link_data = {https://scans.io/study/sba-email},
      }
  • Sebastian Neuner and Martin Schmiedecker and Sebastian Schrittwieser and Edgar R. Weippl, "Gradually Improving the Forensic Process," in International Workshop on Cyber Crime (IWCC), 2015. BibTeX | PDF
    @INPROCEEDINGS{Neuner2015Gradually,
      Author = {Sebastian Neuner and Martin Schmiedecker and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Gradually Improving the Forensic Process},
      booktitle = {International Workshop on Cyber Crime (IWCC)},
      year = {2015},
      month = {8},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/Neuner_IWCC2015.pdf},
      }
  • Tariq Fadai and Sebastian Schrittwieser and Peter Kieseberg and Martin Schmiedecker, "Trust me, I am a Root CA! Analyzing SSL Root CAs in modern Browsers and Operating Systems," in International Conference on Availability, Reliability and Security (ARES), 2015. BibTeX | PDF
    @INPROCEEDINGS{Fadai2015Trust,
      Author = {Tariq Fadai and Sebastian Schrittwieser and Peter Kieseberg and Martin Schmiedecker},
      title = {Trust me, I am a Root CA! Analyzing SSL Root CAs in modern Browsers and Operating Systems},
      booktitle = {International Conference on Availability, Reliability and Security (ARES)},
      year = {2015},
      month = {8},
      pdf = {SSL.pdf},
      }
  • Christian Kadluba and Martin Schmiedecker and Lorenz Zechner and Sebastian Neuner and Edgar R. Weippl, "Windows Installer Security," in Sixth ASE International Conference on Privacy, Security, Risk and Trust (PASSAT 2014), 2014. BibTeX | PDF
    @INPROCEEDINGS{Kadluba2014Windows,
      Author = {Christian Kadluba and Martin Schmiedecker and Lorenz Zechner and Sebastian Neuner and {Edgar R.} Weippl},
      title = {Windows Installer Security},
      booktitle = {Sixth ASE International Conference on Privacy, Security, Risk and Trust (PASSAT 2014)},
      year = {2014},
      month = {12},
      pdf = {Sebastian Neuner msiInstaller.pdf},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl, "Covert Computation – Hiding Code in Code Through Compile-Time Obfuscation," Computers & Security, 2014. BibTeX | PDF
    @ARTICLE{Schrittwieser2014Covert,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation},
      journal = {Computers & Security},
      year = {2014},
      month = {5},
      pdf = {http://www.sciencedirect.com/science/article/pii/S0167404814000030},
      publisher = {Elsevier Advanced Technology},
      }
  • Stefanie Beyer and Martin Schmiedecker and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl, "Towards Fully Automated Digital Alibis with Social Interaction," in Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2014. BibTeX | PDF | Slides | Src
    @INPROCEEDINGS{ifip119_2014_alibi,
      Author = {Stefanie Beyer and Martin Schmiedecker and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
      title = {Towards Fully Automated Digital Alibis with Social Interaction},
      booktitle = {Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics},
      year = {2014},
      month = {1},
      pdf = {alibigenerator_preprint.pdf},
      link_source = {https://github.com/mmulazzani/alibiFramework},
      link_slides = {http://www.slideshare.net/SBAResearch/digitale-alibis-ifip},
      }
  • Adrian Dabrowski and Nicola Pianta and Thomas Klepp and Martin Schmiedecker and Edgar R. Weippl, "IMSI-Catch Me If You Can: IMSI-Catcher-Catchers," in Annual Computer Security Applications Conference (ACSAC), 2014. BibTeX | PDF | Src
    @INPROCEEDINGS{Dabrowski2014IMSICatch,
      Author = {Adrian Dabrowski and Nicola Pianta and Thomas Klepp and Martin Schmiedecker and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {IMSI-Catch Me If You Can: IMSI-Catcher-Catchers},
      booktitle = {Annual Computer Security Applications Conference (ACSAC)},
      year = {2014},
      month = {12},
      pdf = {DabrowskiEtAl-IMSI-Catcher-Catcher-ACSAC2014.pdf},
      link_source = {http://sourceforge.net/p/icc/},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Isao Echizen and Edgar R. Weippl, "An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata," Electronic Markets – The International Journal on Networked Business, 2014. BibTeX | PDF
    @ARTICLE{Kieseberg2014algorithm,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Isao Echizen and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata},
      journal = {Electronic Markets - The International Journal on Networked Business},
      year = {2014},
      month = {0},
      pdf = {http://link.springer.com/article/10.1007/s12525-014-0154-x},
      }
  • Sebastian Neuner and Victor Van der Veen and Martina Lindorfer and Markus Huber and Georg Merzdovnik and Martin Schmiedecker and Edgar R. Weippl, "Enter Sandbox: Android Sandbox Comparison," in Proceedings of the IEEE Mobile Security Technologies Workshop (MoST), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Neuner2014Enter,
      Author = {Sebastian Neuner and Victor {Van der Veen} and Martina Lindorfer and Markus Huber and Georg Merzdovnik and Martin Schmiedecker and {Edgar R.} Weippl},
      title = {Enter Sandbox: Android Sandbox Comparison},
      booktitle = {Proceedings of the IEEE Mobile Security Technologies Workshop (MoST)},
      year = {2014},
      month = {5},
      pdf = {mostAndroid.pdf},
      publisher = {IEEE},
      link_slides = {http://www.slideshare.net/SBAResearch/enter-sandbox-android-sandbox-comparison},
      }
  • Philipp Winter and Richard Koewer and Martin Schmiedecker and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and Edgar R. Weippl, "Spoiled Onions: Exposing Malicious Tor Exit Relays," in The 14th Privacy Enhancing Technologies Symposium (PETS), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Winter2014Spoiled,
      Author = {Philipp Winter and Richard Koewer and Martin Schmiedecker and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and {Edgar R.} Weippl},
      title = {Spoiled Onions: Exposing Malicious Tor Exit Relays},
      booktitle = {The 14th Privacy Enhancing Technologies Symposium (PETS)},
      year = {2014},
      month = {7},
      pdf = {http://www.sba-research.org/wp-content/uploads/publications/pets2014_preprint.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/spoiled-onions},
      }
  • Martin Schmiedecker, "New challenges in digital forensics: online storage and anonymous communication," 2014. BibTeX | PDF | Slides
    @TECHREPORT{Mulazzani2014challenges,
      Author = {Martin Schmiedecker},
      title = {New challenges in digital forensics: online storage and anonymous communication},
      booktitle = {PhD Thesis},
      year = {2014},
      month = {0},
      pdf = {dissertation_Mulazzani.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/presentation-diss},
      }
  • Martin Schmiedecker and Philipp Reschl and Markus Huber and Manuel Leithner and Sebastian Schrittwieser and Edgar R. Weippl, "Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting," in Web 2.0 Workshop on Security and Privacy (W2SP), 2013. BibTeX | PDF | Slides
    @INPROCEEDINGS{_Fast_and_Reliable_Browser_Iden_2013,
      Author = {Martin Schmiedecker and Philipp Reschl and Markus Huber and Manuel Leithner and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting},
      booktitle = {Web 2.0 Workshop on Security and Privacy (W2SP)},
      year = {2013},
      month = {5},
      pdf = {jsfingerprinting.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/fast-and-efficient-browser-identification-with-javascript-engine-fingerprinting},
      }
  • Thomas Unger and Martin Schmiedecker and Dominik Frühwirt and Markus Huber and Sebastian Schrittwieser and Edgar R. Weippl, "SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting," in Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES), 2013. BibTeX | PDF | Slides | Src
    @INPROCEEDINGS{ARES_SHPF_short_2013,
      Author = {Thomas Unger and Martin Schmiedecker and Dominik Frühwirt and Markus Huber and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting},
      booktitle = {Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES)},
      year = {2013},
      month = {9},
      pdf = {shpf_extendedPreprint.pdf},
      link_source = {https://github.com/mmulazzani/shpf},
      link_slides = {http://www.slideshare.net/SBAResearch/shpf-enhancing-https-session-security-with-browser-fingerprinting},
      }
  • Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and Edgar R. Weippl, "Appinspect: large-scale evaluation of social networking apps," in Proceedings of the first ACM conference on Online social networks, 2013, pp. 143-154. BibTeX | PDF | Slides
    @INPROCEEDINGS{huber2013appinspect,
      Author = {Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Appinspect: large-scale evaluation of social networking apps},
      booktitle = {Proceedings of the first ACM conference on Online social networks},
      year = {2013},
      month = {10},
      pdf = {AppInspect_peprint.pdf},
      pages = {143--154},
      publisher = {ACM},
      link_slides = {http://cosn.acm.org/2013/files/Session6/Session6Paper1.pdf},
      }
  • Sebastian Schrittwieser and Martin Schmiedecker and Edgar R. Weippl, "Ethics in Security Research – Which Lines Should Not Be Crossed?," in Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS 2013), 2013. BibTeX | PDF
    @INPROCEEDINGS{schrittwieser-ethics-2013,
      Author = {Sebastian Schrittwieser and Martin Schmiedecker and {Edgar R.} Weippl},
      title = {Ethics in Security Research - Which Lines Should Not Be Crossed?},
      booktitle = {Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS 2013)},
      year = {2013},
      month = {5},
      pdf = {creds2013_preprint.pdf},
      }
  • Martin Schmiedecker and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and Edgar R. Weippl, "Quantifying Windows File Slack in Size and Stability," in Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2013. BibTeX | PDF | Slides | Data
    @INPROCEEDINGS{Mulazzani_Slackspace_Quantifiation_2013,
      Author = {Martin Schmiedecker and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Quantifying Windows File Slack in Size and Stability},
      booktitle = {Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics},
      year = {2013},
      month = {1},
      pdf = {ifipSlack_2013_preprint.pdf},
      link_data = {http://128.130.204.91/slackspaceDataset.7z},
      link_slides = {http://www.slideshare.net/SBAResearch/quantifying-windows-file-slack-in-size-and-stability},
      }
  • Sebastian Schrittwieser and Martin Schmiedecker and Edgar R. Weippl and Sandra Panhans, "Ethik in der Sicherheitsforschung," in DACH Security 2013, 2013. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Ethik_in_der_Sicherheitsforsch_2013,
      Author = {Sebastian Schrittwieser and Martin Schmiedecker and {Edgar R.} Weippl and Sandra Panhans},
      title = {Ethik in der Sicherheitsforschung},
      booktitle = {DACH Security 2013},
      year = {2013},
      month = {9},
      pdf = {DACH-Camera Ready.pdf},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl, "Covert Computation – Hiding Code in Code for Obfuscation Purposes," in Proceedings of the 8th International Symposium on ACM Symposium on Information , Computer and Communications Security (ASIACCS 2013), 2013. BibTeX | PDF
    @INPROCEEDINGS{schrittwieser-covertcomputation-2013,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
      title = {Covert Computation - Hiding Code in Code for Obfuscation Purposes},
      booktitle = {Proceedings of the 8th International Symposium on ACM Symposium on Information , Computer and Communications Security (ASIACCS 2013)},
      year = {2013},
      month = {5},
      pdf = {p529-schrittwieser.pdf},
      }
  • Martin Schmiedecker and Philipp Reschl and Markus Huber and Manuel Leithner and Edgar R. Weippl, "Fast and Efficient Browser Identification with JavaScript Engine Fingerprinting," 2012. BibTeX | PDF
    @TECHREPORT{_Fast_and_Efficient_Browser_Ide_2012,
      Author = {Martin Schmiedecker and Philipp Reschl and Markus Huber and Manuel Leithner and {Edgar R.} Weippl},
      title = {Fast and Efficient Browser Identification with JavaScript Engine Fingerprinting},
      booktitle = {Technical Report TR-SBA-Research-0512-01},
      year = {2012},
      month = {5},
      pdf = {jsfingerprinting_Tech_Report.pdf},
      }
  • Martin Schmiedecker and Markus Huber and Edgar R. Weippl, "Social Network Forensics: Tapping the Data Pool of Social Networks," in Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2012. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Social_Network_Forensics_2012,
      Author = {Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
      title = {Social Network Forensics: Tapping the Data Pool of Social Networks},
      booktitle = {Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics},
      year = {2012},
      month = {1},
      pdf = {socialForensics_preprint.pdf},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl and Lindsay Munroe and Mayank Sinha, "Malicious Pixels Using QR Codes as Attack Vector," in Trustworthy Ubiquitous Computing, 2012, pp. 21-38. BibTeX
    @INPROCEEDINGS{_Malicious_Pixels_Using_QR_Code_2012,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl and Lindsay Munroe and Mayank Sinha},
      title = {Malicious Pixels Using QR Codes as Attack Vector},
      booktitle = {Trustworthy Ubiquitous Computing},
      year = {2012},
      month = {9},
      pages = {21-38},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Gilbert Wondracek and Sylvi Rennert and Edgar R. Weippl, "Secure Software in der Cloud," in Tagungsband Cloud und Klein: IT im Spannungsfeld zwischen Servercluster und Sensornetz, 2012. BibTeX
    @INPROCEEDINGS{Schrittwieser_Secure_Software_in_der_Cloud_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Gilbert Wondracek and Sylvi Rennert and {Edgar R.} Weippl},
      title = {Secure Software in der Cloud},
      booktitle = {Tagungsband Cloud und Klein: IT im Spannungsfeld zwischen Servercluster und Sensornetz},
      year = {2012},
      month = {4},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Edgar R. Weippl, "Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications," in Network and Distributed System Security Symposium (NDSS 2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Guess_Who_s_Texting_You_Evalua_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
      title = {Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications},
      booktitle = {Network and Distributed System Security Symposium (NDSS 2012)},
      year = {2012},
      month = {2},
      pdf = {ndss2012_final.pdf},
      }
  • Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl, "Cloud Speicherdienste als Angriffsvektoren," in 9th Information Security Konferenz in Krems, 2011. BibTeX | PDF
    @INPROCEEDINGS{DropboxKrems2011,
      Author = {Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
      title = {Cloud Speicherdienste als Angriffsvektoren},
      booktitle = {9th Information Security Konferenz in Krems},
      year = {2011},
      month = {10},
      pdf = {DunkleWolken.pdf},
      }
  • Markus Huber and Martin Schmiedecker and Gerhard Kitzler and Sigrun Goluch and Edgar R. Weippl, "Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam," IEEE Internet Computing: Special Issue on Security and Privacy in Social Networks, 2011. BibTeX | PDF
    @ARTICLE{Huber_Friend_in_the_middle_Attacks_E_2011,
      Author = {Markus Huber and Martin Schmiedecker and Gerhard Kitzler and Sigrun Goluch and {Edgar R.} Weippl},
      title = {Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam},
      journal = {IEEE Internet Computing: Special Issue on Security and Privacy in Social Networks},
      year = {2011},
      month = {5},
      pdf = {FITM_InternetComputing_preprint.pdf},
      note = {Pre Print},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Lorcan Morgan and Martin Schmiedecker and Markus Huber and Edgar R. Weippl, "Using the Structure of B plus Trees for Enhancing Logging Mechanisms of Databases," in International Conference on Information Integration and Web-based Applications & Services (iiWAS2011), 2011. BibTeX | PDF
    @INPROCEEDINGS{_Using_the_Structure_of_B_Trees_2011,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Lorcan Morgan and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
      title = {Using the Structure of B plus Trees for Enhancing Logging Mechanisms of Databases},
      booktitle = {International Conference on Information Integration and Web-based Applications & Services (iiWAS2011)},
      year = {2011},
      month = {12},
      pdf = {iiWAS2011_133_Short_Kieseberg.pdf},
      }
  • Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl, "Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space," in USENIX Security, 2011. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Dark_Clouds_on_the_Horizon_Usi_2011,
      Author = {Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
      title = {Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space},
      booktitle = {USENIX Security},
      year = {2011},
      month = {8},
      pdf = {dropboxUSENIX2011.pdf},
      }
  • Markus Huber and Martin Schmiedecker and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and Edgar R. Weippl, "Social Snapshots: Digital Forensics for Online Social Networks," in Annual Computer Security Applications Conference (ACSAC), 2011. BibTeX | PDF
    @INPROCEEDINGS{_Social_Snapshots_Digital_Foren_2011,
      Author = {Markus Huber and Martin Schmiedecker and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and {Edgar R.} Weippl},
      title = {Social Snapshots: Digital Forensics for Online Social Networks},
      booktitle = {Annual Computer Security Applications Conference (ACSAC)},
      year = {2011},
      month = {12},
      pdf = {social_snapshots_preprint.pdf},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Markus Huber and Edgar R. Weippl, "Trees Cannot Lie: Using Data Structures for Forensics Purposes," in European Intelligence and Security Informatics Conference (EISIC 2011), 2011. BibTeX | PDF
    @INPROCEEDINGS{Kieseberg_Trees_Cannot_Lie_Using_Data_St_2011,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
      title = {Trees Cannot Lie: Using Data Structures for Forensics Purposes},
      booktitle = {European Intelligence and Security Informatics Conference (EISIC 2011)},
      year = {2011},
      month = {9},
      pdf = {btree_forensics_camera_ready.pdf},
      }
  • Markus Huber and Martin Schmiedecker and Edgar R. Weippl, "Who On Earth Is Mr. Cypher? Automated Friend Injection Attacks on Social Networking Sites," in Proceedings of the IFIP International Information Security Conference 2010: Security and Privacy, 2010. BibTeX | PDF
    @INPROCEEDINGS{Huber_Who_On_Earth_Is_Mr_Cypher_Auto_2010,
      Author = {Markus Huber and Martin Schmiedecker and {Edgar R.} Weippl},
      title = {Who On Earth Is Mr. Cypher? Automated Friend Injection Attacks on Social Networking Sites},
      booktitle = {Proceedings of the IFIP International Information Security Conference 2010: Security and Privacy},
      year = {2010},
      month = {9},
      pdf = {sec2010-friendInjection_preprint.pdf},
      }
  • Markus Huber and Martin Schmiedecker and Edgar R. Weippl, "Social Networking Sites Security Quo Vadis," in Proceedings of the 1st International Workshop on Privacy Aspects of Social Web and Cloud Computing, 2010. BibTeX
    @INPROCEEDINGS{Huber_Social_Networking_Sites_Securi_2010,
      Author = {Markus Huber and Martin Schmiedecker and {Edgar R.} Weippl},
      title = {Social Networking Sites Security Quo Vadis},
      booktitle = {Proceedings of the 1st International Workshop on Privacy Aspects of Social Web and Cloud Computing},
      year = {2010},
      month = {8},
      }
  • Peter Fruehwirt and Markus Huber and Martin Schmiedecker and Edgar R. Weippl, "InnoDB Database Forensics," in Proceedings of the 24th International Conference on Advanced Information Networking and Applications, 2010. BibTeX | PDF
    @INPROCEEDINGS{Huber_InnoDB_Database_Forensics_2010,
      Author = {Peter Fruehwirt and Markus Huber and Martin Schmiedecker and {Edgar R.} Weippl},
      title = {InnoDB Database Forensics},
      booktitle = {Proceedings of the 24th International Conference on Advanced Information Networking and Applications},
      year = {2010},
      month = {4},
      pdf = {AINA2010-InnoDBforensics_preprint.pdf},
      }
  • Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and Edgar R. Weippl, "Cheap and Automated Socio-Technical Attacks based on Social Networking Sites," in 3rd Workshop on Artificial Intelligence and Security AISec 10, 2010. BibTeX | PDF
    @INPROCEEDINGS{Huber_Cheap_and_Automated_Socio_Tech_2010,
      Author = {Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Cheap and Automated Socio-Technical Attacks based on Social Networking Sites},
      booktitle = {3rd Workshop on Artificial Intelligence and Security AISec 10},
      year = {2010},
      month = {10},
      pdf = {p61huber.pdf},
      }
  • Markus Huber and Martin Schmiedecker and Gerhard Kitzler and Sigrun Goluch and Edgar R. Weippl, "Friend-in-the-middle Attacks," 2010. BibTeX | PDF
    @TECHREPORT{Huber2010Friendin-the-middle,
      Author = {Markus Huber and Martin Schmiedecker and Gerhard Kitzler and Sigrun Goluch and {Edgar R.} Weippl},
      title = {Friend-in-the-middle Attacks},
      booktitle = {Technical Report},
      year = {2010},
      month = {1},
      pdf = {FITM_TR-SBA-Research-0710-01.pdf},
      }
  • Peter Fruehwirt and Markus Huber and Martin Schmiedecker and Edgar R. Weippl, "Sicherheit in sozialen Netzwerken: Quo Vadis," in 8th Information Security Konferenz in Krems, 2010. BibTeX
    @INPROCEEDINGS{Fruewirt_Sicherheit_in_sozialen_Netzwer_2010,
      Author = {Peter Fruehwirt and Markus Huber and Martin Schmiedecker and {Edgar R.} Weippl},
      title = {Sicherheit in sozialen Netzwerken: Quo Vadis},
      booktitle = {8th Information Security Konferenz in Krems},
      year = {2010},
      month = {11},
      }
  • Markus Huber and Martin Schmiedecker and Edgar R. Weippl, "Tor HTTP usage and information leakage," in Proceedings of IFIP CMS 2010, 2010, pp. 245-255. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Tor_HTTP_usage_and_information_2010,
      Author = {Markus Huber and Martin Schmiedecker and {Edgar R.} Weippl},
      title = {Tor HTTP usage and information leakage},
      booktitle = {Proceedings of IFIP CMS 2010},
      year = {2010},
      month = {5},
      pdf = {2010 - Huber - Tor HTTP Usage.pdf},
      pages = {245-255},
      }
  • Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and Edgar R. Weippl, "QR Code Security," in Fourth International Workshop on Trustworthy Ubiquitous Computing (TwUC 2010), 2010. BibTeX | PDF
    @INPROCEEDINGS{twuc_2010,
      Author = {Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and {Edgar R.} Weippl},
      title = {QR Code Security},
      booktitle = {Fourth International Workshop on Trustworthy Ubiquitous Computing (TwUC 2010)},
      year = {2010},
      month = {11},
      pdf = {QR_Code_Security.pdf},
      }
  • Martin Schmiedecker and Markus Huber and Edgar R. Weippl, "Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System," IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, pp. 539-546, 2010. BibTeX | PDF
    @ARTICLE{Mulazzani_Anonymity_and_Monitoring_How_t_2010,
      Author = {Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
      title = {Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System},
      journal = {IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews},
      year = {2010},
      month = {9},
      pdf = {IEEE_SMC_Tor_finalPreprint.pdf},
      pages = {539-546},
      }
  • Martin Schmiedecker and Edgar R. Weippl, "Aktuelle Herausforderungen in der Datenbankforensik," in 7th Information Security Konferenz in Krems, 2009. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_AktuelleHerausforderungenin_2009,
      Author = {Martin Schmiedecker and {Edgar R.} Weippl},
      title = {Aktuelle Herausforderungen in der Datenbankforensik},
      booktitle = {7th Information Security Konferenz in Krems},
      year = {2009},
      month = {1},
      pdf = {Mulazzani_AktuelleHerausforderungenin_2009.pdf},
      publisher = {OCG Austrian Computer Society, Krems},
      }

Professional Activities

  • General chair at the Tenth Annual IFIP WG 11.9 Int. Conference on Digital Forensics, 2014
  • Workshop chair at the Int. Workshop on Digital Forensics (WSDF), 2012-2015

PC Member At

  • Privacy Enhancing Technologies Symposium (PETS), 2016-2017
  • International Conference on Availability, Reliability and Security (ARES), 2016
  • International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), 2016
  • International Workshop on Digital Forensics (WSDF), 2016
  • 20th European Symposium on Research in Computer Security (ESORICS), 2015
  • IFIP International Information Security and Privacy Conference (IFIP SEC), 2015-2016
  • International Conference on Digital Forensics \& Cyber Crime (ICDF2C), 2015-2016
  • Digital Forensics Research Conference (DFRWS EU), 2014-2017
  • IFIP WG 11.9 Int. Conference on Digital Forensics, 2013-2017

Datasets

  • Our dataset on timestamp steganography (DFRWS USA 2016) can be found here.
  • Our dataset on torrents as input source for digital forensics (DFRWS USA 2016) can be found here.
  • Our dataset on Tor network measurements (IEEE Euro S&P 2016) can be found at naviga-tor.github.io.
  • Our dataset on TLS in the email ecosystem for the entire IPv4 adress space can be found at scans.io.
  • Our dataset for our NTFS slackspace evaluation (IFIP Forensics conference 2013) can be found here. SHA1 = 526c5b934e3a067d1c61b3f19bbe027b377482b4

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close