Peter Kieseberg

is senior researcher and research coordinator at SBA Research.Kieseberg

  • E-Mail
  • Phone: +43 (1) 505 36 88
  • Fax: +43 (1) 505 88 88

Research Interest

His main research interests include various topics in the area of IT-Security: Digital forensics, especially regarding databases, fingerprinting of sensitive data, as well as mobile security. He repeatedly organizes the IWSMA and is currently first vice chair of the joint IEEE-chapter CS/SMC in Austria.

Bio

Peter received a master’s degree in Technical Mathematics in Computer Science from the VTU Wien with specializations in cryptography and numerical mathematics. He worked as a consultant in the telecommunication sector for several years before joining SBA Research. Here his main activities lie in the area of project management and acquisition, as well as industrial and academic research. Since 2014 he is also visiting doctoral researcher at the Holzinger Group and involved in standardization activities at ETSI (TC-CYBER). He is the Co-Founder of Kibosec, a company targeting the development of services in the area of digital forensics and advanced trainings.

Publications

  • Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Isao Echizen and Edgar R. Weippl, "An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata," Electronic Markets – The International Journal on Networked Business, 2014. BibTeX
    @ARTICLE{Kieseberg2014algorithm,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Isao Echizen and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata},
      journal = {Electronic Markets - The International Journal on Networked Business},
      year = {2014},
      month = {0},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl, "Covert Computation – Hiding Code in Code Through Compile-Time Obfuscation," Computers & Security, 2014. BibTeX
    @ARTICLE{Schrittwieser2014Covert,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation},
      journal = {Computers & Security},
      year = {2014},
      month = {5},
      publisher = {Elsevier Advanced Technology},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Edgar R. Weippl, "Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications," in Network and Distributed System Security Symposium (NDSS 2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Guess_Who_s_Texting_You_Evalua_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
      title = {Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications},
      booktitle = {Network and Distributed System Security Symposium (NDSS 2012)},
      year = {2012},
      month = {2},
      pdf = {ndss2012_final.pdf},
      }
  • Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and Edgar R. Weippl, "QR Code Security," in Fourth International Workshop on Trustworthy Ubiquitous Computing (TwUC 2010), 2010. BibTeX | PDF
    @INPROCEEDINGS{twuc_2010,
      Author = {Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and {Edgar R.} Weippl},
      title = {QR Code Security},
      booktitle = {Fourth International Workshop on Trustworthy Ubiquitous Computing (TwUC 2010)},
      year = {2010},
      month = {11},
      pdf = {QR Code Security.pdf},
      }

View all publications

  • Peter Kieseberg and Bernd Malle and Peter Fruehwirt and Edgar R. Weippl and Andreas Holzinger, "A tamper-proof audit and control system for the doctor in the loop," Brain Informatics, pp. 1-11, 2016. BibTeX | PDF
    @ARTICLE{Kiesebergtamperproof,
      Author = {Peter Kieseberg and Bernd Malle and Peter Fruehwirt and {Edgar R.} Weippl and Andreas Holzinger},
      title = {A tamper-proof audit and control system for the doctor in the loop},
      journal = {Brain Informatics},
      year = {2016},
      month = {3},
      pdf = {http://link.springer.com/article/10.1007/s40708-016-0046-2},
      pages = {1--11},
      }
  • Peter Kieseberg and Edgar R. Weippl and Andreas Holzinger, "Trust for the “Doctor in the Loop"," ERCIM News, 2016. BibTeX | PDF
    @ARTICLE{Kieseberg2016Trust,
      Author = {Peter Kieseberg and {Edgar R.} Weippl and Andreas Holzinger},
      title = {Trust for the “Doctor in the Loop"},
      journal = {ERCIM News},
      year = {2016},
      month = {1},
      pdf = {trustfordoctorintheloop.pdf},
      }
  • Peter Kieseberg and Edgar R. Weippl and Sebastian Schrittwieser, "Detection of Data Leaks in Collaborative Data Driven Research," ERCIM News, 2016. BibTeX | PDF
    @ARTICLE{Kieseberg2016Detection,
      Author = {Peter Kieseberg and {Edgar R.} Weippl and Sebastian Schrittwieser},
      title = {Detection of Data Leaks in Collaborative Data Driven Research},
      journal = {ERCIM News},
      year = {2016},
      month = {4},
      pdf = {Detection_EN105.pdf},
      }
  • Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Edgar R. Weippl, "Security and privacy of smartphone messaging applications," International Journal of Pervasive Computing and Communications, vol. 11, 2015. BibTeX | PDF
    @ARTICLE{Mueller2015Security,
      Author = {Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and {Edgar R.} Weippl},
      title = {Security and privacy of smartphone messaging applications},
      journal = {International Journal of Pervasive Computing and Communications},
      year = {2015},
      month = {6},
      pdf = {Draft.pdf},
      volume = {11},
      }
  • Tariq Fadai and Sebastian Schrittwieser and Peter Kieseberg and Martin Schmiedecker, "Trust me, I am a Root CA! Analyzing SSL Root CAs in modern Browsers and Operating Systems," in International Conference on Availability, Reliability and Security (ARES), 2015. BibTeX | PDF
    @INPROCEEDINGS{Fadai2015Trust,
      Author = {Tariq Fadai and Sebastian Schrittwieser and Peter Kieseberg and Martin Schmiedecker},
      title = {Trust me, I am a Root CA! Analyzing SSL Root CAs in modern Browsers and Operating Systems},
      booktitle = {International Conference on Availability, Reliability and Security (ARES)},
      year = {2015},
      month = {8},
      pdf = {SSL.pdf},
      }
  • Peter Kieseberg and Olga E. Segou and Fabio Roli, "CyberROAD: Developing a Roadmap for Research in Cybercrime and Cyberterrorism," ERCIM News, 2015. BibTeX | PDF
    @ARTICLE{Kieseberg2015CyberROAD,
      Author = {Peter Kieseberg and {Olga E.} Segou and Fabio Roli},
      title = {CyberROAD: Developing a Roadmap for Research in Cybercrime and Cyberterrorism},
      journal = {ERCIM News},
      year = {2015},
      month = {7},
      pdf = {CyberRoad-Excerpt.pdf},
      }
  • Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser and Edgar R. Weippl, "Security tests for mobile applications – Why using TLS SSL is not enough," in 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2015. BibTeX | PDF
    @INPROCEEDINGS{Kieseberg2015Security,
      Author = {Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Security tests for mobile applications - Why using TLS SSL is not enough},
      booktitle = {2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW)},
      year = {2015},
      month = {4},
      pdf = {ASQT2015_cameraready_wo1stpage.pdf},
      }
  • Peter Kieseberg, "A Structured Approach to Defence Simulation Training," ERCIM News, 2015. BibTeX | PDF
    @ARTICLE{Kieseberg2015Structured,
      Author = {Peter Kieseberg},
      title = {A Structured Approach to Defence Simulation Training},
      journal = {ERCIM News},
      year = {2015},
      month = {10},
      pdf = {Scudo.pdf},
      }
  • Johanna Ullrich and Peter Kieseberg and Katharina Krombholz and Edgar R. Weippl, "On Reconnaissance with IPv6: A Pattern-Based Scanning Approach," in International Conference on Availability, Reliability and Security (ARES), 2015. BibTeX | PDF
    @INPROCEEDINGS{Ullrich2015Reconnaissance,
      Author = {Johanna Ullrich and Peter Kieseberg and Katharina Krombholz and {Edgar R.} Weippl},
      title = {On Reconnaissance with IPv6: A Pattern-Based Scanning Approach},
      booktitle = {International Conference on Availability, Reliability and Security (ARES)},
      year = {2015},
      month = {8},
      pdf = {PID3762727.pdf},
      }
  • Christoph Rottermanner and Peter Kieseberg and Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser, "Privacy and Data Protection in Smartphone Messengers," in Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services (iiWAS2015), 2015. BibTeX | PDF
    @INPROCEEDINGS{Rottermanner2015Privacy,
      Author = {Christoph Rottermanner and Peter Kieseberg and Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser},
      title = {Privacy and Data Protection in Smartphone Messengers},
      booktitle = {Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services (iiWAS2015)},
      year = {2015},
      month = {12},
      pdf = {paper_drafthp.pdf},
      }
  • Peter Kieseberg and Johannes Schantl and Peter Fruehwirt and Edgar R. Weippl and Andreas Holzinger, "Witnesses for the Doctor in the Loop," in 2015 International Conference on Brain Informatics & Health (BIH), 2015. BibTeX | PDF
    @INPROCEEDINGS{Kieseberg2015Witnesses,
      Author = {Peter Kieseberg and Johannes Schantl and Peter Fruehwirt and {Edgar R.} Weippl and Andreas Holzinger},
      title = {Witnesses for the Doctor in the Loop},
      booktitle = {2015 International Conference on Brain Informatics & Health (BIH)},
      year = {2015},
      month = {9},
      pdf = {https://online.tugraz.at/tug_online/voe_main2.getVollText?pDocumentNr=1151817&pCurrPk=85962},
      }
  • Katharina Krombholz and Peter Fruehwirt and Peter Kieseberg and Ioannis Kapsalis and Markus Huber and Edgar R. Weippl, "QR Code Security: A Survey of Attacks and Challenges for Usable Security." Springer, 2014, pp. 79-90. BibTeX | PDF | Slides
    @INBOOK{Krombholz2014Code,
      Author = {Katharina Krombholz and Peter Fruehwirt and Peter Kieseberg and Ioannis Kapsalis and Markus Huber and {Edgar R.} Weippl},
      title = {QR Code Security: A Survey of Attacks and Challenges for Usable Security},
      booktitle = {Human Aspects of Information Security, Privacy, and Trust},
      year = {2014},
      month = {0},
      pdf = {llncs.pdf},
      pages = {79--90},
      publisher = {Springer},
      link_slides = {http://de.slideshare.net/SBAResearch/qr-code-security-a-survey-of-attacks-and-challenges-for-usable-security},
      }
  • Peter Fruehwirt and Peter Kieseberg and Katharina Krombholz and Edgar R. Weippl, "Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations," Digital Investigation, vol. 11, pp. 336-348, 2014. BibTeX | PDF
    @ARTICLE{Fruehwirt2014Towards,
      Author = {Peter Fruehwirt and Peter Kieseberg and Katharina Krombholz and {Edgar R.} Weippl},
      title = {Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations},
      journal = {Digital Investigation},
      year = {2014},
      month = {0},
      pdf = {towards a forensic aware_paper.pdf},
      volume = {11},
      pages = {336-348},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Isao Echizen and Edgar R. Weippl, "An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata," Electronic Markets – The International Journal on Networked Business, 2014. BibTeX
    @ARTICLE{Kieseberg2014algorithm,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Isao Echizen and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata},
      journal = {Electronic Markets - The International Journal on Networked Business},
      year = {2014},
      month = {0},
      }
  • Peter Fruehwirt and Peter Kieseberg and Christoph Hochreiner and Sebastian Schrittwieser and Edgar R. Weippl, "InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles," in GI Sicherheit 2014, 2014. BibTeX | PDF
    @INPROCEEDINGS{Fruehwirt2014InnoDB,
      Author = {Peter Fruehwirt and Peter Kieseberg and Christoph Hochreiner and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles },
      booktitle = {GI Sicherheit 2014 },
      year = {2014},
      month = {3},
      pdf = {FRUEHWIRT-InnoDB Datenbank Forensik-Rekonstruktion.pdf},
      }
  • Peter Kieseberg and Heidelinde Hobel and Sebastian Schrittwieser and Edgar R. Weippl and Andreas Holzinger, "Protecting Anonymity in Data-Driven Biomedical Science." , 2014, pp. 301-316. BibTeX | PDF
    @INBOOK{Kieseberg2014Protecting,
      Author = {Peter Kieseberg and Heidelinde Hobel and Sebastian Schrittwieser and {Edgar R.} Weippl and Andreas Holzinger},
      title = {Protecting Anonymity in Data-Driven Biomedical Science},
      booktitle = {Interactive Knowledge Discovery and Data Mining in Biomedical Informatics - State-of-the-Art and Future Challenges},
      year = {2014},
      month = {0},
      pdf = {1v0_KIESEBERG_bookchapter.pdf},
      pages = {301--316},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl, "Covert Computation – Hiding Code in Code Through Compile-Time Obfuscation," Computers & Security, 2014. BibTeX
    @ARTICLE{Schrittwieser2014Covert,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation},
      journal = {Computers & Security},
      year = {2014},
      month = {5},
      publisher = {Elsevier Advanced Technology},
      }
  • Christoph Hochreiner and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl, "Using Model Driven Security Approaches in Web Application Development," in AsiaARES (The 2014 Asian Conference on Availability, Reliability and Security), 2014. BibTeX | PDF
    @INPROCEEDINGS{Hochreiner2014Using,
      Author = {Christoph Hochreiner and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Using Model Driven Security Approaches in Web Application Development },
      booktitle = {AsiaARES (The 2014 Asian Conference on Availability, Reliability and Security)},
      year = {2014},
      month = {4},
      pdf = {UsingModelDrivenSecurityApproachesinWebApplicationDevelopment.pdf},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Georg Merzdovnik and Peter Kieseberg and Edgar R. Weippl, "AES-SEC: Improving software obfuscation through hardware-assistance," in ARES 2014, 2014. BibTeX
    @INPROCEEDINGS{Schrittwieser2014AESSEC,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Georg Merzdovnik and Peter Kieseberg and {Edgar R.} Weippl},
      title = {AES-SEC: Improving software obfuscation through hardware-assistance },
      booktitle = {ARES 2014},
      year = {2014},
      month = {9},
      }
  • Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Edgar R. Weippl, "What is new with whatsapp & co.? Revisiting the security of smartphone messaging applications," in iiWas 2014, 2014. BibTeX | PDF
    @INPROCEEDINGS{Mueller2014Whats,
      Author = {Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and {Edgar R.} Weippl},
      title = {What is new with whatsapp & co.? Revisiting the security of smartphone messaging applications},
      booktitle = {iiWas 2014},
      year = {2014},
      month = {12},
      pdf = {WhatsApp-iiwas-paper_cameraready.pdf},
      }
  • Peter Fruehwirt and Peter Kieseberg and Edgar R. Weippl, "Testen der Integrität von Datenbanken mit Hilfe von Transaction-Logs," in ASQT, 2014. BibTeX
    @INPROCEEDINGS{Fruehwirt2014Testen,
      Author = {Peter Fruehwirt and Peter Kieseberg and {Edgar R.} Weippl},
      title = {Testen der Integrität von Datenbanken mit Hilfe von Transaction-Logs},
      booktitle = {ASQT},
      year = {2014},
      month = {9},
      }
  • Christoph Hochreiner and Peter Fruehwirt and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl, "Genie in a Model? Why Model Driven Security will not secure your Web Application," Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol. 5, pp. 44-62, 2014. BibTeX | PDF
    @ARTICLE{Hochreiner2014Genie,
      Author = {Christoph Hochreiner and Peter Fruehwirt and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Genie in a Model? Why Model Driven Security will not secure your Web Application},
      journal = {Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)},
      year = {2014},
      month = {9},
      pdf = {jowua-v5n3-4.pdf},
      volume = {5},
      pages = {44-62},
      }
  • Stefanie Falkner and Peter Kieseberg and Dimitris Simos and Christina Traxler and Edgar R. Weippl, "E-voting authentication with QR-codes," in 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust, 2014. BibTeX | PDF
    @INPROCEEDINGS{Falkner2014Evoting,
      Author = {Stefanie Falkner and Peter Kieseberg and Dimitris Simos and Christina Traxler and {Edgar R.} Weippl},
      title = {E-voting authentication with QR-codes},
      booktitle = {2nd International Conference on Human Aspects of Information Security, Privacy, and Trust},
      year = {2014},
      month = {0},
      pdf = {evoting_final_HCI_2014.pdf},
      }
  • Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl, "InnoDB Database Forensics: Enhanced Reconstruction of Data Manipulation Queries from Redo Logs," Information Security Technical Report (ISTR), Special Issue: ARES, 2013. BibTeX | PDF
    @ARTICLE{_InnoDB_Database_Forensics_Enha_2013,
      Author = {Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
      title = {InnoDB Database Forensics: Enhanced Reconstruction of Data Manipulation Queries from Redo Logs},
      journal = {Information Security Technical Report (ISTR), Special Issue: ARES},
      year = {2013},
      month = {4},
      pdf = {ARES2012_Journal.pdf},
      }
  • Heidelinde Hobel and Sebastian Schrittwieser and Peter Kieseberg and Edgar R. Weippl, "Privacy, Anonymity, Pseudonymity and Data Disclosure in Data-Driven Science." , 2013. BibTeX
    @INBOOK{_Privacy_Anonymity_Pseudonymity_2013,
      Author = {Heidelinde Hobel and Sebastian Schrittwieser and Peter Kieseberg and {Edgar R.} Weippl},
      title = {Privacy, Anonymity, Pseudonymity and Data Disclosure in Data-Driven Science},
      booktitle = {Encyclopedia of Business Analytics and Optimization},
      year = {2013},
      month = {0},
      }
  • Martin Schmiedecker and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and Edgar R. Weippl, "Quantifying Windows File Slack in Size and Stability," in Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2013. BibTeX | PDF | Slides | Data
    @INPROCEEDINGS{Mulazzani_Slackspace_Quantifiation_2013,
      Author = {Martin Schmiedecker and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Quantifying Windows File Slack in Size and Stability},
      booktitle = {Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics},
      year = {2013},
      month = {1},
      pdf = {ifipSlack_2013_preprint.pdf},
      link_data = {http://128.130.204.91/slackspaceDataset.7z},
      link_slides = {http://www.slideshare.net/SBAResearch/quantifying-windows-file-slack-in-size-and-stability},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl, "Covert Computation – Hiding Code in Code for Obfuscation Purposes," in Proceedings of the 8th International Symposium on ACM Symposium on Information , Computer and Communications Security (ASIACCS 2013), 2013. BibTeX | PDF
    @INPROCEEDINGS{schrittwieser-covertcomputation-2013,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
      title = {Covert Computation - Hiding Code in Code for Obfuscation Purposes},
      booktitle = {Proceedings of the 8th International Symposium on ACM Symposium on Information , Computer and Communications Security (ASIACCS 2013)},
      year = {2013},
      month = {5},
      pdf = {p529-schrittwieser.pdf},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Edgar R. Weippl, "Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications," in Network and Distributed System Security Symposium (NDSS 2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Guess_Who_s_Texting_You_Evalua_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
      title = {Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications},
      booktitle = {Network and Distributed System Security Symposium (NDSS 2012)},
      year = {2012},
      month = {2},
      pdf = {ndss2012_final.pdf},
      }
  • Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl, "InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs," in The Fifth International Workshop on Digital Forensics (WSDF), 2012. BibTeX | PDF
    @INPROCEEDINGS{_InnoDB_Database_Forensics_Reco_2012,
      Author = {Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
      title = {InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs},
      booktitle = {The Fifth International Workshop on Digital Forensics (WSDF)},
      year = {2012},
      month = {8},
      pdf = {WSDF2012_InnoDB.pdf},
      }
  • Sebastian Schrittwieser and Peter Kieseberg and Edgar R. Weippl, "Digital Forensics for Enterprise Rights Management," in International Conference on Information Integration and Web-based Applications & Services (iiWAS2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{_Digital_Forensics_for_Enterpri_2012,
      Author = {Sebastian Schrittwieser and Peter Kieseberg and {Edgar R.} Weippl},
      title = {Digital Forensics for Enterprise Rights Management},
      booktitle = {International Conference on Information Integration and Web-based Applications & Services (iiWAS2012)},
      year = {2012},
      month = {12},
      pdf = {16_schrittwieser.pdf},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Gilbert Wondracek and Sylvi Rennert and Edgar R. Weippl, "Secure Software in der Cloud," in Tagungsband Cloud und Klein: IT im Spannungsfeld zwischen Servercluster und Sensornetz, 2012. BibTeX
    @INPROCEEDINGS{Schrittwieser_Secure_Software_in_der_Cloud_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Gilbert Wondracek and Sylvi Rennert and {Edgar R.} Weippl},
      title = {Secure Software in der Cloud},
      booktitle = {Tagungsband Cloud und Klein: IT im Spannungsfeld zwischen Servercluster und Sensornetz},
      year = {2012},
      month = {4},
      }
  • Manuele Barbieri and Ivan Cibrario Bertolotti and Manuel Cheminod and Ioannis Christou and Luca Durante and Sofoklis Efremidis and Giorgio Gentile and Peter Kieseberg and Steen Lehmann and Paolo Paci and Micol Pesce and Andreas Ronge and Michal Tanas and Craig Taverner and Lorenz Zechner, "INMOTOS Project," in International Conference on Critical Information Infrastructures Security (CRITIS 12), 2012. BibTeX
    @INPROCEEDINGS{_INMOTOS_Project_2012,
      Author = {Manuele Barbieri and Ivan Cibrario Bertolotti and Manuel Cheminod and Ioannis Christou and Luca Durante and Sofoklis Efremidis and Giorgio Gentile and Peter Kieseberg and Steen Lehmann and Paolo Paci and Micol Pesce and Andreas Ronge and Michal Tanas and Craig Taverner and Lorenz Zechner},
      title = {INMOTOS Project},
      booktitle = {International Conference on Critical Information Infrastructures Security (CRITIS 12)},
      year = {2012},
      month = {9},
      }
  • Lorenz Zechner and Peter Kieseberg and Edgar R. Weippl, "INMOTOS: Extending the ROPE-methodology," in 14th International Conference on Information Integration and Web-based Applications and Services (iiWAS2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{Zechner2012INMOTOS,
      Author = {Lorenz Zechner and Peter Kieseberg and {Edgar R.} Weippl},
      title = {INMOTOS: Extending the ROPE-methodology},
      booktitle = {14th International Conference on Information Integration and Web-based Applications and Services (iiWAS2012)},
      year = {2012},
      month = {12},
      pdf = {p272zechner.pdf},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl and Lindsay Munroe and Mayank Sinha, "Malicious Pixels Using QR Codes as Attack Vector," in Trustworthy Ubiquitous Computing, 2012, pp. 21-38. BibTeX
    @INPROCEEDINGS{_Malicious_Pixels_Using_QR_Code_2012,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl and Lindsay Munroe and Mayank Sinha},
      title = {Malicious Pixels Using QR Codes as Attack Vector},
      booktitle = {Trustworthy Ubiquitous Computing},
      year = {2012},
      month = {9},
      pages = {21-38},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Markus Huber and Edgar R. Weippl, "Trees Cannot Lie: Using Data Structures for Forensics Purposes," in European Intelligence and Security Informatics Conference (EISIC 2011), 2011. BibTeX | PDF
    @INPROCEEDINGS{Kieseberg_Trees_Cannot_Lie_Using_Data_St_2011,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
      title = {Trees Cannot Lie: Using Data Structures for Forensics Purposes},
      booktitle = {European Intelligence and Security Informatics Conference (EISIC 2011)},
      year = {2011},
      month = {9},
      pdf = {btree_forensics_camera_ready.pdf},
      }
  • Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara, "Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters," in Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2011), 2011. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Using_Generalization_Patterns__2011,
      Author = {Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara},
      title = {Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters},
      booktitle = {Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2011)},
      year = {2011},
      month = {8},
      pdf = {k-anonymity_fingerprinting_cameraReady.pdf},
      }
  • Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara and Edgar R. Weippl, "An Algorithm for k-anonymity-based Fingerprinting," in International Workshop on Digital-forensics and Watermarking (IWDW 2011), 2011. BibTeX | PDF
    @INPROCEEDINGS{_An_Algorithm_for_k_anonymity_b_2011,
      Author = {Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara and {Edgar R.} Weippl},
      title = {An Algorithm for k-anonymity-based Fingerprinting},
      booktitle = {International Workshop on Digital-forensics and Watermarking (IWDW 2011)},
      year = {2011},
      month = {10},
      pdf = {k_anonymity_algorithm_2011.pdf},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Lorcan Morgan and Martin Schmiedecker and Markus Huber and Edgar R. Weippl, "Using the Structure of B plus Trees for Enhancing Logging Mechanisms of Databases," in International Conference on Information Integration and Web-based Applications & Services (iiWAS2011), 2011. BibTeX | PDF
    @INPROCEEDINGS{_Using_the_Structure_of_B_Trees_2011,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Lorcan Morgan and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
      title = {Using the Structure of B plus Trees for Enhancing Logging Mechanisms of Databases},
      booktitle = {International Conference on Information Integration and Web-based Applications & Services (iiWAS2011)},
      year = {2011},
      month = {12},
      pdf = {iiWAS2011_133_Short_Kieseberg.pdf},
      }
  • Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and Edgar R. Weippl, "QR Code Security," in Fourth International Workshop on Trustworthy Ubiquitous Computing (TwUC 2010), 2010. BibTeX | PDF
    @INPROCEEDINGS{twuc_2010,
      Author = {Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and {Edgar R.} Weippl},
      title = {QR Code Security},
      booktitle = {Fourth International Workshop on Trustworthy Ubiquitous Computing (TwUC 2010)},
      year = {2010},
      month = {11},
      pdf = {QR Code Security.pdf},
      }