Peter Kieseberg

is senior researcher and research coordinator at SBA Research.Kieseberg

  • E-Mail
  • Phone: +43 (1) 505 36 88
  • Fax: +43 (1) 505 88 88

Research Interest

His main research interests include various topics in the area of IT-Security: Digital forensics, especially regarding databases, fingerprinting of sensitive data, as well as mobile security. He repeatedly organizes the IWSMA and is currently first vice chair of the joint IEEE-chapter CS/SMC in Austria.

Bio

Peter received a master’s degree in Technical Mathematics in Computer Science from the VTU Wien with specializations in cryptography and numerical mathematics. He worked as a consultant in the telecommunication sector for several years before joining SBA Research. Here his main activities lie in the area of project management and acquisition, as well as industrial and academic research. Since 2014 he is also visiting doctoral researcher at the Holzinger Group HCI-KDD and involved in standardization activities at ETSI (TC-CYBER).

Professional Activities (selection):

Founder and Chair of the International Workshop on Security of Mobile Applications (IWSMA), 2012 – 2017
Conference Co-Organizer of the International Cross Domain (CD) Conference for Machine Learning & Knowledge Extraction (MAKE), 2017
Chair of the International Workshop on Criminal Use of Information Hiding (CUING), 2017
Chair of the International Workshop on Privacy Aware Machine Learning for Health Data Science (PAML) 2016
Chair of the International Workshop on Future Scenarios for Cyber Crime and Cyber Terrorism (FCCT), 2015

PC-Member at the International Conference on Availability, Reliability and Security (ARES), 2011 – 2017
Industry Track PC-Member of the Symposium on Electronic Crime Research (eCrime), 2015 – 2017
PC-Member of the International Conference on Software Security and Assurance (ICSSA), 2016 – 2017
Member of the PC & the Industry/Research Advisory Committee of the International Multi-Conference on Computing in the Global Information Technology (ICCGI), 2016 – 2017
PC-Member of the 22nd Australasian Conference on Information Security and Privacy (ACISP), 2017
PC-Member of the International Conference on Management Science and Engineering (MSE), 2017

First Vice Chair IEEE SMC Austria, 2011 – 2017
Delegate for the European Telecommunications Standards Institute (ETSI) TC CYBER, 2014 – 2017
Vice President Digital Networked Data, 2015 – 2017
Board Member of the APWG.eu, 2016 – 2017

Top Publications:

  • Availability, Reliability, and Security in Information Systems (2016)
    • BOOK--
    • Francesco Buccafurri and Andreas Holzinger and Peter Kieseberg and A Min Tjoa and Edgar R. Weippl
    • Springer
    @BOOK{Buccafurri2016Availability,
       author = {Francesco Buccafurri and Andreas Holzinger and Peter Kieseberg and {A Min} Tjoa and {Edgar R.} Weippl},
       title = {Availability,
       Reliability,
       and Security in Information Systems},
       booktitle = {Lecture Notes in Computer Science},
       year = {2016},
       pdf = {2016 - FBuccafurri - Availability,
       Reliability,
       and Security in Information Systems - Editorial Notes.pdf},
       publisher = {Springer},
    }
  • Trust me, I am a Root CA! Analyzing SSL Root CAs in modern Browsers and Operating Systems (2015)
    • INPROCEEDINGS--
    • Tariq Fadai and Sebastian Schrittwieser and Peter Kieseberg and Martin Schmiedecker
    • International Conference on Availability, Reliability and Security (ARES)
    @INPROCEEDINGS{Fadai2015Trust,
       author = {Tariq Fadai and Sebastian Schrittwieser and Peter Kieseberg and Martin Schmiedecker},
       title = {Trust me,
       I am a Root CA! Analyzing SSL Root CAs in modern Browsers and Operating Systems},
       booktitle = {International Conference on Availability,
       Reliability and Security (ARES)},
       year = {2015},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/SSL.pdf},
    }
  • E-voting authentication with QR-codes (2014)
    • INPROCEEDINGS--
    • Stefanie Falkner and Peter Kieseberg and Dimitris Simos and Christina Traxler and Edgar R. Weippl
    • 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust
    @INPROCEEDINGS{Falkner2014Evoting,
       author = {Stefanie Falkner and Peter Kieseberg and Dimitris Simos and Christina Traxler and {Edgar R.} Weippl},
       title = {E-voting authentication with QR-codes},
       booktitle = {2nd International Conference on Human Aspects of Information Security,
       Privacy,
       and Trust},
       year = {2014},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/evoting_final_HCI_2014.pdf},
    }
  • Humans Forget, Machines Remember: Artificial Intelligence and the Right to Be Forgotten (2017)
    • ARTICLE-true
    • Eduard Fosch Villaronga and Peter Kieseberg and Tiffany Li
    • Computer Security and Law Review
    @ARTICLE{FoschVillaronga2017Humans,
       author = {Eduard {Fosch Villaronga} and Peter Kieseberg and Tiffany Li},
       authorhotlist = {true},
       title = {Humans Forget,
       Machines Remember: Artificial Intelligence and the Right to Be Forgotten},
       journal = {Computer Security and Law Review},
       year = {2017},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/201708 - PKieseberg - SSRN-id3018186.pdf},
    }
  • InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles (2014)
    • INPROCEEDINGS--
    • Peter Fruehwirt and Peter Kieseberg and Christoph Hochreiner and Sebastian Schrittwieser and Edgar R. Weippl
    • GI Sicherheit 2014
    @INPROCEEDINGS{Fruehwirt2014InnoDB,
       author = {Peter Fruehwirt and Peter Kieseberg and Christoph Hochreiner and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles },
       booktitle = {GI Sicherheit 2014 },
       year = {2014},
       month = {3},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/FRUEHWIRT-InnoDB Datenbank Forensik-Rekonstruktion.pdf},
    }
  • Testen der Integrität von Datenbanken mit Hilfe von Transaction-Logs (2014)
    • INPROCEEDINGS--
    • Peter Fruehwirt and Peter Kieseberg and Edgar R. Weippl
    • ASQT
    @INPROCEEDINGS{Fruehwirt2014Testen,
       author = {Peter Fruehwirt and Peter Kieseberg and {Edgar R.} Weippl},
       title = {Testen der Integrität von Datenbanken mit Hilfe von Transaction-Logs},
       booktitle = {ASQT},
       year = {2014},
       month = {9},
    }
  • Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations (2014)
    • ARTICLE--
    • Peter Fruehwirt and Peter Kieseberg and Katharina Krombholz and Edgar R. Weippl
    • Digital Investigation
    @ARTICLE{Fruehwirt2014Towards,
       author = {Peter Fruehwirt and Peter Kieseberg and Katharina Krombholz and {Edgar R.} Weippl},
       title = {Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations},
       journal = {Digital Investigation},
       year = {2014},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/towards a forensic aware_paper.pdf},
       volume = {11},
       pages = {336-348},
    }
  • Genie in a Model? Why Model Driven Security will not secure your Web Application (2014)
    • ARTICLE--
    • Christoph Hochreiner and Peter Fruehwirt and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl
    • Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)
    @ARTICLE{Hochreiner2014Genie,
       author = {Christoph Hochreiner and Peter Fruehwirt and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Genie in a Model? Why Model Driven Security will not secure your Web Application},
       journal = {Journal of Wireless Mobile Networks,
       Ubiquitous Computing,
       and Dependable Applications (JoWUA)},
       year = {2014},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/jowua-v5n3-4.pdf},
       volume = {5},
       pages = {44-62},
    }
  • Using Model Driven Security Approaches in Web Application Development (2014)
    • INPROCEEDINGStrue-
    • Christoph Hochreiner and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl
    • AsiaARES (The 2014 Asian Conference on Availability, Reliability and Security)
    @INPROCEEDINGS{Hochreiner2014Using,
       author = {Christoph Hochreiner and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Using Model Driven Security Approaches in Web Application Development },
       booktitle = {AsiaARES (The 2014 Asian Conference on Availability,
       Reliability and Security)},
       year = {2014},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/UsingModelDrivenSecurityApproachesinWebApplicationDevelopment.pdf},
    }
  • Machine Learning and Knowledge Extraction (2017)
    • INBOOK--
    • Andreas Holzinger and Peter Kieseberg and A Min Tjoa and Edgar R. Weippl
    • -
    @INBOOK{Holzinger2017Machine,
       author = {Andreas Holzinger and Peter Kieseberg and {A Min} Tjoa and {Edgar R.} Weippl},
       title = {Machine Learning and Knowledge Extraction},
       booktitle = {Lecture Notes in Computer Science},
       year = {2017},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/2017 - AHolzinger - Machine Learning and Knowledge Extraction - Editorial Notes.pdf},
    }
  • An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata (2014)
    • ARTICLEtruetrue
    • Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Isao Echizen and Edgar R. Weippl
    • Electronic Markets - The International Journal on Networked Business
    @ARTICLE{Kieseberg2014algorithm,
       author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Isao Echizen and {Edgar R.} Weippl},
       authorhotlist = {true},
       sbahotlist = {true},
       title = {An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata},
       journal = {Electronic Markets - The International Journal on Networked Business},
       year = {2014},
       pdf = {http://link.springer.com/article/10.1007/s12525-014-0154-x},
    }
  • Protecting Anonymity in Data-Driven Biomedical Science (2014)
    • INBOOK--
    • Peter Kieseberg and Heidelinde Hobel and Sebastian Schrittwieser and Edgar R. Weippl and Andreas Holzinger
    • -
    @INBOOK{Kieseberg2014Protecting,
       author = {Peter Kieseberg and Heidelinde Hobel and Sebastian Schrittwieser and {Edgar R.} Weippl and Andreas Holzinger},
       title = {Protecting Anonymity in Data-Driven Biomedical Science},
       booktitle = {Interactive Knowledge Discovery and Data Mining in Biomedical Informatics - State-of-the-Art and Future Challenges},
       year = {2014},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/1v0_KIESEBERG_bookchapter.pdf},
       pages = {301--316},
    }
  • CyberROAD: Developing a Roadmap for Research in Cybercrime and Cyberterrorism (2015)
    • ARTICLE--
    • Peter Kieseberg and Olga E. Segou and Fabio Roli
    • ERCIM News
    @ARTICLE{Kieseberg2015CyberROAD,
       author = {Peter Kieseberg and {Olga E.} Segou and Fabio Roli},
       title = {CyberROAD: Developing a Roadmap for Research in Cybercrime and Cyberterrorism},
       journal = {ERCIM News},
       year = {2015},
       month = {7},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/CyberRoad-Excerpt.pdf},
    }
  • Security tests for mobile applications - Why using TLS SSL is not enough (2015)
    • INPROCEEDINGS--
    • Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser and Edgar R. Weippl
    • 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW)
    @INPROCEEDINGS{Kieseberg2015Security,
       author = {Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Security tests for mobile applications - Why using TLS SSL is not enough},
       booktitle = {2015 IEEE Eighth International Conference on Software Testing,
       Verification and Validation Workshops (ICSTW)},
       year = {2015},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ASQT2015_cameraready_wo1stpage.pdf},
    }
  • A Structured Approach to Defence Simulation Training (2015)
    • ARTICLE--
    • Peter Kieseberg
    • ERCIM News
    @ARTICLE{Kieseberg2015Structured,
       author = {Peter Kieseberg},
       title = {A Structured Approach to Defence Simulation Training},
       journal = {ERCIM News},
       year = {2015},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Scudo.pdf},
    }
  • Witnesses for the Doctor in the Loop (2015)
    • INPROCEEDINGS--
    • Peter Kieseberg and Johannes Schantl and Peter Fruehwirt and Edgar R. Weippl and Andreas Holzinger
    • 2015 International Conference on Brain Informatics & Health (BIH)
    @INPROCEEDINGS{Kieseberg2015Witnesses,
       author = {Peter Kieseberg and Johannes Schantl and Peter Fruehwirt and {Edgar R.} Weippl and Andreas Holzinger},
       title = {Witnesses for the Doctor in the Loop},
       booktitle = {2015 International Conference on Brain Informatics & Health (BIH)},
       year = {2015},
       month = {9},
       pdf = {https://online.tugraz.at/tug_online/voe_main2.getVollText?pDocumentNr=1151817&pCurrPk=85962},
    }
  • Detection of Data Leaks in Collaborative Data Driven Research (2016)
    • ARTICLE--
    • Peter Kieseberg and Edgar R. Weippl and Sebastian Schrittwieser
    • ERCIM News
    @ARTICLE{Kieseberg2016Detection,
       author = {Peter Kieseberg and {Edgar R.} Weippl and Sebastian Schrittwieser},
       title = {Detection of Data Leaks in Collaborative Data Driven Research},
       journal = {ERCIM News},
       year = {2016},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Detection_EN105.pdf},
    }
  • Trust for the “Doctor in the Loop" (2016)
    • ARTICLE--
    • Peter Kieseberg and Edgar R. Weippl and Andreas Holzinger
    • ERCIM News
    @ARTICLE{Kieseberg2016Trust,
       author = {Peter Kieseberg and {Edgar R.} Weippl and Andreas Holzinger},
       title = {Trust for the “Doctor in the Loop"},
       journal = {ERCIM News},
       year = {2016},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/trustfordoctorintheloop.pdf},
    }
  • Forensics using Internal Database Structures (2017)
    • ARTICLE--
    • Peter Kieseberg and Edgar R. Weippl and Sebastian Schrittwieser
    • ERCIM News
    @ARTICLE{Kieseberg2017Forensics,
       author = {Peter Kieseberg and {Edgar R.} Weippl and Sebastian Schrittwieser},
       title = {Forensics using Internal Database Structures},
       journal = {ERCIM News},
       year = {2017},
       month = {1},
       pdf = {http://ercim-news.ercim.eu/images/stories/EN108/EN108-web.pdf},
       volume = {108},
    }
  • Real-time Forensics through Endpoint Visibility (2017)
    • INPROCEEDINGS--
    • Peter Kieseberg and Sebastian Neuner and Sebastian Schrittwieser and Martin Schmiedecker and Edgar R. Weippl
    • International Conference on Digital Forensics & Cyber Crime (ICDF2C)
    @INPROCEEDINGS{Kieseberg2017Realtime,
       author = {Peter Kieseberg and Sebastian Neuner and Sebastian Schrittwieser and Martin Schmiedecker and {Edgar R.} Weippl},
       title = {Real-time Forensics through Endpoint Visibility},
       booktitle = {International Conference on Digital Forensics & Cyber Crime (ICDF2C)},
       year = {2017},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/fleetForensics.pdf},
       link_slides = {https://www.slideshare.net/SBAResearch/realtime-forensics-through-endpoint-visibility-80707652},
    }
  • Security Testing for Mobile Applications (2017)
    • ARTICLE--
    • Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser
    • ERCIM News
    @ARTICLE{Kieseberg2017Security,
       author = {Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser},
       title = {Security Testing for Mobile Applications},
       journal = {ERCIM News},
       year = {2017},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/201704 - KIESEBERG - Pages from EN109-web.pdf},
       volume = {109},
       pages = {52--53},
    }
  • Das Testen von Algorithmen in sensibler datengetriebener Forschung (2017)
    • ARTICLE--
    • Peter Kieseberg and Sebastian Schrittwieser and Bernd Malle and Edgar R. Weippl and Andreas Holzinger
    • Rundbrief des Fachausschusses Management der Anwendungsentwicklung und -wartung (WI-MAW)
    @ARTICLE{Kieseberg2017Testen,
       author = {Peter Kieseberg and Sebastian Schrittwieser and Bernd Malle and {Edgar R.} Weippl and Andreas Holzinger},
       title = {Das Testen von Algorithmen in sensibler datengetriebener Forschung},
       journal = {Rundbrief des Fachausschusses Management der Anwendungsentwicklung und -wartung (WI-MAW)},
       year = {2017},
       month = {4},
       pdf = {http://fa-wi-maw.gi.de/fileadmin/gliederungen/fg-maw/Rundbriefe/GI_Rundbrief_41_JG23_Online.pdf},
    }
  • Trend Analysis of Underground Marketplaces (2017)
    • ARTICLE--
    • Klaus Kieseberg and Peter Kieseberg and Edgar R. Weippl
    • ERCIM News
    @ARTICLE{Kieseberg2017Trend,
       author = {Klaus Kieseberg and Peter Kieseberg and {Edgar R.} Weippl},
       title = {Trend Analysis of Underground Marketplaces},
       journal = {ERCIM News},
       year = {2017},
       month = {10},
       pdf = {https://ercim-news.ercim.eu/en111/r-i/trend-analysis-of-underground-marketplaces},
       volume = {111},
    }
  • A tamper-proof audit and control system for the doctor in the loop (2016)
    • ARTICLE--
    • Peter Kieseberg and Bernd Malle and Peter Fruehwirt and Edgar R. Weippl and Andreas Holzinger
    • Brain Informatics
    @ARTICLE{Kiesebergtamperproof,
       author = {Peter Kieseberg and Bernd Malle and Peter Fruehwirt and {Edgar R.} Weippl and Andreas Holzinger},
       title = {A tamper-proof audit and control system for the doctor in the loop},
       journal = {Brain Informatics},
       year = {2016},
       month = {3},
       pdf = {http://link.springer.com/article/10.1007/s40708-016-0046-2},
       pages = {1--11},
    }
  • Trees Cannot Lie: Using Data Structures for Forensics Purposes (2011)
    • INPROCEEDINGS--
    • Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Markus Huber and Edgar R. Weippl
    • European Intelligence and Security Informatics Conference (EISIC 2011)
    @INPROCEEDINGS{Kieseberg_Trees_Cannot_Lie_Using_Data_St_2011,
       author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
       title = {Trees Cannot Lie: Using Data Structures for Forensics Purposes},
       booktitle = {European Intelligence and Security Informatics Conference (EISIC 2011)},
       year = {2011},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/btree_forensics_camera_ready.pdf},
    }
  • QR Code Security: A Survey of Attacks and Challenges for Usable Security (2014)
    • INBOOK--
    • Katharina Krombholz and Peter Fruehwirt and Peter Kieseberg and Ioannis Kapsalis and Markus Huber and Edgar R. Weippl
    • Springer
    @INBOOK{Krombholz2014Code,
       author = {Katharina Krombholz and Peter Fruehwirt and Peter Kieseberg and Ioannis Kapsalis and Markus Huber and {Edgar R.} Weippl},
       title = {QR Code Security: A Survey of Attacks and Challenges for Usable Security},
       booktitle = {Human Aspects of Information Security,
       Privacy,
       and Trust},
       year = {2014},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/llncs.pdf},
       pages = {79--90},
       publisher = {Springer},
       link_slides = {http://de.slideshare.net/SBAResearch/qr-code-security-a-survey-of-attacks-and-challenges-for-usable-security},
    }
  • Privacy Aware Machine Learning and the “Right to be forgotten (2016)
    • ARTICLE--
    • Bernd Malle and Peter Kieseberg and Sebastian Schrittwieser and Andreas Holzinger
    • ERCIM News
    @ARTICLE{Malle2016Privacy,
       author = {Bernd Malle and Peter Kieseberg and Sebastian Schrittwieser and Andreas Holzinger},
       title = {Privacy Aware Machine Learning and the “Right to be forgotten},
       journal = {ERCIM News},
       year = {2016},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ERCIM_article_printed.pdf},
    }
  • The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Bases (2016)
    • INPROCEEDINGS-true
    • Bernd Malle and Peter Kieseberg and Edgar R. Weippl and Andreas Holzinger
    • International Conference on Availability, Reliability, and Security
    @INPROCEEDINGS{Malle2016Right,
       author = {Bernd Malle and Peter Kieseberg and {Edgar R.} Weippl and Andreas Holzinger},
       authorhotlist = {true},
       title = {The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Bases},
       booktitle = {International Conference on Availability,
       Reliability,
       and Security},
       year = {2016},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/PAML.pdf},
    }
  • DO NOT DISTURB? Classifier Behavior on Perturbed Datasets (2017)
    • INPROCEEDINGS--
    • Bernd Malle and Peter Kieseberg and Andreas Holzinger
    • International Cross-Domain Conference for Machine Learning and Knowledge Extraction
    @INPROCEEDINGS{Malle2017DISTURB,
       author = {Bernd Malle and Peter Kieseberg and Andreas Holzinger},
       title = {DO NOT DISTURB? Classifier Behavior on Perturbed Datasets},
       booktitle = {International Cross-Domain Conference for Machine Learning and Knowledge Extraction},
       year = {2017},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/201708 - BMalle - DO NOT DISTURB.pdf},
    }
  • The More the Merrier-Federated Learning from Local Sphere Recommendations (2017)
    • INPROCEEDINGS--
    • Bernd Malle and Nicola Giuliani and Peter Kieseberg and Andreas Holzinger
    • International Cross-Domain Conference for Machine Learning and Knowledge Extraction
    @INPROCEEDINGS{Malle2017More,
       author = {Bernd Malle and Nicola Giuliani and Peter Kieseberg and Andreas Holzinger},
       title = {The More the Merrier-Federated Learning from Local Sphere Recommendations},
       booktitle = {International Cross-Domain Conference for Machine Learning and Knowledge Extraction},
       year = {2017},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/201708 - BMalle - The More the Merrier.pdf},
    }
  • What is new with whatsapp & co.? Revisiting the security of smartphone messaging applications (2014)
    • INPROCEEDINGS--
    • Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Edgar R. Weippl
    • iiWas 2014
    @INPROCEEDINGS{Mueller2014Whats,
       author = {Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and {Edgar R.} Weippl},
       title = {What is new with whatsapp & co.? Revisiting the security of smartphone messaging applications},
       booktitle = {iiWas 2014},
       year = {2014},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/WhatsApp-iiwas-paper_cameraready.pdf},
    }
  • Security and privacy of smartphone messaging applications (2015)
    • ARTICLE--
    • Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Edgar R. Weippl
    • International Journal of Pervasive Computing and Communications
    @ARTICLE{Mueller2015Security,
       author = {Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and {Edgar R.} Weippl},
       title = {Security and privacy of smartphone messaging applications},
       journal = {International Journal of Pervasive Computing and Communications},
       year = {2015},
       month = {6},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Draft.pdf},
       volume = {11},
    }
  • Quantifying Windows File Slack in Size and Stability (2013)
    • INPROCEEDINGS--
    • Martin Schmiedecker and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and Edgar R. Weippl
    • Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics
    @INPROCEEDINGS{Mulazzani_Slackspace_Quantifiation_2013,
       author = {Martin Schmiedecker and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Quantifying Windows File Slack in Size and Stability},
       booktitle = {Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics},
       year = {2013},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ifipSlack_2013_preprint.pdf},
       link_data = {http://128.130.204.91/slackspaceDataset.7z},
       link_slides = {http://www.slideshare.net/SBAResearch/quantifying-windows-file-slack-in-size-and-stability},
    }
  • Privacy and Data Protection in Smartphone Messengers (2015)
    • INPROCEEDINGS--
    • Christoph Rottermanner and Peter Kieseberg and Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser
    • Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services (iiWAS2015)
    @INPROCEEDINGS{Rottermanner2015Privacy,
       author = {Christoph Rottermanner and Peter Kieseberg and Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser},
       title = {Privacy and Data Protection in Smartphone Messengers},
       booktitle = {Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services (iiWAS2015)},
       year = {2015},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/paper_drafthp.pdf},
    }
  • Covert Computation - Hiding Code in Code for Obfuscation Purposes (2013)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl
    • Proceedings of the 8th International Symposium on ACM Symposium on Information , Computer and Communications Security (ASIACCS 2013)
    @INPROCEEDINGS{schrittwieser-covertcomputation-2013,
       author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
       title = {Covert Computation - Hiding Code in Code for Obfuscation Purposes},
       booktitle = {Proceedings of the 8th International Symposium on ACM Symposium on Information ,
       Computer and Communications Security (ASIACCS 2013)},
       year = {2013},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/p529-schrittwieser.pdf},
    }
  • AES-SEC: Improving software obfuscation through hardware-assistance (2014)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Stefan Katzenbeisser and Georg Merzdovnik and Peter Kieseberg and Edgar R. Weippl
    • ARES 2014
    @INPROCEEDINGS{Schrittwieser2014AESSEC,
       author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Georg Merzdovnik and Peter Kieseberg and {Edgar R.} Weippl},
       title = {AES-SEC: Improving software obfuscation through hardware-assistance },
       booktitle = {ARES 2014},
       year = {2014},
       month = {9},
       pdf = {http://ieeexplore.ieee.org/document/6980281/},
    }
  • Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation (2014)
    • ARTICLEtruetrue
    • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl
    • Computers & Security
    @ARTICLE{Schrittwieser2014Covert,
       author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
       authorhotlist = {true},
       sbahotlist = {true},
       title = {Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation},
       journal = {Computers & Security},
       year = {2014},
       month = {5},
       pdf = {http://www.sciencedirect.com/science/article/pii/S0167404814000030},
       publisher = {Elsevier Advanced Technology},
    }
  • Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications (2012)
    • INPROCEEDINGS-true
    • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Edgar R. Weippl
    • Network and Distributed System Security Symposium (NDSS 2012)
    @INPROCEEDINGS{Schrittwieser_Guess_Who_s_Texting_You_Evalua_2012,
       author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
       authorhotlist = {true},
       title = {Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications},
       booktitle = {Network and Distributed System Security Symposium (NDSS 2012)},
       year = {2012},
       month = {2},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ndss2012_final.pdf},
    }
  • Secure Software in der Cloud (2012)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Gilbert Wondracek and Sylvi Rennert and Edgar R. Weippl
    • Tagungsband Cloud und Klein: IT im Spannungsfeld zwischen Servercluster und Sensornetz
    @INPROCEEDINGS{Schrittwieser_Secure_Software_in_der_Cloud_2012,
       author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Gilbert Wondracek and Sylvi Rennert and {Edgar R.} Weippl},
       title = {Secure Software in der Cloud},
       booktitle = {Tagungsband Cloud und Klein: IT im Spannungsfeld zwischen Servercluster und Sensornetz},
       year = {2012},
       month = {4},
    }
  • Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters (2011)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara
    • Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2011)
    @INPROCEEDINGS{Schrittwieser_Using_Generalization_Patterns__2011,
       author = {Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara},
       title = {Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters},
       booktitle = {Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2011)},
       year = {2011},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/k-anonymity_fingerprinting_cameraReady.pdf},
    }
  • QR Code Security (2010)
    • INPROCEEDINGS-true
    • Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and Edgar R. Weippl
    • Fourth International Workshop on Trustworthy Ubiquitous Computing (TwUC 2010)
    @INPROCEEDINGS{twuc_2010,
       author = {Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and {Edgar R.} Weippl},
       authorhotlist = {true},
       title = {QR Code Security},
       booktitle = {Fourth International Workshop on Trustworthy Ubiquitous Computing (TwUC 2010)},
       year = {2010},
       month = {11},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/QR_Code_Security.pdf},
    }
  • On Reconnaissance with IPv6: A Pattern-Based Scanning Approach (2015)
    • INPROCEEDINGS--
    • Johanna Ullrich and Peter Kieseberg and Katharina Krombholz and Edgar R. Weippl
    • International Conference on Availability, Reliability and Security (ARES)
    @INPROCEEDINGS{Ullrich2015Reconnaissance,
       author = {Johanna Ullrich and Peter Kieseberg and Katharina Krombholz and {Edgar R.} Weippl},
       title = {On Reconnaissance with IPv6: A Pattern-Based Scanning Approach},
       booktitle = {International Conference on Availability,
       Reliability and Security (ARES)},
       year = {2015},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/PID3762727.pdf},
    }
  • INMOTOS: Extending the ROPE-methodology (2012)
    • INPROCEEDINGS--
    • Lorenz Zechner and Peter Kieseberg and Edgar R. Weippl
    • 14th International Conference on Information Integration and Web-based Applications and Services (iiWAS2012)
    @INPROCEEDINGS{Zechner2012INMOTOS,
       author = {Lorenz Zechner and Peter Kieseberg and {Edgar R.} Weippl},
       title = {INMOTOS: Extending the ROPE-methodology},
       booktitle = {14th International Conference on Information Integration and Web-based Applications and Services (iiWAS2012)},
       year = {2012},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/p272zechner.pdf},
    }
  • An Algorithm for k-anonymity-based Fingerprinting (2011)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara and Edgar R. Weippl
    • International Workshop on Digital-forensics and Watermarking (IWDW 2011)
    @INPROCEEDINGS{_An_Algorithm_for_k_anonymity_b_2011,
       author = {Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara and {Edgar R.} Weippl},
       title = {An Algorithm for k-anonymity-based Fingerprinting},
       booktitle = {International Workshop on Digital-forensics and Watermarking (IWDW 2011)},
       year = {2011},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/k_anonymity_algorithm_2011.pdf},
    }
  • Digital Forensics for Enterprise Rights Management (2012)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Peter Kieseberg and Edgar R. Weippl
    • International Conference on Information Integration and Web-based Applications & Services (iiWAS2012)
    @INPROCEEDINGS{_Digital_Forensics_for_Enterpri_2012,
       author = {Sebastian Schrittwieser and Peter Kieseberg and {Edgar R.} Weippl},
       title = {Digital Forensics for Enterprise Rights Management},
       booktitle = {International Conference on Information Integration and Web-based Applications & Services (iiWAS2012)},
       year = {2012},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/16_schrittwieser.pdf},
    }
  • INMOTOS Project (2012)
    • INPROCEEDINGS--
    • Manuele Barbieri and Ivan Cibrario Bertolotti and Manuel Cheminod and Ioannis Christou and Luca Durante and Sofoklis Efremidis and Giorgio Gentile and Peter Kieseberg and Steen Lehmann and Paolo Paci and Micol Pesce and Andreas Ronge and Michal Tanas and Craig Taverner and Lorenz Zechner
    • International Conference on Critical Information Infrastructures Security (CRITIS 12)
    @INPROCEEDINGS{_INMOTOS_Project_2012,
       author = {Manuele Barbieri and Ivan Cibrario Bertolotti and Manuel Cheminod and Ioannis Christou and Luca Durante and Sofoklis Efremidis and Giorgio Gentile and Peter Kieseberg and Steen Lehmann and Paolo Paci and Micol Pesce and Andreas Ronge and Michal Tanas and Craig Taverner and Lorenz Zechner},
       title = {INMOTOS Project},
       booktitle = {International Conference on Critical Information Infrastructures Security (CRITIS 12)},
       year = {2012},
       month = {9},
    }
  • InnoDB Database Forensics: Enhanced Reconstruction of Data Manipulation Queries from Redo Logs (2013)
    • ARTICLE--
    • Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl
    • Information Security Technical Report (ISTR), Special Issue: ARES
    @ARTICLE{_InnoDB_Database_Forensics_Enha_2013,
       author = {Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
       title = {InnoDB Database Forensics: Enhanced Reconstruction of Data Manipulation Queries from Redo Logs},
       journal = {Information Security Technical Report (ISTR),
       Special Issue: ARES},
       year = {2013},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ARES2012_Journal.pdf},
    }
  • InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs (2012)
    • INPROCEEDINGS--
    • Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl
    • The Fifth International Workshop on Digital Forensics (WSDF)
    @INPROCEEDINGS{_InnoDB_Database_Forensics_Reco_2012,
       author = {Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
       title = {InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs},
       booktitle = {The Fifth International Workshop on Digital Forensics (WSDF)},
       year = {2012},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/WSDF2012_InnoDB.pdf},
    }
  • Malicious Pixels Using QR Codes as Attack Vector (2012)
    • INPROCEEDINGS--
    • Peter Kieseberg and Sebastian Schrittwieser and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl and Lindsay Munroe and Mayank Sinha
    • Trustworthy Ubiquitous Computing
    @INPROCEEDINGS{_Malicious_Pixels_Using_QR_Code_2012,
       author = {Peter Kieseberg and Sebastian Schrittwieser and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl and Lindsay Munroe and Mayank Sinha},
       title = {Malicious Pixels Using QR Codes as Attack Vector},
       booktitle = {Trustworthy Ubiquitous Computing},
       year = {2012},
       month = {9},
       pages = {21-38},
    }
  • Privacy, Anonymity, Pseudonymity and Data Disclosure in Data-Driven Science (2013)
    • INBOOK--
    • Heidelinde Hobel and Sebastian Schrittwieser and Peter Kieseberg and Edgar R. Weippl
    • -
    @INBOOK{_Privacy_Anonymity_Pseudonymity_2013,
       author = {Heidelinde Hobel and Sebastian Schrittwieser and Peter Kieseberg and {Edgar R.} Weippl},
       title = {Privacy,
       Anonymity,
       Pseudonymity and Data Disclosure in Data-Driven Science},
       booktitle = {Encyclopedia of Business Analytics and Optimization},
       year = {2013},
    }
  • Using the Structure of B plus Trees for Enhancing Logging Mechanisms of Databases (2011)
    • INPROCEEDINGS--
    • Peter Kieseberg and Sebastian Schrittwieser and Lorcan Morgan and Martin Schmiedecker and Markus Huber and Edgar R. Weippl
    • International Conference on Information Integration and Web-based Applications & Services (iiWAS2011)
    @INPROCEEDINGS{_Using_the_Structure_of_B_Trees_2011,
       author = {Peter Kieseberg and Sebastian Schrittwieser and Lorcan Morgan and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
       title = {Using the Structure of B plus Trees for Enhancing Logging Mechanisms of Databases},
       booktitle = {International Conference on Information Integration and Web-based Applications & Services (iiWAS2011)},
       year = {2011},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/iiWAS2011_133_Short_Kieseberg.pdf},
    }

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close