default search action
Sebastian Schrittwieser
Publications
- 2021
- [j16]Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Secure Internal Data Markets. Future Internet 13(8): 208 (2021) - [c52]Patrick Kochberger, Sebastian Schrittwieser, Stefan Schweighofer, Peter Kieseberg, Edgar R. Weippl:
SoK: Automatic Deobfuscation of Virtualization-protected Applications. ARES 2021: 6:1-6:15 - 2020
- [c51]Daniel Judt, Patrick Kochberger, Peter Kieseberg, Sebastian Schrittwieser:
Compiling and Analyzing Open Source Malware for Research Purposes. ICSSA 2020: 32-37 - 2019
- [c49]Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Fingerprinting using database steganography. ICSSA 2019: 16-20 - [c48]Peter Kieseberg, Sebastian Schrittwieser, Peter Frühwirt, Edgar R. Weippl:
Analysis of the Internals of MySQL/InnoDB B+ Tree Index Navigation from a Forensic Perspective. ICSSA 2019: 46-51 - 2018
- [c45]Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Structural Limitations of B+-Tree forensics. CECC 2018: 9:1-9:4 - 2017
- [c42]Peter Kieseberg, Sebastian Neuner, Sebastian Schrittwieser, Martin Schmiedecker, Edgar R. Weippl:
Real-Time Forensics Through Endpoint Visibility. ICDF2C 2017: 18-32 - [i4]Peter Kieseberg, Edgar R. Weippl, Sebastian Schrittwieser:
Forensics using Internal Database Structures. ERCIM News 2017(108) (2017) - [i3]Peter Kieseberg, Peter Frühwirt, Sebastian Schrittwieser:
Security Testing for Mobile Applications. ERCIM News 2017(109) (2017) - 2016
- [i2]Peter Kieseberg, Edgar R. Weippl, Sebastian Schrittwieser:
Detection of Data Leaks in Collaborative Data Driven Research. ERCIM News 2016(105) (2016) - [i1]Bernd Malle, Peter Kieseberg, Sebastian Schrittwieser, Andreas Holzinger:
Privacy Aware Machine Learning and the "Right to be Forgotten". ERCIM News 2016(107) (2016) - 2015
- [j6]Robin Mueller, Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Edgar R. Weippl:
Security and privacy of smartphone messaging applications. Int. J. Pervasive Comput. Commun. 11(2): 132-150 (2015) - [c28]Tariq Fadai, Sebastian Schrittwieser, Peter Kieseberg, Martin Mulazzani:
Trust me, I'm a Root CA! Analyzing SSL Root CAs in Modern Browsers and Operating Systems. ARES 2015: 174-179 - [c26]Peter Kieseberg, Peter Frühwirt, Sebastian Schrittwieser, Edgar R. Weippl:
Security tests for mobile applications - Why using TLS/SSL is not enough. ICST Workshops 2015: 1-2 - [c24]Christoph Rottermanner, Peter Kieseberg, Markus Huber, Martin Schmiedecker, Sebastian Schrittwieser:
Privacy and data protection in smartphone messengers. iiWAS 2015: 83:1-83:10 - 2014
- [j5]Sebastian Schrittwieser, Stefan Katzenbeisser, Peter Kieseberg, Markus Huber, Manuel Leithner, Martin Mulazzani, Edgar R. Weippl:
Covert Computation - Hiding code in code through compile-time obfuscation. Comput. Secur. 42: 13-26 (2014) - [j4]Peter Kieseberg, Sebastian Schrittwieser, Martin Mulazzani, Isao Echizen, Edgar R. Weippl:
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata. Electron. Mark. 24(2): 113-124 (2014) - [j3]Christoph Hochreiner, Peter Frühwirt, Zhendong Ma, Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Genie in a Model? Why Model Driven Security will not secure your Web Application. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(3): 44-62 (2014) - [c23]Sebastian Schrittwieser, Stefan Katzenbeisser, Georg Merzdovnik, Peter Kieseberg, Edgar R. Weippl:
AES-SEC: Improving Software Obfuscation through Hardware-Assistance. ARES 2014: 184-191 - [c22]Christoph Hochreiner, Zhendong Ma, Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Using Model Driven Security Approaches in Web Application Development. ICT-EurAsia 2014: 419-431 - [c20]Robin Mueller, Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Edgar R. Weippl:
What's new with WhatsApp & Co.? Revisiting the Security of Smartphone Messaging Applications. iiWAS 2014: 142-151 - [c18]Peter Frühwirt, Peter Kieseberg, Christoph Hochreiner, Sebastian Schrittwieser, Edgar R. Weippl:
InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles. Sicherheit 2014: 363-374 - [p1]Peter Kieseberg, Heidelinde Hobel, Sebastian Schrittwieser, Edgar R. Weippl, Andreas Holzinger:
Protecting Anonymity in Data-Driven Biomedical Science. Interactive Knowledge Discovery and Data Mining in Biomedical Informatics 2014: 301-316 - 2013
- [j2]Peter Kieseberg, Sebastian Schrittwieser, Lorcan Morgan, Martin Mulazzani, Markus Huber, Edgar R. Weippl:
Using the structure of B+-trees for enhancing logging mechanisms of databases. Int. J. Web Inf. Syst. 9(1): 53-68 (2013) - [j1]Peter Frühwirt, Peter Kieseberg, Sebastian Schrittwieser, Markus Huber, Edgar R. Weippl:
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs. Inf. Secur. Tech. Rep. 17(4): 227-238 (2013) - [c16]Sebastian Schrittwieser, Stefan Katzenbeisser, Peter Kieseberg, Markus Huber, Manuel Leithner, Martin Mulazzani, Edgar R. Weippl:
Covert computation: hiding code in code for obfuscation purposes. AsiaCCS 2013: 529-534 - [c14]Martin Mulazzani, Sebastian Neuner, Peter Kieseberg, Markus Huber, Sebastian Schrittwieser, Edgar R. Weippl:
Quantifying Windows File Slack Size and Stability. IFIP Int. Conf. Digital Forensics 2013: 183-193 - 2012
- [c13]Peter Frühwirt, Peter Kieseberg, Sebastian Schrittwieser, Markus Huber, Edgar R. Weippl:
InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs. ARES 2012: 625-633 - [c12]Sebastian Schrittwieser, Peter Kieseberg, Edgar R. Weippl:
Digital forensics for enterprise rights management systems. iiWAS 2012: 111-120 - [c11]Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar R. Weippl:
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications. NDSS 2012 - 2011
- [c10]Sebastian Schrittwieser, Peter Kieseberg, Isao Echizen, Sven Wohlgemuth, Noboru Sonehara:
Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters. ARES 2011: 645-649 - [c8]Peter Kieseberg, Sebastian Schrittwieser, Martin Mulazzani, Markus Huber, Edgar R. Weippl:
Trees Cannot Lie: Using Data Structures for Forensics Purposes. EISIC 2011: 282-285 - [c6]Peter Kieseberg, Sebastian Schrittwieser, Lorcan Morgan, Martin Mulazzani, Markus Huber, Edgar R. Weippl:
Using the structure of B+-trees for enhancing logging mechanisms of databases. iiWAS 2011: 301-304 - [c4]Sebastian Schrittwieser, Peter Kieseberg, Isao Echizen, Sven Wohlgemuth, Noboru Sonehara, Edgar R. Weippl:
An Algorithm for k-Anonymity-Based Fingerprinting. IWDW 2011: 439-452 - 2010
- [c1]Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Lindsay Munroe, Sebastian Schrittwieser, Mayank Sinha, Edgar R. Weippl:
QR code security. MoMM 2010: 430-435
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 00:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint