Sebastian Schrittwieser

According to our database1, Sebastian Schrittwieser authored at least 57 papers between 2010 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Large-Scale Analysis of Pop-Up Scam on Typosquatting URLs.
CoRR, 2019

AIDIS: Detecting and classifying anomalous behavior in ubiquitous kernel processes.
Computers & Security, 2019

2018
SEQUIN: a grammar inference framework for analyzing malicious system behavior.
J. Computer Virology and Hacking Techniques, 2018

FLASH: Is the 20th Century Hero Really Gone? Large-Scale Evaluation on Flash Usage & Its Security and Privacy Implications.
JoWUA, 2018

APT RPG: Design of a Gamified Attacker/Defender Meta Model.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Structural Limitations of B+-Tree forensics.
Proceedings of the Central European Cybersecurity Conference 2018, 2018

The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Semantics-aware detection of targeted attacks: a survey.
J. Computer Virology and Hacking Techniques, 2017

The Evolution of Process Hiding Techniques in Malware - Current Threats and Possible Countermeasures.
JIP, 2017

Forensics using Internal Database Structures.
ERCIM News, 2017

Security Testing for Mobile Applications.
ERCIM News, 2017

Poster: Design of an Anomaly-based Threat Detection & Explication System.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook.
Proceedings of the Information Security Practice and Experience, 2017

Longkit - A Universal Framework for BIOS/UEFI Rootkits in System Management Mode.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Design of an Anomaly-based Threat Detection & Explication System.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Sequitur-based Inference and Analysis Framework for Malicious System Behavior.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

LLR-Based Sentiment Analysis for Kernel Event Sequences.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Privacy Aware Machine Learning and the "Right to be Forgotten".
ERCIM News, 2016

Detection of Data Leaks in Collaborative Data Driven Research.
ERCIM News, 2016

Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?
ACM Comput. Surv., 2016

Empirical Malware Research through Observation of System Behaviour.
Proceedings of the 25th International Conference on World Wide Web, 2016

TAON: an ontology-based approach to mitigating targeted attacks.
Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, 2016

Empirical Research and Research Ethics in Information Security.
Proceedings of the Information Systems Security and Privacy, 2016

2015
Security and privacy of smartphone messaging applications.
Int. J. Pervasive Computing and Communications, 2015

Privacy and data protection in smartphone messengers.
Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services, 2015

Classifying malicious system behavior using event propagation trees.
Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services, 2015

Security tests for mobile applications - Why using TLS/SSL is not enough.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

Gradually Improving the Forensic Process.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Trust me, I'm a Root CA! Analyzing SSL Root CAs in Modern Browsers and Operating Systems.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Protecting Anonymity in Data-Driven Biomedical Science.
Proceedings of the Interactive Knowledge Discovery and Data Mining in Biomedical Informatics, 2014

Genie in a Model? Why Model Driven Security will not secure your Web Application.
JoWUA, 2014

An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata.
Electronic Markets, 2014

Covert Computation - Hiding code in code through compile-time obfuscation.
Computers & Security, 2014

InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Spoiled Onions: Exposing Malicious Tor Exit Relays.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

What's new with WhatsApp & Co.? Revisiting the Security of Smartphone Messaging Applications.
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014

Towards Fully Automated Digital Alibis with Social Interaction.
Proceedings of the Advances in Digital Forensics X, 2014

Using Model Driven Security Approaches in Web Application Development.
Proceedings of the Information and Communication Technology, 2014

AES-SEC: Improving Software Obfuscation through Hardware-Assistance.
Proceedings of the Ninth International Conference on Availability, 2014

2013
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs.
Inf. Sec. Techn. Report, 2013

Using the structure of B+-trees for enhancing logging mechanisms of databases.
IJWIS, 2013

Quantifying Windows File Slack Size and Stability.
Proceedings of the Advances in Digital Forensics IX, 2013

Appinspect: large-scale evaluation of social networking apps.
Proceedings of the Conference on Online Social Networks, 2013

Covert computation: hiding code in code for obfuscation purposes.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Digital forensics for enterprise rights management systems.
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, IIWAS '12, Bali, Indonesia, 2012

InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.
Proceedings of the 20th USENIX Security Symposium, 2011

An Algorithm for k-Anonymity-Based Fingerprinting.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Data Provenance with Watermarks for Usage Control Monitors at Disaster Recovery.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

Code Obfuscation against Static and Dynamic Reverse Engineering.
Proceedings of the Information Hiding - 13th International Conference, 2011

Trees Cannot Lie: Using Data Structures for Forensics Purposes.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

Social snapshots: digital forensics for online social networks.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters.
Proceedings of the Sixth International Conference on Availability, 2011

2010

Cheap and automated socio-technical attacks based on social networking sites.
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, 2010


  Loading...