Sebastian Schrittwieser
TitleCited byYear
Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.
M Mulazzani, S Schrittwieser, M Leithner, M Huber, ER Weippl
USENIX security symposium, 65-76, 2011
2152011
QR code security
P Kieseberg, M Leithner, M Mulazzani, L Munroe, S Schrittwieser, ...
Proceedings of the 8th International Conference on Advances in Mobile …, 2010
1492010
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ...
NDSS, 2012
1142012
Social snapshots: Digital forensics for online social networks
M Huber, M Mulazzani, M Leithner, S Schrittwieser, G Wondracek, ...
Proceedings of the 27th annual computer security applications conference …, 2011
832011
Fast and reliable browser identification with javascript engine fingerprinting
M Mulazzani, P Reschl, M Huber, M Leithner, S Schrittwieser, E Weippl, ...
Web 2.0 Workshop on Security and Privacy (W2SP) 5, 2013
822013
Spoiled onions: Exposing malicious Tor exit relays
P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ...
International Symposium on Privacy Enhancing Technologies Symposium, 304-331, 2014
702014
Code obfuscation against static and dynamic reverse engineering
S Schrittwieser, S Katzenbeisser
International workshop on information hiding, 270-284, 2011
682011
Protecting software through obfuscation: Can it keep pace with progress in code analysis?
S Schrittwieser, S Katzenbeisser, J Kinder, G Merzdovnik, E Weippl
ACM Computing Surveys (CSUR) 49 (1), 4, 2016
582016
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs
P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl
Information Security Technical Report 17 (4), 227-238, 2013
452013
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs
P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl
Information Security Technical Report 17 (4), 227-238, 2013
452013
Shpf: Enhancing http (s) session security with browser fingerprinting
T Unger, M Mulazzani, D Frühwirt, M Huber, S Schrittwieser, E Weippl
2013 International Conference on Availability, Reliability and Security, 255-261, 2013
392013
Semantics-aware detection of targeted attacks: a survey
R Luh, S Marschalek, M Kaiser, H Janicke, S Schrittwieser
Journal of Computer Virology and Hacking Techniques 13 (1), 47-85, 2017
262017
Appinspect: large-scale evaluation of social networking apps
M Huber, M Mulazzani, S Schrittwieser, E Weippl
Proceedings of the first ACM conference on Online social networks, 143-154, 2013
262013
An algorithm for k-anonymity-based fingerprinting
S Schrittwieser, P Kieseberg, I Echizen, S Wohlgemuth, N Sonehara, ...
International Workshop on Digital Watermarking, 439-452, 2011
202011
Protecting anonymity in data-driven biomedical science
P Kieseberg, H Hobel, S Schrittwieser, E Weippl, A Holzinger
Interactive knowledge discovery and data mining in biomedical informatics …, 2014
172014
Trees Cannot Lie: Using Data Structures for Forensics Purposes
P Kieseberg, S Schrittwieser, M Mulazzani, M Huber, E Weippl
Intelligence and Security Informatics Conference (EISIC), 2011 European, 282-285, 2011
172011
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata
P Kieseberg, S Schrittwieser, M Mulazzani, I Echizen, E Weippl
Electronic Markets 24 (2), 113-124, 2014
152014
Gradually improving the forensic process
S Neuner, M Mulazzani, S Schrittwieser, E Weippl
2015 10th International Conference on Availability, Reliability and Security …, 2015
132015
Malicious pixels using qr codes as attack vector
P Kieseberg, S Schrittwieser, M Leithner, M Mulazzani, E Weippl, ...
Trustworthy ubiquitous computing, 21-38, 2012
122012
Covert Computation—Hiding code in code through compile-time obfuscation
S Schrittwieser, S Katzenbeisser, P Kieseberg, M Huber, M Leithner, ...
Computers & security 42, 13-26, 2014
112014
The system can't perform the operation now. Try again later.
Articles 1–20