2017

2017

Publications

Security Testing for Mobile Applications
Kieseberg Peter, Frühwirt Peter, Schrittwieser Sebastian, ERCIM News, vol. 109, pp. 52-53, 2017.
Forensics using Internal Database Structures
Kieseberg Peter, Weippl Edgar, Schrittwieser Sebastian, ERCIM News, vol. 108, 2017.
Sequitur-based Inference and Analysis Framework for Malicious System Behavior
Luh Robert, Schramm Georg, Wagner Markus, Schrittwieser Sebastian, , First International Workshop on Formal Methods for Security Engineering, 2017.
Hello, Facebook! Here is the stalkers' paradise!: Design and analysis of enumeration attack using phone numbers on Facebook
Kim Jinwoo, Kim Kuyju, Cho Junsung, Kim Hyoungshick, Schrittwieser Sebastian, , 13th International Conference on Information Security Practice and Experience (ISPEC 2017), 2017.
Anomaly Detection for Simulated IEC-60870-5-104 Trafiic
Hodo Ersi, Grebeniuk Stepan, Ruotsalainen Henri, Tavolato Paul, , ARES - S-CI 2017: S-CI II - Critical Infrastructure Systems CyberSecurity Tools, ACM, 2017.
Real-time Forensics through Endpoint Visibility
Kieseberg Peter, Neuner Sebastian, Schrittwieser Sebastian, Schmiedecker Martin, , International Conference on Digital Forensics & Cyber Crime (ICDF2C), URL: https://www.sba-research.org/wp-content/uploads/publications/fleetForensics.pdf, 2017.
Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools
Merzdovnik Georg, Huber Markus, Buhov Damjan, Nikiforakis N, Neuner Sebastian, Weippl Edgar, , IEEE European Symposium on Security and Privacy, IEEE, 2017.
Journal of Information Processing
Eresheim Sebastian, Luh Robert, Schrittwieser Sebastian, Journal of Information Processing, 2017.
Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems
Kreimel Philipp, Eigner Oliver, Tavolato Paul, , International Conference on Availability, Reliability and Security, ACM, https://doi.org/10.1145/3098954.3103155, 2017.
Design of an Anomaly-based Threat Detection & Explication System
Luh Robert, Schrittwieser Sebastian, Marschalek Stefan, Janicke Helge, Weippl Edgar, , 22nd ACM Symposium on Access Control Models and Technologies (SACMAT), ACM, 10.1145/3078861.3084162, 2017.
Das Testen von Algorithmen in sensibler datengetriebener Forschung
Kieseberg Peter, Schrittwieser Sebastian, Malle Bernd, Weippl Edgar, Rundbrief des Fachausschusses Management der Anwendungsentwicklung und -wartung (WI-MAW), 2017.
(In)Security in der Gebäudeautomatisierung
Brandstetter Thomas, Reisinger Kerstin, , 15. Deutscher IT Sicherheitskongress des BSI, Bundesamt für Sicherheit in der Informationstechnik (BSI), ISBN: 978-3-933746-93-5, 2017.
Design of an Anomaly-based Threat Detection & Explication System
Luh Robert, Schrittwieser Sebastian, Janicke Helge, Marschalek Stefan, , International Conference on Information Systems Security and Privacy, Madeira, Portugal, 2017.
Longkit - A Universal Framework for BIOS/UEFI Rootkits in System Management Mode
Rauchberger Julian, Luh Robert, Schrittwieser Sebastian, , International Conference on Information Systems Security and Privacy, Madeira, Portugal, 2017.
LLR-based Sentiment Analysis for Kernel Event Sequences
Luh Robert, Schrittwieser Sebastian, Marschalek Stefan, , 31th International Conference on Advanced Information Networking and Applications, IEEE, 2017.

Lectures

Sequitur-based Inference and Analysis Framework for Malicious System Behavior
Luh Robert, Schramm Georg, Wagner Markus, Schrittwieser Sebastian, , First International Workshop on Formal Methods for Security Engineering, 2017.
Wie funktioniert eine Blockchain wirklich
Weippl Edgar R., , VIenna, http://idcitsecurity.com/vienna_de/agenda, 2017.
Bitcoins, Crypocurrencies und Smart Contracts
Weippl Edgar, , presented at the 14. Österreichischer IT-Sicherheitstag, Klagenfurt, https://www.syssec.at/sitag2017prog/, 2017.