Sebastian Schrittwieser
Orcid: 0000-0003-2115-2022
According to our database1,
Sebastian Schrittwieser
authored at least 85 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Obfuscation undercover: Unraveling the impact of obfuscation layering on structural code patterns.
J. Inf. Secur. Appl., 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Code Obfuscation Classification Using Singular Value Decomposition on Grayscale Image Representations.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024
Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
2023
Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI's GPT-3.5 on C Source Code.
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
2022
Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation.
Proceedings of the Secure IT Systems, 2022
Proceedings of the IEEE Global Engineering Education Conference, 2022
2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
PenQuest: a gamified attacker/defender meta model for cyber security assessment and education.
J. Comput. Virol. Hacking Tech., 2020
J. Cyber Secur. Mobil., 2020
Advanced threat intelligence: detection and classification of anomalous behavior in system processes.
Elektrotech. Informationstechnik, 2020
Proceedings of the International Conference on Software Security and Assurance, 2020
2019
Comput. Secur., 2019
Proceedings of the International Conference on Software Security and Assurance, 2019
Proceedings of the International Conference on Software Security and Assurance, 2019
Analysis of the Internals of MySQL/InnoDB B+ Tree Index Navigation from a Forensic Perspective.
Proceedings of the International Conference on Software Security and Assurance, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
J. Comput. Virol. Hacking Tech., 2018
FLASH: Is the 20th Century Hero Really Gone? Large-Scale Evaluation on Flash Usage & Its Security and Privacy Implications.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the Central European Cybersecurity Conference 2018, 2018
The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
J. Comput. Virol. Hacking Tech., 2017
The Evolution of Process Hiding Techniques in Malware - Current Threats and Possible Countermeasures.
J. Inf. Process., 2017
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook.
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the International Conference on Software Security and Assurance, 2017
Proceedings of the International Conference on Software Security and Assurance, 2017
Proceedings of the International Conference on Software Security and Assurance, 2017
Proceedings of the International Conference on Software Security and Assurance, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
2016
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?
ACM Comput. Surv., 2016
Proceedings of the 25th International Conference on World Wide Web, 2016
Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, 2016
Proceedings of the International Conference on Software Security and Assurance, 2016
Proceedings of the Information Systems Security and Privacy, 2016
2015
Int. J. Pervasive Comput. Commun., 2015
Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services, 2015
Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services, 2015
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
Trust me, I'm a Root CA! Analyzing SSL Root CAs in Modern Browsers and Operating Systems.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Proceedings of the Interactive Knowledge Discovery and Data Mining in Biomedical Informatics, 2014
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata.
Electron. Mark., 2014
Comput. Secur., 2014
InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles.
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014
What's new with WhatsApp & Co.? Revisiting the Security of Smartphone Messaging Applications.
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014
Proceedings of the Advances in Digital Forensics X, 2014
Proceedings of the Information and Communication Technology, 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs.
Inf. Secur. Tech. Rep., 2013
Int. J. Web Inf. Syst., 2013
Proceedings of the Advances in Digital Forensics IX, 2013
Proceedings of the Conference on Online Social Networks, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, IIWAS '12, Bali, Indonesia, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011
Proceedings of the Information Hiding - 13th International Conference, 2011
Proceedings of the European Intelligence and Security Informatics Conference, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters.
Proceedings of the Sixth International Conference on Availability, 2011
2010
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, 2010