Sebastian Schrittwieser

Orcid: 0000-0003-2115-2022

According to our database1, Sebastian Schrittwieser authored at least 85 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Editorial: Special issue on ARES 2022.
Comput. Secur., March, 2024

Obfuscation undercover: Unraveling the impact of obfuscation layering on structural code patterns.
J. Inf. Secur. Appl., 2024

Safe or Scam? An Empirical Simulation Study on Trust Indicators in Online Shopping.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

Code Obfuscation Classification Using Singular Value Decomposition on Grayscale Image Representations.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

Attacking Graph Neural Networks with Bit Flips: Weisfeiler and Leman Go Indifferent.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024

Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Quantifying the Odds in Real World Attack Scenarios.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

2023
Evaluation Methodologies in Software Protection Research.
CoRR, 2023

Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI's GPT-3.5 on C Source Code.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Modeling Obfuscation Stealth Through Code Complexity.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2022
Meta-framework for Automating Static Malware Analysis.
ERCIM News, 2022

Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation.
Proceedings of the Secure IT Systems, 2022

PenQuest Reloaded: A Digital Cyber Defense Game for Technical Education.
Proceedings of the IEEE Global Engineering Education Conference, 2022

2021
Secure Internal Data Markets.
Future Internet, 2021

SoK: Automatic Deobfuscation of Virtualization-protected Applications.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
PenQuest: a gamified attacker/defender meta model for cyber security assessment and education.
J. Comput. Virol. Hacking Tech., 2020

Typosquatting for Fun and Profit: Cross-Country Analysis of Pop-Up Scam.
J. Cyber Secur. Mobil., 2020

Advanced threat intelligence: detection and classification of anomalous behavior in system processes.
Elektrotech. Informationstechnik, 2020

Compiling and Analyzing Open Source Malware for Research Purposes.
Proceedings of the International Conference on Software Security and Assurance, 2020

2019
AIDIS: Detecting and classifying anomalous behavior in ubiquitous kernel processes.
Comput. Secur., 2019

Assessment of the Transparency of the Windows Subsystem for Linux (WSL).
Proceedings of the International Conference on Software Security and Assurance, 2019

Fingerprinting using database steganography.
Proceedings of the International Conference on Software Security and Assurance, 2019

Analysis of the Internals of MySQL/InnoDB B+ Tree Index Navigation from a Forensic Perspective.
Proceedings of the International Conference on Software Security and Assurance, 2019

Large-Scale Analysis of Pop-Up Scam on Typosquatting URLs.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
SEQUIN: a grammar inference framework for analyzing malicious system behavior.
J. Comput. Virol. Hacking Tech., 2018

FLASH: Is the 20th Century Hero Really Gone? Large-Scale Evaluation on Flash Usage & Its Security and Privacy Implications.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

APT RPG: Design of a Gamified Attacker/Defender Meta Model.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Structural Limitations of B+-Tree forensics.
Proceedings of the Central European Cybersecurity Conference 2018, 2018

The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Semantics-aware detection of targeted attacks: a survey.
J. Comput. Virol. Hacking Tech., 2017

The Evolution of Process Hiding Techniques in Malware - Current Threats and Possible Countermeasures.
J. Inf. Process., 2017

Forensics using Internal Database Structures.
ERCIM News, 2017

Security Testing for Mobile Applications.
ERCIM News, 2017

Poster: Design of an Anomaly-based Threat Detection & Explication System.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook.
Proceedings of the Information Security Practice and Experience, 2017

Creation and Integration of Remote High Interaction Honeypots.
Proceedings of the International Conference on Software Security and Assurance, 2017

Endpoint Data Classification Using Markov Chains.
Proceedings of the International Conference on Software Security and Assurance, 2017

On the Impact of Kernel Code Vulnerabilities in IoT Devices.
Proceedings of the International Conference on Software Security and Assurance, 2017

Discovering Cryptographic Algorithms in Binary Code Through Loop Enumeration.
Proceedings of the International Conference on Software Security and Assurance, 2017

Longkit - A Universal Framework for BIOS/UEFI Rootkits in System Management Mode.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Design of an Anomaly-based Threat Detection & Explication System.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Sequitur-based Inference and Analysis Framework for Malicious System Behavior.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Real-Time Forensics Through Endpoint Visibility.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

LLR-Based Sentiment Analysis for Kernel Event Sequences.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Privacy Aware Machine Learning and the "Right to be Forgotten".
ERCIM News, 2016

Detection of Data Leaks in Collaborative Data Driven Research.
ERCIM News, 2016

Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?
ACM Comput. Surv., 2016

Empirical Malware Research through Observation of System Behaviour.
Proceedings of the 25th International Conference on World Wide Web, 2016

TAON: an ontology-based approach to mitigating targeted attacks.
Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, 2016

Catch Me if You Can! Transparent Detection of Shellcode.
Proceedings of the International Conference on Software Security and Assurance, 2016

Empirical Research and Research Ethics in Information Security.
Proceedings of the Information Systems Security and Privacy, 2016

2015
Security and privacy of smartphone messaging applications.
Int. J. Pervasive Comput. Commun., 2015

Privacy and data protection in smartphone messengers.
Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services, 2015

Classifying malicious system behavior using event propagation trees.
Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services, 2015

Security tests for mobile applications - Why using TLS/SSL is not enough.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

Gradually Improving the Forensic Process.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Trust me, I'm a Root CA! Analyzing SSL Root CAs in Modern Browsers and Operating Systems.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Protecting Anonymity in Data-Driven Biomedical Science.
Proceedings of the Interactive Knowledge Discovery and Data Mining in Biomedical Informatics, 2014

Genie in a Model? Why Model Driven Security will not secure your Web Application.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata.
Electron. Mark., 2014

Covert Computation - Hiding code in code through compile-time obfuscation.
Comput. Secur., 2014

InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Spoiled Onions: Exposing Malicious Tor Exit Relays.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

What's new with WhatsApp & Co.? Revisiting the Security of Smartphone Messaging Applications.
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014

Towards Fully Automated Digital Alibis with Social Interaction.
Proceedings of the Advances in Digital Forensics X, 2014

Using Model Driven Security Approaches in Web Application Development.
Proceedings of the Information and Communication Technology, 2014

AES-SEC: Improving Software Obfuscation through Hardware-Assistance.
Proceedings of the Ninth International Conference on Availability, 2014

2013
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs.
Inf. Secur. Tech. Rep., 2013

Using the structure of B+-trees for enhancing logging mechanisms of databases.
Int. J. Web Inf. Syst., 2013

Quantifying Windows File Slack Size and Stability.
Proceedings of the Advances in Digital Forensics IX, 2013

Appinspect: large-scale evaluation of social networking apps.
Proceedings of the Conference on Online Social Networks, 2013

Covert computation: hiding code in code for obfuscation purposes.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Digital forensics for enterprise rights management systems.
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, IIWAS '12, Bali, Indonesia, 2012

InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.
Proceedings of the 20th USENIX Security Symposium, 2011

An Algorithm for k-Anonymity-Based Fingerprinting.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Data Provenance with Watermarks for Usage Control Monitors at Disaster Recovery.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

Code Obfuscation against Static and Dynamic Reverse Engineering.
Proceedings of the Information Hiding - 13th International Conference, 2011

Trees Cannot Lie: Using Data Structures for Forensics Purposes.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

Social snapshots: digital forensics for online social networks.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters.
Proceedings of the Sixth International Conference on Availability, 2011

2010

Cheap and automated socio-technical attacks based on social networking sites.
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, 2010


  Loading...