TU Wien Informatics

20 Years

Role

2023W

 

2022

2015

  • Dataset of Developer-Labeled Commit Messages / Mauczka, A., Brosch, F., Schanes, C., & Grechenig, T. (2015). Dataset of Developer-Labeled Commit Messages. In 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories. The 12th Working Conference on Mining Software Repositories (MSR), Florenz, Italien, EU. IEEE. https://doi.org/10.1109/msr.2015.71
  • Global VoIP security threats - large scale validation based on independent honeynets / Gruber, M., Hoffstadt, D., Aziz, A., Fankhauser, F., Schanes, C., Rathgeb, E., & Grechenig, T. (2015). Global VoIP security threats - large scale validation based on independent honeynets. In 2015 IFIP Networking Conference (IFIP Networking). IFIP Networking Conference (IFIP Networking 2015), Toulouse, Frankreich, EU. IEEE Conference Publications. https://doi.org/10.1109/ifipnetworking.2015.7145329
  • KCI-based Man-in-the-Middle Attacks against TLS / Hlauschek, C., Gruber, M., Fankhauser, F., & Schanes, C. (2015). KCI-based Man-in-the-Middle Attacks against TLS. BSidesVienna 2015, Wien, Austria. http://hdl.handle.net/20.500.12708/86221
  • Prying open Pandora's box: KCI attacks against TLS / Hlauschek, C., Gruber, M., Fankhauser, F., & Schanes, C. (2015). Prying open Pandora’s box: KCI attacks against TLS. 9th USENIX Workshop on Offensive Technologies (WOOT 15), Washington D.C., Non-EU. http://hdl.handle.net/20.500.12708/86209
  • Mobile Payment Fraud: A Practical View on the Technical Architecture and Starting Points for Forensic Analysis of New Attack Scenarios. / Kier, C., Madlmayr, G., Nawratil, A., Schafferer, M., Schanes, C., & Grechenig, T. (2015). Mobile Payment Fraud: A Practical View on the Technical Architecture and Starting Points for Forensic Analysis of New Attack Scenarios. In Proceedings of the 9th International Conference on IT Security Incident Management & IT Forensics (IMF) (pp. 68–76). IEEE. http://hdl.handle.net/20.500.12708/56361
  • Aktive Bewußtseinsbildung / Schanes, C., Fankhauser, F., & Grechenig, T. (2015). Aktive Bewußtseinsbildung. Workshop Internationale Wirtschafts- und Industriespionage, Wien, Austria. http://hdl.handle.net/20.500.12708/86225
  • Ein realer Cyber-Angriff und seine Abwehr: Struktur und Live-Demo / Grechenig, T., & Schanes, C. (2015). Ein realer Cyber-Angriff und seine Abwehr: Struktur und Live-Demo. Österreichische Fachtagung zum Thema Industrie 4.0, Zell am See, Austria. http://hdl.handle.net/20.500.12708/86224
  • Absicherung gegen IT-Angriffe von außen und innen. Vom Konzept zum dauerhaften Sicherheitsgrad / Schanes, C. (2015). Absicherung gegen IT-Angriffe von außen und innen. Vom Konzept zum dauerhaften Sicherheitsgrad. ARS Jahrestagung Datenschutz, Wien, Austria. http://hdl.handle.net/20.500.12708/86222

2014

  • Chaotic ad-hoc data network - A bike based system for city networks / Isemann, B., Gruber, M., Grünberger, J., Schanes, C., & Grechenig, T. (2014). Chaotic ad-hoc data network - A bike based system for city networks. In 2014 IEEE Fifth International Conference on Communications and Electronics (ICCE). The Fifth International Conference on Communications and Electronics (ICCE 2014), Da Nang, Vietnam, Non-EU. IEEE. https://doi.org/10.1109/cce.2014.6916711
  • Concept and Design of a Transparent Security Layer to Enable Anonymous VoIP Calls / Gruber, M., Maier, M., Schafferer, M., Schanes, C., & Grechenig, T. (2014). Concept and Design of a Transparent Security Layer to Enable Anonymous VoIP Calls. In Proceedings of the International Conference on Advanced Networking, Distributed Systems and Applications (pp. 58–61). INDS. http://hdl.handle.net/20.500.12708/55942
  • Data retention services with soft privacy impacts: Concept and implementation / Schafferer, M., Gruber, M., Schanes, C., & Grechenig, T. (2014). Data retention services with soft privacy impacts: Concept and implementation. In 2014 IEEE 5th International Conference on Software Engineering and Service Science. 5th IEEE International Conference on Software Engineering and Service Science (ICSESS 2014), Beijing, China, EU. IEEE. https://doi.org/10.1109/icsess.2014.6933540

2013

2012

2011

  • Security status of voip based on the observation of real-world attacks on a honeynet / Gruber, M., Fankhauser, F., Taber, S., Schanes, C., & Grechenig, T. (2011). Security status of voip based on the observation of real-world attacks on a honeynet. In Proceedings of the Third IEEE International Conference on Information Privacy, Security, Risk and Trust (pp. 1041–1047). IEEE. http://hdl.handle.net/20.500.12708/54039
  • Trapping and analyzing malicious voip traffic using a honeynet approach. / Gruber, M., Fankhauser, F., Taber, S., Schanes, C., & Grechenig, T. (2011). Trapping and analyzing malicious voip traffic using a honeynet approach. In Proceedings of the 6th International Conference on Internet Technology and Secured Transactions (pp. 442–447). IEEE. http://hdl.handle.net/20.500.12708/54037
  • Security test environment for voip research / Fankhauser, F., Ronniger, M., Schanes, C., & Grechenig, T. (2011). Security test environment for voip research. International Journal for Information Security Research, 1(1), 53–60. http://hdl.handle.net/20.500.12708/163157
  • Security test approach for automated detection of vulnerabilities of sip-based voip softphones. / Schanes, C., Taber, S., Popp, K., Fankhauser, F., & Grechenig, T. (2011). Security test approach for automated detection of vulnerabilities of sip-based voip softphones. International Journal On Advances in Security, 4(1 & amp;2), 95–105. http://hdl.handle.net/20.500.12708/163156
  • Generic data format approach for generation of security test data / Schanes, C., Fankhauser, F., Taber, S., & Grechenig, T. (2011). Generic data format approach for generation of security test data. In Proceedings of the Third International Conference on Advances in System Testing and Validation Lifecycle (pp. 103–108). IARIA. http://hdl.handle.net/20.500.12708/54038

2010

  • Mining security changes in freebsd / Mauczka, A., Schanes, C., Fankhauser, F., Bernhart, M., & Grechenig, T. (2010). Mining security changes in freebsd. In Proceedings of 7th IEEE Working Conference on Mining Software Repositories (MSR) (pp. 90–93). IEEE. http://hdl.handle.net/20.500.12708/53545
  • Work in progress: Black-Box approach for testing quality of service in case of security incidents on the example of a SIP-based VoIP service. / Steinbacher, P., Fankhauser, F., Schanes, C., & Grechenig, T. (2010). Work in progress: Black-Box approach for testing quality of service in case of security incidents on the example of a SIP-based VoIP service. In Proceedings of IPTComm 2010 Principles, Systems and Applications of IP Telecommunications (pp. 107–116). Technische Universität München, Germany. http://hdl.handle.net/20.500.12708/53544
  • A Robust and Flexible Test Environment for VoIP Security Tests. / Ronniger, M., Fankhauser, F., Schanes, C., & Grechenig, T. (2010). A Robust and Flexible Test Environment for VoIP Security Tests. In Proceedings of The 5th International Conference for Internet Technology and Secured Transactions (pp. 96–101). Infonomics Society, UK. http://hdl.handle.net/20.500.12708/53543
  • Automated Security Test Approach for SIP based VoIP Softphones / Taber, S., Schanes, C., Hlauschek, C., Fankhauser, F., & Grechenig, T. (2010). Automated Security Test Approach for SIP based VoIP Softphones. In Proceedings of The Second International Conference on Advances in System Testing and Validation Lifecycle (pp. 114–119). IEEE Computer Society Press. http://hdl.handle.net/20.500.12708/53539

2009

2008