Edgar Weippl
Privatdoz. Mag.rer.soc.oec. Dipl.-Ing. Dr.techn.
Research Areas
- IT-Security, E-Learning
Role
-
Affilliated
Information and Software Engineering, E194-01
Courses
2021W
- Digital Forensics / 188.922 / VU
- Privacy Enhancing Technologies / 188.982 / VU
- Project in Computer Science 1 / 192.075 / PR
- Research seminar for PhD students / 188.081 / SE
2022S
- Bachelor Thesis / 188.919 / PR
- Project in Computer Science 1 / 192.075 / PR
- Project in Computer Science 2 / 192.076 / PR
- Research seminar for PhD students / 188.081 / SE
- Selected Topics in Information Security / 188.985 / VU
- Seminar on Security / 188.972 / SE
Projects
-
Christian Doppler - Laboratory for Software Engineering Integration for Flexible Automation Systems
2010 – 2016 / Christian Doppler Research Association (CDG) -
HardObfuscation - Hardware-assisted software obfuscation for ERM
2010 – 2015 / Austrian Research Promotion Agency (FFG) -
Female Academy for Mentoring, Opportunities and Self-Development
2010 – 2014 / Austrian Research Promotion Agency (FFG) -
Secure 2.0 - Securing the Information Sharing on Web 2.0
2009 – 2014 / Austrian Research Promotion Agency (FFG) -
Female Intrapreneurship Career Academy
2009 – 2012 / Austrian Research Promotion Agency (FFG) -
Austrian Grid: Grid Computing Infrastructure Initiative for Austria
2008 – 2010 / Federal Ministry of Science and Research (bm:wf) -
DynamOnt Methodology for Dynamic Ontology Creation
2005 – 2007 / Austrian Research Promotion Agency (FFG)
Publications
Note: Due to the rollout of TU Wien’s new publication database, the list below may be slightly outdated. Once APIs for the new database have been released, everything will be up to date again.
2021
- Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AI / A. Holzinger, E. Weippl, A. Tjoa, P. Kieseberg / Talk: 5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2021, Virtual Event, August 17-20, 2021, Proceedings, Virtual Event; 2021-08-17 - 2021-08-20; in: "Machine Learning and Knowledge Extraction", Springer, 12844 (2021), ISBN: 978-3-030-84059-4; 1 - 20
- Randrunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness / P. Schindler, A. Judmayer, M. Hittmeir, N. Stifter, E. Weippl / Talk: Network and Distributed System Security Symposium (NDSS), San Diego; 2021-02-21 - 2021-02-25; in: "2021 Network and Distributed System Security Symposium", Internet Society, (2021), ISBN: 1-891562-66-5
- Machine Learning and Knowledge Extraction - 5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2021, Virtual Event, August 17-20, 2021, Proceedings. / A. Holzinger, P. Kieseberg, A. Tjoa, E. Weippl / Springer, 2021, ISBN: 978-3-030-84059-4
2020
- HydRand: Practical Continuous Distributed Randomness / P. Schindler, A. Judmayer, N. Stifter, E. Weippl / Talk: 2020 IEEE Symposium on Security and Privacy, San Francisco, CA; 2020-05-18 - 2020-05-20; in: "Proceedings of the 2020 IEEE Symposium on Security and Privacy", (2020)
- Trust, Privacy and Security in Digital Business - 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14-17, 2020, Proceedings / S. Gritzalis, E. Weippl, G. Anderst-Kotsis, A. Tjoa, I. Khalil / Springer, 2020, ISBN: 978-3-030-58985-1
- Machine Learning and Knowledge Extraction - 4th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2020, Dublin, Ireland, August 25-28, 2020, Proceedings / A. Holzinger, P. Kieseberg, A. Tjoa, E. Weippl / Springer, 2020, ISBN: 978-3-030-57320-1
- Automated Security Risk Identification Using AutomationML-based Engineering Data / M. Eckhart, A. Ekelhart, E. Weippl / IEEE Transactions on Dependable and Secure Computing, 1 (2020)
2019
- Distributed Key Generation with Ethereum Smart Contracts / P. Schindler, A. Judmayer, N. Stifter, E. Weippl / Talk: Consumer Identity World EU 2019, Amsterdam, Netherland; 2019-10-20 - 2019-10-22; in: "Consumer Identity World EU 2019", Springer, (2019)
- Security Related Technical Debt in the Cyber-Physical Production Systems Engineering Process / B. Brenner, E. Weippl, A. Ekelhart / Talk: 45th Annual Conference of the IEEE Industrial Electronics Society (IECON 2019), Lisbon, Portugal, Portugal; 2019-10-14 - 2019-10-18; in: "IEEE", IEEE, (2019), ISBN: 978-1-7281-4878-6; 3012 - 3017
- Security Development Lifecycle for Cyber-Physical Production Systems / M. Eckhart, A. Ekelhart, A. Lüder, S. Biffl, E. Weippl / Talk: 45th Annual Conference of the IEEE Industrial Electronics Society (IECON 2019), Lisbon, Portugal, Portugal; 2019-10-14 - 2019-10-18; in: "IEEE", IEEE, (2019), ISBN: 978-1-7281-4878-6
- Security Related Technical Debt in Cyber Physical Production Systems / B. Brenner, E. Weippl, A. Ekelhart / Talk: 45th Annual Conference of the IEEE Industrial Electronics Society (IECON 2019), Lisbon, Portugal, Portugal; 2019-10-14 - 2019-10-18; in: "IEEE", IEEE, (2019), ISBN: 978-1-7281-4878-6
- Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins / M. Eckhart, A. Ekelhart, E. Weippl / Talk: 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2019), Zaragoza, Spain; 2019-09-10 - 2019-09-13; in: "Proceedings of the 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2019)", IEEE, (2019), ISBN: 978-1-7281-0304-4; 1222 - 1225
- "Avoiding Risky Designs When Using Blockchain Technologies in Cyber-Physical Systems" / N. Stifter, M. Eckhart, B. Brenner, E. Weippl / Talk: 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2019), Zaragoza, Spain; 2019-09-10 - 2019-09-13; in: "Proceedings of the 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2019)", IEEE, (2019), ISBN: 978-1-7281-0304-4
- A versatile Security Layer for AutomationML / B. Brenner, A. Ekelhart, E. Weippl / Talk: 17th IEEE International Conference on Industrial Informatics (INDIN 2019), Helsinki, Finland; 2019-07-22 - 2019-07-25; in: "Proceedings of INDIN 2019", IEEE, (2019)
- Measuring Cookies and Web Privacy in a Post-GDPR World / A. Dabrowski, G. Merzdovnik, J. Ullrich, G. Sendera, E. Weippl / Talk: 2019 International Conference on Passive and Active Network Measurement (PAM), Puerto Varas, Chile; 2019-03-27 - 2019-03-29; in: "Passive and Active Measurement", Springer, Cham, (2019), 258 - 270
- Echoes of the Past: Recovering Blockchain Metrics from Merged mining / N. Stifter, P. Schindler, A. Judmayer, A. Zamyatin, A. Kern, E. Weippl / Talk: 23rd International Conference, FC 2019, St. Kitts; 2019-02-18 - 2019-02-22; in: "Financial Cryptography and Data Security", Springer, (2019), ISBN: 978-3-030-32101-7
- Securing Information against Manipulation in the Production Systems Engineering Process / P. Kieseberg, E. Weippl / in: "Security and Quality in Cyber-Physical Systems Engineering", Springer International Publishing, Switzerland, 2019, ISBN: 978-3-030-25311-0
- Security Analysis / B. Brenner, E. Weippl / in: "Security and Quality in Cyber-Physical Systems Engineering", Springer International Publishing, Switzerland, 2019, ISBN: 978-3-030-25311-0
- Revisiting Practical Byzantine Fault Tolerance Through Blockchain Technologies / N. Stifter, A. Judmayer, E. Weippl / in: "Security and Quality in Cyber-Physical Systems Engineering", Springer International Publishing, Switzerland, 2019, ISBN: 978-3-030-25311-0
- Introduction to Security & Quality Improvement in Complex Cyber-Physical Systems Engineering / S. Biffl, M. Eckhart, A. Lüder, E. Weippl / in: "Security and Quality in Cyber-Physical Systems Engineering", Springer International Publishing, Switzerland, 2019, ISBN: 978-3-030-25311-0
- Conclusion and Outlook on Security & Quality of Complex Cyber-Physical Systems Engineering / S. Biffl, M. Eckhart, A. Lüder, E. Weippl / in: "Security and Quality in Cyber-Physical Systems Engineering", Springer International Publishing, Switzerland, 2019, ISBN: 978-3-030-25311-0
- Security and Quality in Cyber-Physical Systems Engineering / S. Biffl, M. Eckhart, A. Lüder, E. Weippl / Springer International Publishing, Switzerland, 2019, ISBN: 978-3-030-25311-0; 519 pages
- From Hack to Elaborate Technique-A Survey on Binary Rewriting / M. Wenzl, G. Merzdovnik, J. Ullrich, E. Weippl / Acm Computing Surveys, 52 (2019), 3; 1 - 37
- Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges / M. Eckhart, B. Brenner, A. Ekelhart, E. Weippl / Journal of Internet Services and Information Security (JISIS), 9 (2019), 3; 52 - 73
2018
- Structural Limitations of B+-Tree forensics / P. Kieseberg, S. Schrittwieser, E. Weippl / Talk: Central European Cybersecurity Conference 2018, Ljubljana, Slowenia; 2018-11-15 - 2018-11-16; in: "International Conference Proceedings Series ACM Digital Library", ACM Digital Library, 9 (2018), ISBN: 978-1-4503-6515-4
- Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids / J. Ullrich, N. Stifter, A. Judmayer, A. Dabrowski, E. Weippl / Talk: 21st International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2018), Heraklion, Crete, Greece; 2018-09-10 - 2018-09-12; in: "Research in Attacks, Intrusions, and Defenses", Springer in the Lecture Notes in Computer Science series, 11050 (2018), 184 - 203
- Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques / A. Judmayer, N. Stifter, P. Schindler, E. Weippl / Talk: 2018 International Workshop on Cryptocurrencies and Blockchain Technology (CBT 2018), Barcelona, Catalonia; 2018-09-06 - 2018-09-07; in: "Springer Data Privacy Management, Cryptocurrencies and Blockchain Technology", Springer Lecture Notes in Computer Science, 11025 (2018), 197 - 206
- Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI. / A. Holzinger, P. Kieseberg, E. Weippl, A. Tjoa / Talk: International IFIP Cross Domain (CD) Conference for Machine Learning & Knowledge Extraction (MAKE), CD-MAKE 2018, Hamburg, Germany; 2018-08-27 - 2018-08-30; in: "CD-MAKE 2018: Machine Learning and Knowledge Extraction - Second IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/WG 12.9 International Cross-Domain Conference", Springer, 11015 (2018), ISBN: 978-3-319-99739-1; 1 - 8
- Machine Learning and Knowledge Extraction / A. Holzinger, P. Kieseberg, A. Tjoa, E. Weippl / Talk: International Cross-Domain Conference, CD-Make 2018, Hamburg; 2018-08-27 - 2018-08-30; in: "Springer Lecture Notes in Computer Science 11015, Second IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/ WG 12.9, International Cross-Domain Conference, CD-Make 2018, Hamburg, Germany, August 27-30, 2018, Proceedings", Sprinter Lecture Notes in Computer Science, 11015 (2018), ISBN: 978-3-319-99740-7; 1 - 7
- A Framework for Monitoring Net Neutrality / W. Mayer, T. Schreiber, E. Weippl / Talk: The 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany; 2018-08-27 - 2018-08-30; in: "The 13th International Conference on Availability, Reliability and Security (ARES 2018)", ACM International Conference Proceeding Series, (2018), ISBN: 978-1-4503-6448-5
- USBlock: Blocking USB-Based Keypress Injection Attacks / S. Neuner, A. Voyiatzis, S. Fotopoulos, C. Mulliner, E. Weippl / Talk: IFIP Annual Conference on Data and Applications Security and Privacy, Bergamo, Italy; 2018-07-16 - 2018-07-18; in: "Data and Applications Security and Privacy XXXII", Springer Lecture Notes in Computer Science, 10980 (2018), 278 - 295
- A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice / A. Zamyatin, N. Stifter, A. Judmayer, P. Schindler, E. Weippl, W.J. Knottenbelt / Talk: 5th Workshop on Bitcoin and Blockchain Research at Financial Cryptography and Data Security 2018, Curacao, Santa Barbara Beach Resort; 2018-03-02; in: "Proceedings of Bitcoin 2018", Sprinter Lecture Notes in Computer Science, (2018)
- Security Challenges in Cyber-Physical Production Systems / P. Kieseberg, E. Weippl / Talk: Software Quality Days 2018 (SWQD 2018), Wien; 2018-01-16 - 2018-01-19; in: "Software Quality: Methods and Tools for Better Software and Systems", Springer Lecture Notes in Business Information Processing, 302 (2018), 3 - 16
- Botnets causing blackouts: How Coordinated load attacks can destabilize the power grid / A. Dabrowski, J. Ullrich, E. Weippl / Journal e&i: Elektrotechnik und Informationstechnik, 135 (2018), 3; 250 - 255
- On Security Research towards Future Mobile Network Generations / D. Rupprecht, A. Dabrowski, T. Holz, E. Weippl, C. Pöpper / IEEE Communications Surveys & Tutorials, 20 (2018), 3; 24 pages
2017
- Grid Shock: Coordinated Load-Changing Attacks on Power Grids / A. Dabrowski, J. Ullrich, E. Weippl / Talk: Annual Computer Security Applications Conference (ACSAC), Orlando, Florida, USA; 2017-12-04 - 2017-12-08; in: "Proceedings of the 2017 Annual Computer Security Applications Conference", (2017)
- Real-time forensics through endpoint visibility / P. Kieseberg, S. Neuner, S. Schrittwieser, M Schmiedecker, E. Weippl / Talk: 9th EAI International Conference on Digital Forensics & Cyber Crime, Prague, Czech Republic; 2017-10-09 - 2017-10-11; in: "Proceedings of the 9th EAI International Conference on Digital Forensics & Cyber Crime", LNICST SpringerLink Digital Library, (2017)
- PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks / S. Machida, A. Dabrowski, E. Weippl, I. Echizen / Talk: 16th IFIP Conference on e-Business, e-Services and e-Society (I3E 2017), Delhi, India; 2017-09-21 - 2017-09-23; in: "I3E 2017: Digital Nations - Smart Cities, Innovation, and Sustainability", Lecture Notes in Computer Science, 10595 (2017), 261 - 275
- Lightweight Address Hopping for Defending the IPv6 IoT / A. Judmayer, J. Ullrich, G. Merzdovnik, A. Voyiatzis, E. Weippl / Talk: 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio Calabria, Italy; 2017-08-29 - 2017-09-01; in: "Proceedings of ARES 2017 (ACM International Conference Proceedings Series)", (2017)
- Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS / S. Neuner, A. Voyiatzis, M Schmiedecker, E. Weippl / Talk: 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio Calabria, Italy; 2017-08-29 - 2017-09-01; in: "Proceedings of ARES 2017 (ACM International Conference Proceedings Series)", (2017)
- I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS / K. Krombholz, W. Mayer, M. Mulazzani, E. Weippl / Talk: 26th USENIX Security Symposium (USENIX Security 2017), Vancouver, Canada; 2017-08-16 - 2017-08-18; in: "Proceedings of the 26th USENIX Security Symposium", (2017)
- Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools / G. Merzdovnik, M. Huber, D. Buhov, N. Nikiforakis, S. Neuner, M Schmiedecker, E. Weippl / Talk: 2nd IEEE European Symposium on Security and Privacy (EuroS&P), Paris, France; 2017-04-26 - 2017-04-28; in: "Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P)", (2017)
- A Risk Management Framework for Cloud Migration Decision Support / S. Islam, S. Fenz, E. Weippl, H. Mouratidis / Journal of Risk and Financial Management, 10 (2017), 1 - 24
- Network-Based Secret Communication in Clouds: A Survey / J. Ullrich, T. Zseby, J. Fabini, E. Weippl / IEEE Communications Surveys & Tutorials, 19 (2017), 2; 1112 - 1144
2016
- The beauty or the beast? Attacking rate limits of the xen hypervisor / J. Ullrich, E. Weippl / Talk: European Symposium on Research in Computer Security (ESORICS), Heraklion, Greece; 2016-09-28 - 2016-09-30; in: "Computer Security - ESORICS 2016, Part II", (2016), 493 - 512
- The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection / A. Dabrowski, G. Petzl, E. Weippl / Talk: 19th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2016), Paris, France; 2016-09-19 - 2016-09-21; in: "RAID 2016: Research in Attacks, Intrusions, and Defenses", Lecture Notes in Computer Science, 9854 (2016), 279 - 302
- Availability, Reliability, and Security in Information Systems - CD-ARES 2016 / A. Tjoa, E. Weippl, P. Kieseberg, A. Holzinger, F. Buccafurri / Springer LNCS 9817, Cham, CH, 2016, ISBN: 978-3-319-45506-8; 268 pages
- Migration Goals and Risk Management in Cloud Computing: A review of State of the Art and Survey Results on Practitioners / S. Islam, S. Fenz, E. Weippl, C. Kalloniatis / International Journal of Secure Software Engineering (IJSSE), 7 (2016), 44 - 73
- Effectiveness of file‐based deduplication in digital forensics / S. Neuner, M Schmiedecker, E. Weippl / Security And Communication Networks, 9 (2016), 15; 2876 - 2885
- A Framework for Security Transparency in Cloud Computing / U. Ismail, S. Islam, M. Ouedraogo, E. Weippl / Future Internet, 8 (2016), 1
- A tamper-proof audit and control system for the doctor in the loop / P. Kieseberg, B. Malle, P. Frühwirt, A. Holzinger, E. Weippl / Brain Informatics, 3 (2016), 4; 269 - 279
- Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? / S. Schrittwieser, S. Katzenbeisser, J. Kinder, G. Merzdovnik, E. Weippl / Acm Computing Surveys, 49 (2016), 1
- The and security of firewalls in cyber-physical cloud computing / J. Ullrich, J. Cropper, P. Frühwirt, E. Weippl / EURASIP Journal on Information Security, 2016:18 (2016), 18
2015
- Privacy is Not an Option: Attacking the IPv6 Privacy Extension / J. Ullrich, E. Weippl / Talk: 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Kyoto, Japan; 2015-11-02 - 2015-11-04; in: "Proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)", Springer Lecture Notes in Computer Science, (2015), 448 - 468
- Network Security Challenges in Android Applications / D. Buhov, M. Huber, G. Merzdovnik, E. Weippl, V. Dimitrova / Talk: 10th International Conference on Availability, Reliability and Security (ARES), 2015, Toulouse, France; 2015-08-24 - 2015-08-28; in: "Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES)", IEEE, (2015), 327 - 332
- Gradually Improving the Forensic Process / S. Neuner, M. Mulazzani, S. Schrittwieser, E. Weippl / Talk: 4th International Workshop on Cyber Crime (IWCC), 2015, Toulouse, France; 2015-08-24 - 2015-08-28; in: "Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES)", IEEE, (2015), 404 - 410
- On Reconnaissance with IPv6: A Pattern-Based Scanning Approach / J. Ullrich, P. Kieseberg, K. Krombholz, E. Weippl / Talk: 10th International Conference on Availability, Reliability and Security (ARES), 2015, Toulouse, France; 2015-08-24 - 2015-08-28; in: "Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES)", IEEE, (2015), 186 - 192
- QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes / K. Krombholz, P. Frühwirt, T. Rieder, I. Kapsalis, J. Ullrich, E. Weippl / Talk: 10th International Conference on Availability, Reliability and Security (ARES), 2015, Toulouse, France; 2015-08-24 - 2015-08-28; in: "Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES)", IEEE, (2015), 230 - 237
- Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education / A. Dabrowski, M. Kammerstetter, E. Thamm, E. Weippl, W. Kastner / Talk: 2015 USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE 15), Washington, D.C.; 2015-08-11; in: "Proceedings of the 2015 USENIX Summit on Gaming, Games and Gamification in Security Education", USENIX, (2015)
- Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology / K. Krombholz, C. Frauenberger, E. Weippl / Talk: Workshop on Inclusive Privacy and Security (WIPS), Symposium On Usable Privacy and Security 2015 (SOUPS 2015), Ottawa, Canada; 2015-07-22 - 2015-07-24; in: "SOUPS '15 Full Proceedings", USENIX, (2015)
- Smart Privacy Visor: Bridging the Privacy Gap / A. Dabrowski, K. Krombholz, E. Weippl, I. Echizen / Talk: Workshop on Privacy by Transparency in Data-Centric Services (PTDCS 2015), BIS 2015, Poznan, Poland; 2015-06-24 - 2015-06-26; in: "Business Information Systems Workshops - BIS 2015 International Workshops", Springer International Publishing, (2015), 235 - 247
- Error-Correcting Codes as Source for Decoding Ambiguity / A. Dabrowski, I. Echizen, E. Weippl / Talk: 2nd Workshop on Language Theoretic Security (LangSec), IEEE Security & Privacy, San Jose, California; 2015-05-21; in: "Proceedings of the 2nd Workshop on Language Theoretic Security (LangSec)", (2015)
- Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing / K. Krombholz, A. Dabrowski, M. Smith, E. Weippl / Talk: 1st Workshop on Wearable Security and Privacy, Financial Crypto 2015, Puerto Rico; 2015-01-30; in: "Financial Cryptography and Data Security FC 2015 International Workshops", Springer, (2015), ISBN: 978-3-662-48051-9
- Advanced social engineering attacks / K. Krombholz, H. Hobel, M. Huber, E. Weippl / Journal of Information Security and Applications, 22 (2015), 113 - 122
2014
- Windows Installer Security / C. Kadluba, M. Mulazzani, L. Zechner, S. Neuner, E. Weippl / Talk: ASE International Conference on Privacy, Security, Risk and Trust (PASSAT), Cambridge, MA, USA; 2014-12-14 - 2014-12-16; in: "International Conference on Privacy, Security, Risk and Trust", (2014)
- Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile / P. Frühwirt, S. Schrittwieser, E. Weippl / Talk: ASE International Conference on Privacy, Security, Risk and Trust (PASSAT), Cambridge, MA, USA; 2014-12-14 - 2014-12-16; in: "International Conference on Privacy, Security, Risk and Trust", (2014)
- IMSI-Catch Me If You Can: IMSI-Catcher-Catchers / A. Dabrowski, N. Pianta, T. Klepp, M. Mulazzani, E. Weippl / Talk: Annual Computer Security Applications Conference (ACSAC), New Orleans, Louisiana, USA; 2014-12-08 - 2014-12-12; in: "Annual Computer Security Applications Conference (ACSAC)", (2014)
- QR - Inception: Barcode in Barcode Attacks / A. Dabrowski, K. Krombholz, J. Ullrich, E. Weippl / Talk: 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Scottsdale, Arizona, USA; 2014-11-03 - 2014-11-07; in: "ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices", (2014)
- Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations / P. Aufner, G. Merzdovnik, M. Huber, E. Weippl / Talk: 7th International Conference on Security of Information and Networks (SIN 2014), Glasgow, Scotland Uk; 2014-09-09 - 2014-09-11; in: "Proceedings of the 7th International Conference on Security of Information and Networks", ACM Digital Library, (2014), 434 - 440
- Towards a Hardware Trojan Detection Cycle / A. Dabrowski, H. Hobel, J. Ullrich, K. Krombholz, E. Weippl / Talk: International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014, Fribourg, Switzerland; 2014-09-08 - 2014-09-12; in: "International Workshop on Emerging Cyberthreats and Countermeasures", (2014)
- IPv6 Security: Attacks and Countermeasures in a Nutshell / J. Ullrich, K. Krombholz, H. Hobel, A. Dabrowski, E. Weippl / Talk: 8th USENIX Workshop on Offensive Technologies, San Diego, CA; 2014-08-19; in: "8th USENIX Workshop on Offensive Technologies (WOOT 14)", USENIX Association, (2014), 11 pages
- Spoiled Onions: Exposing Malicious Tor Exit Relays / P. Winter, R. Köwer, M. Mulazzani, M. Huber, S. Schrittwieser, S. Lindskog, E. Weippl / Talk: Privacy Enhancing Technologies Symposium (PETS), Amsterdam, Netherlands; 2014-07-16 - 2014-07-18; in: "Privacy Enhancing Technologies Symposium", (2014)
- E-voting authentication with QR-codes / S. Falkner, P. Kieseberg, D. Simos, C. Traxler, E. Weippl / Talk: HCI International Conference 2014, Kreta; 2014-06-22 - 2014-06-27; in: "Proceedings of the 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust", Springer, Switzerland (2014), ISBN: 978-3-319-07731-4; 149 - 159
- Using Model Driven Security Approaches in Web Application Development / C. Hochreiner, Z. Ma, P. Kieseberg, S. Schrittwieser, E. Weippl / Talk: AsiaARES (The 2014 Asian Conference on Availability, Reliability and Security), Bali, Indonesia; 2014-04-14 - 2014-04-17; in: "Asian Conference on Availability, Reliability and Security", (2014)
- InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles / P. Frühwirt, P. Kieseberg, C. Hochreiner, S. Schrittwieser, E. Weippl / Talk: GI Sicherheit 2014, Wien; 2014-03-19 - 2014-03-21; in: "GI Sicherheit 2014", (2014)
- Hardware Trojans - Detect and React? / A. Dabrowski, P. Fejes, J. Ullrich, K. Krombholz, H. Hobel, E. Weippl / Poster: Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA; 2014-02-23 - 2014-02-26
- Automated Analysis of Underground Marketplaces / A. Hudic, K. Krombholz, T. Otterbein, Ch. Platzer, E. Weippl / Talk: Annual IFIP WG 11.9 International Conference on Digital Forensics, Wien; 2014-01-08 - 2014-01-10; in: "Research Advances in Digital Forensics", (2014)
- Towards Fully Automated Digital Alibis with Social Interaction / S. Beyer, M. Mulazzani, S. Schrittwieser, M. Huber, E. Weippl / Talk: Annual IFIP WG 11.9 International Conference on Digital Forensics, Wien; 2014-01-08 - 2014-01-10; in: "Research Advances in Digital Forensics", (2014)
- Availability, Reliability, and Security in Information Systems CD-ARES 2014 / S. Teufel, A. Tjoa, I. You, E. Weippl / Springer LNCS 8708, Heidelberg, 2014, ISBN: 978-3-319-10974-9; 311 pages
- An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata / P. Kieseberg, S. Schrittwieser, M. Mulazzani, I. Echizen, E. Weippl / Electronic Markets, 24 (2014), 2; 113 - 124
- Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations / P. Frühwirt, P. Kieseberg, K. Krombholz, E. Weippl / Digital Investigation, 11 (2014), 4; 336 - 348
- QR Code Security: A Survey of Attacks and Challenges for Usable Security / K. Krombholz, P. Frühwirt, P. Kieseberg, I. Kapsalis, M. Huber, E. Weippl / Lecture Notes in Computer Science, 8533 (2014), 79 - 90
- Genie in a Model? Why Model Driven Security will not secure your Web Application / C. Hochreiner, P. Frühwirt, Z. Ma, P. Kieseberg, S. Schrittwieser, E. Weippl / Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 5 (2014), 3; 44 - 62
- Enter Sandbox: Android Sandbox Comparison / S. Neuner, v. Victor, M. Lindorfer, M. Huber, M. Georg, M. Mulazzani, E. Weippl / in: "Proceedings of the IEEE Mobile Security Technologies Workshop (MoST)", IEEE, 2014
- Protecting Anonymity in Data-Driven Biomedical Science / P. Kieseberg, H. Hobel, S. Schrittwieser, E. Weippl, A. Holzinger / in: "Interactive Knowledge Discovery and Data Mining in Biomedical Informatics", A. Holzinger, I. Jurisica (ed.); Springer-Verlag, Berlin Heidelberg, 2014, ISBN: 978-3-662-43967-8, 301 - 316
2013
- Cloudoscopy: Services Discovery and Topology Mapping / A. Herzberg, H. Shulman, J. Ullrich, E. Weippl / Talk: cloud computing security workshop CCSW 2013, Berlin; 2013-11-08; in: "Fifth ACM cloud computing security workshop (CCSW 2013)", 1 (2013), ISBN: 978-1-4503-2477-9; 113 - 122
- Appinspect: large-scale evaluation of social networking apps / M. Huber, S. Schrittwieser, M. Mulazzani, E. Weippl / Talk: Acm Conference On Online Social Networks (cosn'13), Boston; 2013-10-07 - 2013-10-08; in: "Proceedings of the first ACM conference on Online social networks", (2013), 143 - 154
- Ethik in der Sicherheitsforschung / S. Schrittwieser, M. Mulazzani, E. Weippl, S. Panhans / Talk: DACH Security 2013, Nürnberg; 2013-09-17 - 2013-09-18; in: "D-A-CH Security 2013", (2013), ISBN: 9783000420979
- SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting / M. Mulazzani, E. Weippl, S. Schrittwieser, T. Unger, M. Huber, D. Frühwirt / Talk: Eighth International Conference on Availability, Reliability and Security (ARES), Regensburg; 2013-09-02 - 2013-09-06; in: "Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES)", 8 (2013), ISBN: 978-0-7695-5008-4
- Towards Security-Enhanced and Privacy-Preserving Mashup Compositions / H. Hobel, J. Heurix, A. Anjomshoaa, E. Weippl / Talk: 28th IFIP TC-11 International Information Security and Privacy Conference (SEC2013), Auckland, New Zealand; 2013-07-08 - 2013-07-10; in: "Security and Privacy Protection in Information Processing Systems - 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings", Springer-Verlag GmbH, Vol 405 (2013), ISBN: 978-3-642-39217-7; 286 - 299
- Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting / M. Mulazzani, S. Schrittwieser, P. Reschl, M. Leithner, E. Weippl, M. Huber / Talk: Web 2.0 Security & Privacy 2013, San Francisco; 2013-05-24
- Ethics in Security Research - Which Lines Should Not Be Crossed? / S. Schrittwieser, E. Weippl, M. Mulazzani / Talk: Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS 2013), San Francisco; 2013-05-23
- Covert Computation - Hiding Code in Code for Obfuscation Purposes / S. Schrittwieser, M. Huber, M. Leithner, M. Mulazzani, S. Katzenbeisser, E. Weippl, P. Kieseberg / Talk: ASIA CCS '13 8th ACM Symposium on Information, Computer and Communications Security, Hangzhou; 2013-05-08 - 2013-05-10; in: "Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security", 1 (2013), ISBN: 978-1-4503-1767-2
- Malware in Hardware Infrastructure Components / C. Krieg, E. Weippl / in: "Advances in IT Early Warning", Fraunhofer IRB Verlag, 2013
- Information and Communicatiaon Technology, ICT_EurAsia 2013 / A. Tjoa, E. Weippl, K. Mustofa, E. Neuhold, I. You / Springer LNCS 7804, Berlin Heidelberg, 2013, ISBN: 978-3-642-36817-2; 552 pages
- Hardware Malware / C. Krieg, A. Dabrowski, H. Hobel, K. Krombholz, E. Weippl / Synthesis Lectures on Information Security, Privacy, and Trust, 4 (2013), 2; 1 - 115
- A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-Based System / S. Islam, H. Mouratidis, E. Weippl / in: "Security Engineering for Cloud Computing: Approaches and Tools", IGI Global, 2013, 97 - 122
- Quantifying Windows File Slack in Size and Stability / M. Mulazzani, S. Neuner, S. Schrittwieser, E. Weippl, P. Kieseberg, M. Huber / in: "Advances in Digital Forensics IX", Springer, 1, 2013, ISBN: 978-3-642-41147-2
2012
- Malicious Pixels: Using QR Codes as Attack Vector / P. Kieseberg, S. Schrittwieser, M. Leithner, M. Mulazzani, E. Weippl, L. Munroe, M. Sinha / in: "Trustworthy Ubiquitous Computing", Atlantic Press, 2012, 21 - 38
- QMHE2012 / S. Avasilcai, A. Tjoa, C. Hutu, E. Weippl / OCG (Österreichische Computer Gesellschaft), Wien, 2012, ISBN: 9783854032915; 240 pages
- Self-Monitoring in Social Networks / A. Anjomshoaa, V. Khue, A. Tahamtan, A. Tjoa, E. Weippl / International Journal of Intelligent Information and Database Systems, 6 (2012), 4; 363 - 380
- InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs / P. Frühwirt, P. Kieseberg, S. Schrittwieser, M. Huber, E. Weippl / in: "Proceedings of the Seventh International Conference on Availability, Reliability and Security (ARES)", IEEE, 2012, 625 - 633
- Digital Forensics for Enterprise Rights Management Systems / S. Schrittwieser, P. Kieseberg, E. Weippl / in: "Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services (iiWAS)", ACM, 2012, 10 pages
- Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications / S. Schrittwieser, P. Frühwirt, P. Kieseberg, M. Leithner, M. Mulazzani, M. Huber, E. Weippl / in: "Proceedings of the Network and Distributed System Security Symposium, NDSS 2012", issued by: The Internet Society; The Internet Society, 2012, 9 pages
2011
- Using the Structure of B+ Trees for Enhancing Logging Mechanisms of Databases / P. Kieseberg, S. Schrittwieser, L. Morgan, M. Mulazzani, M. Huber, E. Weippl / Talk: IIWAS International Conference on Information Integration, Web-Applications and Services, Ho Chi Minh City; 2011-12-05 - 2011-12-07; in: "Proceedings of the 13th International Conference on Information Integration and Web-based Applications & Services", (2011)
- Social Snapshots: Digital Forensics for Online Social Networks / M. Huber, M. Mulazzani, M. Leithner, S. Schrittwieser, G. Wondracek, E. Weippl / Talk: Annual Computer Security Applications Conference (ACSAC), Orlando, FL; 2011-12-05 - 2011-12-09; in: "Proceedings of 27th Annual Computer Security Applications Conference (ACSAC)", (2011), 113 - 122
- Poster Abstract: Efficient Browser Identification with JavaScript Engine Fingerprinting / P. Reschl, M. Mulazzani, M. Huber, E. Weippl / Poster: Annual Computer Security Applications Conference (ACSAC), Orlando, FL; 2011-12-05 - 2011-12-09
- Cloud Speicherdienste als Angriffsvektoren / M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, E. Weippl / Talk: Sicherheitskonferenz Krems, Krems; 2011-10-27; in: "Proceedings of 9. Sicherheitskonferenz Krems", (2011)
- An Algorithm for k-anonymity-based Fingerprinting / S. Schrittwieser, P. Kieseberg, I. Echizen, S. Wohlgemuth, N. Sonehara, E. Weippl / Talk: International Workshop on Digital-forensics and Watermarking, Atlantic City, USA; 2011-10-23 - 2011-10-26; in: "Proceedings of the 10th International Workshop on Digital-forensics and Watermarking", (2011)
- Trees Cannot Lie: Using Data Structures for Forensics Purposes / P. Kieseberg, S. Schrittwieser, M. Mulazzani, M. Huber, E. Weippl / Talk: European Intelligence and Security Informatics Conference 2011, Athens; 2011-09-12 - 2011-09-14; in: "Proceedings of the European Intelligence and Security Informatics Conference", (2011), ISBN: 978-0-7695-4406-9
- Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space / M. Mulazzani, S. Schrittwieser, M. Huber, M. Leithner, E. Weippl / Talk: Usenix Security Symposium, San Francisco; 2011-08-08 - 2011-08-12; in: "Proceedings of 20th USENIX Security Symposium", (2011)
- A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric Systems / C. Schwarzl, E. Weippl / International Journal of Secure Software Engineering (IJSSE), 2 (2011), 1; 40 - 83
- Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam / M. Huber, M. Mulazzani, E. Weippl, G. Kitzler, S. Goluch / IEEE Internet Computing, Special Issue on Security and Privacy in Social Networks (2011)
2010
- Governance, Risk & Compliance (GRC) Status Quo and Software Use: Results from a Survey among Large Enterprises / N. Racz, J. Panitz, M. Amberg, E. Weippl, A. Seufert / Talk: ACIS 2010, Brisbane, Australia; 2010-12-01 - 2010-12-03; in: "Proceedings of the 21st Australasian Conference on Information Systems (ACIS)", (2010)
- Questioning the need for separate IT risk management frameworks / N. Racz, A. Seufert, E. Weippl / Talk: Risk Management, Compliance und Governance für widerstandsfähige Informationssysteme, Leipzig; 2010-09-29; in: "Konferenz Risk Management, Compliance und Governance für widerstandsfähige Informationssysteme, Lecture Notes in Informatics (LNI), P-176, Informatik 2010 Proceedings, Band 2", Springer LNI, 2 (2010)
- Who On Earth Is Mr. Cypher? Automated Friend Injection Attacks on Social Networking Sites / M. Huber, M. Mulazzani, E. Weippl / Talk: IFIP International Information Security Conference 2010: Security & Privacy --- Silver Linings in the Cloud, Brisbane, Australia; 2010-09-20 - 2010-09-23; in: "Proceedings of the IFIP International Information Security Conference 2010: Security \& Privacy --- Silver Linings in the Cloud", (2010)
- An Event-Based Empirical Process Analysis Framework / W. Sunindyo, S. Biffl, R. Mordinyi, T Moser, A. Schatten, M. Tabatabai Irani, D. Wahyudin, E. Weippl, D. Winkler / Poster: 4th International Symposium on Empirical Software Engineering and Measurement (ESEM 2010) - Poster Sessions, Bolzano-Bozen, Italy; 2010-09-15 - 2010-09-17; in: "Proc. 4th International Symposium on Empirical Software Engineering and Measurement (ESEM 2010) - Poster Sessions", (2010), 1 - 2
- Addressing Misalignment Between Information Security Metrics and Business-Driven Security Objectives / C. Frühwirth, S. Biffl, M. Tabatabai Irani, E. Weippl / Talk: International Workshop on Security Measurement and Metrics (MetriSec), Bolzano-Bozen, Italy; 2010-09-15; in: "Proc. International Workshop on Security Measurement and Metrics (MetriSec)", G. Succi, M. Morisio, N. Nagappan (ed.); (2010), ISBN: 978-1-4503-0039-1; 1 - 7
- A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects: / A. Tahamtan, A. Anjomshoaa, E. Weippl, A. Tjoa / Talk: 4th International Conference on Knowledge Science, Engineering & Management (KSEM 2010), Belfast; 2010-09-01 - 2010-09-03; in: "Knowledge Science, Engineering & Management", Springer, LNAI 6291 (2010), ISBN: 978-3-642-15279-5; 412 - 423
- Research Challenges in the Security Design and Evaluation of an Engineering Service Bus Platform / C. Frühwirth, S. Biffl, A. Schatten, S. Schrittwieser, E. Weippl, W. Sunindyo / Talk: 36th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA) - Work in Progress Session, Lille, France; 2010-09-01 - 2010-09-03; in: "Proc. 36th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA) - Work in Progress Session", E. Grosspietsch, K. Klöckner (ed.); (2010), ISBN: 978-3-902457-27-1; 1 - 2
- Defect Detection Using Event-Based Process Analysis in (Software+) Engineering Projects / W. Sunindyo, S. Biffl, C. Frühwirth, R. Mordinyi, T Moser, A. Schatten, S. Schrittwieser, E. Weippl, D. Winkler / Talk: 36th Euromicro Conference Software Engineering and Advanced Applications (SEAA 2010) - Work in Progress, Lille, France; 2010-09-01 - 2010-09-03; in: "Proc. 36th Euromicro Conference Software Engineering and Advanced Applications (SEAA 2010) - Work in Progress Session", E. Grosspietsch, K. Klöckner (ed.); COREP Vauban, Lille (2010), ISBN: 978-3-902457-27-1; 1 - 2
- Implementation of Affective States and Learning Styles Tactics in Web-based Learning Management Systems / F. Khan, S. Graf, E. Weippl, A. Tjoa / Talk: 10th IEEE International Conference on Advanced Learning Technologies, Sousse, Tunisia; 2010-07-05 - 2010-07-07; in: "Proceedings of 10th IEEE International Conference on Advanced Learning Technologies", (2010), 734 - 735
- A process model for integrated IT governance, risk, and compliance management / N. Racz, A. Seufert, E. Weippl / Talk: Ninth Baltic Conference on Databases and Information Systems (DB&IS 2010), Riga, Latvia; 2010-07-05 - 2010-07-07; in: "Proceedings of the Ninth Baltic Conference on Databases and Information Systems (DB&IS 2010)", (2010), 155 - 170
- Role of Learning Styles & Affective States in Web-based Adaptive Learning Environments / A. Farman, S. Graf, E. Weippl, A. Tjoa / Talk: World Conference on Educational Multimedia, Hypermedia and Telecommunications (EDMEDIA), Toronto, Canada; 2010-06-29 - 2010-07-03; in: "Proceedings of EDMEDIA 2010", (2010)
- Tor HTTP usage and information leakage / M. Mulazzani, M. Huber, E. Weippl / Talk: Proceedings of IFIP CMS 2010, Linz; 2010-05-31 - 2010-06-02; in: "Proceedings of IFIP CMS 2010", (2010)
- A Frame of Reference for Research of Integrated Governance, Risk & Compliance (GRC) / N. Racz, A. Seufert, E. Weippl / Talk: Proceedings of IFIP CMS 2010, Linz; 2010-05-31 - 2010-06-02; in: "Proceedings of IFIP CMS 2010", (2010)
- Context Oriented Analysis of Web 2.0 Social Network Contents - MindMeister Use-case / A. Anjomshoaa, V. Khue, A. Tjoa, E. Weippl, H. Michael / Talk: ACIIDS 2010, Intelligent Information and Database Systems, Hue City, Vietnam; 2010-03-24 - 2010-03-26; in: "Proceedings of the Asian Conference on Intelligent Information and Database Systems (ACIIDS 2010)", Springer, LNAI 5990 (2010), ISBN: 978-3-642-12144-9; 180 - 189
- Social Engineering / B. Böck, E. Weippl / in: "The Handbook of Technology Management", John Wiley & Sons Ltd., 2010, ISBN: 978-0-470-24950-5
- Anonymity & Monitoring: How to Monitor the Infrastructure of an Anonymity System / M. Mulazzani, M. Huber, E. Weippl / IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 40 (2010), 5; 539 - 546
- Identifying and Incorporating Affective States and Learning Styles in Web-based Learning Management Systems / F. Khan, S. Graf, E. Weippl, A. Tjoa / Interaction Design and Architecture(s) Journal, 9-10 (2010), 85 - 103
- Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten / T. Neubauer, J. Heurix, A. Tjoa, E. Weippl / Elektrotechnik und Informationstechnik (e&i), 127 (2010), 5; 135 - 142
- Exploiting Ontology for Software License Agreements / M. Asfand-E-Yar, A. Anjomshoaa, E. Weippl, A. Tjoa / International Journal of Software and Informatics, 4 (2010), 1; 89 - 100
- InnoDB Database Forensics / P. Frühwirt, M. Huber, M. Mulazzani, E. Weippl / in: "Proceedings of the 24th International Conference on Advanced Information Networking and Applications (AINA 2010)", IEEE Press, 2010
- Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop / M. Ahmed, E. Weippl / in: "Proceedings of the Fifth International Conference on Availability, Reliability and Security (ARES), Workshop on Frontiers in Availability, Reliability and Security (FARES 2010)", IEEE Press, 2010
2009
- Integrated Approach for the Detection of Learning Styles & Affective States / E. Weippl, A. Tjoa, S. Graf, A. Farman / Talk: World Conference on Educational Multimedia, Hypermedia & Telecommunications EDMEDIA 2009, Honolulu, Hawaii; 2009-06-22 - 2009-06-26; in: "Proceedings of ED-MEDIA 2009", (2009), 753 - 761
- Screen Recording for E-Learning / E. Weippl, S. Schnabl / Talk: World Conference on Educational Multimedia, Hypermedia & Telecommunications EDMEDIA 2009, Honolulu, Hawaii; 2009-06-22 - 2009-06-26; in: "Proceedings of ED-MEDIA 2009", (2009), ISBN: 1-880094-73-8; 1271 - 1277
- Security in Data Warehouses / E. Weippl / in: "Data Warehousing Design and Advanced Engineering Applications: Methods for Complex Construction", IGI Global, Hershey, New York, 2009, ISBN: 978-1-60566-756-0, 272 - 279
- Automation Of Post-Exploitation / M. Tabatabai Irani, E. Weippl / International Journal of Web Information Systems (IJWIS), 5 (2009), 4; 518 - 536
- Automation Of Post-Exploitation / M. Tabatabai Irani, E. Weippl / in: "Proceedings of International Conference on Security Technology (SecTech 2009)", Springer LNCS, 2009, ISBN: 978-3-642-10847-1, 250 - 257
- Blending the Sketched Use Case Scenario with License Agreements using Semantics / M. Asfand-E-Yar, A. Anjomshoaa, E. Weippl, A. Tjoa / in: "Proceedings of the 3rd International Conference on Knowledge Science, Engineering and Management, (KSEM 2009)", Springer, LNAI, 2009, ISBN: 978-3-642-10487-9, 275 - 284
- Can End-to-End Verifiable E-Voting be Explained Easily? / P. Kalchgruber, E. Weippl / in: "Proceedings of the 11th International Conference on Information Integration and Web Based Applications and Services (iiWAS2009), Workshop on Emerging Research Projects, Applications and Services (ERPAS2009)", issued by: IIWAS; ACM Press, 2009, ISBN: 978-1-60558-660-1
- An Approach for Identifying Affective States through Behavioral Patterns in Web-based Learning Management System / A. Farman, E. Weippl / in: "Proceedings of the 11th International Conference on Information Integration and Web Based Applications and Services (iiWAS2009)", issued by: IIWAS; ACM, 2009, ISBN: 978-1-60558-660-1
2008
- Semantic Potential of existing Security Advisory Standards / A. Ekelhart, E. Weippl, S. Fenz / Talk: The Forum of Incident Response and Security Teams (FIRST), Vancouver; 2008-06-22 - 2008-06-27; in: "Inproceedings of the FIRST 2008", (2008)
- Fortification of IT security by automatic security advisory processing / E. Weippl, S. Fenz, A. Ekelhart / Talk: 22nd International Conference on Advanced Information Networking and Applications AINA 2008, Okinawa, Japan; 2008-03-25 - 2008-03-28; in: "Proceedings of the 22nd International Conference on Advanced Information Networking and Applications", IEEE Computer Society, (2008), ISBN: 978-0-7695-3095-6; 575 - 582
- OCG IT-Security Zertifikat fuer Nutzer / E. Weippl, M. Klemen, P. Benditsch, G. Futschek / Talk: 11. Internationales Rechtsinformatik Symposium IRIS 2008, Salzburg; 2008-02-21 - 2008-02-23; in: "Proceedings of the 23rd International Information Security Conference (SEC 2008)", (2008), 445 - 448
- Security, Trust and Privacy on Mobile Devices and Multimedia Applications / E. Weippl, B. Riedl / in: "Handbook of Research on Mobile Multimedia, Second Edition", Information Science Reference, 2008, ISBN: 978-1-60566-046-2, 115 - 131
- Improving Storage Concepts for Semantic Models and Ontologies / E. Weippl, M. Klemen / in: "The Semantic Web for Knowlege and Data Management: Technologies and Practices", issued by: Zongmin Ha, Huaiging Wang; Idea Group Publishing, 2008, ISBN: 1605660280, 38 - 48
- ARES 08. Third International Conference on Availability, Reliability and Security, 2008. / S. Tjoa, S. Jakoubi, E. Weippl / IEEE Computer Society Press, 2008, ISBN: 0-7695-3102-4
- ED-MEDIA Conference Proceedings 2008 / E. Weippl, J. Luca / AACE, 2008
- XML Security - A Comparative Literature Review / A. Ekelhart, S. Fenz, G. Goluch, M. Steinkellner, E. Weippl / Journal of Systems and Software (invited), 81 (2008), 10; 1715 - 1724
- Cyber Attacks and the article 5 of the Treaty of NATO / E. Weippl / Euro Atlantic Quartely, 3 (2008), 4; 22
2007
- Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard / S. Fenz, G. Goluch, A. Ekelhart, B. Riedl, E. Weippl / Talk: 13th Pacific Rim International Symposium on Dependable Computing (PRDC 07), Melbourne, Australia; 2007-12-17 - 2007-12-19; in: "Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 07)", Springer, (2007), 381 - 388
- Formal Threat Descriptions for Enhancing Governmental Risk Assessment / A. Ekelhart, S. Fenz, T. Neubauer, E. Weippl / Talk: First International Conference on Theory and Practice of Eletronic Governance (ICEGOV2007), Macau; 2007-12-10 - 2007-12-13; in: "Proceedings of the First International Conference on Theory and Practice of Eletronic Governance (ICEGOV2007)", ACM Press, (2007), ISBN: 978-1-59593-822-0; 40 - 43
- Security Aspects In Semantic Web Services Filtering / W. Abramowicz, A. Ekelhart, S. Fenz, M. Kaczmarek, A. Tjoa, E. Weippl, D. Zyskowski / Poster: 9th International Conference on Information Integration and Web-based Applications & Services (iiWAS2007), Jakarta, Indonesien; 2007-12-03 - 2007-12-05; in: "Proceedings of The 9th International Conference on Information Integration and Web-based Applications and Services (iiWAS2007)", (2007), 21 - 31
- Comparative Literature Review on RFID Security and Privacy / B. Riedl, G. Goluch, S. Pöchlinger, E. Weippl / Poster: 9th International Conference on Information Integration and Web-based Applications & Services (iiWAS2007), Jarkata, Indonesien; 2007-12-03 - 2007-12-05; in: "Proceedings of the 9th International Conference on Information Integration and Web-based Applications & Services (iiWAS 2007)", Österreichische Computer Gesellschaft, 229 (2007), ISBN: 978-3-85403-229-8
- Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse / E. Weippl, K. Latif, A. Tjoa / Talk: IRI 2007 - Information Reuse and Integration, Las Vegas, USA; 2007-08-13 - 2007-08-15; in: "IEEE International Conference on Information Reuse and Integration", (2007), 170 - 176
- Security Ontologies: How to Improve Understanding of Complex Relationships / E. Weippl, S. Fenz, A. Ekelhart / Talk: ED MEDIA 2007, Vancouver, Canada; 2007-06-25 - 2007-06-29; in: "Ed Media 2007", (2007), 404 - 407
- Ontological Mapping of Common Criteria's Security Assurance Requirements / A. Ekelhart, S. Fenz, G. Goluch, E. Weippl / Talk: IFIP TC 11 22nd International Information Security Conference (IFIPSEC2007), Sandton, South Africa; 2007-05-14 - 2007-05-16; in: "Proceedings of the IFIP TC 11 22nd International Information Security Conference, IFIPSEC2007", (2007), 85 - 95
- Security Issues for the Use of Semantic Web in E-Commerce / A. Ekelhart, S. Fenz, A. Tjoa, E. Weippl / Talk: BIS 2007, Poznan, Polen; 2007-04-25 - 2007-04-27; in: "Business Information Systems", Springer, LNCS 4439 (2007), ISBN: 978-3-540-72034-8; 1 - 13
- Forschung und Praxis der Informationssicherheit / E. Weippl / Talk: University meets Public, Vienna; 2007-03-19
- Security Ontologies: Improving Quantitative Risk Analysis / S. Fenz, A. Ekelhart, M. Klemen, E. Weippl / Talk: HICCS 2007, Hawaii; 2007-01-03 - 2007-01-06; in: "HICSS 2007", (2007), 156 - 162
- Database Security and Statistical Database Security / E. Weippl / in: "Encyclopedia of Data Warehousing and Mining", J. Wang (ed.); Idea Group Publishing, 2007
- Social Engineering / M. Klemen, E. Weippl / in: "The Handbook of Computer Networks", John Wiley and Sons, 2007, ISBN: 0471784613
- Business Requirements of Backup Systems / M. Klemen, T. Neubauer, E. Weippl / in: "The Handbook of Computer Networks", John Wiley and Sons, 2007, ISBN: 0471784613
- Architectural approach for handling semi-structured data in an user-centered working environment / A. Ekelhart, S. Fenz, G. Goluch, M. Klemen, E. Weippl / International Journal of Web Information Systems (IJWIS), 3 (2007), 3; 198 - 211
- Dependability in e-assessment / E. Weippl / international journal on e-learning (invited), 6 (2007), 2; 293 - 302
2006
- Security Ontology: Simulating Threats to Corporate Assets / M. Klemen, E. Weippl, A. Ekelhart, S. Fenz / Talk: ICISS 2006, Calcutta; 2006-12-19 - 2006-12-21; in: "Proceedings of the 2nd International Conference on Information Systems Security(ICISS 2006)", Springer, (2006), ISBN: 3-540-68962-1; 249 - 259
- Workshop-based Multiobjective Security Safeguard Selection / T. Neubauer, C. Stummer, E. Weippl / Talk: First International Conference on Availability, Reliability and Security (ARES'06), Wien; 2006-04-20; in: "Proceedings of the First International Conference on Availability, Reliability and Security", IEEE Computer Society, (2006), 366 - 373
- Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF / T. Neubauer, E. Weippl, S. Biffl / Talk: First International Conference on Availability, Reliability and Security (ARES'06), Vienna; 2006-04-20 - 2006-04-22; in: "First International Conference on Availability, Reliability and Security (ARES'06)", IEEE Computer Society, California, USA (2006), ISBN: 0-7695-2567-9; 723 - 731
- Digitale PDF-Signaturen mit der Bürgerkarte / E. Weippl / Talk: D-A-CH 2006, Duesseldorf; 2006-04-01; in: "Proceedings of D-A-CH 2006", (2006)
- Implementing IT Security for Small and Medium-Sized Enterprises / E. Weippl, M. Klemen / in: "Enterprise Information Systems Assurance and System Managerial and Technical Issues", Idea Group Publishing, 2006, ISBN: 1-59140-911-x
- Security and Trust in Mobile Multimedia / E. Weippl / in: "Handbook of Research on Mobile Multimedia", Idea Group Publishing, 2006, ISBN: 1-59140-866-0, 22 - 37
- Securing Mobile Communication: RADIUS in a Windows Environment / E. Weippl / in: "Mobile Multimedia: Communication Engineering Perspective", Nova Science Publishers, 2006, ISBN: 1-60021-207-7, 22 - 37
- Computer Security in the Context of E-Learning / E. Weippl / in: "Encyclopedia of E-Commerce, E-Government and Mobile Commerce", Idea Group Publishing, 2006, ISBN: 1-59140-799-0, 135 - 141
- Security Aspects of Ubiquitious Computing in Health Care / E. Weippl, A. Tjoa / Elektrotechnik und Informationstechnik, 123 (2006), 4; 156 - 161
- Sarbanes-Oxley Act Compliance: Strategies for Implementing a Audit Committee Complaints Procedure / E. Weippl / Information Systems Control Journal, 4 (2006), 10
- Ontology-based IT-Security planning / E. Weippl, S. Fenz / Talk: 2006 IEEE International Symposium Pacific Rim Dependable Computing, California, USA; 2006; in: "Proceedings of the 2006 IEEE International Symposium Pacific Rim Dependable Computing (PRDC'06)", (2006), 389 - 390
- Workshop-based Multiobjective Security Safeguard Selection / T. Neubauer, E. Weippl / Talk: IEEE Computer Society, Vienna; 2006 - 2006; in: "Proceedings of ARES 2006", (2006), ISBN: 0-7695-2567-9
- Nichtabstreitbarkeit und Audits in ELearning / E. Weippl, G. Goluch / Talk: IRIS, Vienna; 2006; in: "IRIS 2006", (2006)
- Addressing the Weakest Link: How to improve teaching of IT security / E. Weippl / Talk: EDMEDIA 2006, Orlando; 2006 - 2006; in: "Proceedings of EDMEDIA 2006", (2006), ISBN: 1-880094-59-2; 223 - 227
- Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets / A. Tjoa, E. Weippl, M. Klemen, A. Ekelhart, S. Fenz / Talk: 6th International Conference on Practical Aspects of Knowledge Management (PAKM), Vienna; 2006; in: "Proceedings of the 6th International Conference on Practical Aspects of Knowledge Management", Springer, (2006), ISBN 978-3-540-49998-5/ ISSN 0302-9743; 37 - 48
2005
- Non-repudiation and audits in e-learning / E. Weippl / Talk: Proceedings of E-Learn, Vancouver, Canada (invited); 2005-10-24 - 2005-10-28; in: "Proceedings of E-Learn 2005", (2005), 1785 - 1790
- On cooperatively creating dynamic ontologies / E. Gahleitner, J. Palkoska, E. Weippl et al. / Talk: Proceedings of the 16th ACM Conference on Hypertext and Hypermedia, Salzburg; 2005-09-06 - 2005-09-09; in: "Proceedings of the 16th ACM Conference on Hypertext and Hypermedia", (2005)
- The Semantic Desktop: A Semantic Personal Information Management System based on RDF and Topic Maps / E. Weippl, M. Klemen, S. Fenz, A. Ekelhart, A. Tjoa / Talk: ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB), Trondheim, Norway; 2005-09-02 - 2005-09-03; in: "Proceedings of the ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB) 2005", (2005), 135 - 151
- The semantic desktop: A semantic personal information management system based on rdf and topic maps / M. Klemen, E. Weippl, A. Tjoa / Talk: ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB), Trondheim; 2005-08-30 - 2005-09-02; in: "In Proceedings the ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB)", ACM, (2005)
- Semantic Storage: A Report on Performance and Flexibility / E. Weippl, M. Klemen, M. Linnert, S. Fenz, G. Goluch, A. Tjoa / Talk: 16th International Conference on Database and Expert Systems Applications (DEXA2005), Copenhagen, Denmark; 2005-08-22 - 2005-08-26; in: "Database and Expert Systems Applications", Springer Berlin / Heidelberg, (2005), ISBN: 978-3-540-28566-3; 586 - 595
- E-Learning without Text and Language: A Language-Free Learning Model / H. Kalinyaprak, G. Futschek, G. Blaha, E. Weippl / Talk: World Conference on Educational Multimedia, Hypermedia and Telecommunications (EDMEDIA), Montreal / Kanada; 2005-06-27 - 2005-07-02; in: "ED-MEDIA 2005", (2005)
- Privacy in e-learning: How to implement anonymity / E. Weippl, A. Tjoa / Talk: International Workshop on e-Learning Online Communities - eLOC 2005, Cairo; 2005-01-03 - 2005-01-03; in: "Proceedings the 3rd ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-05), Workshop on E-Learning Online Communities (eLOC)", IEEE Computer Society Press, (2005)
- Security in E-Learning / E. Weippl / Springer, 2005, ISBN: 0-387-24341-0; 185 pages
- Security in E-Learning / E. Weippl / in: "The Handbook of Information Security", John Wiley and Sons, 2005, ISBN: 0-471-64833-7
- Toward a Grid-Based Zero-Latency Data Warehousing Implementation for Continuous Data Streams Processing / M. Nguyen, A. Tjoa, E. Weippl, P. Brezany / International Journal of Data Warehousing and Mining, Idea Group (2005), Vol. 1- Issue 4; 22 - 55
- Security in e-learning / E. Weippl / ACM eLearn, 2005 (2005), 3
- Privacy in e-learning: Anonymity, pseudonyms and authenticated usage / E. Weippl, A. Tjoa / Interactive Technology and Smart Education (ITSE), 2005 (2005), 2; 247 - 256
- Dependability in e-assessment / E. Weippl / in: "Proceedings of EDMEDIA 2005", AACE, 2005, 1674 - 1679
- Semantic storage: A report on performance and flexibility / E. Weippl, M. Klemen, A. Tjoa et al. / in: "Proceedings of DEXA, LNCS", Springer, 2005, 586 - 595
- On the use of test centers in e-assessment / E. Weippl / elearningreports.com, elearningreports.com (2005)
2004
- SemanticLIFE collaboration: Security requirements and solutions - security aspects of semantic knowledge management / E. Weippl, A. Schatten, S. Karim, A. Tjoa / Talk: 5th International Conference on Practical Aspects of Knowledge Management (PAKM), Wien; 2004-12-02 - 2004-12-03; in: "Proceedings of the 5th International Conference on Practical Aspects of Knowledge Management (PAKM)", Springer LNCS, Wien (2004), ISBN: 3-540-24088-8; 365 - 374
- From Maintenance to Evolutionary Development of Web Applications: A Pragmatic Approach / R. Ramler, K. Wolfmaier, E. Weippl / Talk: International Conference on Web Engineering, Munich; 2004-07-28 - 2004-07-30; in: "Proceedings of ICWE 2004", Springer, LNCS, (2004), ISBN: 3-540-22511-0; 287 - 299
- Content-basierte Zugriffsrechte in E-Learning Systemen / E. Weippl, M. Klemen / ÖGAI Journal, 23 (2004), 4; 24 - 29
- Role-based access controls: Status, dissemination, and prospects for generic security mechanisms / W. Essmayr, E. Weippl, S Probst / International Journal of Electronic Commerce Research, 4 (2004), 1; 127 - 156
- Security in mobile multimedia / E. Weippl / Journal of Communication Engineering, 1 (2004), 1; 59 - 69
- Interactivity - A Possible Answer to Fundamental Security Threats to E-Learning Content: Securing E-Textbooks / E. Weippl / in: "Proceedings of ED-MEDIA", AACE, 2004, 363 - 369
- Revisiting Mandatory Access Control: Improving the security of e-learning systems / E. Weippl, G. Quirchmayr / in: "Proceedings of International Conference on Communication and Computer Networks (CCN 2004)", issued by: IASTED; ACTA Press, 2004, ISBN: 0-88986-431-4
- Improving Security in Mobile E-Learning / E. Weippl / in: "Proceedings of EDMEDIA 2004", AACE, 2004, 209 - 216
Supervisions
Note: Due to the rollout of TU Wien’s new publication database, the list below may be slightly outdated. Once APIs for the new database have been released, everything will be up to date again.
- A bionic view on complex software systems - and the consequences for digital resilience / Master Thesis by V. Tomic / Supervisor: E. Weippl, A. Schatten; Institut für Information Systems Engineering, 2021
- Zero-Rating, One Big Mess: Analyzing Differential Pricing Practices of European Mobile Network Operators / Master Thesis by G. Gegenhuber / Supervisor: E. Weippl; Institut für Information Systems Engineering, 2021
- Object Capabilities and Their Benefits for Web Application Security / Master Thesis by M. Koppmann / Supervisor: E. Weippl; Institut für Information Systems Engineering, 2021
- Comparison and Evaluation of the attacks and defenses against Adversarial attacks / Master Thesis by A. Jankovic / Supervisor: E. Weippl, R. Mayer; Institut für Information Systems Engineering, 2021
- Backdoor defenses / Master Thesis by A. Milakovic / Supervisor: E. Weippl, R. Mayer; Institut für Information Systems Engineering, 2021
- Investigating Router Misconfigurations on the IPv6 Internet / Master Thesis by M. Maier / Supervisor: E. Weippl; Institut für Information Systems Engineering, 2021
- Privacy-Preserving Remote Attestation Protocol / Master Thesis by D. George / Supervisor: E. Weippl, G. Merzdovnik; Institut für Information Systems Engineering, 2021
- Securing Group Communication in Critical Infrastructures / Doctoral Thesis by R. Annessi / Supervisor, Reviewer: T. Zseby, A. Perrig, E. Weippl; E389, 2019; oral examination: 2019-03-28
- Geheime Kommunikation im Internet / Doctoral Thesis by J. Ullrich / Supervisor, Reviewer: E. Weippl, T. Zseby, D. Balzarotti, G. Pernul; Institute of Software Technology and Interactive Systems, 2016; oral examination: 2016-10-28
- Malware Through the Looking Glass: Malware Analysis in an Evolving Threat Landscape / Doctoral Thesis by M. Lindorfer / Supervisor, Reviewer: E. Weippl, T. Holz, E. Kirda; Institut für Rechnergestützte Automation, 2016; oral examination: 2016-02-02
- Appropriate Obfuscation of Location Information on an Application Level for Mobile Devices / Master Thesis by C. Hochreiner / Supervisor: E. Weippl; Institut für Softwaretechnik und Interaktive Systeme, 2014
- Lower-Latency Anonymity - Latency Reduction in the Tor Network using Circuit-Level Round-Trip-Time Measurements / Master Thesis by R. Annessi / Supervisor: E. Weippl, M. Mulazzani; Information & Software Engineering Group, 2014
Awards
-
Award for the 2nd highest CISA exam (2005) score in Europe and Africa.
2006 / USA
And more…
Soon, this page will include additional information such as reference projects, activities as journal reviewer and editor, memberships in councils and committees, and other research activities.
Until then, please visit Edgar Weippl’s research profile in TISS .