TU Wien Informatics

Edgar Weippl

Privatdoz. Mag.rer.soc.oec. Dipl.-Ing. Dr.techn.

Research Areas

  • IT-Security, E-Learning
Edgar Weippl

Role

2018

  • Botnets causing blackouts: How Coordinated load attacks can destabilize the power grid / A. Dabrowski, J. Ullrich, E. Weippl / Journal e&i: Elektrotechnik und Informationstechnik, 135 (2018), 3; 250 - 255
  • On Security Research towards Future Mobile Network Generations / D. Rupprecht, A. Dabrowski, T. Holz, E. Weippl, C. Pöpper / IEEE Communications Surveys & Tutorials, 20 (2018), 3; 24 pages
  • Machine Learning and Knowledge Extraction / A. Holzinger, P. Kieseberg, A. Tjoa, E. Weippl / Talk: International Cross-Domain Conference, CD-Make 2018, Hamburg; 2018-08-27 - 2018-08-30; in: "Springer Lecture Notes in Computer Science 11015, Second IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/ WG 12.9, International Cross-Domain Conference, CD-Make 2018, Hamburg, Germany, August 27-30, 2018, Proceedings", Sprinter Lecture Notes in Computer Science, 11015 (2018), ISBN: 978-3-319-99740-7; 1 - 7
  • Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques / A. Judmayer, N. Stifter, P. Schindler, E. Weippl / Talk: 2018 International Workshop on Cryptocurrencies and Blockchain Technology (CBT 2018), Barcelona, Catalonia; 2018-09-06 - 2018-09-07; in: "Springer Data Privacy Management, Cryptocurrencies and Blockchain Technology", Springer Lecture Notes in Computer Science, 11025 (2018), 197 - 206
  • A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice / A. Zamyatin, N. Stifter, A. Judmayer, P. Schindler, E. Weippl, W.J. Knottenbelt / Talk: 5th Workshop on Bitcoin and Blockchain Research at Financial Cryptography and Data Security 2018, Curacao, Santa Barbara Beach Resort; 2018-03-02; in: "Proceedings of Bitcoin 2018", Sprinter Lecture Notes in Computer Science, (2018)
  • Structural Limitations of B+-Tree forensics / P. Kieseberg, S. Schrittwieser, E. Weippl / Talk: Central European Cybersecurity Conference 2018, Ljubljana, Slowenia; 2018-11-15 - 2018-11-16; in: "International Conference Proceedings Series ACM Digital Library", ACM Digital Library, 9 (2018), ISBN: 978-1-4503-6515-4
  • USBlock: Blocking USB-Based Keypress Injection Attacks / S. Neuner, A. Voyiatzis, S. Fotopoulos, C. Mulliner, E. Weippl / Talk: IFIP Annual Conference on Data and Applications Security and Privacy, Bergamo, Italy; 2018-07-16 - 2018-07-18; in: "Data and Applications Security and Privacy XXXII", Springer Lecture Notes in Computer Science, 10980 (2018), 278 - 295
  • Security Challenges in Cyber-Physical Production Systems / P. Kieseberg, E. Weippl / Talk: Software Quality Days 2018 (SWQD 2018), Wien; 2018-01-16 - 2018-01-19; in: "Software Quality: Methods and Tools for Better Software and Systems", Springer Lecture Notes in Business Information Processing, 302 (2018), 3 - 16
  • Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids / J. Ullrich, N. Stifter, A. Judmayer, A. Dabrowski, E. Weippl / Talk: 21st International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2018), Heraklion, Crete, Greece; 2018-09-10 - 2018-09-12; in: "Research in Attacks, Intrusions, and Defenses", Springer in the Lecture Notes in Computer Science series, 11050 (2018), 184 - 203
  • A Framework for Monitoring Net Neutrality / W. Mayer, T. Schreiber, E. Weippl / Talk: The 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany; 2018-08-27 - 2018-08-30; in: "The 13th International Conference on Availability, Reliability and Security (ARES 2018)", ACM International Conference Proceeding Series, (2018), ISBN: 978-1-4503-6448-5

2017

2016

2015

  • Advanced social engineering attacks / K. Krombholz, H. Hobel, M. Huber, E. Weippl / Journal of Information Security and Applications, 22 (2015), 113 - 122
  • Network Security Challenges in Android Applications / D. Buhov, M. Huber, G. Merzdovnik, E. Weippl, V. Dimitrova / Talk: 10th International Conference on Availability, Reliability and Security (ARES), 2015, Toulouse, France; 2015-08-24 - 2015-08-28; in: "Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES)", IEEE, (2015), 327 - 332
  • Gradually Improving the Forensic Process / S. Neuner, M. Mulazzani, S. Schrittwieser, E. Weippl / Talk: 4th International Workshop on Cyber Crime (IWCC), 2015, Toulouse, France; 2015-08-24 - 2015-08-28; in: "Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES)", IEEE, (2015), 404 - 410
  • Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education / A. Dabrowski, M. Kammerstetter, E. Thamm, E. Weippl, W. Kastner / Talk: 2015 USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE 15), Washington, D.C.; 2015-08-11; in: "Proceedings of the 2015 USENIX Summit on Gaming, Games and Gamification in Security Education", USENIX, (2015)
  • Error-Correcting Codes as Source for Decoding Ambiguity / A. Dabrowski, I. Echizen, E. Weippl / Talk: 2nd Workshop on Language Theoretic Security (LangSec), IEEE Security & Privacy, San Jose, California; 2015-05-21; in: "Proceedings of the 2nd Workshop on Language Theoretic Security (LangSec)", (2015)
  • Smart Privacy Visor: Bridging the Privacy Gap / A. Dabrowski, K. Krombholz, E. Weippl, I. Echizen / Talk: Workshop on Privacy by Transparency in Data-Centric Services (PTDCS 2015), BIS 2015, Poznan, Poland; 2015-06-24 - 2015-06-26; in: "Business Information Systems Workshops - BIS 2015 International Workshops", Springer International Publishing, (2015), 235 - 247
  • Privacy is Not an Option: Attacking the IPv6 Privacy Extension / J. Ullrich, E. Weippl / Talk: 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Kyoto, Japan; 2015-11-02 - 2015-11-04; in: "Proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)", Springer Lecture Notes in Computer Science, (2015), 448 - 468
  • On Reconnaissance with IPv6: A Pattern-Based Scanning Approach / J. Ullrich, P. Kieseberg, K. Krombholz, E. Weippl / Talk: 10th International Conference on Availability, Reliability and Security (ARES), 2015, Toulouse, France; 2015-08-24 - 2015-08-28; in: "Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES)", IEEE, (2015), 186 - 192
  • QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes / K. Krombholz, P. Frühwirt, T. Rieder, I. Kapsalis, J. Ullrich, E. Weippl / Talk: 10th International Conference on Availability, Reliability and Security (ARES), 2015, Toulouse, France; 2015-08-24 - 2015-08-28; in: "Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES)", IEEE, (2015), 230 - 237
  • Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology / K. Krombholz, C. Frauenberger, E. Weippl / Talk: Workshop on Inclusive Privacy and Security (WIPS), Symposium On Usable Privacy and Security 2015 (SOUPS 2015), Ottawa, Canada; 2015-07-22 - 2015-07-24; in: "SOUPS '15 Full Proceedings", USENIX, (2015)
  • Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing / K. Krombholz, A. Dabrowski, M. Smith, E. Weippl / Talk: 1st Workshop on Wearable Security and Privacy, Financial Crypto 2015, Puerto Rico; 2015-01-30; in: "Financial Cryptography and Data Security FC 2015 International Workshops", Springer, (2015), ISBN: 978-3-662-48051-9

2014

2013

2012

2011

2010

2009

2008

2007

2006

2005

2004

 

  • Award for the 2nd highest CISA exam (2005) score in Europe and Africa. / USA / 2006

Soon, this page will include additional information such as reference projects, activities as journal reviewer and editor, memberships in councils and committees, and other research activities.

Until then, please visit Edgar Weippl’s research profile in TISS .