TU Wien Informatics

Role

2022W

 

Note: Due to the rollout of TU Wien’s new publication database, the list below may be slightly outdated. Once APIs for the new database have been released, everything will be up to date again.

2021

2020

2019

2018

  • Structural Limitations of B+-Tree forensics / P. Kieseberg, S. Schrittwieser, E. Weippl / Talk: Central European Cybersecurity Conference 2018, Ljubljana, Slowenia; 2018-11-15 - 2018-11-16; in: "International Conference Proceedings Series ACM Digital Library", ACM Digital Library, 9 (2018), ISBN: 978-1-4503-6515-4
  • Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids / J. Ullrich, N. Stifter, A. Judmayer, A. Dabrowski, E. Weippl / Talk: 21st International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2018), Heraklion, Crete, Greece; 2018-09-10 - 2018-09-12; in: "Research in Attacks, Intrusions, and Defenses", Springer in the Lecture Notes in Computer Science series, 11050 (2018), 184 - 203
  • Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques / A. Judmayer, N. Stifter, P. Schindler, E. Weippl / Talk: 2018 International Workshop on Cryptocurrencies and Blockchain Technology (CBT 2018), Barcelona, Catalonia; 2018-09-06 - 2018-09-07; in: "Springer Data Privacy Management, Cryptocurrencies and Blockchain Technology", Springer Lecture Notes in Computer Science, 11025 (2018), 197 - 206
  • Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI. / A. Holzinger, P. Kieseberg, E. Weippl, A. Tjoa / Talk: International IFIP Cross Domain (CD) Conference for Machine Learning & Knowledge Extraction (MAKE), CD-MAKE 2018, Hamburg, Germany; 2018-08-27 - 2018-08-30; in: "CD-MAKE 2018: Machine Learning and Knowledge Extraction - Second IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/WG 12.9 International Cross-Domain Conference", Springer, 11015 (2018), ISBN: 978-3-319-99739-1; 1 - 8
  • Machine Learning and Knowledge Extraction / A. Holzinger, P. Kieseberg, A. Tjoa, E. Weippl / Talk: International Cross-Domain Conference, CD-Make 2018, Hamburg; 2018-08-27 - 2018-08-30; in: "Springer Lecture Notes in Computer Science 11015, Second IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/ WG 12.9, International Cross-Domain Conference, CD-Make 2018, Hamburg, Germany, August 27-30, 2018, Proceedings", Sprinter Lecture Notes in Computer Science, 11015 (2018), ISBN: 978-3-319-99740-7; 1 - 7
  • A Framework for Monitoring Net Neutrality / W. Mayer, T. Schreiber, E. Weippl / Talk: The 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany; 2018-08-27 - 2018-08-30; in: "The 13th International Conference on Availability, Reliability and Security (ARES 2018)", ACM International Conference Proceeding Series, (2018), ISBN: 978-1-4503-6448-5
  • USBlock: Blocking USB-Based Keypress Injection Attacks / S. Neuner, A. Voyiatzis, S. Fotopoulos, C. Mulliner, E. Weippl / Talk: IFIP Annual Conference on Data and Applications Security and Privacy, Bergamo, Italy; 2018-07-16 - 2018-07-18; in: "Data and Applications Security and Privacy XXXII", Springer Lecture Notes in Computer Science, 10980 (2018), 278 - 295
  • A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice / A. Zamyatin, N. Stifter, A. Judmayer, P. Schindler, E. Weippl, W.J. Knottenbelt / Talk: 5th Workshop on Bitcoin and Blockchain Research at Financial Cryptography and Data Security 2018, Curacao, Santa Barbara Beach Resort; 2018-03-02; in: "Proceedings of Bitcoin 2018", Sprinter Lecture Notes in Computer Science, (2018)
  • Security Challenges in Cyber-Physical Production Systems / P. Kieseberg, E. Weippl / Talk: Software Quality Days 2018 (SWQD 2018), Wien; 2018-01-16 - 2018-01-19; in: "Software Quality: Methods and Tools for Better Software and Systems", Springer Lecture Notes in Business Information Processing, 302 (2018), 3 - 16
  • Botnets causing blackouts: How Coordinated load attacks can destabilize the power grid / A. Dabrowski, J. Ullrich, E. Weippl / Journal e&i: Elektrotechnik und Informationstechnik, 135 (2018), 3; 250 - 255
  • On Security Research towards Future Mobile Network Generations / D. Rupprecht, A. Dabrowski, T. Holz, E. Weippl, C. Pöpper / IEEE Communications Surveys & Tutorials, 20 (2018), 3; 24 pages

2017

2016

2015

  • Privacy is Not an Option: Attacking the IPv6 Privacy Extension / J. Ullrich, E. Weippl / Talk: 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Kyoto, Japan; 2015-11-02 - 2015-11-04; in: "Proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)", Springer Lecture Notes in Computer Science, (2015), 448 - 468
  • Network Security Challenges in Android Applications / D. Buhov, M. Huber, G. Merzdovnik, E. Weippl, V. Dimitrova / Talk: 10th International Conference on Availability, Reliability and Security (ARES), 2015, Toulouse, France; 2015-08-24 - 2015-08-28; in: "Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES)", IEEE, (2015), 327 - 332
  • Gradually Improving the Forensic Process / S. Neuner, M. Mulazzani, S. Schrittwieser, E. Weippl / Talk: 4th International Workshop on Cyber Crime (IWCC), 2015, Toulouse, France; 2015-08-24 - 2015-08-28; in: "Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES)", IEEE, (2015), 404 - 410
  • On Reconnaissance with IPv6: A Pattern-Based Scanning Approach / J. Ullrich, P. Kieseberg, K. Krombholz, E. Weippl / Talk: 10th International Conference on Availability, Reliability and Security (ARES), 2015, Toulouse, France; 2015-08-24 - 2015-08-28; in: "Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES)", IEEE, (2015), 186 - 192
  • QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes / K. Krombholz, P. Frühwirt, T. Rieder, I. Kapsalis, J. Ullrich, E. Weippl / Talk: 10th International Conference on Availability, Reliability and Security (ARES), 2015, Toulouse, France; 2015-08-24 - 2015-08-28; in: "Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES)", IEEE, (2015), 230 - 237
  • Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education / A. Dabrowski, M. Kammerstetter, E. Thamm, E. Weippl, W. Kastner / Talk: 2015 USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE 15), Washington, D.C.; 2015-08-11; in: "Proceedings of the 2015 USENIX Summit on Gaming, Games and Gamification in Security Education", USENIX, (2015)
  • Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology / K. Krombholz, C. Frauenberger, E. Weippl / Talk: Workshop on Inclusive Privacy and Security (WIPS), Symposium On Usable Privacy and Security 2015 (SOUPS 2015), Ottawa, Canada; 2015-07-22 - 2015-07-24; in: "SOUPS '15 Full Proceedings", USENIX, (2015)
  • Smart Privacy Visor: Bridging the Privacy Gap / A. Dabrowski, K. Krombholz, E. Weippl, I. Echizen / Talk: Workshop on Privacy by Transparency in Data-Centric Services (PTDCS 2015), BIS 2015, Poznan, Poland; 2015-06-24 - 2015-06-26; in: "Business Information Systems Workshops - BIS 2015 International Workshops", Springer International Publishing, (2015), 235 - 247
  • Error-Correcting Codes as Source for Decoding Ambiguity / A. Dabrowski, I. Echizen, E. Weippl / Talk: 2nd Workshop on Language Theoretic Security (LangSec), IEEE Security & Privacy, San Jose, California; 2015-05-21; in: "Proceedings of the 2nd Workshop on Language Theoretic Security (LangSec)", (2015)
  • Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing / K. Krombholz, A. Dabrowski, M. Smith, E. Weippl / Talk: 1st Workshop on Wearable Security and Privacy, Financial Crypto 2015, Puerto Rico; 2015-01-30; in: "Financial Cryptography and Data Security FC 2015 International Workshops", Springer, (2015), ISBN: 978-3-662-48051-9
  • Advanced social engineering attacks / K. Krombholz, H. Hobel, M. Huber, E. Weippl / Journal of Information Security and Applications, 22 (2015), 113 - 122

2014

2013

2012

2011

2010

2009

2008

2007

2006

2005

2004

 

Note: Due to the rollout of TU Wien’s new publication database, the list below may be slightly outdated. Once APIs for the new database have been released, everything will be up to date again.

  • Award for the 2nd highest CISA exam (2005) score in Europe and Africa.
    2006 / USA

Soon, this page will include additional information such as reference projects, activities as journal reviewer and editor, memberships in councils and committees, and other research activities.

Until then, please visit Edgar Weippl’s research profile in TISS .