Martin Schmiedecker
Univ.Lektor Dipl.-Ing. Dr.techn.
Role
-
External Lecturer
Information Systems Engineering, E194
Courses
Projects
-
TRUDIE - Trust Relationships in Underground IT Economies
2009 – 2012 / Austrian Research Promotion Agency (FFG)
Publications
- Real-time forensics through endpoint visibility / P. Kieseberg, S. Neuner, S. Schrittwieser, M Schmiedecker, E. Weippl / Talk: 9th EAI International Conference on Digital Forensics & Cyber Crime, Prague, Czech Republic; 2017-10-09 - 2017-10-11; in: "Proceedings of the 9th EAI International Conference on Digital Forensics & Cyber Crime", LNICST SpringerLink Digital Library, (2017)
- Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS / S. Neuner, A. Voyiatzis, M Schmiedecker, E. Weippl / Talk: 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio Calabria, Italy; 2017-08-29 - 2017-09-01; in: "Proceedings of ARES 2017 (ACM International Conference Proceedings Series)", (2017)
- Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools / G. Merzdovnik, M. Huber, D. Buhov, N. Nikiforakis, S. Neuner, M Schmiedecker, E. Weippl / Talk: 2nd IEEE European Symposium on Security and Privacy (EuroS&P), Paris, France; 2017-04-26 - 2017-04-28; in: "Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P)", (2017)
- NavigaTor: Finding Faster Paths to Anonymity / R. Annessi, M Schmiedecker / Talk: 1st IEEE European Symposium on Security and Privacy, Saarbrücken; 2016-03-21 - 2016-03-24; in: "IEEE European Symposium on Security and Privacy (Euro S&P)", (2016), 13 pages
- Effectiveness of file‐based deduplication in digital forensics / S. Neuner, M Schmiedecker, E. Weippl / Security And Communication Networks, 9 (2016), 15; 2876 - 2885
- Gradually Improving the Forensic Process / S. Neuner, M. Mulazzani, S. Schrittwieser, E. Weippl / Talk: 4th International Workshop on Cyber Crime (IWCC), 2015, Toulouse, France; 2015-08-24 - 2015-08-28; in: "Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES)", IEEE, (2015), 404 - 410
- Ethik in der Sicherheitsforschung / S. Schrittwieser, M. Mulazzani, E. Weippl, S. Panhans / Talk: DACH Security 2013, Nürnberg; 2013-09-17 - 2013-09-18; in: "D-A-CH Security 2013", (2013), ISBN: 9783000420979
- Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting / M. Mulazzani, S. Schrittwieser, P. Reschl, M. Leithner, E. Weippl, M. Huber / Talk: Web 2.0 Security & Privacy 2013, San Francisco; 2013-05-24
- Covert Computation - Hiding Code in Code for Obfuscation Purposes / S. Schrittwieser, M. Huber, M. Leithner, M. Mulazzani, S. Katzenbeisser, E. Weippl, P. Kieseberg / Talk: ASIA CCS '13 8th ACM Symposium on Information, Computer and Communications Security, Hangzhou; 2013-05-08 - 2013-05-10; in: "Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security", 1 (2013), ISBN: 978-1-4503-1767-2
- Quantifying Windows File Slack in Size and Stability / M. Mulazzani, S. Neuner, S. Schrittwieser, E. Weippl, P. Kieseberg, M. Huber / in: "Advances in Digital Forensics IX", Springer, 1, 2013, ISBN: 978-3-642-41147-2
- Using the Structure of B+ Trees for Enhancing Logging Mechanisms of Databases / P. Kieseberg, S. Schrittwieser, L. Morgan, M. Mulazzani, M. Huber, E. Weippl / Talk: IIWAS International Conference on Information Integration, Web-Applications and Services, Ho Chi Minh City; 2011-12-05 - 2011-12-07; in: "Proceedings of the 13th International Conference on Information Integration and Web-based Applications & Services", (2011)
- Social Snapshots: Digital Forensics for Online Social Networks / M. Huber, M. Mulazzani, M. Leithner, S. Schrittwieser, G. Wondracek, E. Weippl / Talk: Annual Computer Security Applications Conference (ACSAC), Orlando, FL; 2011-12-05 - 2011-12-09; in: "Proceedings of 27th Annual Computer Security Applications Conference (ACSAC)", (2011), 113 - 122
- Poster Abstract: Efficient Browser Identification with JavaScript Engine Fingerprinting / P. Reschl, M. Mulazzani, M. Huber, E. Weippl / Poster: Annual Computer Security Applications Conference (ACSAC), Orlando, FL; 2011-12-05 - 2011-12-09
- Cloud Speicherdienste als Angriffsvektoren / M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, E. Weippl / Talk: Sicherheitskonferenz Krems, Krems; 2011-10-27; in: "Proceedings of 9. Sicherheitskonferenz Krems", (2011)
- Trees Cannot Lie: Using Data Structures for Forensics Purposes / P. Kieseberg, S. Schrittwieser, M. Mulazzani, M. Huber, E. Weippl / Talk: European Intelligence and Security Informatics Conference 2011, Athens; 2011-09-12 - 2011-09-14; in: "Proceedings of the European Intelligence and Security Informatics Conference", (2011), ISBN: 978-0-7695-4406-9
- Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space / M. Mulazzani, S. Schrittwieser, M. Huber, M. Leithner, E. Weippl / Talk: Usenix Security Symposium, San Francisco; 2011-08-08 - 2011-08-12; in: "Proceedings of 20th USENIX Security Symposium", (2011)
- Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam / M. Huber, M. Mulazzani, E. Weippl, G. Kitzler, S. Goluch / IEEE Internet Computing, Special Issue on Security and Privacy in Social Networks (2011)
Supervisions
- Lower-Latency Anonymity - Latency Reduction in the Tor Network using Circuit-Level Round-Trip-Time Measurements / Master Thesis by R. Annessi / Supervisor: E. Weippl, M. Mulazzani; Information & Software Engineering Group, 2014