Josef Ressel Zentrum für konsolidierte Erkennung gezielter Angriffe (TARGET)

Publikationen

Typen
Von
Bis
Luh, Robert, & Schrittwieser, S. (2019). Advanced threat intelligence: detection and classification of anomalous behavior in system processes. E \& i Elektrotechnik Und Informationstechnik, Springer, 1–7.
Pirker, M. (2019, November). More Data - More Security? Invited Talk presented at the TOP Alumni Club, TU Wien.
Pirker, M. (2019, October). Digitale Probleme....für Alle! Presented at the PrivacyWeek, Wien.
Schrittwieser, S. (2019, September). Sicherheit von Container-Virtualisierung. Invited Talk presented at the IDC Security Roadshow Vienna, Wien.
Luh, R., Janicke, H., & Schrittwieser, S. (2019). AIDIS: Detecting and classifying anomalous behavior in ubiquitous kernel processes. Computers & Security, (84), 120–147. https://doi.org/https://doi.org/10.1016/j.cose.2019.03.015
Luh, R. (2019). Advanced Threat Intelligence: Interpretation of Anomalous Behavior in Ubiquitous Kernel Processes (Dissertation). De Monfort University Leicester.
Wenzl, M., Merzdovnik, G., Ullrich, J., & Weippl, E. (2019). From Hack to Elaborate Technique—A Survey on Binary Rewriting. ACM Computing Surveys, 52(3 / Artikel 49).
Pirker, M. (2019, March). (Big) Data (Science) für Security. Invited Talk presented at the Vienna Data Science Group, Wien.
Pirker, M. (2019, February). Robustes Parsen von Inputdaten. Presented at the Sec4dev, Wien.
Dabrowski, A., Merzdovnik, G., Ullrich, J., Sendera, G., & Weippl, E. (2019). Measuring cookies and Web privacy in a post-GDPR world. In Passive and Active Measurement (p. pp 258-270). Chile: Springer.
Schrittwieser, S. (2019, 08.-16.08). Software Protection through Obfusction - Can it keep pace with progress in code analysis? Invited Talk presented at the Dagstuhl Seminar on Software Protection Decision Support and Evaluation Methodologies, Dagstuhl.
Dam, T., Klausner, L. D., Buhov, D., & Schrittwieser, S. (2019). Large-Scale Analysis of Pop-Up Scam on Typosquatting URLs. In Proceedings of the 14th International Conference on Availability, Reliability and Security (pp. 53:1–53:9). Canterbury, United Kingdom: ACM.
Luh, R., Schramm, G., Wagner, M., Janicke, H., & Schrittwieser, S. (2018). SEQUIN: a grammar inference framework for analyzing malicious system behavior. Journal of Computer Virology and Hacking Techniques, 01–21. https://doi.org/10.1007/s11416-018-0318-x
Luh, Robert, Temper, M., Tjoa, S., & Schrittwieser, S. (2018). APT RPG: Design of a Gamified Attacker/Defender Meta Model. In International Workshop on FORmal methods for Security Engineering.
Eresheim, S., Luh, R., & Schrittwieser, S. (2017). The Evolution of Process Hiding Techniques in Malware – Current Threats and Possible Countermeasures. Journal of Information Processing. https://doi.org/10.2197/ipsjjip.25.866
Rauchberger, J., Luh, R., & Schrittwieser, S. (2017). Longkit - A Universal Framework for BIOS/UEFI Rootkits in System Management Mode. Presented at the Third International Conference on Information Systems Security and Privacy, Madeira, Portugal.
Luh, R., Schrittwieser, S., & Marschalek, S. (2017). LLR-based Sentiment Analysis for Kernel Event Sequences. Presented at the 31th International Conference on Advanced Information Networking and Applications, IEEE.
Kieseberg, P., Weippl, E., & Schrittwieser, S. (2017). Forensics using Internal Database Structures. ERCIM News, (108).
Luh, R., Schrittwieser, S., Janicke, H., & Marschalek, S. (2017). Design of an Anomaly-based Threat Detection & Explication System. Presented at the Third International Conference on Information Systems Security and Privacy, Madeira, Portugal.
Luh, R., Schramm, G., Wagner, M., & Schrittwieser, S. (2017). Sequitur-based Inference and Analysis Framework for Malicious System Behavior. Presented at the First International Workshop on Formal Methods for Security Engineering.
Kim, J., Kim, K., Cho, J., Kim, H., & Schrittwieser, S. (2017). Hello, Facebook! Here is the stalkers" paradise!: Design and analysis of enumeration attack using phone numbers on Facebook. Presented at the 13th International Conference on Information Security Practice and Experience (ISPEC 2017).
Kieseberg, P., Frühwirt, P., & Schrittwieser, S. (2017). Security Testing for Mobile Applications. ERCIM News, 109, 52–53.
Luh, R., Marschalek, S., Kaiser, M., Janicke, H., & Schrittwieser, S. (2016). Semantics-aware detection of targeted attacks – A survey. Journal of Computer Virology and Hacking Techniques, 1–39. https://doi.org/10.1007/s11416-016-0273-3
Buhov, D., Thron, R., & Schrittwieser, S. (2016). Catch Me If You Can! Transparent Detection Of Shellcode. Presented at the the 2016 International Conference on Software Security and Assurance (ICSSA), IEEE.
Malle, B., Kieseberg, P., Schrittwieser, S., & Holzinger, A. (2016). Privacy Aware Machine Learning and the Right to be Forgotten. ERCIM News, (107).
Kieseberg, P., Weippl, E., & Schrittwieser, S. (2016). Detection of Data Leaks in Collaborative Data Driven Research. ERCIM News, (105).
Kieseberg, P., Weippl, E., & Schrittwieser, S. (2016). Forensics using Internal Database Structures. ERCIM News, (108).
Marschalek, S., Kaiser, M., Luh, R., & Schrittwieser, S. (2016). Empirical Malware Research through Observation of System Behaviour. In First Workshop on Empirical Research Methods in Information Security (pp. 467–469). ACM. https://doi.org/10.1145/2872518.2888609
Luh, R., Schrittwieser, S., & Marschalek, S. (2016). TAON: An Ontology-based Approach to Mitigating Targeted Attacks. Presented at the International Conference on Information Integration and Web-based Applications & Services (iiWAS), ACM.
Pirker, M., & Nusser, A. (2016). A Work-Flow for Empirical Exploration of Security Events. In 25th International Conference Companion on World Wide Web. ACM. https://doi.org/10.1145/2872518.2888607
Pirker, M., & Nusser, A. (2016). Assessment of Server State via Inter-Clone Differences. Presented at the 2016 International Conference on Software Security and Assurance (ICSSA), IEEE.
Wegerer, M., & Tjoa, S. (2016). Defeating the Database Adversary Using Deception – A MySQL Database Honeypot. Presented at the 2016 International Conference on Software Security and Assurance (ICSSA), IEEE.
Wagner, M., Fischer, F., Luh, R., Haberson, A., Rind, A., Keim, D. A., & Aigner, W. (2015). A Survey of Visualization Systems for Malware Analysis. In R. Borgo, F. Ganovelli, & I. Viola (Eds.), Eurographics Conference on Visualization (EuroVis) - STARs (pp. 105–125). Cagliari, Italy: The Eurographics Association. https://doi.org/10.2312/eurovisstar.20151114
Marschalek, S., Luh, R., Kaiser, M., & Schrittwieser, S. (2015). Classifying Malicious System Behavior using Event Propagation Trees. In Proceedings of the 17th International Con- ference on Information Integration and Web-based Applications Services (iiWAS2015).
Rottermanner, C., Kieseberg, P., Huber, M., Schmiedecker, M., & Schrittwieser, S. (2015). Privacy and Data Protection in Smartphone Messengers. In Proceedings of the 17th International Conference on Information Integration and Web-based Applications Services (iiWAS2015).
Wagner, M., Aigner, W., Rind, A., Dornhackl, H., Kadletz, K., Luh, R., & Tavolato, P. (2014). Problem Characterization and Abstraction for Visual Analytics in Behavior-Based Malware Pattern Analysis. In L. Harrison (Ed.), Proceedings of the Eleventh Workshop on Visualization for Cyber Security (pp. 9–16). Paris: ACM. https://doi.org/10.1145/2671491.2671498
Luh, R., & Tavolato, P. (2011). Automatische verhaltensbasierte Malware-Analyse. Hackin9, (11).
Kurniawan, K., Ekelhart, A., Fröschl, A., & Ekaputra, F. (n.d.). Semantic integration and monitoring of file system activity. In Semantic Systems. The Power of AI and Knowledge Graphs (p. Artikel Nummer 17). Karlsruhe, Deutschland.