Hochschule Würzburg-Schweinfurt

Sebastian Biedermann


Anschrift:
Herr Prof. Dr.-Ing. Sebastian Biedermann
Hochschule Würzburg-Schweinfurt
FIW Fakultät Informatik und Wirtschaftsinformatik
Straße:
Münzstraße 12
Ort:
97070 Würzburg

Leistungsprofil:
Praxisrelevante Forschungsgebiete:
  • Sicherheit in verteilten Systemen
  • Seitenkanalangriffe
  • Threat Intelligence
  • Blockchain
  • AI Security



Publikationen:
  • Nikolay Matyunin, Jakub Szefer, Sebastian Biedermann, Stefan Katzenbeisser: Covert channels using mobile device's magnetic field sensors. ASP-DAC 2016: 525-532 - Michael Riecker, Sebastian Biedermann, Rachid El Bansarkhani, Matthias Hollick: Lightweight energy consumption-based intrusion detection system for wireless sensor networks. Int. J. Inf. Sec. 14(2): 155-167 (2015)
  • Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer: Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors. Financial Cryptography 2015: 489-496 - Sebastian Biedermann: Transparent security services for an infrastructure-as-a-service cloud. Darmstadt University of Technology, 2014, pp. 1-127
  • Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer: Hot-hardening: getting more out of your security settings. ACSAC 2014: 6-15 - Frederico Araujo, Kevin W. Hamlen, Sebastian Biedermann, Stefan Katzenbeisser: From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation. CCS 2014: 942-953
  • Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer: Leveraging Virtual Machine Introspection for Hot-Hardening of Arbitrary Cloud-User Applications. HotCloud 2014 - Jakub Szefer, Sebastian Biedermann: Towards fast hardware memory integrity checking with skewed Merkle trees. HASP@ISCA 2014: 9:1-9:8
  • Sebastian Biedermann, Jakub Szefer: SystemWall: An Isolated Firewall Using Hardware-Based Memory Introspection. ISC 2014: 273-290 - Sebastian Biedermann, Tobias Ruppenthal, Stefan Katzenbeisser: Data-centric phishing detection based on transparent virtualization technologies. PST 2014: 215-223
  • Sebastian Biedermann, Jakub Szefer: SystemWall: An Isolated Firewall Using Hardware-Based Memory Introspection. ISC 2014: 273-290 - Sebastian Biedermann, Tobias Ruppenthal, Stefan Katzenbeisser: Data-centric phishing detection based on transparent virtualization technologies. PST 2014: 215-223
  • Sebastian Biedermann, Nikolaos P. Karvelas, Stefan Katzenbeisser, Thorsten Strufe, Andreas Peter: ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation. SOFSEM 2014: 114-125 - Nikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser, Sebastian Biedermann: Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM. IACR Cryptol. ePrint Arch. 2014: 72 (2014)
  • Sebastian Biedermann, Stefan Katzenbeisser: Event-based isolation of critical data in the cloud. CCS 2013: 1383-1386 - Sebastian Biedermann, Martin Zittel, Stefan Katzenbeisser: Improving security of virtual machines during live migrations. PST 2013: 352-357
  • Michael Riecker, Sebastian Biedermann, Matthias Hollick: Lightweight energy consumption based intrusion detection system for wireless sensor networks. SAC 2013: 1784-1791 - Sascha Hauke, Sebastian Biedermann, Max Mühlhäuser, Dominik Heider: On the Application of Supervised Machine Learning to Trustworthiness Assessment. TrustCom/ISPA/IUCC 2013: 525-534 - Sebastian Biedermann, Martin Mink, Stefan Katzenbeisser: Fast dynamic extracted honeypots in cloud computing. CCSW 2012: 13-18
  • Michael Riecker, Ana Barroso, Matthias Hollick, Sebastian Biedermann: On Data-Centric Intrusion Detection in Wireless Sensor Networks. GreenCom 2012: 325-334 - Sebastian Biedermann, Stefan Katzenbeisser: Detecting Computer Worms in the Cloud. iNetSeC 2011: 43-54 - Sami Alsouri, Stefan Katzenbeisser, Sebastian Biedermann: Trustable outsourcing of business processes to cloud computing environments. NSS 2011: 280-284 - Tobias Hoßfeld, Sebastian Biedermann, Raimund Schatz, Alexander Platzer, Sebastian Egger, Markus Fiedler: The memory effect and its implications on Web QoE modeling. International Teletraffic Congress 2011: 103-110


Kooperationsangebot für die Wirtschaft / Praxis:
Bevorzugte Form der Kooperation:
  • Beratung
  • FuE
  • Bachelor-/Master-/Diplomarbeit




Zurück zur Liste
Falls dies ihr Profil ist, können Sie es hier nach dem Login bearbeiten.