Peter Frühwirt
Peter Frühwirt
Verified email at broadcom.com
TitleCited byYear
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ...
NDSS, 2012
1192012
InnoDB Database Forensics
P Frühwirt, M Huber, M Mulazzani, ER Weippl
Advanced Information Networking and Applications (AINA), 2010 24th IEEE …, 2010
552010
InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs
P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl
5th International Workshop on Digital Forensic, 2012
46*2012
QR code security: A survey of attacks and challenges for usable security
K Krombholz, P Frühwirt, P Kieseberg, I Kapsalis, M Huber, E Weippl
International Conference on Human Aspects of Information Security, Privacy …, 2014
442014
A tamper-proof audit and control system for the doctor in the loop
P Kieseberg, B Malle, P Frühwirt, E Weippl, A Holzinger
Brain informatics 3 (4), 269-279, 2016
202016
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations
P Frühwirt, P Kieseberg, K Krombholz, E Weippl
Digital Investigation 11 (4), 336-348, 2014
122014
The role and security of firewalls in iaas cloud computing
J Cropper, J Ullrich, P Frühwirt, E Weippl
2015 10th International Conference on Availability, Reliability and Security …, 2015
112015
Witnesses for the doctor in the loop
P Kieseberg, J Schantl, P Frühwirt, E Weippl, A Holzinger
International Conference on Brain Informatics and Health, 369-378, 2015
102015
The role and security of firewalls in cyber-physical cloud computing
J Ullrich, J Cropper, P Frühwirt, E Weippl
EURASIP Journal on Information Security 2016 (1), 18, 2016
92016
QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes
K Krombholz, P Fruhwirt, T Rieder, I Kapsalis, J Ullrich, E Weippl
Availability, Reliability and Security (ARES), 2015 10th International …, 2015
92015
Security and privacy of smartphone messaging applications
R Mueller, S Schrittwieser, P Fruehwirt, P Kieseberg, E Weippl
International Journal of Pervasive Computing and Communications 11 (2), 132-150, 2015
92015
What's new with whatsapp & co.? revisiting the security of smartphone messaging applications
R Mueller, S Schrittwieser, P Fruehwirt, P Kieseberg, E Weippl
Proceedings of the 16th International Conference on Information Integration …, 2014
82014
Using machine learning techniques for traffic classification and preliminary surveying of an attacker’s profile
P Frühwirt, S Schrittwieser, ER Weippl
6th ASE International Conference on Privacy, Security, Risk and Trust (PASSAT), 2014
52014
Security tests for mobile applications - Why using TLS/SSL is not enough
P Kieseberg, P Fruhwirt, S Schrittwieser, E Weippl
Software Testing, Verification and Validation Workshops (ICSTW), 2015 IEEE …, 2015
42015
Using internal MySQL/InnoDB B-Tree Index Navigation for Data Hiding
P Fruhwirt, P Kieseberg, E Weippl
Advances in Digital Forensics XI: 11th IFIP WG 11.9 International Conference …, 2015
22015
Genie in a Model? Why Model Driven Security will not secure your Web Application.
C Hochreiner, P Frühwirt, Z Ma, P Kieseberg, S Schrittwieser, ER Weippl
JoWUA 5 (3), 44-62, 2014
22014
Security testing for mobile applications
P Kieseberg, P Fruhwirt, S Schrittwieser
ERCIM News 109, 2017
12017
Security and privacy of smartphone messaging applications
M Steinbauer, M Indrawan-Santiago, G Anderst-Kotsis, R Mueller, ...
International Journal of Pervasive Computing and Communications, 2015
2015
InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles
P Frühwirt, P Kieseberg, C Hochreiner, S Schrittwieser, E Weippl
2014
Defence side reconnaissance: Preliminary surveying of an attacker’s profile
P Frühwirt
Vienna University of Technology, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–20