Prof. Dr.-Ing. Sebastian Biedermann
Persönliche Daten
Titel
Prof. Dr.-Ing.
Vorname
Sebastian
Nachname
Biedermann
E-Mail Adresse
Abteilung / Funktion / Ausstattung an der FHWS
Fakultät
FIW (Informatik und Wirtschaftsinformatik)
Funktion in der FHWS
Array
Lehrgebiete
Informationssicherheit
Einordnung in DFG Systematik der Fächer
Ingenieurwissenschaften
- Betriebs-, Kommunikations- und Informationssysteme
- Softwaretechnologie
Forschungsaktivität
Forschungsgebiete
Sicherheit in verteilten Systemen, Seitenkanalangriffe, Threat Intelligence, Blockchain, AI Security
Kompetenzcluster der FHWS
- Digitalisierung
- Smarte Produktion
Persönliche Vernetzung und Auszeichnungen
Mitgliedschaft Fachgremien / Verbänden
International Information Systems Security Certification Consortium (ISC)²
Information Systems Audit and Control Association (ISACA)
Information Systems Audit and Control Association (ISACA)
Publikationen
Einzelwerke
Nikolay Matyunin, Jakub Szefer, Sebastian Biedermann, Stefan Katzenbeisser: Covert channels using mobile device's magnetic field sensors. ASP-DAC 2016: 525-532
Michael Riecker, Sebastian Biedermann, Rachid El Bansarkhani, Matthias Hollick: Lightweight energy consumption-based intrusion detection system for wireless sensor networks. Int. J. Inf. Sec. 14(2): 155-167 (2015)
Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer: Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors. Financial Cryptography 2015: 489-496
Sebastian Biedermann: Transparent security services for an infrastructure-as-a-service cloud. Darmstadt University of Technology, 2014, pp. 1-127
Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer: Hot-hardening: getting more out of your security settings. ACSAC 2014: 6-15
Frederico Araujo, Kevin W. Hamlen, Sebastian Biedermann, Stefan Katzenbeisser: From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation. CCS 2014: 942-953
Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer: Leveraging Virtual Machine Introspection for Hot-Hardening of Arbitrary Cloud-User Applications. HotCloud 2014
Jakub Szefer, Sebastian Biedermann: Towards fast hardware memory integrity checking with skewed Merkle trees. HASP@ISCA 2014: 9:1-9:8
Sebastian Biedermann, Jakub Szefer: SystemWall: An Isolated Firewall Using Hardware-Based Memory Introspection. ISC 2014: 273-290
Sebastian Biedermann, Tobias Ruppenthal, Stefan Katzenbeisser: Data-centric phishing detection based on transparent virtualization technologies. PST 2014: 215-223
Sebastian Biedermann, Nikolaos P. Karvelas, Stefan Katzenbeisser, Thorsten Strufe, Andreas Peter: ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation. SOFSEM 2014: 114-125
Nikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser, Sebastian Biedermann: Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM. IACR Cryptol. ePrint Arch. 2014: 72 (2014)
Sebastian Biedermann, Stefan Katzenbeisser: Event-based isolation of critical data in the cloud. CCS 2013: 1383-1386
Sebastian Biedermann, Martin Zittel, Stefan Katzenbeisser: Improving security of virtual machines during live migrations. PST 2013: 352-357
Michael Riecker, Sebastian Biedermann, Matthias Hollick: Lightweight energy consumption based intrusion detection system for wireless sensor networks. SAC 2013: 1784-1791
Sascha Hauke, Sebastian Biedermann, Max Mühlhäuser, Dominik Heider: On the Application of Supervised Machine Learning to Trustworthiness Assessment. TrustCom/ISPA/IUCC 2013: 525-534
Sebastian Biedermann, Martin Mink, Stefan Katzenbeisser: Fast dynamic extracted honeypots in cloud computing. CCSW 2012: 13-18
Michael Riecker, Ana Barroso, Matthias Hollick, Sebastian Biedermann: On Data-Centric Intrusion Detection in Wireless Sensor Networks. GreenCom 2012: 325-334
Sebastian Biedermann, Stefan Katzenbeisser: Detecting Computer Worms in the Cloud. iNetSeC 2011: 43-54
Sami Alsouri, Stefan Katzenbeisser, Sebastian Biedermann: Trustable outsourcing of business processes to cloud computing environments. NSS 2011: 280-284
Tobias Hoßfeld, Sebastian Biedermann, Raimund Schatz, Alexander Platzer, Sebastian Egger, Markus Fiedler: The memory effect and its implications on Web QoE modeling. International Teletraffic Congress 2011: 103-110
Michael Riecker, Sebastian Biedermann, Rachid El Bansarkhani, Matthias Hollick: Lightweight energy consumption-based intrusion detection system for wireless sensor networks. Int. J. Inf. Sec. 14(2): 155-167 (2015)
Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer: Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors. Financial Cryptography 2015: 489-496
Sebastian Biedermann: Transparent security services for an infrastructure-as-a-service cloud. Darmstadt University of Technology, 2014, pp. 1-127
Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer: Hot-hardening: getting more out of your security settings. ACSAC 2014: 6-15
Frederico Araujo, Kevin W. Hamlen, Sebastian Biedermann, Stefan Katzenbeisser: From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation. CCS 2014: 942-953
Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer: Leveraging Virtual Machine Introspection for Hot-Hardening of Arbitrary Cloud-User Applications. HotCloud 2014
Jakub Szefer, Sebastian Biedermann: Towards fast hardware memory integrity checking with skewed Merkle trees. HASP@ISCA 2014: 9:1-9:8
Sebastian Biedermann, Jakub Szefer: SystemWall: An Isolated Firewall Using Hardware-Based Memory Introspection. ISC 2014: 273-290
Sebastian Biedermann, Tobias Ruppenthal, Stefan Katzenbeisser: Data-centric phishing detection based on transparent virtualization technologies. PST 2014: 215-223
Sebastian Biedermann, Nikolaos P. Karvelas, Stefan Katzenbeisser, Thorsten Strufe, Andreas Peter: ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation. SOFSEM 2014: 114-125
Nikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser, Sebastian Biedermann: Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM. IACR Cryptol. ePrint Arch. 2014: 72 (2014)
Sebastian Biedermann, Stefan Katzenbeisser: Event-based isolation of critical data in the cloud. CCS 2013: 1383-1386
Sebastian Biedermann, Martin Zittel, Stefan Katzenbeisser: Improving security of virtual machines during live migrations. PST 2013: 352-357
Michael Riecker, Sebastian Biedermann, Matthias Hollick: Lightweight energy consumption based intrusion detection system for wireless sensor networks. SAC 2013: 1784-1791
Sascha Hauke, Sebastian Biedermann, Max Mühlhäuser, Dominik Heider: On the Application of Supervised Machine Learning to Trustworthiness Assessment. TrustCom/ISPA/IUCC 2013: 525-534
Sebastian Biedermann, Martin Mink, Stefan Katzenbeisser: Fast dynamic extracted honeypots in cloud computing. CCSW 2012: 13-18
Michael Riecker, Ana Barroso, Matthias Hollick, Sebastian Biedermann: On Data-Centric Intrusion Detection in Wireless Sensor Networks. GreenCom 2012: 325-334
Sebastian Biedermann, Stefan Katzenbeisser: Detecting Computer Worms in the Cloud. iNetSeC 2011: 43-54
Sami Alsouri, Stefan Katzenbeisser, Sebastian Biedermann: Trustable outsourcing of business processes to cloud computing environments. NSS 2011: 280-284
Tobias Hoßfeld, Sebastian Biedermann, Raimund Schatz, Alexander Platzer, Sebastian Egger, Markus Fiedler: The memory effect and its implications on Web QoE modeling. International Teletraffic Congress 2011: 103-110