Sebastian Neuner
Vienna University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Sebastian Neuner.
ieee european symposium on security and privacy | 2017
Georg Merzdovnik; Markus Huber; Damjan Buhov; Nick Nikiforakis; Sebastian Neuner; Martin Schmiedecker; Edgar R. Weippl
In this paper, we quantify the effectiveness of third-party tracker blockers on a large scale. First, we analyze the architecture of various state-of-the-art blocking solutions and discuss the advantages and disadvantages of each method. Second, we perform a two-part measurement study on the effectiveness of popular tracker-blocking tools. Our analysis quantifies the protection offered against trackers present on more than 100,000 popular websites and 10,000 popular Android applications. We provide novel insights into the ongoing arms race between trackers and developers of blocking tools as well as which tools achieve the best results under what circumstances. Among others, we discover that rule-based browser extensions outperform learning-based ones, trackers with smaller footprints are more successful at avoiding being blocked, and CDNs pose a major threat towards the future of tracker-blocking tools. Overall, the contributions of this paper advance the field of web privacy by providing not only the largest study to date on the effectiveness of tracker-blocking tools, but also by highlighting the most pressing challenges and privacy issues of third-party tracking.
availability, reliability and security | 2015
Sebastian Neuner; Martin Mulazzani; Sebastian Schrittwieser; Edgar R. Weippl
At the time of writing, one of the most pressing problems for forensic investigators is the huge amount of data to analyze per case. Not only the number of devices increases due to the advancing computerization of every days life, but also the storage capacity of each and every device raises into multi-terabyte storage requirements per case for forensic working images. In this paper we improve the standardized forensic process by proposing to use file deduplication across devices as well as file white listing rigorously in investigations, to reduce the amount of data that needs to be stored for analysis as early as during data acquisition. These improvements happen in an automatic fashion and completely transparent to the forensic investigator. They furthermore be added without negative effects to the chain of custody or artefact validity in court, and are evaluated in a realistic use case.
international conference on digital forensics | 2013
Martin Mulazzani; Sebastian Neuner; Peter Kieseberg; Markus Huber; Sebastian Schrittwieser; Edgar R. Weippl
Slack space can be used to hide data from the operating system and other users. While some forms of data hiding are easily detectable, others are subtle and require an experienced forensic practitioner to discover the hidden data. The amount of data that can be hidden varies with the type of slack space and environmental parameters such as filesystem block size and partition alignment. This paper evaluates the amount of file slack space available in Windows systems and the stability of slack space over time with respect to system updates. Measurements of the file slack for eighteen versions of Microsoft Windows with the NTFS filesystem reveal that many of the files change very little during system updates and are, thus, highly suitable for hiding data. A model is presented for estimating the amount of data that can be hidden in the file slack space of Windows filesystems of arbitrary size.
IFIP Annual Conference on Data and Applications Security and Privacy | 2018
Sebastian Neuner; Artemios G. Voyiatzis; Spiros Fotopoulos; Collin Mulliner; Edgar R. Weippl
The Universal Serial Bus (USB) is becoming a prevalent attack vector. Rubber Ducky and BadUSB are two recent classes of a whole spectrum of attacks carried out using fully-automated keypress injections through innocent-looking USB devices. So far, defense mechanisms are insufficient and rely on user participation in the trust decision.
international conference on digital forensics | 2017
Peter Kieseberg; Sebastian Neuner; Sebastian Schrittwieser; Martin Schmiedecker; Edgar R. Weippl
In the course of the last years, there has been an established forensic process in place known by every investigator and researcher. This traditional process is regarded to produce valid evidence when it comes to court trials and, more importantly, it specifies on a very precise level how to acquire a suspects machine and handle the data within. However, when new technologies come into play, certain constraints appear: Having an incident in a network containing thousands of machines, like a global corporate network, there is no such thing as shutting down and sending an investigation team. Moreover, the question appears: Is this an isolated incident, or are there any other clients affected?
availability, reliability and security | 2017
Sebastian Neuner; Artemios G. Voyiatzis; Martin Schmiedecker; Edgar R. Weippl
Redundant capacity in filesystem timestamps is recently proposed in the literature as an effective means for information hiding and data leakage. Here, we evaluate the steganographic capabilities of such channels and propose techniques to aid digital forensics investigation towards identifying and detecting manipulated filesystem timestamps. Our findings indicate that different storage media and interfaces exhibit different timestamp creation patterns. Such differences can be utilized to characterize file source media and increase the analysis capabilities of the incident response process.
Digital Investigation | 2016
Sebastian Neuner; Artemios G. Voyiatzis; Martin Schmiedecker; Stefan Brunthaler; Stefan Katzenbeisser; Edgar R. Weippl
arXiv: Cryptography and Security | 2014
Sebastian Neuner; Victor van der Veen; Martina Lindorfer; Markus Huber; Georg Merzdovnik; Martin Mulazzani; Edgar R. Weippl
Security and Communication Networks | 2016
Sebastian Neuner; Martin Schmiedecker; Edgar R. Weippl
Digital Investigation | 2016
Sebastian Neuner; Martin Schmiedecker; Edgar R. Weippl