uni.liPersonenverzeichnis

Dr.-Ing. Frank Breitinger

Assistenzprofessor
Hilti Lehrstuhl für Daten- und Anwendungssicherheit
Portrait
  • Debinski, M., Breitinger, F., & Mohan, P. (2019). Timeline2GUI: A Log2Timeline CSV parser and training scenarios. Digital Investigations, 28(March 2019), 34 - 43. (ISI: 1.66; ISI: 2.275)

    details
  • Liebler, L., Schmitt, P., Baier, H., & Breitinger, F. (2019). On Efficiency of Artifact Lookup Strategies in Digital Forensics. Digital Investigation, 28(April 2019), S116 - S125. (ISI: 1.66; ISI: 2.275)

    details
  • Ricci, J., Baggili, I., & Breitinger, F. (2019). Blockchain-Based Distributed Cloud Storage Digital Forensics: Where's the Beef? IEEE Security & Privacy, 17(1), 34 - 42.

    details
  • Grajeda, C. (2018). Experience constructing the Artifact Genome Project (AGP): Managing the domain's knowledge one artifact at a time. Digital Inverstigation, 26, 47 - 58. (ISI: 1.66; ISI: 2.275)

    details
  • Ricci, J., Breitinger, F., & Baggili, I. (2018). Survey results on adults and cybersecurity education. Education and Information Technologies, July 2018, 1 - 19.

    details
  • Clark, D. R., Meffert, C., Baggili, I., & Breitinger, F. (2017). DROP (DRone Open source Parser) your drone: Forensic analysis of the DJI Phantom III. Digital Investigation, 22, Supplement. (ISI: 1.66; ISI: 2.275)

    details
  • Denton, G., Karpisek, F., Breitinger, F., & Baggili, I. (2017). Leveraging the SRTP protocol for over-the-network memory acquisition of a GE Famuc Series 90-30. Digital Investigation, 22, Supplment, 26 38. (ISI: 1.66; ISI: 2.275)

    details
  • Grajeda, C., Breitinger, F., & Baggili, I. (2017). Availability of datasets for digital forensics - And what is missing. Digital Investigation, 22, Supplement, 94 - 105. (ISI: 1.66; ISI: 2.275)

    details
  • Moore, J., Baggili, I., & Breitinger, F. (2017). Find Me If You Can: Mobile GPS Mapping Applications Forensics Analysis & SNAVP The Open Source, Modular, Extensible Parser. Journal of Digital Forensics, Security and Law (JDFSL), 12.1, 7.

    details
  • Zhang, X., Baggili, I., & Breitinger, F. (2017). Breaking into the vault: privacy, security and forensic analysis of adroid vault applications. Computers & Security, 70, 516 - 531. (ISI: 3.062; ISI: 3.476)

    details
  • Al-khateeb, S., Conlan, K. J., Agarwal, N., Baggili, I., & Breitinger, F. (2016). Exploring Deviant Hacker Networks (DHN) On Social Media Platforms. Journal of Digital Forensics, Security and Law, 11(2), 7 - 20.

    details
  • Conlan, K., Baggili, I., & Breitinger, F. (2016). Anti-forensics: Furthering digital forensic science through a new extended, granular taonomy. Digital Investigation, 18, 66 - 75. (ISI: 1.66; ISI: 2.275)

    details
  • Harichandran, V. S., Breitinger, F., & Baggili, I. (2016). Bytewise Approximate Matching: The Good, the Bad, and The Unknown. Journal of Digital Forensics, Security and Law, 11.2, 59 - 78.

    details
  • Harichandran, V. S., Breitinger, F., Baggili, I., & Marrington, A. (2016). A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later. Computers & Security, 57, 1 - 13. (ISI: 3.062; ISI: 3.476)

    details
  • Harichandran, V. S., Walnycky, D., Baggili, I., & Breitinger, F. (2016). CuFA: A more formal definition for digital forensic artifacts. Diigital Investigation, 18, 125 - 137. (ISI: 1.66; ISI: 2.275)

    details
  • Jeong, D., Breitinger, F., Kang, H., & Lee, S. (2016). Towards Syntactic Approximate Matching-A Pre-Processing Experiment. Journal of Digital Forensics, Security and Law, 11(2), 97 - 110.

    details
  • Meffert, C. S., Baggili, I., & Breitinger, F. (2016). Deleting collected digital evidence by exploiting a widely adopted hardware write blocker. Ditigal Investigation, 18, 87 - 96. (ISI: 1.66; ISI: 2.275)

    details
  • Zhang, X., Breitinger, F., & Baggili, I. (2016). Rapid Android Parser for Investigatin DEX files (RAPID). Digital Investigation, 17, 28 - 39. (ISI: 1.66; ISI: 2.275)

    details
  • Karpisek, F., Baggili, I., & Breitinger, F. (2015). WhatsApp network forensics: Decrypting and understanding the WahtsApp call signaling messages. Digital Investigation, 15, 110 - 118. (ISI: 1.66; ISI: 2.275)

    details
  • Walnycky, D., Baggili, I., Marrington, A., & Breitinger, F. (2015). Network and device forensic analysis of Android social-messaging applications. Digital Investigation, 77 - 84. (ISI: 1.66; ISI: 2.275)

    details
  • Breitinger, F., & Baggili, I. (2014). File Detection On Network Traffic Using Approximate Matching. Journal of Digital Forensics, Security and Law, 9, 23 - 36.

    details
  • Breitinger, F., Baier, H., & White, D. (2014). On the database lookup problem of approximate matching. Digital Investigation, 11, Supplement 1.0, 1 - 9. (ISI: 1.66; ISI: 2.275)

    details
  • Breitinger, F., Rathgeb, C., & Baier, H. (2014). An Efficient Similarity Digests Database Lookup - A Logarithmic Divide & Conquer Approach. Journal of Digital Forensics, Security and Law, 9(2), 155 - 166.

    details
  • Breitinger, F., & Roussev, V. (2014). Automated evaluation of approximate matching algorithms on real data. Digital Investigation, 11, 10 - 17. (ISI: 1.66; ISI: 2.275)

    details
  • Breitinger, F., Stivaktakis, & Roussev, V. (2014). Evaluating Detection Error Trade-offs for Bytewise Approximate Matching Algorithms. Digital Investigation, 11(2), 81 - 89. (ISI: 1.66; ISI: 2.275)

    details
  • Rathgeb, C., Breitinger, F., Busch, C., & Baier, H. (2014). On application of bloom filters to iris biometrics. IET Biometrics, 3(4), 207 - 218. (ISI: 2.092; ISI: 2.207)

    details
  • Breitinger, F., Sivaktakis, G., & Baier, H. (2013). FRASH: A Framework to Test Algorithms of Similarity Hashing. Digital Investigation, 10, 50 - 58. (ISI: 1.66; ISI: 2.275)

    details
  • F. Breitinger & I. Baggili (Eds.). (2019). Digital Forensics and Cyber Crime ( Vol. 259): Springer International Publishing.

    details
  • J. I. James & F. Breitinger (Eds.). Digital Forensics and Cyber Crime: 7th International Conference ( Vol. 157). Seoul, Korea: Springer.

    details
  • Ricci, J., Baggili, I., & Breitinger, F. (2016). Watch What You Wear: Smartwatches and Sluggish Security. In Managing Security Issues and the Hidden Dangers of Wearable Technolgies (pp. 47).

    details
  • Haigh, T., Breitinger, F., & Baggili, I. (2019). If I Had a Million Cryptos: Cryptowallet Application Analysis and a Trojan Proof-of-Concept. Paper presented at the Digital Forensics and Cyber Crime.

    details
  • Schmicker, R., Breitinger, F., & Baggili, I. (2019). AndroParse - An Android Feature Extraction Framework and Dataset. Paper presented at the Digital Forensic and Cyber Crime.

    details
  • Knieriem, B., Zhang, X., Levine, P., Breitinger, F., & Baggili, I. (2018). An Overview of the Usage of Default Passwords. Paper presented at the Digital Forensics and Cyber Crime.

    details
  • Liebler, L., & Breitinger, F. (2018). mrsh-mem: Approximate Matching on Raw Memory Dumps. Paper presented at the 11th International Conference on IT Security Incident Management IT Forensics.

    details
  • Lillis, D., Breitinger, F., & Scanlon, M. (2018). Expediting MRSH-v2 Approximate Matching with Herarchical Bloom Filter Trees. Paper presented at the Digital Forensics and Cyber Crime.

    details
  • Laoise, L., Baggili, I., Topor, M., Casey, P., & Breitinger, F. (2018). Digital Forensics in the Next Five Years. Paper presented at the Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany.

    details
  • Meffert, C., Clark, D., Baggili, I., & Breitinger, F. (2017). Forensic State Acquisition from Internet of Things (FSAIoT): A General Framework and Practical Approach for IoT Forensics Through IoT Device State Acquisiton. Paper presented at the Proceedings of the 12th International Conference on Availability, Reliability and Security.

    details
  • Baggili, I., & Breitinger, F. (2015). Data Sources for Advancing Cyber Forensics: What the Social World Has to Offer. Paper presented at the AAAI Spring Symposium Series.

    details
  • Baggili, I., Odure, J., Anthony, K., Breitinger, F., & McGee, G. (2015). Watch What You Wear: Preliminary Forensic Analysis of Smart Watches. Paper presented at the Availability, Reliability and Security (ARES).

    details
  • Gupta, V., & Breitinger, F. (2015). How Cuckoo Filter Can Improve Existing Approximate Matching Techniques. Paper presented at the Digital Forensics and Cyber Crime.

    details
  • Rathgeb, C., Breitinger, F., Baier, H., & Busch, C. (2015). Towards Bloom filter-based indexing of iris biometric data. Paper presented at the Biometrics (ICB), 2015 International Conference on Siew-Sngiem Best Paper Award.

    details
  • Satyendra, G., Baggili, I., Breitinger, F., & Fischer, A. (2015). An empirical comparison of widely adopted hash functions in digital forensics: does the programming language and operating system make a difference. Paper presented at the Proceedings of the Conference on Digital Forensics, Security and Law.

    details
  • Breitinger, F., Winter, C., Yannikos, Y., Fink, T., & Seefried, M. (2014). Using Approximate Matching to Reduce the Volume of Digital Data. Paper presented at the Advances in Digital Forensics X.

    details
  • Breitinger, F., Ziroff, G., Lange, S., & Baier, H. (2014). Similarity Hashing Based on Levenshtein Distances. Paper presented at the IFIP Advances in Information and Communication Technology.

    details
  • Breitinger, F., Liu, H., Winter, C., Baier, H., Rybalchenko, A., & Steinebach, M. (2014). Towards a Process Model for Hash Functions in Digital Forensics. Paper presented at the Digital Forensics and Cyber Crime.

    details
  • Breitinger, F., Astebol, K., Baier, H., & Busch, C. (2013). mvHash-B - A New Approach for Similarity Preserving Hashing. Paper presented at the IT Security Incident Management and IT Forensics (IMF).

    details
  • Breitinger, F., & Baier, H. (2013). Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2. Paper presented at the Digital Forensics and Cyber Crime.

    details
  • Breitinger, F., & Petrov, K. (2013). Reducing the Time Required for Hashing Operations. Paper presented at the Advances in Information and Communication Technolgy.

    details
  • Rathgeb, C., Breitinger, F., & Busch, C. (2013). Alignment-free cancelable iris biometric templates based on adaptive bloom filters. Paper presented at the Biometrics (ICB).

    details
  • Breitinger, F., & Baier, H. (2012). A fuzzy hashing approach based on random sequences and hamming distance. Paper presented at the Proceedings of the Conference on Digital Forensics, Security and Law.

    details
  • Breitinger, F., & Baier, H. (2012). Performance Issues About Context-Triggered Piecwise Hashing. Paper presented at the Digital Forensics and Cyber Crime.

    details
  • Breitinger, F., & Baier, H. (2012). Properties of a smilarity preserving hash function and their realization in sdhash. Paper presented at the Information Security for South Africa (ISSA).

    details
  • Breitinger, F., Baier, H., & Beckingham, J. (2012). Security and implementation analysis of the similarity digest sdhash. Paper presented at the First International Baltic Conference on Network Security & Forensics (NeSeFo).

    details
  • Baier, H., & Breitinger, F. (2011). Security Aspects of Piecewise Hashing in Computer Forensics. Paper presented at the IT Security Incident Management and IT Forensics (IMF).

    details
  • Breitinger, F., & Nickel, C. (2010). User Survey on Phone Security and Usage. Paper presented at the BIOSIG.

    details
  • Breitinger, F. (2014). On the utility of bytewise approximate matching in computer science with a special focus on digital forensics investigations. , Technical University Darmstadt, Germany.

    details