HomeWho 's who

Dr.-Ing. Frank Breitinger

Assistant Professor
Hilti Chair for Data and Application Security
Current Activity
Dr. Frank Breitinger received the B.S. degree in computer science from the University of Applied Sciences in Mannheim (2009, Germany), his M.S. degree in computer science from the University of Applied Sciences Darmstadt (2011, Germany) and his Ph.D. degree in computer science from the Technical University Darmstadt (2014). He was self-employed for 5 years, a visiting researcher at the National Institute of Standards and Technology to lead NIST SP 800-168 on Approximate Matching and interned as a software developer for the University of Maryland and the sobedi GmbH (Mannheim, Germany). From 2014 to 2019 he was an Assistant Professor of computer science at the University of New Haven, CT before accepting an Assistant Professor position at the Hilti Chair for Data and Application Security at the University of Liechtenstein. His research focus is cybersecurity and digital forensics where he has published numerous peer-reviewed articles, chaired an international conference in Manhattan and serves as a reviewer on several program committees. Additional information about him and his work is on his website (https://www.fbreitinger.de).
Portrait
  • Jan Pluskal and Frank Breitinger and Ondrej Rysavy. (2020). Netfox detective: A novel open-source network forensics analysis tool. Forensic Science International: Digital Investigation, 35.

    more
  • Wu, T., Breitinger, F., & O'Shaughnessy, S. (2020). Digital forensic tools: Recent advances and enhancing the status quo. Forensic Science International: Digital Investigation, 24.

    more
  • Breitinger, F., Tully-Doyle, R., Przyborski, K., Beck, L., & Harichandran, R. S. (2020). First year students' experience in a Cyber World course -- an evaluation. Education and Information Technologies.

    more
  • Breitinger, F., Tully-Doyle, R., & Hassenfeldt, C. (2020). A survey on smartphone user's security choices, awareness and education. Computers & Security, 88. (ISI_2016: 3.062; ISI_2016_5year: 3.476)

    more
  • Moia, V. H., Breitinger, . F., & Henriques, M. A. (2020). The impact of excluding common blocks for approximate matching. Computers & Security, 89. (ISI_2016: 3.062; ISI_2016_5year: 3.476)

    more
  • Palmbach, D., & Breitinger, F. (2020). Artifacts for detecting timestamp manipulation in NTFS on Windows and their reliability. Forensic Science International: Digital Investigation, 32, 300920. (ISI_2016: 1.66; ISI_2016_5year: 2.275)

    more
  • David Palmbach and Frank Breitinger. (2020). Artifacts for detecting timestamp manipulation in NTFS on Windows and their reliability. Forensic Science International: Digital Investigation, 32.

    more
  • Ricci, J., Baggili, I., & Breitinger, F. (2019). Blockchain-Based Distributed Cloud Storage Digital Forensics: Where's the Beef? IEEE Security & Privacy, 17(1), 34 - 42. (ISI_2016: 1.596; ISI_2016_5year: 1.784)

    more
  • Debinski, M., Breitinger, F., & Mohan, P. (2019). Timeline2GUI: A Log2Timeline CSV parser and training scenarios. Digital Investigation, 28, 34 - 43. (ISI_2016: 1.66; ISI_2016_5year: 2.275)

    more
  • Liebler, L., Schmitt, P., Baier, H., & Breitinger, F. (2019). On Efficiency of Artifact Lookup Strategies in Digital Forensics. Digital Investigation, 28(April), S116 - S125. (ISI_2016: 1.66; ISI_2016_5year: 2.275)

    more
  • Grajeda, C., Sanchez, L., Baggili, I., Clark, D., & Breitinger, F. (2018). Experience constructing the Artifact Genome Project (AGP): Managing the domain's knowledge one artifact at a time. Digital Investigation, 26, 47 - 58. (ISI_2016: 1.66; ISI_2016_5year: 2.275)

    more
  • Ricci, J., Breitinger, F., & Baggili, I. (2018). Survey results on adults and cybersecurity education. Education and Information Technologies, 24(1), 231-249.

    more
  • Clark, D. R., Meffert, C., Baggili, I., & Breitinger, F. (2017). DROP (DRone Open source Parser) your drone: Forensic analysis of the DJI Phantom III. Digital Investigation, 22(Supplement). (ISI_2016: 1.66; ISI_2016_5year: 2.275)

    more
  • Moore, J., Baggili, I., & Breitinger, F. (2017). Find Me If You Can: Mobile GPS Mapping Applications Forensics Analysis & SNAVP The Open Source, Modular, Extensible Parser. Journal of Digital Forensics, Security and Law, 12(1).

    more
  • Denton, G., Karpisek, F., Breitinger, F., & Baggili, I. (2017). Leveraging the SRTP protocol for over-the-network memory acquisition of a GE Fanuc Series 90-30. Digital Investigation, 22(Supplement), 26-38. (ISI_2016: 1.66; ISI_2016_5year: 2.275)

    more
  • Grajeda, C., Breitinger, F., & Baggili, I. (2017). Availability of datasets for digital forensics - And what is missing. Digital Investigation, 22(Supplement), 94 - 105. (ISI_2016: 1.66; ISI_2016_5year: 2.275)

    more
  • Zhang, X., Baggili, I., & Breitinger, F. (2017). Breaking into the vault: privacy, security and forensic analysis of android vault applications. Computers & Security, 70, 516 - 531. (ISI_2016: 3.062; ISI_2016_5year: 3.476)

    more
  • Al-khateeb, S., Conlan, K. J., Agarwal, N., Baggili, I., & Breitinger, F. (2016). Exploring Deviant Hacker Networks (DHN) On Social Media Platforms. Journal of Digital Forensics, Security and Law, 11(2), 7 - 20.

    more
  • Conlan, K., Baggili, I., & Breitinger, F. (2016). Anti-forensics: Furthering digital forensic science through a new extended, granular taonomy. Digital Investigation, 18, 66 - 75. (ISI_2016: 1.66; ISI_2016_5year: 2.275)

    more
  • Harichandran, V. S., Breitinger, F., Baggili, I., & Marrington, A. (2016). A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later. Computers & Security, 57, 1 - 13. (ISI_2016: 3.062; ISI_2016_5year: 3.476)

    more
  • Zhang, X., Breitinger, F., & Baggili, I. (2016). Rapid Android Parser for Investigating DEX files (RAPID). Digital Investigation, 17, 28 - 39. (ISI_2016: 1.66; ISI_2016_5year: 2.275)

    more
  • Harichandran, V. S., Breitinger, F., & Baggili, I. (2016). Bytewise Approximate Matching: The Good, the Bad, and The Unknown. Journal of Digital Forensics, Security and Law, 11(2), 59 - 78.

    more
  • Harichandran, V. S., Walnycky, D., Baggili, I., & Breitinger, F. (2016). CuFA: A more formal definition for digital forensic artifacts. Digital Investigation, 18, 125 - 137. (ISI_2016: 1.66; ISI_2016_5year: 2.275)

    more
  • Jeong, D., Breitinger, F., Kang, H., & Lee, S. (2016). Towards Syntactic Approximate Matching-A Pre-Processing Experiment. Journal of Digital Forensics, Security and Law, 11(2), 97 - 110.

    more
  • Meffert, C. S., Baggili, I., & Breitinger, F. (2016). Deleting collected digital evidence by exploiting a widely adopted hardware write blocker. Digital Investigation, 18, 87 - 96. (ISI_2016: 1.66; ISI_2016_5year: 2.275)

    more
  • Karpisek, F., Baggili, I., & Breitinger, F. (2015). WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages. Digital Investigation, 15, 110 - 118. (ISI_2016: 1.66; ISI_2016_5year: 2.275)

    more
  • Walnycky, D., Baggili, I., Marrington, A., Moore, J., & Breitinger, F. (2015). Network and device forensic analysis of Android social-messaging applications. Digital Investigation, 14(Supplement 1), S77 - S84. (ISI_2016: 1.66; ISI_2016_5year: 2.275)

    more
  • Breitinger, F., & Baggili, I. (2014). File Detection On Network Traffic Using Approximate Matching. Journal of Digital Forensics, Security and Law, 9, 23 - 36.

    more
  • Breitinger, F., Baier, H., & White, D. (2014). On the database lookup problem of approximate matching. Digital Investigation, 11, Supplement 1.0, 1 - 9. (ISI_2016: 1.66; ISI_2016_5year: 2.275)

    more
  • Breitinger, F., & Roussev, V. (2014). Automated evaluation of approximate matching algorithms on real data. Digital Investigation, 11, 10 - 17. (ISI_2016: 1.66; ISI_2016_5year: 2.275)

    more
  • Breitinger, F., Stivaktakis, & Roussev, V. (2014). Evaluating Detection Error Trade-offs for Bytewise Approximate Matching Algorithms. Digital Investigation, 11(2), 81 - 89. (ISI_2016: 1.66; ISI_2016_5year: 2.275)

    more
  • Breitinger, F., Rathgeb, C., & Baier, H. (2014). An Efficient Similarity Digests Database Lookup - A Logarithmic Divide & Conquer Approach. Journal of Digital Forensics, Security and Law, 9(2), 155 - 166.

    more
  • Rathgeb, C., Breitinger, F., Busch, C., & Baier, H. (2014). On application of bloom filters to iris biometrics. IET Biometrics, 3(4), 207 - 218. (ISI_2016: 2.092; ISI_2016_5year: 2.207)

    more
  • Breitinger, F., Sivaktakis, G., & Baier, H. (2013). FRASH: A Framework to Test Algorithms of Similarity Hashing. Digital Investigation, 10, 50 - 58. (ISI_2016: 1.66; ISI_2016_5year: 2.275)

    more
  • F. Breitinger & I. Baggili (Eds.). (2019). Digital Forensics and Cyber Crime ( Vol. 259): Springer International Publishing.

    more
  • J. I. James & F. Breitinger (Eds.). Digital Forensics and Cyber Crime: 7th International Conference ( Vol. 157). Seoul, Korea: Springer.

    more
  • Ricci, J., Baggili, I., & Breitinger, F. (2016). Watch What You Wear: Smartwatches and Sluggish Security. In Managing Security Issues and the Hidden Dangers of Wearable Technolgies (pp. 47).

    more
  • Schmicker, R., Breitinger, F., & Baggili, I. (2019). AndroParse - An Android Feature Extraction Framework and Dataset. Paper presented at the International Conference on Digital Forensics and Cyber Crime (ICDF2C).

    more
  • Haigh, T., Breitinger, F., & Baggili, I. (2019). If I Had a Million Cryptos: Cryptowallet Application Analysis and a Trojan Proof-of-Concept. Paper presented at the International Conference on Digital Forensics and Cyber Crime (ICDF2C).

    more
  • Lillis, D., Breitinger, F., & Scanlon, M. (2018). Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees. Paper presented at the International Conference on Digital Forensics and Cyber Crime (ICDF2C).

    more
  • Luciano, L., Baggili, I., Topor, M., Casey, P., & Breitinger, F. (2018). Digital Forensics in the Next Five Years. Paper presented at the Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany.

    more
  • Knieriem, B., Zhang, X., Levine, P., Breitinger, F., & Baggili, I. (2018). An Overview of the Usage of Default Passwords. Paper presented at the International Conference on Digital Forensics and Cyber Crime (ICDF2C).

    more
  • Liebler, L., & Breitinger, F. (2018). mrsh-mem: Approximate Matching on Raw Memory Dumps. Paper presented at the 11th International Conference on IT Security Incident Management & IT Forensics.

    more
  • Meffert, C., Clark, D., Baggili, I., & Breitinger, F. (2017). Forensic State Acquisition from Internet of Things (FSAIoT): A General Framework and Practical Approach for IoT Forensics Through IoT Device State Acquisiton. Paper presented at the Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy.

    more
  • Gupta, V., & Breitinger, F. (2015). How Cuckoo Filter Can Improve Existing Approximate Matching Techniques. Paper presented at the International Conference on Digital Forensics & Cyber Crime (ICDF2C), Seoul, South Korea.

    more
  • Baggili, I., Odure, J., Anthony, K., Breitinger, F., & McGee, G. (2015). Watch What You Wear: Preliminary Forensic Analysis of Smart Watches. Paper presented at the International Conference on Availability, Reliability and Security (ARES), Toulouse, France.

    more
  • Rathgeb, C., Breitinger, F., Baier, H., & Busch, C. (2015). Towards Bloom filter-based indexing of iris biometric data. Paper presented at the 2015 International Conference Biometrics (ICB), Phuket, Thailand.

    more
  • Satyendra, G., Baggili, I., Breitinger, F., & Fischer, A. (2015). An empirical comparison of widely adopted hash functions in digital forensics: does the programming language and operating system make a difference. Paper presented at the Proceedings of the Conference on Digital Forensics, Security and Law, Daytona Beach, Florida.

    more
  • Baggili, I., & Breitinger, F. (2015). Data Sources for Advancing Cyber Forensics: What the Social World Has to Offer. Paper presented at the AAAI Spring Symposium Series, Palo Alto, California, USA.

    more
  • Breitinger, F., Winter, C., Yannikos, Y., Fink, T., & Seefried, M. (2014). Using Approximate Matching to Reduce the Volume of Digital Data. Paper presented at the Advances in Digital Forensics X.

    more
  • Breitinger, F., Liu, H., Winter, C., Baier, H., Rybalchenko, A., & Steinebach, M. (2014). Towards a Process Model for Hash Functions in Digital Forensics. Paper presented at the Digital Forensics and Cyber Crime.

    more
  • Breitinger, F., Ziroff, G., Lange, S., & Baier, H. (2014). Similarity Hashing Based on Levenshtein Distances. Paper presented at the IFIP Advances in Information and Communication Technology.

    more
  • Breitinger, F., & Baier, H. (2013). Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2. Paper presented at the Digital Forensics and Cyber Crime.

    more
  • Breitinger, F., & Petrov, K. (2013). Reducing the Time Required for Hashing Operations. Paper presented at the Advances in Information and Communication Technolgy.

    more
  • Breitinger, F., Astebol, K., Baier, H., & Busch, C. (2013). mvHash-B - A New Approach for Similarity Preserving Hashing. Paper presented at the IT Security Incident Management and IT Forensics (IMF).

    more
  • Rathgeb, C., Breitinger, F., & Busch, C. (2013). Alignment-free cancelable iris biometric templates based on adaptive bloom filters. Paper presented at the Biometrics (ICB).

    more
  • Breitinger, F., & Baier, H. (2012). Performance Issues About Context-Triggered Piecwise Hashing. Paper presented at the Digital Forensics and Cyber Crime.

    more
  • Breitinger, F., Baier, H., & Beckingham, J. (2012). Security and implementation analysis of the similarity digest sdhash. Paper presented at the First International Baltic Conference on Network Security & Forensics (NeSeFo).

    more
  • Breitinger, F., & Baier, H. (2012). A fuzzy hashing approach based on random sequences and hamming distance. Paper presented at the Proceedings of the Conference on Digital Forensics, Security and Law.

    more
  • Breitinger, F., & Baier, H. (2012). Properties of a smilarity preserving hash function and their realization in sdhash. Paper presented at the Information Security for South Africa (ISSA).

    more
  • Baier, H., & Breitinger, F. (2011). Security Aspects of Piecewise Hashing in Computer Forensics. Paper presented at the IT Security Incident Management and IT Forensics (IMF).

    more
  • Breitinger, F., & Nickel, C. (2010). User Survey on Phone Security and Usage. Paper presented at the BIOSIG.

    more
  • Breitinger, F. (2014). On the utility of bytewise approximate matching in computer science with a special focus on digital forensics investigations. , Technical University Darmstadt, Germany.

    more