Skip to content

Instantly share code, notes, and snippets.

@jgru
Last active October 31, 2023 08:45
Show Gist options
  • Save jgru/eb686cffd278f9ffb10c4424958b3627 to your computer and use it in GitHub Desktop.
Save jgru/eb686cffd278f9ffb10c4424958b3627 to your computer and use it in GitHub Desktop.
Publication list
@article{SchmitzG17,
doi = {10.1155/2017/5879257},
url = {https://doi.org/10.1155%2F2017%2F5879257},
year = {2017},
publisher = {Hindawi Limited},
volume = {2017},
pages = {1--10},
author = {Roland Schmitz and Jan Gruber},
title = {Commutative Watermarking-Encryption of Audio Data with Minimum Knowledge Verification},
journal = {Advances in Multimedia}
}
@inproceedings{GruberF22a,
author = {Gruber, Jan and Freiling, Felix},
title = {Fighting Evasive Malware: How to Pass the Reverse Turing Test By Utilizing a VMI-Based Human Interaction Simulator},
booktitle = {SICHERHEIT 2022},
year = {2022},
editor = {Wressnegger, C. and Reinhardt, D. and Barber, T. and Witt, B. C. and Arp, D. and Mann, Z. },
pages = {49--64},
doi = {10.18420/sicherheit2022_03},
publisher = {Gesellschaft für Informatik e.V.},
address = {Karlsruhe}
}
@article{GruberF22b,
doi = {10.1007/s11623-022-1604-9},
url = {https://doi.org/10.1007%2Fs11623-022-1604-9},
year = {2022},
month = {5},
publisher = {Springer Science and Business Media {LLC}},
volume = {46},
number = {5},
pages = {284--290},
author = {Jan Gruber and Felix Freiling},
title = {Fighting Evasive Malware},
journal = {Datenschutz und Datensicherheit - {DuD}}
}
@inproceedings{DeuberGHRS22,
author = {Deuber, Dominic and Gruber, Jan and Humml, Merlin and Ronge, Viktoria and Scheler, Nicole},
booktitle = {Sixteenth International Workshop on Juris-informatics (JURISIN 2022)},
date = {2022-06-13/2022-06-14},
title = {{Argumentation} {Schemes} for {Blockchain} {Deanonymization}},
venue = {Kyoto International Conference Center, Kyoto, Japan},
year = {2022}
}
@article{GruberBF22,
title = {Die polizeiliche Aufgabe und Pflicht zur digitalen Gefahrenabwehr},
author = {Gruber, Jan and Brodowski, Dominik and Freiling, Felix C.},
journal = {Zeitschrift f\"ur das gesamte Sicherheitsrecht (GSZ)},
issn = {2567-3823},
issue = {4},
pages = {171--176},
volume = {5},
year = {2022}
}
@article{GruberVBF22,
title = {Foundations of cybercriminalistics: From general process models to case-specific concretizations in cybercrime investigations},
author = {Jan Gruber and Lena L. Voigt and Zinaida Benenson and Felix C. Freiling},
year = 2022,
journal = {Forensic Science International: Digital Investigation},
volume = 43,
pages = 301438,
doi = {https://doi.org/10.1016/j.fsidi.2022.301438},
issn = {2666-2817},
url = {https://www.sciencedirect.com/science/article/pii/S2666281722001196},
keywords = {Cybercriminalistics, Digital investigations, Investigative process, Knowledge management},
abstract = {Despite spectacular stories of successful cyber operations by law enforcement agencies, we continue to be extremely inefficient in fighting cybercrime. The research community has contributed many abstract models to guide digital forensic analyses, but these are usually too abstract to be helpful in concrete cybercrime investigations since they do not give an immediate and straightforward translation of a confronted (digital) crime scene into viable yet promising criminalistic actions. We propose a method to systematically bridge the gap between high-level process models and the demands of actual investigations. The idea is to encode phenomenon-specific knowledge of cybercrime into node-link representations, thereby literally mapping the digital crime scene in well-founded visual representations – so-called cognitive maps. These can be used to derive a prioritized plan of action for targeted acquisition and analysis of case-relevant artifacts. To illustrate our approach, we present a cognitive map for the category of botnet crime and evaluate it with the help of domain experts and by applying it to two real-world cases.}
}
@incollection{Gruber23,
author = {Jan Gruber},
title = {{Identifizierung von Malware-Infrastruktur mittels verteilter Spamtrap-Systeme}},
booktitle = {{Sicherheit in vernetzten Systemen: 30. DFN-Konferenz}},
publisher = {BoD--Books on Demand},
year = {2023},
editor = {Albrecht Ude},
pages = {A1--A27},
month = {02},
address = {Hamburg},
}
@article{GruberHF23,
author = {Jan Gruber and
Christopher J. Hargreaves and
Felix C. Freiling},
title = {Contamination of digital evidence: Understanding an underexposed risk},
journal = {Forensic Sci. Int. Digit. Investig.},
volume = {44},
number = {Supplement},
pages = {301501},
year = {2023},
url = {https://doi.org/10.1016/j.fsidi.2023.301501},
doi = {10.1016/j.fsidi.2023.301501},
timestamp = {Tue, 23 May 2023 09:42:25 +0200},
biburl = {https://dblp.org/rec/journals/di/GruberHF23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{GruberHSF23,
title = {Formal Verification of Necessary and Sufficient Evidence in Forensic Event Reconstruction},
author = {Jan Gruber and Merlin Humml and Lutz Schr\"oder and Felix C. Freiling},
booktitle = {Proceedings of the Digital Forensics Research Conference Europe (DFRWS EU)},
year = 2023,
month = {3},
pages = {1--11},
address = {Bonn},
publisher = {dfrws.org},
editor = {Edita Bajramovic and Ricardo J. Rodr\'{i}guez},
url = {https://dfrws.org/presentation/formal-verification-of-necessary-and-sufficient-evidence-in-forensic-event-reconstruction/},
}
@article{GruberVF23,
title = {{Faktoren erfolgreicher Cybercrime-Ermittlungen}},
subtitle = {{Ergebnisse einer Expertenbefragung}},
author = {Jan Gruber and Lena L. Voigt and Felix C. Freiling},
year = {2023},
month = {5},
journal = {Kriminalistik},
volume = {77},
pages = {266--271},
issn = {0023-4699}
}
@article{GruberH23,
author = {Gruber, Jan and Humml, Merlin},
title = {A Formal Treatment of Expressiveness and Relevance of Digital Evidence},
month = {7},
year = {2023},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
issn = {2692-1626},
doi = {10.1145/3608485},
url = {https://dl.acm.org/doi/10.1145/3608485},
journal = {Digital Threats},
keywords = {formal methods, digital investigations, cybercriminalistics, forensic computing, digital evidence}
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment