Logo

Univ.-Prof. Dr. Rainer Böhme
Professor

E-mailrainer.boehme@uibk.ac.at
Phone+43 512 507-53202
Phone (PA)+43 512 507-53354
Fax+43 512 507-53018
AddressTechnikerstraße 21A, 6020 Innsbruck, Austria
OfficeICT 3N02
Univ.-Prof. Dr. Rainer Böhme

Upcoming Events

Research Interests

  • Digital forensics
  • Steganography and steganalysis
  • Economics of information security
  • Virtual currencies and cryptographic financial instruments
  • Privacy-enhancing technologies (PET)
  • Economic and behavioral aspects of information security and privacy
  • Cybercrime research

Positions

since 03/2015 Professor for Security and Privacy, Department of Computer Science, University of Innsbruck, Austria
2010 – 2015 Assistant Professor, Department of Information Systems, University of Münster, Germany
2009 – 2010 Postdoctoral Fellow, Networking and Security Group, International Computer Science Institute, Berkeley, California
2007 – 2009 Research Assistant, Chair of Privacy and Data Security (Prof. Dr. Andreas Pfitzmann), Technische Universität Dresden, Germany
2005 – 2007 Research Analyst, Directorate General Economics, European Central Bank, Frankfurt am Main, Germany

Education

2008 Ph.D. (Dr.-Ing.) in Computer Science, Technische Universität Dresden, Germany
1998 – 2003 M.A. in Communications, Economics and Computer Science, Technische Universität Dresden, Germany
1999 – 2000 Communication publique et politique, Erasmus exchange, Université Paris XII, France

Publications

This list is broadly structured by topic. See Google Scholar for crawler-based bibliometrics and DBLP for a chronological order of my computer science papers. SSRN hosts my popular economics working papers.

Most Recent

  • Schöttle, P. and Böhme, R. Game Theory and Adaptive Steganography. IEEE Transactions on Information Forensics and Security, 11, 4 (2016), 760–773. [PDF] [Publisher]
  • Riek, M., Böhme, R., and Moore, T. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance. IEEE Transactions on Dependable and Secure Computing, 13, 2 (2016), 261–273. [Publisher]
  • Machuletz, D., Sendt, H., Laube, S., and Böhme, R. Users Protect Their Privacy If They Can: Determinants of Webcam Covering Behavior. In Proceedings of the 1st European Workshop on Usable Security (EuroUSEC). Internet Society, Darmstadt, Germany, 2016. [PDF]
  • Heitzenrather, C., Böhme, R., and Simpson, A. The Days Before Zero Day: Investment Models for Secure Software Engineering. In Workshop on the Economics of Information Security (WEIS). University of California at Berkeley, 2016. [Publisher]
  • Riek, M., Böhme, R., Ciere, M., Ganan, C., and van Eeten, M. Estimating the Costs of Consumer-facing Cybercrime: A Tailored Instrument and Representative Data for Six EU Countries. In Workshop on the Economics of Information Security (WEIS). University of California at Berkeley, 2016. [Publisher]
  • Böhme, R. and Kirchner, M. Media Forensics. In S. Katzenbeisser and F. Petitcolas, eds., Information Hiding. Artech House, 2016, pp. 231–259. [PDF]
  • Spiekermann, S., Acquisti, A., Böhme, R., and Hui, K.-L. The Challenges of Personal Data Markets and Privacy. Electronic Markets, 25, 2 (2015), 161–167. [Publisher]
This paper won the Lloyd’s Science of Risk Prize 2015 in the category cyber risk:

  • Laube, S. and Böhme, R. Mandatory Security Information Sharing with Authorities: Implications on Investments in Internal Controls. In ACM Conference on Computer and Communication Security (ACM CCS), 2nd Workshop on Information Sharing and Collaborative Security. ACM, Denver, Colorado, 2015, pp. 31–42. [PDF]

Virtual Currencies

  • Böhme, R., Christin, N., Edelman, B., and Moore, T. Bitcoin: Economics, Technology, and Governance. Journal of Economic Perspectives, 29, 2 (2015), 213–238. [Publisher]
  • Möser, M. and Böhme, R. Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees. In M. Brenner, N. Christin, B. Johnson and K. Rohloff, eds., Financial Cryptography and Data Security, 2nd Workshop on BITCOIN Research. Lecture Notes in Computer Science 8976, Springer, Berlin Heidelberg, 2015, pp. 19–33. [PDF] [Publisher]
  • Möser, M., Böhme, R., and Breuker, D. Towards Risk Scoring of Bitcoin Transactions. In R. Böhme, M. Brenner, T. Moore and M. Smith, eds., Financial Cryptography and Data Security, 1st Workshop on BITCOIN Research. Lecture Notes in Computer Science 8438, Springer, Berlin Heidelberg, 2014, pp. 16–32. [Publisher]
  • Böhme, R. Internet Protocol Adoption: Learning from Bitcoin. 2013. IAB Workshop on Internet Technology Adoption and Transition (ITAT), Cambridge. [PDF]
  • Möser, M., Böhme, R., and Breuker, D. An Inquiry into Money Laundering Tools in the Bitcoin Ecosystem. In APWG eCrime Researchers Summit (ECRIME). San Francisco, CA, 2013, pp. 1–14. [PDF] [Publisher]
  • Becker, J., Breuker, D., Heide, T., Holler, J., Rauer, H.P., and Böhme, R. Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency. In R. Böhme, ed., The Economics of Information Security and Privacy. Springer, Berlin Heidelberg, 2013, pp. 135–156.

Economics of Information Security

  • Laube, S. and Böhme, R. The Economics of Mandatory Security Breach Reporting to Authorities. In Workshop on the Economics of Information Security (WEIS). Delft University of Technology, 2015.
  • Laszka, A., Johnson, B., Schöttle, P., Grossklags, J., and Böhme, R. Secure Team Composition to Thwart Insider Threats and Cyberespionage. ACM Transactions on Internet Technology, 14, 2–3 (2014), 19:1–22. [Publisher]
  • Riek, M., Böhme, R., and Moore, T. Understanding the Influence of Cybercrime Risk on the E-Service Adoption of European Internet Users. In Workshop on the Economics of Information Security (WEIS). The Pennsylvania State University, State College, Pennsylvania, 2014.
  • Anderson, R., Barton, C., Böhme, R., et al. Measuring the Cost of Cybercrime. In R. Böhme, ed., The Economics of Information Security and Privacy. Springer, Berlin, Germany, 2013, pp. 265–300.
  • Böhme, R. and Grossklags, J. Trading Agent Kills Market Information – Evidence from Online Social Lending. In Y. Chen and N. Immorlica, eds., Web and Internet Economics. Lecture Notes in Computer Science 8289, Springer, Berlin Heidelberg, 2013, pp. 68–81. [PDF]
  • Laszka, A., Johnson, B., Schöttle, P., and Böhme, R. Managing the Weakest Link: A Game-Theoretic Approach for the Mitigation of Insider Threats. In J. Crampton, S. Jajodia and K. Mayes, eds., Computer Security (ESORICS). Lecture Notes in Computer Science 8134, Springer, Berlin Heidelberg, 2013, pp. 273–290.
  • Böhme, R. Security Audits Revisited. In A. Keromytis, ed., Financial Cryptography and Data Security. Lecture Notes in Computer Science 7397, Springer, Berlin Heidelberg, 2012, pp. 129–147.
  • Böhme, R. and Moore, T. How Do Consumers React to Cybercrime? In APWG eCrime Researchers Summit (ECRIME). Puerto Rico, 2012, pp. 1–12. [PDF]
  • Johnson, B., Böhme, R., and Grossklags, J. Security Games with Market Insurance. In J.S. Baras, J. Katz and E. Altmann, eds., Decision and Game Theory for Security. Lecture Notes in Computer Science 7037, Springer, Berlin Heidelberg, 2011, pp. 117–130.
  • Böhme, R. and Félegyházi, M. Security Investment with Penetration Testing. IEEE COMSOC E-Letter, 6, 5 (2011), 6–8.
  • Böhme, R. and Grossklags, J. The Security Cost of Cheap User Interaction. In New Security Paradigms Workshop (NSPW’11). ACM, New York, 2011, pp. 67–82.
  • Böhme, R. and Grossklags, J. Vanishing Signals: Trading Agent Kills Market Information. In NetEcon (ACM Electronic Commerce Workshop). San Jose, CA, 2011.
  • Böhme, R. and Schwartz, G. Modeling Cyber-Insurance: Towards a Unifying Framework. In Workshop on the Economics of Information Security (WEIS). Harvard University, Cambridge, MA, 2010. [PDF]
  • Böhme, R. and Félegyházi, M. Optimal Information Security Investment with Penetration Testing. In T. Alpcan, L. Buttyán and J.S. Baras, eds., Decision and Game Theory for Security. Lecture Notes in Computer Science 6442, Springer, Berlin Heidelberg, 2010, pp. 21–37.
  • Böhme, R. Security Metrics and Security Investment Models. In I. Echizen, N. Kunihiro and R. Sasaki, eds., Advances in Information and Computer Security. Lecture Notes in Computer Science 6434, Springer, Berlin Heidelberg, 2010, pp. 10–24. [PDF] [Publisher]
  • Böhme, R. and Moore, T. The Iterated Weakest Link. IEEE Security & Privacy, 8, 1 (2010), 53–55.
  • Böhme, R. Towards Insurable Network Architectures. it - Information Technology, 52, 5 (2010), 290–293.
  • Böhme, R. and Moore, T. The Iterated Weakest Link: A Model of Adaptive Security Investment. In Workshop on the Economics of Information Security (WEIS). University College London, UK, 2009.
  • Anderson, R., Böhme, R., Clayton, R., and Moore, T. Security Economics and European Policy. In M.E. Johnson, ed., Managing Information Risk and the Economics of Security. Springer, New York, 2009, pp. 55–80.
  • Böhme, R. and Nowey, T. Economic Security Metrics. In I. Eusgeld, F.C. Freiling and R. Reussner, eds., Dependability Metrics. Lecture Notes in Computer Science 4909, Springer, Berlin Heidelberg, 2008, pp. 176–187.
  • Böhme, R. and Freiling, F.C. On Metrics and Measurements. In I. Eusgeld, F.C. Freiling and R. Reussner, eds., Dependability Metrics. Lecture Notes in Computer Science 4909, Springer, Berlin Heidelberg, 2008, pp. 7–13.
  • Böhme, R. and Reussner, R. Validation of Predictions with Measurements. In I. Eusgeld, F.C. Freiling and R. Reussner, eds., Dependability Metrics. Lecture Notes in Computer Science 4909, Springer, Berlin Heidelberg, 2008, pp. 14–18.
  • Anderson, R., Böhme, R., Clayton, R., and Moore, T. Security Economics and European Policy. In Workshop on the Economics of Information Security (WEIS). Tuck School of Business, Dartmouth College, Hanover, NH, 2008.
  • Anderson, R., Böhme, R., Clayton, R., and Moore, T. Security Economics and the Internal Market. ENISA, Heraklion, Greece, 2008.
  • Böhme, R. A Comparison of Market Approaches to Software Vulnerability Disclosure. In G. Müller, ed., Emerging Trends in Information and Communication Security (ETRICS). Lecture Notes in Computer Science 3995, Springer, Berlin Heidelberg, 2006, pp. 298–311.
  • Koble, S. and Böhme, R. Economics of Identity Management: A Supply-side Perspective. In G. Danezis and D. Martin, eds., Privacy Enhancing Technologies (PET 2005). Lecture Notes in Computer Science 3856, Springer, Berlin Heidelberg, 2006, pp. 259–272.
  • Böhme, R. and Kataria, G. Models and Measures for Correlation in Cyber-Insurance. In Workshop on the Economics of Information Security (WEIS). University of Cambridge, UK, 2006.
  • Böhme, R. and Kataria, G. On the Limits of Cyber-Insurance. In S. Fischer-Hübner, S. Furnell and C. Lambrinoudakis, eds., Trust, Privacy and Security in Digital Business (TrustBus/DEXA 2006). Lecture Notes in Computer Science 4083, Springer, Berlin Heidelberg, 2006, pp. 31–40.
  • Böhme, R. and Holz, T. The Effect of Stock Spam on Financial Markets. In Workshop on the Economics of Information Security (WEIS). University of Cambridge, UK, 2006.
  • Böhme, R. Vulnerability Markets – What is the Economic Value of a Zero-Day Exploit? In 22C3: Private Investigations. Chaos Computer Club, Berlin, Germany, 2005.
  • Böhme, R. Cyber-Insurance Revisited. In Workshop on the Economics of Information Security (WEIS). Harvard University, Cambridge, MA, 2005.

In German

  • Laube, S. and Böhme, R. Meldepflichten für IT-Sicherheitsvorfälle: Ein Prinzipal-Agent-Ansatz. In O. Thomas and F. Teuteberg, eds., Tagungsband Wirtschaftsinformatik. 2015, pp. 1146–1162.
  • Böhme, R. and Laube, S. Das IT-Sicherheitsgesetz. In J. Baetge and H.-J. Kirsch, eds., Mittelstand im Blick: Compliance und Risikomanagement. IDW, Düsseldorf, 2014, pp. 17–36.
  • Böhme, R. Wann sind IT-Security-Audits nützlich? In Tagungsband Wirtschaftsinformatik. 1, 2011, pp. 385–394.
  • Böhme, R. IT-Risiken im Schadenversicherungsmodell: Implikationen der Marktstruktur. In H. Federrath, ed., Sicherheit 2005 – Sicherheit, Schutz und Zuverlässigkeit. Lecture Notes in Informatics 62, Gesellschaft für Informatik, Bonn, 2005, pp. 27–40.

Privacy

  • Möser, M. and Böhme, R. Join Me on a Market for Anonymity. In Workshop on the Economics of Information Security (WEIS). University of California at Berkeley, 2016. [Publisher]
  • Korff, S. and Böhme, R. Too Much Choice: End-User Privacy Decisions in the Context of Choice Proliferation. In Symposium on Usable Privacy and Security (SOUPS). USENIX Association, 2014, pp. 69–87. [Publisher]
  • Boehm, F. and Böhme, R. Improving Informed Consent for Consumers in E-Commerce – An Interdisciplinary Perspective. In Privacy Law Scholars Conference (PLSC). Washington, DC, 2014.
  • Böhme, R. and Pötzsch, S. Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data. In G. Danezis, ed., Financial Cryptography and Data Security. Lecture Notes in Computer Science 7035, Springer, Berlin Heidelberg, 2011, pp. 1–15.
  • Böhme, R. and Pötzsch, S. Privacy in Online Social Lending. In AAAI Spring Symposium on Intelligent Privacy Management. AAAI Press, Palo Alto, 2010, pp. 23–28.
  • Böhme, R. and Köpsell, S. Trained to Accept? A Field Experiment on Consent Dialogs. In Conference on Human Factors in Computing Systems (ACM CHI). New York, 2010, pp. 2403–2406.
  • Berthold, S. and Böhme, R. Valuating Privacy with Option Pricing Theory. In T. Moore, D.J. Pym and C. Ioannidis, eds., Economics of Information Security and Privacy. Springer, New York, 2010, pp. 187–209.
  • Berthold, S., Böhme, R., and Köpsell, S. Data Retention and Anonymity Services. In V. Matyáš, S. Fischer-Hübner, D. Cvrček and P. Švenda, eds., The Future of Identity in the Information Society. Springer, New York, 2009, pp. 92–106.
  • Böhme, R. and Pfitzmann, A. Privacy-DRM: Data Protection by Copy Protection? 2009. Mimeo. [PDF]
  • Kellermann, B. and Böhme, R. Privacy-Enhanced Event Scheduling. In Conference on Information Privacy, Security, Risk and Trust (PASSAT ’09). 3, IEEE Computer Society, Los Alamitos, CA, USA, 2009, pp. 52–59.
  • Böhme, R. Conformity or Diversity: On the Social Implications of Transparency in Personal Data Processing. In M.E. Johnson, ed., Managing Information Risk and the Economics of Security. Springer, New York, 2009, pp. 291–312.
  • Böhme, R. and Koble, S. On the Viability of Privacy-Enhancing Technologies in a Self-regulated Business-to-consumer Market: Will Privacy Remain a Luxury Good? In Workshop on the Economics of Information Security (WEIS). Carnegie Mellon University, Pittsburgh, PA, 2007.
  • Böhme, R. and Koble, S. Pricing Strategies in Electronic Marketplaces with Privacy-Enhancing Technologies. Wirtschaftsinformatik, 49, 1 (2007), 16–25.
  • Böhme, R., Diaz, C., Danezis, G., Köpsell, S., and Pfitzmann, A. Mix Cascades versus Peer-to-Peer: Is One Concept Superior? In D. Martin and A. Serjantov, eds., Privacy Enhancing Technologies (PET 2004). Lecture Notes in Computer Science 3424, Springer, Berlin Heidelberg, 2005, pp. 243–255.

In German

  • Böhme, R. and Luhn, S. Die Privatsphäre des Verbrauchers – ein Luxusgut? In C. Bala and K. Müler, eds., Der gläserne Verbraucher – Wird Datenschutz zum Verbraucherschutz? Verbraucherzentrale NRW, Düsseldorf, 2014, pp. 42–56.
  • Schöttle, P. and Böhme, R. Die totale Transparenz. Facebook, Cookies, RFID etc. In M. Dabrowski, J. Wolf and K. Abmeier, eds., Ethische Herausforderungen im Web 2.0. Schöningh, Paderborn, 2014, pp. 11–31.
  • Böhme, R. and Pötzsch, S. Social Lending aus der Perspektive des Datenschutzes. In F.C. Freiling, ed., Sicherheit 2010 – Sicherheit, Schutz und Zuverlässigkeit. Lecture Notes in Informatics 170, Köllen, Bonn, 2010, pp. 317–328.
  • Böhme, R. and Pfitzmann, A. Digital Rights Management zum Schutz personenbezogener Daten? Datenschutz und Datensicherheit, 32, 5 (2008), 342–346.
  • Böhme, R. and Pfitzmann, A. Datenspuren beim Forschungskontakt: Wie die Vorratsdatenspeicherung empirische Sozialforschung verändern könnte. Forschung & Lehre, 14, 10 (2007), 610–611.

Digital Forensics

  • Pasquini, C., Schöttle, P., Böhme, R., Boato, G., and Pèrez-Gonzàlez, F. Forensics of High Quality and Nearly Identical JPEG Image Recompression. In ACM Information Hiding and Multimedia Security Workshop. Vigo, Galicia, Spain, 2016, pp. 11–21. [Publisher]
  • Abramova, S. and Böhme, R. Detecting Copy–Move Forgeries in Scanned Text Documents. In Proceedings of IS&T Electronic Imaging: Media Watermarking, Security, and Forensics 2016. San Francisco, CA, 2016. [PDF]
  • Carnein, M., Schöttle, P., and Böhme, R. Telltale Watermarks for Counting JPEG Compressions. In Proceedings of IS&T Electronic Imaging: Media Watermarking, Security, and Forensics 2016. San Francisco, CA, 2016. [PDF]
  • Carnein, M., Schöttle, P., and Böhme, R. Forensics of High-Quality JPEG Images with Color Subsampling. In IEEE International Workshop on Information Forensics and Security (IEEE WIFS). Rome, Italy, 2015. [PDF]
  • Lai, S.-Y. and Böhme, R. Block Convergence in Repeated Transform Coding: JPEG-100 Forensics, Carbon Dating, and Tamper Detection. In IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP). Vancouver, Canada, 2013, pp. 3028–3032. [PDF]
  • Böhme, R. and Kirchner, M. Counter-Forensics: Attacking Image Forensics. In H.T. Sencar and N.D. Memon, eds., Digital Image Forensics: There is More to a Picture Than Meets the Eye. Springer, New York, 2012, pp. 327–366. [PDF]
  • Lai, S.-Y. and Böhme, R. Countering Counter-Forensics: The Case of JPEG Compression. In T. Filler, T. Pevný, S. Craver and A. Ker, eds., Information Hiding (12th International Conference). Lecture Notes in Computer Science 6985, Springer, Berlin Heidelberg, 2011, pp. 285–298.
  • Gloe, T., Cebron, N., and Böhme, R. An ML Perspective on Feature-Based Forensic Camera Model Identification. In DAGM Workshop on Pattern Recognition for IT Security. Darmstadt, Germany, 2010.
  • Gloe, T. and Böhme, R. The Dresden Image Database for Benchmarking Digital Image Forensics. Journal of Digital Forensic Practice, 3, (2010), 150–159.
  • Böhme, R., Freiling, F.C., Gloe, T., and Kirchner, M. Multimedia Forensics Is Not Computer Forensics. In Z.J.M.H. Geradts, K. Franke and C.J. Veenman, eds., International Workshop on Computational Forensics (IWCF). Lecture Notes in Computer Science 5718, Springer, Berlin Heidelberg, 2009, pp. 90–103.
  • Kirchner, M. and Böhme, R. Synthesis of Color Filter Array Pattern in Digital Images. In E.J. Delp, J. Dittmann, N.D. Memon and P.W. Wong, eds., Proceedings of SPIE-IS&T Electronic Imaging: Media Forensics and Security XI. 7254, San Jose, CA, 2009, pp. 725421.
  • Kirchner, M. and Böhme, R. Hiding Traces of Resampling in Digital Images. IEEE Transactions on Information Forensics and Security, 3, 4 (2008), 582–592.
  • Gloe, T., Kirchner, M., Winkler, A., and Böhme, R. Can We Trust Digital Image Forensics? In ACM Multimedia. ACM, New York, NY, USA, 2007, pp. 78–86.
  • Kirchner, M. and Böhme, R. Tamper Hiding: Defeating Image Forensics. In T. Furon, F. Cayre, G. Doërr and P. Bas, eds., Information Hiding. Lecture Notes in Computer Science 4567, Springer, Berlin Heidelberg, 2007, pp. 326–341.
  • Böhme, R. and Westfeld, A. Feature-based Encoder Classification of Compressed Audio Streams. Multimedia Systems Journal, 11, 2 (2005), 108–120.

In German

  • Böhme, R., Freiling, F.C., Gloe, T., and Kirchner, M. Multimedia-Forensik als Teildisziplin der digitalen Forensik. In S. Fischer at al., ed., Informatik 2009 – Im Fokus das Leben. Lecture Notes in Informatics 154, Gesellschaft für Informatik, Bonn, 2009, pp. 1537–1551.

Steganography and Steganalysis

  • Böhme, R. Advanced Statistical Steganalysis. Springer, Berlin Heidelberg, 2010.
  • Johnson, B., Schöttle, P., Laszka, A., Grossklags, J., and Böhme, R. Adaptive Steganography and Steganalysis with Fixed-Size Embedding. Transactions on Data Hiding and Multimedia Security, 10, (2015), 69–91. [Publisher]
  • Kirchner, M. and Böhme, R. “Steganalysis in Technicolor” – Boosting WS Detection of Stego Images from CFA-Interpolated Covers. In IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP). Florence, Italy, 2014, pp. 3982–3986. [PDF]
  • Carnein, M., Schöttle, P., and Böhme, R. Predictable Rain? Steganalysis of Public-Key Steganography using Wet Paper Codes. In ACM Information Hiding and Multimedia Security Workshop. Salzburg, Austria, 2014, pp. 97–108.
  • Ker, A., Bas, P., Böhme, R., et al. Moving Steganography and Steganalysis from the Laboratory into the Real World. In ACM Information Hiding and Multimedia Security Workshop. Montpellier, France, 2013, pp. 45–58.
  • Johnson, B., Schöttle, P., Laszka, A., Grossklags, J., and Böhme, R. Bitspotting: Detecting Optimal Adaptive Steganography. In Y.-Q. Shi, H.-J. Kim and F. Pérez-González, eds., Digital Forensics and Watermarking, 12th International Workshop, IWDW 2013. Lecture Notes in Computer Science 8389, Springer, Berlin Heidelberg, 2014, pp. 3–18.
  • Schöttle, P., Laszka, A., Johnson, B., Grossklags, J., and Böhme, R. A Game-Theoretic Analysis of Content-adaptive Steganography with Independent Embedding. In 21st European Signal Processing Conference (EUSIPCO). IEEE, Marrakech, Morocco, 2013, pp. 1–5.
  • Schöttle, P., Korff, S., and Böhme, R. Weighted Stego-Image Steganalysis for Naive Content-Adaptive Embedding. In IEEE International Workshop on Information Forensics and Security (IEEE WIFS). Tenerife, Spain, 2012, pp. 193–198.
  • Schöttle, P. and Böhme, R. A Game-Theoretic Approach to Content-Adaptive Steganography. In M. Kirchner and D. Ghosal, eds., Information Hiding (14th International Conference). Lecture Notes in Computer Science 7692, Springer, Berlin Heidelberg, 2012, pp. 125–141.
  • Johnson, B., Schöttle, P., and Böhme, R. Where to Hide the Bits? In J. Grossklags and J. Walrand, eds., Decision and Game Theory for Security. Lecture Notes in Computer Science 7638, Springer, Berlin Heidelberg, 2012, pp. 1–17.
  • Böhme, R. An Epistemological Approach to Steganography. In S. Katzenbeisser and A.-R. Sadeghi, eds., Information Hiding (11th International Conference). Lecture Notes in Computer Science 5806, Springer, Berlin Heidelberg, 2009, pp. 15–30.
  • Böhme, R. Improved Statistical Steganalysis using Models of Heterogeneous Cover Signals. 2008.
  • Ker, A. and Böhme, R. Revisiting Weighted Stego-Image Steganalysis. In E.J. Delp, P.W. Wong, J. Dittmann and N.D. Memon, eds., Proceedings of SPIE-IS&T Electronic Imaging: Security, Forensics, Steganography and Watermarking of Multimedia Contents X. 6819, San Jose, CA, 2008.
  • Böhme, R. Weighted Stego-Image Steganalysis for JPEG Covers. In Information Hiding (9th International Workshop). Lecture Notes in Computer Science 5284, Springer, Berlin Heidelberg, 2008, pp. 178–194.
  • Böhme, R. and Keiler, C. On the security of ‘A Steganographic Scheme for Secure Communications Based on the Chaos and Euler Theorem.’ IEEE Transactions on Multimedia, 9, 6 (2007), 1325–1329.
  • Böhme, R. and Ker, A. A Two-Factor Error Model for Quantitative Steganalysis. In E.J. Delp and P.W. Wong, eds., Proceedings of SPIE-IS&T Electronic Imaging: Security, Steganography and Watermarking of Multimedia Contents VIII. 6072, San Jose, CA, 2006, pp. 59–74.
  • Böhme, R. Assessment of Steganalytic Methods Using Multiple Regression Models. In M. Barni, Herrera-Joancomartı́ Jordi, S. Katzenbeisser and F. Pérez-González, eds., Information Hiding (7th International Workshop). Lecture Notes in Computer Science 3727, Springer, Berlin Heidelberg, 2005, pp. 278–295.
  • Böhme, R. and Westfeld, A. Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics. In P. Samarati, P.Y.A. Ryan, D. Gollmann and R. Molva, eds., Computer Security (ESORICS). Lecture Notes in Computer Science 3193, Springer, Berlin Heidelberg, 2004, pp. 125–140.
  • Böhme, R. and Westfeld, A. Exploiting Preserved Statistics for Steganalysis. In J. Fridrich, ed., Information Hiding (6th International Workshop). Lecture Notes in Computer Science 3200, Springer, Berlin Heidelberg, 2004, pp. 82–96.
  • Böhme, R. and Westfeld, A. Statistical Characterisation of MP3 Encoders for Steganalysis. In ACM Multimedia and Security Workshop (MMSEC). ACM Press, New York, 2004, pp. 25–34.

Miscellaneous

  • Spiekermann, S., Böhme, R., Acquisti, A., and Hui, K.-L. Personal Data Markets (Guest Editorial). Electronic Markets, 25, 2 (2015), 91–93. [Publisher]
  • Luhn, S., Bruns, I., and Böhme, R. Consumer Participation in Online Contracts – Exploring Cross-Out Clauses. In H. Federrath, S. Katzenbeisser, V. Lotz, M. Waidner and E. Weippl, eds., Sicherheit 2014 – Sicherheit, Schutz und Zuverlässigkeit. Lecture Notes in Informatics, Gesellschaft für Informatik, Bonn, 2014.
  • Böhme, R., Rath, M., Schneider, R., and Telang, R. Report on Software Liability. ENISA Working Group on Economics of IT Security (WG-EOS), 2011.
  • Böhme, R. Research Note on Progress Indicators in Online Surveys. 2010. [PDF]
  • Pötzsch, S. and Böhme, R. The Role of Soft Information in Trust Building: Evidence from Online Social Lending. In A. Acquisti, S.W. Smith and A.-R. Sadeghi, eds., International Conference on Trust and Trustworthy Computing (TRUST). Lecture Notes in Computer Science 6101, Springer, Berlin Heidelberg, 2010, pp. 381–395.
  • Böhme, R. and Kataria, G. A Closer Look at Attack Clustering. In Workshop on the Economics of Securing the Information Infrastructure (WESII). Washington, DC, 2006.

In German

  • Becker, J., Breuker, D., Heide, T., Holler, J., Rauer, H.P., and Böhme, R. Geld stinkt, Bitcoin auch. Eine Ökobilanz der Bitcoin Block Chain. In U. Goltz et al., ed., Informatik 2012. Lecture Notes in Informatics 208, Gesellschaft für Informatik, Bonn, 2012, pp. 39–50.
  • Böhme, R. IT-Sicherheit: Umdenken nach Stuxnet? Wirtschaftsdienst, 90, 10 (2010), 642.
  • Kühne, M. and Böhme, R. Effekte von Informationsstand, Wissen und Einstellungsstärke von Befragten auf die Antwortstabilität in Online-Befragungen mit Selbstrekrutierung. ZUMA-Nachrichten, 59, (2006), 42–71.
  • Böhme, R. Fragebogeneffekte bei Online-Befragungen. 2003.

Edited Volumes

  • Böhme, R., ed. The Economics of Information Security and Privacy. Springer, Berlin Heidelberg, 2013.
  • Böhme, R. and Okamoto, T., eds. Financial Cryptography and Data Security – 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26–30, 2015, Revised Selected Papers. Lecture Notes in Computer Science 8438, Springer, Berlin Heidelberg, 2015.
  • Böhme, R., Brenner, M., Moore, T., and Smith, M., eds. Financial Cryptography and Data Security – FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8438, Springer, Berlin Heidelberg, 2014.
  • Böhme, R., Fong, P.W., and Safavi-Naini, R., eds. Information Hiding. 12th International Conference, IH 2010, Calgary, Canada, June 28–30, 2010. Revised Selected Papers. Lecture Notes in Computer Science 6387, Springer, Berlin Heidelberg, 2010.

Professional Activities

Secondary Appointments

since 03/2015 Principal Investigator, Department of Information Systems, University of Münster, Germany
since 2014 Lecturer for “Security Management”, Ruhr-Universität Bochum, Germany
since 2013 Co-founder of dence GmbH - Digital Evidence, Dresden, Germany

Scientific Community Service

since 2016 Member of the Editorial Board, Business and Information Systems Engineering (formerly Wirtschaftsinformatik)
since 2013 Associate Editor, EURASIP Journal on Information Security
since 2013 Associate Editor, Electronic Commerce Research
2013 – 2015 Area Editor Security & Privacy, Information Systems
2015 – 2016 Program Co-Chair, 24th & 25th New Security Paradigms Workshop (NSPW)
2015 Program Co-Chair, 19th International Conference on Financial Cryptography and Data Security
2014 General Chair, 8th International Conference on IT Security Incident Management & IT Forensics
2014 Organizer and Program Co-Chair, 1st Workshop on Bitcoin Research
2013 Track Co-Chair, 21st European Conference on Information Systems (ECIS)
2012 Program Chair, 11th Workshop on the Economics of Information Security (WEIS)
2010 Program Co-Chair, 12th Information Hiding Conference

Consulting

Occasionally, I accept consulting jobs iff

  • the job is compatible with my responsibilities as an Austrian university professor,
  • the contract partner is a reputable organization, and
  • the job is remunerated at market rates. (This is not to get rich, but to avoid unfair competition with our graduates’ startups and employers.)

I only sign NDAs which are specific enough to not constrain my research and teaching, contain a reasonable sunset provision, and do not prevent me from responsibly disclosing security vulnerabilities in widely used software.

GPG Public Key Fingerprint

1C1F E7E6 039B DA1B E630 1A15 99D0 738A 70DF 7A85

I may not be able to respond immediately to confidential communication whenever I work in untrusted environments. I do not assume any legal liability for documents signed with this key.

Projects