Wissenschaftsgebiet

Sicherheit in der Informationstechnik (IT-Sicherheit)

Wissenschaftsgebiet

2017
J. Fuß, M. Grottenthaler - MailCoin - Datenschutz und Datensicherheit, 2017, pp. 487-491 mehr
2017
F. Carvalho Ota, M. Roland, M. Hölzl, R. Mayrhofer, A. Manacero - Protecting Touch: Authenticated App-To-Server Channels for Mobile Devices Using NFC Tags - Information, Vol. 8, No. 3, 2017, pp. 1-18 mehr
2016
M. Roland, M. Hölzl - Open Mobile API: Accessing the UICC on Android Devices - Computing Research Repository (CoRR), Vol. 1601, No. 3027, 2016, pp. 76 mehr
2016
M. Hölzl, M. Roland, R. Mayrhofer - Real-World Identification: Towards a Privacy-Aware Mobile eID for Physical and Offline Verification - Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, Singapur, 2016, pp. 280-283 mehr
2016
I. Schaumüller-Bichl, A. Kolberger - Information Security Risk Analysis in komplexen Systemen - neue Herausforderungen und Lösungsansätze - INFORMATIK 2016. Lecture Notes in Informatics (LNI), Klagenfurt, Österreich, 2016, pp. 609-618 mehr
2016
M. Roland - Executing Arbitrary Code in the Context of the Smartcard System Service - Computing Research Repository (CoRR), Vol. 1601, No. 5833, 2016, pp. 28 mehr
2016
I. Schaumüller-Bichl, A. Kolberger - IoT als Herausforderung für die Informationssicherheit - e & i Elektrotechnik und Informationstechnik, Vol. 133, No. 7, 2016, pp. 319-323 mehr
2015
M. Hölzl, E. Asnake, R. Mayrhofer, M. Roland - A Password-authenticated Secure Channel for App to Java Card Applet Communication - International Journal of Pervasive Computing and Communications (IJPCC), Vol. 11, No. 4, 2015 mehr
2015
J. Fuß, S. Gradinger, B. Greslehner-Nimmervoll, R. Kolmhofer - Complexity Estimates of a SHA-1 Near-Collision Attack for GPU and FPGA - Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES), 2015, Toulouse, Toulouse, Frankreich, 2015, pp. 274-280 mehr
2015
M. Roland, M. Hölzl - Evaluation of Contactless Smartcard Antennas - Computing Research Repository (CoRR), Vol. 1507, No. 6427, 2015, pp. 29 mehr
2015
M. Roland - Security Issues in Mobile NFC Devices - Springer Verlag, 2015, pp. 185 mehr
2014
M. Hölzl, E. Asnake, R. Mayrhofer, M. Roland - Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel - Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2014), Kaohsiung, Taiwan, China, 2014, pp. 10 mehr
2014
A. Kolberger, I. Schaumüller-Bichl, V. Brunner, M. Deutschmann - Protection Profile for PUF-based Devices - ICT Systems Security and Privacy Protection, Marrakech, Marokko, 2014, pp. 91-98 mehr
2014
M. Roland, J. Langer, R. Mayrhofer - Managing the life-cycle of Java Card applets in other Java virtual machines - International Journal of Pervasive Computing and Communications (IJPCC), Vol. 10, No. 3, 2014, pp. 291-312 mehr
2014
J. Gonzales, M. Hölzl, P. Riedl, P. Bonnet, R. Mayrhofer - A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices - Information Security, Hong Kong, China, 2014, pp. 542-554 mehr
2014
A. Kolberger, I. Schaumüller-Bichl, M. Deutschmann - Riskanalysis of Physically Unclonable Functions - Communications and Multimedia Security 2014, Aveiro, Portugal, 2014, pp. 136-139 mehr
2013
J. Fuß, P. Winter, T. Pulls - ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship - Proceedings of the Workshop on Privacy in the Electronic Society, Berlin, Deutschland, 2013 mehr
2013
M. Roland, J. Langer - Comparison of the Usability and Security of NFC's Different Operating Modes in Mobile Devices - e & i Elektrotechnik und Informationstechnik, Vol. 130, No. 7, 2013, pp. 201-206 mehr
2013
B. Danczul, J. Fuß, S. Gradinger, B. Greslehner-Nimmervoll, W. Kastl, F. Wex - Cuteforce Analyzer: A Distributed Bruteforce Attack on PDF Encryption - 8th International Conference on Availability, Reliability and Security (ARES), Regensburg, Deutschland, 2013, pp. 720-725 mehr
2013
M. Roland, J. Langer, J. Scharinger - Applying Relay Attacks to Google Wallet - Proceedings of the 5th International Workshop on Near Field Communication, Zurich, Schweiz, 2013, pp. 1-6 mehr
2013
M. Roland, J. Langer - Cloning Credit Cards: A combined pre-play and downgrade attack on EMV Contactless - Proceedings of the 7th USENIX Workshop on Offensive Technologies (WOOT'13), Washington, D.C., Vereinigte Staaten von Amerika, 2013, pp. 12 mehr
2013
P. Winter, T. Pulls, J. Fuss - ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship - Technical Report, Karlstad University, Schweden, 2013, pp. 12 mehr
2012
R. Kolmhofer - IT-Security News - lex:itec, 2012, pp. 8-15 mehr
2012
I. Schaumüller-Bichl - Informationstechnologie als Produktionsfaktor: Potentiale und Sicherheitsrisiken - Tagungsband FFH 2012, Graz, Österreich, 2012, pp. 7-10 mehr
2012
M. Roland - Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack - Computing Research Repository (CoRR), Vol. 1209, No. 857, 2012, pp. 28 mehr
2012
M. Roland, J. Langer, J. Scharinger - Practical Attack Scenarios on Secure Element-enabled Mobile Devices - Proceedings of the 4th International Workshop on Near Field Communication, Helsinki, Finnland, 2012, pp. 19-24 mehr
2012
J. Fuß, W. Kastl, R. Kolmhofer, G. Schönberger, F. Wex - Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors - LECTURE NOTES IN COMPUTER SCIENCE, Vol. 7394, No. 1234567890, 2012, pp. 201-203 mehr
2012
M. Roland - Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare? - 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU 2012), Newcastle, Vereinigtes Königreich von Großbritannien und Nordirland, 2012,… mehr
2012
J. Edler, A. Leitner, I. Schaumüller-Bichl - Messung und Bewertung von Informationssicherheit in Unternehmen - Tagungsband FFH 2012, Graz, Österreich, 2012, pp. 11-16 mehr
2012
E. Hermann, U. Litschauer, J. Fuß - A Formal Equivalence Classes Based Method for Security Policy Conformance Checking - LECTURE NOTES IN COMPUTER SCIENCE, Vol. 7465, No. 1234567890, 2012, pp. 146-160 mehr
2012
M. Roland, J. Langer, J. Scharinger - Relay Attacks on Secure Element-enabled Mobile Devices: Virtual Pickpocketing Revisited - Information Security and Privacy Research, IFIP AICT 376, Heraklion, Crete, Griechenland, 2012, pp. 1-12 mehr
2011
M. Roland, J. Langer, J. Scharinger - Security Vulnerabilities of the NDEF Signature Record Type - Proceedings of the 3rd International Workshop on Near Field Communication, Hagenberg, Österreich, 2011, pp. 65-70 mehr
2011
G. Schönberger, J. Fuß - GPU-assisted AES encryption using GCM - Proceedings of the 12th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security - CMS 2011, Ghent, Belgien, 2011, pp. 178-185 mehr
2010
M. Roland, J. Langer - Digital Signature Records for the NFC Data Exchange Format - Proceedings of the 2nd International Workshop on Near Field Communication, Monaco, Monaco, 2010, pp. 71-76 mehr
2010
M. Roland, J. Langer, M. Bogner, F. Wiesinger - NFC im Automobil: Software bringt Ökonomie und braucht Sicherheit in Energieeffiziente Mobilität - Shaker Verlag, 2010, pp. 8 mehr
2010
I. Schaumüller-Bichl - Informationssicherheit: die Basis für Privacy - OCG Journal, 2010, pp. 6-7 mehr
2010
J. Langer, M. Roland - Anwendungen und Technik von Near Field Communication (NFC) - Springer Verlag, 2010, pp. 265 mehr
2010
H. Lampesberger - Empirical Evaluation of the Internet Analysis System for Application in the Field of Anomaly Detection - Computer Network Defense (EC2ND), 2010 European Conference on, Berlin, Deutschland, 2010, pp. 63-70 mehr
2010
G. Madlmayr, C. Kantner, J. Scharinger, I. Schaumüller-Bichl - Eine mobile Service-Architektur für ein sicheres NFC-Ökosystem - e & i Elektrotechnik und Informationstechnik, Vol. 127, No. 5, 2010, pp. 1-8 mehr
2009
A. Leitner, I. Schaumüller-Bichl - ARiMa – a New Approach to Implement ISO/IEC 27005 - Proceedings of the IEEE 2nd International Symposium on Logistics and Industrial Informatics (Lindi 2009), Linz, Österreich, 2009 mehr
2009
G. Madlmayr, C. Kantner, J. Langer, J. Scharinger, I. Schaumüller-Bichl - Risk Analysis of Over-the-Air Transactions in an NFC ecosystem - Proceedings - 1st International IEEE Workshop on Near Field Communication, Hagenberg, Österreich, 2009, pp. 87-92 mehr