Wissenschaftsgebiet

Sicherheit in der Informationstechnik (IT-Sicherheit)

Wissenschaftsgebiet

2019
A. Aigner, R. Zeller - HEHLKAPPE: Utilizing Deep Learning to Manipulate Surveillance Camera Footage in Real-Time - Proceedings of the 14th International Conference on Availability, Reliability and Security, Canterbury, CA, United Kingdom, Vereinigtes Königreich von Großbritannien und Nordirland, 2019,… mehr
2017
F. Carvalho Ota, M. Roland, M. Hölzl, R. Mayrhofer, A. Manacero - Protecting Touch: Authenticated App-To-Server Channels for Mobile Devices Using NFC Tags - Information, Vol. 8, No. 3, 2017, pp. 1-18 mehr
2017
J. Fuß, M. Grottenthaler - MailCoin - Datenschutz und Datensicherheit, 2017, pp. 487-491 mehr
2016
I. Schaumüller-Bichl, A. Kolberger - Information Security Risk Analysis in komplexen Systemen - neue Herausforderungen und Lösungsansätze - INFORMATIK 2016. Lecture Notes in Informatics (LNI), Klagenfurt, Österreich, 2016, pp. 609-618 mehr
2016
M. Roland - Executing Arbitrary Code in the Context of the Smartcard System Service - Computing Research Repository (CoRR), Vol. 1601, No. 5833, 2016, pp. 28 mehr
2016
I. Schaumüller-Bichl, A. Kolberger - IoT als Herausforderung für die Informationssicherheit - e & i Elektrotechnik und Informationstechnik, Vol. 133, No. 7, 2016, pp. 319-323 mehr
2016
M. Roland, M. Hölzl - Open Mobile API: Accessing the UICC on Android Devices - Computing Research Repository (CoRR), Vol. 1601, No. 3027, 2016, pp. 76 mehr
2016
M. Hölzl, M. Roland, R. Mayrhofer - Real-World Identification: Towards a Privacy-Aware Mobile eID for Physical and Offline Verification - Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, Singapur, 2016, pp. 280-283 mehr
2015
M. Roland - Security Issues in Mobile NFC Devices - Springer Verlag, 2015, pp. 185 mehr
2015
M. Hölzl, E. Asnake, R. Mayrhofer, M. Roland - A Password-authenticated Secure Channel for App to Java Card Applet Communication - International Journal of Pervasive Computing and Communications (IJPCC), Vol. 11, No. 4, 2015 mehr
2015
J. Fuß, S. Gradinger, B. Greslehner-Nimmervoll, R. Kolmhofer - Complexity Estimates of a SHA-1 Near-Collision Attack for GPU and FPGA - Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES), 2015, Toulouse, Toulouse, Frankreich, 2015, pp. 274-280 mehr
2015
M. Roland, M. Hölzl - Evaluation of Contactless Smartcard Antennas - Computing Research Repository (CoRR), Vol. 1507, No. 6427, 2015, pp. 29 mehr
2014
J. Gonzales, M. Hölzl, P. Riedl, P. Bonnet, R. Mayrhofer - A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices - Information Security, Hong Kong, China, 2014, pp. 542-554 mehr
2014
A. Kolberger, I. Schaumüller-Bichl, M. Deutschmann - Riskanalysis of Physically Unclonable Functions - Communications and Multimedia Security 2014, Aveiro, Portugal, 2014, pp. 136-139 mehr
2014
M. Hölzl, E. Asnake, R. Mayrhofer, M. Roland - Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel - Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2014), Kaohsiung, Taiwan, China, 2014, pp. 10 mehr
2014
A. Kolberger, I. Schaumüller-Bichl, V. Brunner, M. Deutschmann - Protection Profile for PUF-based Devices - ICT Systems Security and Privacy Protection, Marrakech, Marokko, 2014, pp. 91-98 mehr
2014
M. Roland, J. Langer, R. Mayrhofer - Managing the life-cycle of Java Card applets in other Java virtual machines - International Journal of Pervasive Computing and Communications (IJPCC), Vol. 10, No. 3, 2014, pp. 291-312 mehr
2013
M. Roland, J. Langer, J. Scharinger - Applying Relay Attacks to Google Wallet - Proceedings of the 5th International Workshop on Near Field Communication, Zurich, Schweiz, 2013, pp. 1-6 mehr
2013
M. Roland, J. Langer - Cloning Credit Cards: A combined pre-play and downgrade attack on EMV Contactless - Proceedings of the 7th USENIX Workshop on Offensive Technologies (WOOT'13), Washington, D.C., Vereinigte Staaten von Amerika, 2013, pp. 12 mehr
2013
P. Winter, T. Pulls, J. Fuss - ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship - Technical Report, Karlstad University, Schweden, 2013, pp. 12 mehr
2013
J. Fuß, P. Winter, T. Pulls - ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship - Proceedings of the Workshop on Privacy in the Electronic Society, Berlin, Deutschland, 2013 mehr
2013
M. Roland, J. Langer - Comparison of the Usability and Security of NFC's Different Operating Modes in Mobile Devices - e & i Elektrotechnik und Informationstechnik, Vol. 130, No. 7, 2013, pp. 201-206 mehr
2013
B. Danczul, J. Fuß, S. Gradinger, B. Greslehner-Nimmervoll, W. Kastl, F. Wex - Cuteforce Analyzer: A Distributed Bruteforce Attack on PDF Encryption - 8th International Conference on Availability, Reliability and Security (ARES), Regensburg, Deutschland, 2013, pp. 720-725 mehr
2012
J. Fuß, W. Kastl, R. Kolmhofer, G. Schönberger, F. Wex - Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors - LECTURE NOTES IN COMPUTER SCIENCE, Vol. 7394, No. 1234567890, 2012, pp. 201-203 mehr
2012
M. Roland - Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare? - 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU 2012), Newcastle, Vereinigtes Königreich von Großbritannien und Nordirland, 2012,… mehr
2012
J. Edler, A. Leitner, I. Schaumüller-Bichl - Messung und Bewertung von Informationssicherheit in Unternehmen - Tagungsband FFH 2012, Graz, Österreich, 2012, pp. 11-16 mehr
2012
E. Hermann, U. Litschauer, J. Fuß - A Formal Equivalence Classes Based Method for Security Policy Conformance Checking - LECTURE NOTES IN COMPUTER SCIENCE, Vol. 7465, No. 1234567890, 2012, pp. 146-160 mehr
2012
M. Roland, J. Langer, J. Scharinger - Relay Attacks on Secure Element-enabled Mobile Devices: Virtual Pickpocketing Revisited - Information Security and Privacy Research, IFIP AICT 376, Heraklion, Crete, Griechenland, 2012, pp. 1-12 mehr
2012
R. Kolmhofer - IT-Security News - lex:itec, 2012, pp. 8-15 mehr
2012
I. Schaumüller-Bichl - Informationstechnologie als Produktionsfaktor: Potentiale und Sicherheitsrisiken - Tagungsband FFH 2012, Graz, Österreich, 2012, pp. 7-10 mehr
2012
M. Roland - Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack - Computing Research Repository (CoRR), Vol. 1209, No. 857, 2012, pp. 28 mehr
2012
M. Roland, J. Langer, J. Scharinger - Practical Attack Scenarios on Secure Element-enabled Mobile Devices - Proceedings of the 4th International Workshop on Near Field Communication, Helsinki, Finnland, 2012, pp. 19-24 mehr
2011
G. Schönberger, J. Fuß - GPU-assisted AES encryption using GCM - Proceedings of the 12th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security - CMS 2011, Ghent, Belgien, 2011, pp. 178-185 mehr
2011
M. Roland, J. Langer, J. Scharinger - Security Vulnerabilities of the NDEF Signature Record Type - Proceedings of the 3rd International Workshop on Near Field Communication, Hagenberg, Österreich, 2011, pp. 65-70 mehr
2010
I. Schaumüller-Bichl - Informationssicherheit: die Basis für Privacy - OCG Journal, 2010, pp. 6-7 mehr
2010
J. Langer, M. Roland - Anwendungen und Technik von Near Field Communication (NFC) - Springer Verlag, 2010, pp. 265 mehr
2010
H. Lampesberger - Empirical Evaluation of the Internet Analysis System for Application in the Field of Anomaly Detection - Computer Network Defense (EC2ND), 2010 European Conference on, Berlin, Deutschland, 2010, pp. 63-70 mehr
2010
G. Madlmayr, C. Kantner, J. Scharinger, I. Schaumüller-Bichl - Eine mobile Service-Architektur für ein sicheres NFC-Ökosystem - e & i Elektrotechnik und Informationstechnik, Vol. 127, No. 5, 2010, pp. 1-8 mehr
2010
M. Roland, J. Langer - Digital Signature Records for the NFC Data Exchange Format - Proceedings of the 2nd International Workshop on Near Field Communication, Monaco, Monaco, 2010, pp. 71-76 mehr
2010
M. Roland, J. Langer, M. Bogner, F. Wiesinger - NFC im Automobil: Software bringt Ökonomie und braucht Sicherheit in Energieeffiziente Mobilität - Shaker Verlag, 2010, pp. 8 mehr
2009
G. Madlmayr, C. Kantner, J. Langer, J. Scharinger, I. Schaumüller-Bichl - Risk Analysis of Over-the-Air Transactions in an NFC ecosystem - Proceedings - 1st International IEEE Workshop on Near Field Communication, Hagenberg, Österreich, 2009, pp. 87-92 mehr
2009
A. Leitner, I. Schaumüller-Bichl - ARiMa – a New Approach to Implement ISO/IEC 27005 - Proceedings of the IEEE 2nd International Symposium on Logistics and Industrial Informatics (Lindi 2009), Linz, Österreich, 2009 mehr