Science Field

IT security

Science Field

2019
A. Aigner, R. Zeller - HEHLKAPPE: Utilizing Deep Learning to Manipulate Surveillance Camera Footage in Real-Time - Proceedings of the 14th International Conference on Availability, Reliability and Security, Canterbury, CA, United Kingdom, United Kingdom of Great Britain and Northern Ireland, 2019, pp.… more
2017
F. Carvalho Ota, M. Roland, M. Hölzl, R. Mayrhofer, A. Manacero - Protecting Touch: Authenticated App-To-Server Channels for Mobile Devices Using NFC Tags - Information, Vol. 8, No. 3, 2017, pp. 1-18 more
2017
J. Fuß, M. Grottenthaler - MailCoin - Datenschutz und Datensicherheit, 2017, pp. 487-491 more
2016
I. Schaumüller-Bichl, A. Kolberger - IoT as a challenge in information security - e & i Electrical Engineering and Information Technology, Vol. 133, No. 7, 2016, pp. 319-323 more
2016
M. Roland, M. Hölzl - Open Mobile API: Accessing the UICC on Android Devices - Computing Research Repository (CoRR), Vol. 1601, No. 3027, 2016, pp. 76 more
2016
M. Hölzl, M. Roland, R. Mayrhofer - Real-World Identification: Towards a Privacy-Aware Mobile eID for Physical and Offline Verification - Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, Singapore, 2016, pp. 280-283 more
2016
I. Schaumüller-Bichl, A. Kolberger - Information security risk analysis in complex systems - new challenges and solution approaches - INFORMATIK 2016. Lecture Notes in Informatics (LNI), Klagenfurt, Austria, 2016, pp. 609-618 more
2016
M. Roland - Executing Arbitrary Code in the Context of the Smartcard System Service - Computing Research Repository (CoRR), Vol. 1601, No. 5833, 2016, pp. 28 more
2015
M. Roland - Security Issues in Mobile NFC Devices - Springer Verlag, 2015, pp. 185 more
2015
M. Hölzl, E. Asnake, R. Mayrhofer, M. Roland - A Password-authenticated Secure Channel for App to Java Card Applet Communication - International Journal of Pervasive Computing and Communications (IJPCC), Vol. 11, No. 4, 2015 more
2015
J. Fuß, S. Gradinger, B. Greslehner-Nimmervoll, R. Kolmhofer - Complexity Estimates of a SHA-1 Near-Collision Attack for GPU and FPGA - Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES), 2015, Toulouse, Toulouse, France, 2015, pp. 274-280 more
2015
M. Roland, M. Hölzl - Evaluation of Contactless Smartcard Antennas - Computing Research Repository (CoRR), Vol. 1507, No. 6427, 2015, pp. 29 more
2014
J. Gonzales, M. Hölzl, P. Riedl, P. Bonnet, R. Mayrhofer - A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices - Information Security, Hong Kong, China, 2014, pp. 542-554 more
2014
A. Kolberger, I. Schaumüller-Bichl, M. Deutschmann - Riskanalysis of Physically Unclonable Functions - Communications and Multimedia Security 2014, Aveiro, Portugal, 2014, pp. 136-139 more
2014
M. Hölzl, E. Asnake, R. Mayrhofer, M. Roland - Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel - Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2014), Kaohsiung, Taiwan, China, 2014, pp. 10 more
2014
A. Kolberger, I. Schaumüller-Bichl, V. Brunner, M. Deutschmann - Protection Profile for PUF-based Devices - ICT Systems Security and Privacy Protection, Marrakech, Morocco, 2014, pp. 91-98 more
2014
M. Roland, J. Langer, R. Mayrhofer - Managing the life-cycle of Java Card applets in other Java virtual machines - International Journal of Pervasive Computing and Communications (IJPCC), Vol. 10, No. 3, 2014, pp. 291-312 more
2013
M. Roland, J. Langer - Cloning Credit Cards: A combined pre-play and downgrade attack on EMV Contactless - Proceedings of the 7th USENIX Workshop on Offensive Technologies (WOOT'13), Washington, D.C., United States of America, 2013, pp. 12 more
2013
P. Winter, T. Pulls, J. Fuss - ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship - Technical Report, Karlstad University, Sweden, 2013, pp. 12 more
2013
J. Fuß, P. Winter, T. Pulls - ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship - Proceedings of the Workshop on Privacy in the Electronic Society, Berlin, Germany, 2013 more
2013
M. Roland, J. Langer - Comparison of the Usability and Security of NFC's Different Operating Modes in Mobile Devices - e & i Electrical Engineering and Information Technology, Vol. 130, No. 7, 2013, pp. 201-206 more
2013
B. Danczul, J. Fuß, S. Gradinger, B. Greslehner-Nimmervoll, W. Kastl, F. Wex - Cuteforce Analyzer: A Distributed Bruteforce Attack on PDF Encryption - 8th International Conference on Availability, Reliability and Security (ARES), Regensburg, Germany, 2013, pp. 720-725 more
2013
M. Roland, J. Langer, J. Scharinger - Applying Relay Attacks to Google Wallet - Proceedings of the 5th International Workshop on Near Field Communication, Zurich, Switzerland, 2013, pp. 1-6 more
2012
J. Edler, A. Leitner, I. Schaumüller-Bichl - Information Security Measurement and Evaluation in Enterprises - Proceedings FFH 2012, Graz, Austria, 2012, pp. 11-16 more
2012
E. Hermann, U. Litschauer, J. Fuß - A Formal Equivalence Classes Based Method for Security Policy Conformance Checking - LECTURE NOTES IN COMPUTER SCIENCE, Vol. 7465, No. 1234567890, 2012, pp. 146-160 more
2012
M. Roland, J. Langer, J. Scharinger - Relay Attacks on Secure Element-enabled Mobile Devices: Virtual Pickpocketing Revisited - Information Security and Privacy Research, IFIP AICT 376, Heraklion, Crete, Greece, 2012, pp. 1-12 more
2012
R. Kolmhofer - IT-Security News - lex:itec, 2012, pp. 8-15 more
2012
I. Schaumüller-Bichl - Information technologiy as production factor: potentials and risks - Proceedings FFH 2012, Graz, Austria, 2012, pp. 7-10 more
2012
M. Roland - Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack - Computing Research Repository (CoRR), Vol. 1209, No. 857, 2012, pp. 28 more
2012
M. Roland, J. Langer, J. Scharinger - Practical Attack Scenarios on Secure Element-enabled Mobile Devices - Proceedings of the 4th International Workshop on Near Field Communication, Helsinki, Finland, 2012, pp. 19-24 more
2012
J. Fuß, W. Kastl, R. Kolmhofer, G. Schönberger, F. Wex - Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors - LECTURE NOTES IN COMPUTER SCIENCE, Vol. 7394, No. 1234567890, 2012, pp. 201-203 more
2011
M. Roland, J. Langer, J. Scharinger - Security Vulnerabilities of the NDEF Signature Record Type - Proceedings of the 3rd International Workshop on Near Field Communication, Hagenberg, Austria, 2011, pp. 65-70 more
2011
G. Schönberger, J. Fuß - GPU-assisted AES encryption using GCM - Proceedings of the 12th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security - CMS 2011, Ghent, Belgium, 2011, pp. 178-185 more
2010
H. Lampesberger - Empirical Evaluation of the Internet Analysis System for Application in the Field of Anomaly Detection - Computer Network Defense (EC2ND), 2010 European Conference on, Berlin, Germany, 2010, pp. 63-70 more
2010
G. Madlmayr, C. Kantner, J. Scharinger, I. Schaumüller-Bichl - A mobile service architecture for a secure NFC ecosystem - e & i Electrical Engineering and Information Technology, Vol. 127, No. 5, 2010, pp. 1-8 more
2010
M. Roland, J. Langer - Digital Signature Records for the NFC Data Exchange Format - Proceedings of the 2nd International Workshop on Near Field Communication, Monaco, Monaco, 2010, pp. 71-76 more
2010
M. Roland, J. Langer, M. Bogner, F. Wiesinger - NFC im Automobil: Software bringt Ökonomie und braucht Sicherheit in Energyefficient Mobility - Shaker Verlag, 2010, pp. 8 more
2010
I. Schaumüller-Bichl - Information Security: basis for privacy - OCG Journal, 2010, pp. 6-7 more
2010
J. Langer, M. Roland - Anwendungen und Technik von Near Field Communication (NFC) - Springer Verlag, 2010, pp. 265 more
2009
G. Madlmayr, C. Kantner, J. Langer, J. Scharinger, I. Schaumüller-Bichl - Risk Analysis of Over-the-Air Transactions in an NFC ecosystem - Proceedings - 1st International IEEE Workshop on Near Field Communication, Hagenberg, Austria, 2009, pp. 87-92 more
2009
A. Leitner, I. Schaumüller-Bichl - ARiMa – a New Approach to Implement ISO/IEC 27005 - Proceedings of the IEEE 2nd International Symposium on Logistics and Industrial Informatics (Lindi 2009), Linz, Austria, 2009 more