A-sit - Secure Information Technology Centre Austria

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 2002 2019

2019

A Comparative Study of Misapplied Crypto in Android and iOS Applications

Feichtner, J., 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT. Portugal: SciTePress, p. 96-108 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Application programming interfaces (API)
Cryptography
iOS (operating system)
Android (operating system)

A Correctable Public Blockchain

Marsalek, A. & Zefferer, T., 2019, (Accepted/In press) 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Decision making
Experiments

Mind the Gap: Finding what Updates have (really) changed in Android Applications

Feichtner, J., Neugebauer, L. & Ziegler, D., 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT. Portugal: SciTePress, p. 306-313 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Android (operating system)

Obfuscation-Resilient Code Recognition in Android Apps

Feichtner, J. & Rabensteiner, C., 2019, 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: Association of Computing Machinery, 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Android (operating system)

Qualified Remote Signatures – Solutions, its Certification, and Use

Leitold, H. & Konrad, D., 2019, Proceedings of 29th SmartCard Workshop. Waldmann, U. (ed.). p. 219-231

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

File

Tackling Data Inefficiency: Compressing the Bitcoin Blockchain

Marsalek, A., Zefferer, T., Fasllija, E. & Ziegler, D., 2019, (Accepted/In press) 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Internet of things
2018

A Federation of Federations: Secure Cloud Federations meet European Identity Federations

Zefferer, T., Ziegler, D. & Reiter, A., Mar 2018, In : International Journal for Information Security Research. Volume 8, Issue 1

Research output: Contribution to journalArticleResearchpeer-review

A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do

Prünster, B., Kollmann, C. P., Suzic, B. & Ziegler, D., 2018, Security and Privacy in Communication Networks. Beyah, R., Chang, B., Li, Y. & Zhu, S. (eds.). Cham: Springer International, p. 122-138 16 p. ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; vol. 255).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Peer to peer networks
Communication

A Security Analysis of FirstCoin

Marsalek, A., Kollmann, C. & Zefferer, T., 2018, ICT Systems Security and Privacy Protection. Janczewski, L. J. & Kutylowski, M. (eds.). Cham: Springer International Publishing AG , p. 127-140 14 p. (IFIP Advances in Information and Communication Technology; vol. 529).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Electronic money

Automated Binary Analysis on iOS - A Case Study on Cryptographic Misuse in iOS Applications

Feichtner, J., Missmann, D. & Spreitzer, R., 2018, Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. New York: Association of Computing Machinery, p. 236-247 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programming interfaces (API)
Cryptography
Computer operating systems
Inspection
Defects

Best of two worlds: Secure cloud federations meet eIDAS

Zefferer, T., Ziegler, D. & Reiter, A., 10 May 2018, 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). p. 396-401 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Erfahrungen aus eIDAS Zertifizierung: Fernsignaturen vs. Smartcards: andere Technologie damit auch anderer Zugang der Sicherheitsbewertung

Leitold, H. & Konrad, D., Jul 2018, In : Datenschutz und Datensicherheit. 42, 7, p. 429-433

Research output: Contribution to journalArticleResearchpeer-review

Hunting Password Leaks in Android Applications

Feichtner, J., 2018, ICT Systems Security and Privacy Protection. Jan Janczewski, L. & Kutyłowski, M. (eds.). Cham: Springer International Publishing AG , Vol. 529. p. 278-292 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Inspection

On The Structure and Authorization Management of RESTful Web Services

Suzic, B., Prünster, B. & Ziegler, D., 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing. Association of Computing Machinery

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Web services
Application programming interfaces (API)
Data privacy
Security of data
Interoperability

SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform

Marsalek, A., Prünster, B., Suzic, B. & Zefferer, T., 2018, Information Systems Security - 14th International Conference, ICISS 2018, Proceedings. Springer Verlag Heidelberg, p. 345-363 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11281 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Privacy Preserving
Instant
Communication
Electronics
Business Process

Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining Processes

Ziegler, D., Prünster, B., Marsalek, A. & Kollmann, C., 28 Jul 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. Portugal: SciTePress - Science and Technology Publications, Vol. 1: SECRYPT. p. 380-387 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Smartphones
Program processors
Electronic money
Android (operating system)
2017

A Sustainable Architecture for Secure and Usable Mobile Signature Solutions

Zefferer, T., 2017, WEBIST 2015 - Selected and Revised Papers. 1 ed. Springer, p. 343 364 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Cloud technology options towards Free Flow of Data

DPSP WG, Jun 2017, 110 p.

Research output: Book/ReportOther reportResearch

Open Access
File
Data privacy
Security of data

Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth

Reimair, F., Feichtner, J., Ziegler, D., Kreuzhuber, S. & Zefferer, T., Jul 2017, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications. Portugal: SciTePress, Vol. 4. p. 367-374 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Data privacy
Security of data
Risk assessment
Hardware

Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases

Reiter, A., Prünster, B. & Zefferer, T., 2017, Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. IEEE Press, p. 935-944

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Mobile devices
Energy conservation
Energy utilization
Bandwidth
Internet of things

ISAP - Towards Side-Channel Secure Authenticated Encryption

Dobraunig, C. E., Eichlseder, M., Mangard, S., Mendel, F. & Unterluggauer, T., 2017, In : IACR Transactions on Symmetric Cryptology. 2017, 1, p. 80-105

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Leveraging the adoption of electronic identities and electronic-signature solutions in Europe

Marsalek, A., Zefferer, T., Reimair, F., Karabat, Ç. & Soykan, E. U., 3 Apr 2017, 32nd Annual ACM Symposium on Applied Computing, SAC 2017. Association of Computing Machinery, Vol. Part F128005. p. 69-71 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Concretes

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives

Chase, M., Derler, D., Goldfeder, S., Orlandi, C., Ramacher, S., Rechberger, C., Slamanig, D. & Zaverucha, G., 2017, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, USA, October 30 - November 3, 2017.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Privacy Technologies and Policy

Schweighofer, E. (ed.), Leitold, H. (ed.), Mitrakas, A. (ed.) & Rannenberg, K. (ed.), 2017, Graz: Springer Verlag.

Research output: Book/ReportBookResearchpeer-review

Open Access

Secure Policy-based Device-to-Device Offloading for Mobile Applications

Reiter, A., 2017, Proceedings of the Symposium on Applied Computing. Association of Computing Machinery, p. 516-521

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Mobile devices
Security of data
Servers
Virtual machine

Side-Channel Analysis of Keymill

Dobraunig, C. E., Eichlseder, M., Korak, T. & Mendel, F., 2017, Constructive Side-Channel Analysis and Secure Design: COSADE 2017. p. 138-152 (Lecture Notes in Computer Science; vol. 10348).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

STORK: a real, heterogeneous, large-scale eID management system

Ribeiro, C., Leitold, H., Esposito, S. & Mitzman, D., Jul 2017, In : International Journal of Information Security.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Electronic scales
Semantics
Interoperability
Identification (control systems)
Internet

Structuring the Scope: Enabling Adaptive and Multilateral Authorization Management

Suzic, B., Reiter, A. & Marsalek, A., Oct 2017, 2017 IEEE Conference on Communications and Network Security (CNS). Las Vegas: IEEE Press, p. 522-530 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Specifications
Web services
Automation
Semantics

SUNFISH ID1v1 – Identity Management and Access Control

SUNFISH WG, Jan 2017

Research output: Other contributionResearch

Access control
Security of data
Application programming interfaces (API)
International cooperation
Reusability

SUNFISH ID1v2 – Identity Management and Access Control at Work

SUNFISH WG, Nov 2017

Research output: Other contributionResearch

Access control
Security of data

The Net Rat: Rethinking Connected Services for Increased Security

Prünster, B., Reimair, F. & Reiter, A., Jul 2017, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications. SciTePress, Vol. 4: SECRYPT. p. 375-383 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Rats
Data privacy
Mobile devices
Personal computers

WebRTC: Your Privacy is at Risk

Reiter, A. & Marsalek, A., 2017, Proceedings of the Symposium on Applied Computing. Association of Computing Machinery, p. 664-669

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Communication
Application programming interfaces (API)
Mobile devices
Specifications
Secure communication
2016

An Ontology-based Interoperability Solution for Electronic-Identity Systems

Priesnitz Filho, W., Ribeiro, C. & Zefferer, T., 2016, IEEE International Conference on Services Computing (SCC 2016). p. 17-24

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Applied Dynamic Policy Selection

Reimair, F., Prünster, B., Reiter, A. & Ertler, C., 19 Oct 2016, 2016 IEEE Conference on Communications and Network Security (CNS 2016). 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Security systems
Information systems
Costs
Industry

Balancing Utility and Security: Securing Cloud Federations of Public Entities

Suzic, B., Prünster, B., Ziegler, D., Marsalek, A. & Reiter, A., 2016, OTM Confederated International Conferences: On the Move to Meaningful Internet Systems. Springer International Publishing AG , p. 943 - 961 18 p. (Lecture Notes in Computer Science (LNCS); no. 10033).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Public administration
Data privacy
Security of data
Scalability
Processing

Challenges for trustworthy (multi-)Cloud-based services in the Digital Single Market

DPSP Cluster WG, 28 Jan 2016, 31 p.

Research output: Other contributionResearch

Open Access
File

CrySIL: Bringing Crypto to the Modern User

Reimair, F., Teufl, P. & Zefferer, T., 22 Mar 2016, Web Information Systems and Technologies: 11th International Conference, WEBIST 2015, Lisbon, Portugal, May 20-22, 2015, Revised Selected Papers. Monfort, V., Krempels, K-H., Majchrzak, T. A. & Ẑ. T. (eds.). 1 ed. Springer, p. 70-90 20 p. (Lecture Notes in Business Information Processing; vol. 246).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Cryptography
Interoperability
Authentication
Computer hardware

Emulating U2F authenticator devices

Reimair, F., Kollmann, C. & Marsalek, A., 19 Oct 2016, 2016 IEEE Conference on Communications and Network Security (CNS 2016). 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Authentication
Smartphones
Smart cards
Hardware

FaaS: Federation-as-a-Service: The SUNFISH Cloud Federation Solution

Schiavo, F. P., Sassone, V., Nicoletti, L., Reiter, A. & Suzic, B., 14 Dec 2016, FaaS: Federation-as-a-Service: The SUNFISH Cloud Federation Solution.

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Open Access
File

Flexible and Secure Resource Sharing for Mobile Augmentation Systems

Reiter, A. & Zefferer, T., Apr 2016, 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Tar
Ubiquitous computing
Mobile devices
Computer programming languages
Electric power utilization

FutureTrust - Future Trust Services for Trustworthy Global Transactions

Hühnlein, D., Frosch, T., Schwenk, J., Piswanger, C-M., Sel, M., Hühnlein, T., Wich, T., Nemmert, D., Lottes, R., Baszanowski, S., Zeuner, V., Rauh, M., Somorovsky, J., Mladenov, V., Condovici, C., Leitold, H., Stalla-Bourdillon, S., Tsakalakis, N., Eichholz, J., Kamm, F-M. & 20 othersUrmann, J., Kühne, A., Wabisch, D., Dean, R., Shamah, J., Kapanadze, M., Ponte, N., Martins, J., Portela, R., Karabat, Ç., Stojičić, S., Nedeljkovic, S., Bouckaert, V., Defays, A., Anderson, B., Jonas, M., Hermanns, C., Schubert, T., Wegener, D. & Sazonov, A., 2016, Open Identity Summit 2016. Bonn: Gesellschaft für Informatik , p. 27 41 p. (Lecture Notes in Informatics; vol. P-264).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

GDPR & ePrivacy: APF 2017, Pre-Proceedings of the 5th ENISA Annual Privacy Forum

Austria, A-SIT. Z. F. S. I. (ed.), Schweighofer, E. (ed.), Mitrakas, A. (ed.) & Rannenberg, K. (ed.), 2016, Graz: Österreichische Computergesellschaft. 257 p.

Research output: Book/ReportBookResearchpeer-review

Practical Key Recovery Attack on MANTIS-5

Dobraunig, C. E., Eichlseder, M., Kales, D. & Mendel, F., 2016, In : IACR Transactions on Symmetric Cryptology. 2016, 2

Research output: Contribution to journalArticleResearchpeer-review

Securing Integration of Cloud Services in Cross-Domain Distributed Environments

Suzic, B., 2016, Proceedings of the 31st Annual ACM Symposium on Applied Computing. New York, NY, USA: Association of Computing Machinery, p. 398-405 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Industry
Chemical analysis

Square Attack on 7-Round Kiasu-BC

Dobraunig, C. E., Eichlseder, M. & Mendel, F., 2016, ACNS 2016. Manulis, M. & Sadeghi, A-R. (eds.). Springer, (LNCS; vol. 9696).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Towards Privacy-preserving Attribute Aggregation in Federated eID Systems

Priesnitz Filho, W., Ribeiro, C. & Zefferer, T., 2016, CAiSE Forum 2016: Proceedings of the CAiSE'16 Forum, at the 28th International Conference on Advanced Information Systems Engineering (CAiSE 2016). CEUR-WS.org, p. 97-104 (CEUR Workshop Proceedings; vol. 1612).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Towards Secure Collaboration in Federated Cloud Environments

Suzic, B. & Reiter, A., 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES). Institute of Electrical and Electronics Engineers, p. 750-759 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Public administration
Security of data
Data privacy
Electronic data interchange
Cloud computing

User-centered Security Management of API-based Data Integration Workflows

Suzic, B., 2016, 2016 IEEE/IFIP Network Operations and Management Symposium (NOMS). Institute of Electrical and Electronics Engineers, p. 1233-1238 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Data integration
Application programming interfaces (API)
Outsourcing
Industry
Network protocols
2015

Attribute-based Encryption goes X.509

Reimair, F. & Feichtner, J., 2015, Proceedings of the International Conference on e-Business Engineering (ICEBE). ., p. 393-400

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Austrian Mobile Signing

Lipp, P. & Leitold, H., 25 Jun 2015.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch