A-sit - Secure Information Technology Centre Austria

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 2002 2019

Filter
Conference contribution
2019

A Comparative Study of Misapplied Crypto in Android and iOS Applications

Feichtner, J., 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT. Portugal: SciTePress, p. 96-108 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Application programming interfaces (API)
Cryptography
iOS (operating system)
Android (operating system)

A Correctable Public Blockchain

Marsalek, A. & Zefferer, T., 2019, (Accepted/In press) 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Decision making
Experiments

Mind the Gap: Finding what Updates have (really) changed in Android Applications

Feichtner, J., Neugebauer, L. & Ziegler, D., 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT. Portugal: SciTePress, p. 306-313 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Android (operating system)

Obfuscation-Resilient Code Recognition in Android Apps

Feichtner, J. & Rabensteiner, C., 2019, 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: Association of Computing Machinery, 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Android (operating system)

Qualified Remote Signatures – Solutions, its Certification, and Use

Leitold, H. & Konrad, D., 2019, Proceedings of 29th SmartCard Workshop. Waldmann, U. (ed.). p. 219-231

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

File

Tackling Data Inefficiency: Compressing the Bitcoin Blockchain

Marsalek, A., Zefferer, T., Fasllija, E. & Ziegler, D., 2019, (Accepted/In press) 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Internet of things
2018

A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do

Prünster, B., Kollmann, C. P., Suzic, B. & Ziegler, D., 2018, Security and Privacy in Communication Networks. Beyah, R., Chang, B., Li, Y. & Zhu, S. (eds.). Cham: Springer International, p. 122-138 16 p. ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; vol. 255).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Peer to peer networks
Communication

A Security Analysis of FirstCoin

Marsalek, A., Kollmann, C. & Zefferer, T., 2018, ICT Systems Security and Privacy Protection. Janczewski, L. J. & Kutylowski, M. (eds.). Cham: Springer International Publishing AG , p. 127-140 14 p. (IFIP Advances in Information and Communication Technology; vol. 529).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Electronic money

Automated Binary Analysis on iOS - A Case Study on Cryptographic Misuse in iOS Applications

Feichtner, J., Missmann, D. & Spreitzer, R., 2018, Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. New York: Association of Computing Machinery, p. 236-247 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programming interfaces (API)
Cryptography
Computer operating systems
Inspection
Defects

Best of two worlds: Secure cloud federations meet eIDAS

Zefferer, T., Ziegler, D. & Reiter, A., 10 May 2018, 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). p. 396-401 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Hunting Password Leaks in Android Applications

Feichtner, J., 2018, ICT Systems Security and Privacy Protection. Jan Janczewski, L. & Kutyłowski, M. (eds.). Cham: Springer International Publishing AG , Vol. 529. p. 278-292 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Inspection

On The Structure and Authorization Management of RESTful Web Services

Suzic, B., Prünster, B. & Ziegler, D., 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing. Association of Computing Machinery

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Web services
Application programming interfaces (API)
Data privacy
Security of data
Interoperability

SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform

Marsalek, A., Prünster, B., Suzic, B. & Zefferer, T., 2018, Information Systems Security - 14th International Conference, ICISS 2018, Proceedings. Springer Verlag Heidelberg, p. 345-363 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11281 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Privacy Preserving
Instant
Communication
Electronics
Business Process

Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining Processes

Ziegler, D., Prünster, B., Marsalek, A. & Kollmann, C., 28 Jul 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. Portugal: SciTePress - Science and Technology Publications, Vol. 1: SECRYPT. p. 380-387 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Smartphones
Program processors
Electronic money
Android (operating system)
2017

Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth

Reimair, F., Feichtner, J., Ziegler, D., Kreuzhuber, S. & Zefferer, T., Jul 2017, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications. Portugal: SciTePress, Vol. 4. p. 367-374 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Data privacy
Security of data
Risk assessment
Hardware

Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases

Reiter, A., Prünster, B. & Zefferer, T., 2017, Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. IEEE Press, p. 935-944

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Mobile devices
Energy conservation
Energy utilization
Bandwidth
Internet of things

Leveraging the adoption of electronic identities and electronic-signature solutions in Europe

Marsalek, A., Zefferer, T., Reimair, F., Karabat, Ç. & Soykan, E. U., 3 Apr 2017, 32nd Annual ACM Symposium on Applied Computing, SAC 2017. Association of Computing Machinery, Vol. Part F128005. p. 69-71 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Concretes

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives

Chase, M., Derler, D., Goldfeder, S., Orlandi, C., Ramacher, S., Rechberger, C., Slamanig, D. & Zaverucha, G., 2017, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, USA, October 30 - November 3, 2017.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Secure Policy-based Device-to-Device Offloading for Mobile Applications

Reiter, A., 2017, Proceedings of the Symposium on Applied Computing. Association of Computing Machinery, p. 516-521

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Mobile devices
Security of data
Servers
Virtual machine

Side-Channel Analysis of Keymill

Dobraunig, C. E., Eichlseder, M., Korak, T. & Mendel, F., 2017, Constructive Side-Channel Analysis and Secure Design: COSADE 2017. p. 138-152 (Lecture Notes in Computer Science; vol. 10348).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Structuring the Scope: Enabling Adaptive and Multilateral Authorization Management

Suzic, B., Reiter, A. & Marsalek, A., Oct 2017, 2017 IEEE Conference on Communications and Network Security (CNS). Las Vegas: IEEE Press, p. 522-530 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Specifications
Web services
Automation
Semantics

The Net Rat: Rethinking Connected Services for Increased Security

Prünster, B., Reimair, F. & Reiter, A., Jul 2017, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications. SciTePress, Vol. 4: SECRYPT. p. 375-383 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Rats
Data privacy
Mobile devices
Personal computers

WebRTC: Your Privacy is at Risk

Reiter, A. & Marsalek, A., 2017, Proceedings of the Symposium on Applied Computing. Association of Computing Machinery, p. 664-669

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Communication
Application programming interfaces (API)
Mobile devices
Specifications
Secure communication
2016

An Ontology-based Interoperability Solution for Electronic-Identity Systems

Priesnitz Filho, W., Ribeiro, C. & Zefferer, T., 2016, IEEE International Conference on Services Computing (SCC 2016). p. 17-24

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Applied Dynamic Policy Selection

Reimair, F., Prünster, B., Reiter, A. & Ertler, C., 19 Oct 2016, 2016 IEEE Conference on Communications and Network Security (CNS 2016). 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Security systems
Information systems
Costs
Industry

Balancing Utility and Security: Securing Cloud Federations of Public Entities

Suzic, B., Prünster, B., Ziegler, D., Marsalek, A. & Reiter, A., 2016, OTM Confederated International Conferences: On the Move to Meaningful Internet Systems. Springer International Publishing AG , p. 943 - 961 18 p. (Lecture Notes in Computer Science (LNCS); no. 10033).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Public administration
Data privacy
Security of data
Scalability
Processing

Emulating U2F authenticator devices

Reimair, F., Kollmann, C. & Marsalek, A., 19 Oct 2016, 2016 IEEE Conference on Communications and Network Security (CNS 2016). 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Authentication
Smartphones
Smart cards
Hardware

Flexible and Secure Resource Sharing for Mobile Augmentation Systems

Reiter, A. & Zefferer, T., Apr 2016, 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Tar
Ubiquitous computing
Mobile devices
Computer programming languages
Electric power utilization

FutureTrust - Future Trust Services for Trustworthy Global Transactions

Hühnlein, D., Frosch, T., Schwenk, J., Piswanger, C-M., Sel, M., Hühnlein, T., Wich, T., Nemmert, D., Lottes, R., Baszanowski, S., Zeuner, V., Rauh, M., Somorovsky, J., Mladenov, V., Condovici, C., Leitold, H., Stalla-Bourdillon, S., Tsakalakis, N., Eichholz, J., Kamm, F-M. & 20 othersUrmann, J., Kühne, A., Wabisch, D., Dean, R., Shamah, J., Kapanadze, M., Ponte, N., Martins, J., Portela, R., Karabat, Ç., Stojičić, S., Nedeljkovic, S., Bouckaert, V., Defays, A., Anderson, B., Jonas, M., Hermanns, C., Schubert, T., Wegener, D. & Sazonov, A., 2016, Open Identity Summit 2016. Bonn: Gesellschaft für Informatik , p. 27 41 p. (Lecture Notes in Informatics; vol. P-264).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Securing Integration of Cloud Services in Cross-Domain Distributed Environments

Suzic, B., 2016, Proceedings of the 31st Annual ACM Symposium on Applied Computing. New York, NY, USA: Association of Computing Machinery, p. 398-405 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Industry
Chemical analysis

Square Attack on 7-Round Kiasu-BC

Dobraunig, C. E., Eichlseder, M. & Mendel, F., 2016, ACNS 2016. Manulis, M. & Sadeghi, A-R. (eds.). Springer, (LNCS; vol. 9696).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Towards Privacy-preserving Attribute Aggregation in Federated eID Systems

Priesnitz Filho, W., Ribeiro, C. & Zefferer, T., 2016, CAiSE Forum 2016: Proceedings of the CAiSE'16 Forum, at the 28th International Conference on Advanced Information Systems Engineering (CAiSE 2016). CEUR-WS.org, p. 97-104 (CEUR Workshop Proceedings; vol. 1612).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Towards Secure Collaboration in Federated Cloud Environments

Suzic, B. & Reiter, A., 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES). Institute of Electrical and Electronics Engineers, p. 750-759 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Public administration
Security of data
Data privacy
Electronic data interchange
Cloud computing

User-centered Security Management of API-based Data Integration Workflows

Suzic, B., 2016, 2016 IEEE/IFIP Network Operations and Management Symposium (NOMS). Institute of Electrical and Electronics Engineers, p. 1233-1238 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Data integration
Application programming interfaces (API)
Outsourcing
Industry
Network protocols
2015

Attribute-based Encryption goes X.509

Reimair, F. & Feichtner, J., 2015, Proceedings of the International Conference on e-Business Engineering (ICEBE). ., p. 393-400

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Challenges emerging from future cloud application scenarios

Jeferry, K., Kousiouris, G., Kyriazis, D., Altmann, J., Ciuffoletti, A., Maglogiannis, I., Nesi, P., Suzic, B. & Zhao, Z., 2015, Procedia Computer Science: 1st International Conference on Cloud Forward: From Distributed to Complete Computing. Elsevier B.V., Vol. 68. p. 227 - 237

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Cloud computing
Interoperability

Enabling Secure Communication Over Existing Peer-to-Peer Frameworks

Reiter, A., 2015, (Accepted/In press) 23rd Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP2015). .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Encryption-based Second Authentication Factor Solutions for Qualified Server-side Signature Creation

Rath, C., Roth, S., Bratko, H. & Zefferer, T., 2015, Electronic Government and the Information Systems Perspective. Springer, Vol. 9265. p. 71-85 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

In Certificates We Trust - Revisited

Reimair, F., Teufl, P. & Prünster, B., 2015, Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. ., p. 702-709

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Leveraging the Adoption of Mobile eID and e-Signature Solutions in Europe

Zefferer, T. & Teufl, P., 2015, Electronic Government and the Information Systems Perspective. Springer, p. 86-100

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

MoCrySIL - Carry Your Cryptographic Keys in Your Pocket

Reimair, F., Teufl, P., Kollmann, C. & Thaller, C., 2015, 12th International Conference on Security and Cryptography. ., p. 285-292

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

PaaSPort – A unified PaaS-Cloud Management Application avoiding Vendor Lock-In

Zwattendorfer, B., Suzic, B. & Schanner, G., 2015, Proceedings of the 13th International Conference e-Society 2015. IADIS Press, p. 223-230

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Paving the Way for Security in Cloud-Based Mobile Augmentation Systems

Reiter, A. & Zefferer, T., 2015, 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (IEEE Mobile Cloud 2015). Institute of Electrical and Electronics Engineers, p. 89-98

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

POWER: A Cloud-based Mobile Augmentation Approach for Web- and Cross-Platform Applications

Reiter, A. & Zefferer, T., 2015, (Accepted/In press) Cloud Networking. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Secure Data Sharing and Processing in Heterogeneous Clouds

Suzic, B., Reiter, A., Reimair, F., Venturi, D. & Kubo, B., 2015, Procedia Computer Science: 1st International Conference on Cloud Forward: From Distributed to Complete Computing Secure Data Sharing and Processing in Heterogeneous Clouds. Elsevier B.V., Vol. 68.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Cloud computing
Processing
Access control
Interoperability
Transparency

Towards a New Generation of Mobile Government

Zefferer, T., 2015, 13th International Conference on e-Society 2015. ., p. 191-198

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Towards Transactional Electronic Services on Mobile End-User Devices - A Sustainable Architecture for Mobile Signature Solutions

Zefferer, T., 2015, 11th International Conference on Web Information Systems and Technologies. ., p. 586-597

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

WebCrySIL - Web Cryptographic Service Interoperability Layer

Reimair, F., Teufl, P. & Zefferer, T., 2015, 11th International Conference on Web Information Systems and Technologies. ., p. 35-44

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
2014

Android Encryption Systems

Teufl, P., Fitzek, A. G., Hein, D., Marsalek, A., Oprisnik, A. & Zefferer, T., 2014, International Conference on Privacy & Security in Mobile Systems. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Android - On-Device Detection of SMS Catchers and Sniffers

Teufl, P., Zefferer, T., Wörgötter, C., Oprisnik, A. & Hein, D., 2014, (Accepted/In press) International Conference on Privacy & Security in Mobile Systems. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review