Research Output 2002 2019

2019

A Comparative Study of Misapplied Crypto in Android and iOS Applications

Feichtner, J., 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT. Portugal: SciTePress, p. 96-108 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Application programming interfaces (API)
Cryptography
iOS (operating system)
Android (operating system)

A Correctable Public Blockchain

Marsalek, A. & Zefferer, T., 2019, (Accepted/In press) 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Decision making
Experiments

Degradation of ZIF-8 in phosphate buffered saline media

Velásquez-Hernández, M. D. J., Ricco, R., Carraro, F., Limpoco, F. T., Linares-Moreau, M., Leitner, E., Wiltsche, H., Rattenberger, J., Schröttner, H., Frühwirt, P., Stadler, E. M., Gescheidt, G., Amenitsch, H., Doonan, C. J. & Falcaro, P., 1 Jan 2019, In : CrystEngComm. 21, 31, p. 4538-4544 7 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
phosphates
Phosphates
degradation
Degradation
biotechnology

Mind the Gap: Finding what Updates have (really) changed in Android Applications

Feichtner, J., Neugebauer, L. & Ziegler, D., 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT. Portugal: SciTePress, p. 306-313 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Android (operating system)

Obfuscation-Resilient Code Recognition in Android Apps

Feichtner, J. & Rabensteiner, C., 2019, 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: Association of Computing Machinery, 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Android (operating system)

Qualified Remote Signatures – Solutions, its Certification, and Use

Leitold, H. & Konrad, D., 2019, Proceedings of 29th SmartCard Workshop. Waldmann, U. (ed.). p. 219-231

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

File

Tackling Data Inefficiency: Compressing the Bitcoin Blockchain

Marsalek, A., Zefferer, T., Fasllija, E. & Ziegler, D., 2019, (Accepted/In press) 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Internet of things

Theory and practice of European co-operative education and training for the support of energy transition

Maier, S., Narodoslawsky, M., Borell-Damián, L., Arentsen, M., Kienberger, M., Bauer, W., Ortner, M., Foxhall, N., Oswald, G., Joval, J. M., Krozer, Y., Urbanz, T., Sakulin, C., Tihamer-Tibor, S. & Dobravec, V., 25 Jul 2019, In : Energy, Sustainability and Society . 9, 12 p., 29.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
education and training
Education
energy
education
study program
2018

A Federation of Federations: Secure Cloud Federations meet European Identity Federations

Zefferer, T., Ziegler, D. & Reiter, A., Mar 2018, In : International Journal for Information Security Research. Volume 8, Issue 1

Research output: Contribution to journalArticleResearchpeer-review

A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do

Prünster, B., Kollmann, C. P., Suzic, B. & Ziegler, D., 2018, Security and Privacy in Communication Networks. Beyah, R., Chang, B., Li, Y. & Zhu, S. (eds.). Cham: Springer International, p. 122-138 16 p. ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; vol. 255).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Peer to peer networks
Communication

A Security Analysis of FirstCoin

Marsalek, A., Kollmann, C. & Zefferer, T., 2018, ICT Systems Security and Privacy Protection. Janczewski, L. J. & Kutylowski, M. (eds.). Cham: Springer International Publishing AG , p. 127-140 14 p. (IFIP Advances in Information and Communication Technology; vol. 529).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Electronic money

Automated Binary Analysis on iOS - A Case Study on Cryptographic Misuse in iOS Applications

Feichtner, J., Missmann, D. & Spreitzer, R., 2018, Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. New York: Association of Computing Machinery, p. 236-247 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programming interfaces (API)
Cryptography
Computer operating systems
Inspection
Defects

Best of two worlds: Secure cloud federations meet eIDAS

Zefferer, T., Ziegler, D. & Reiter, A., 10 May 2018, 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). p. 396-401 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Erfahrungen aus eIDAS Zertifizierung: Fernsignaturen vs. Smartcards: andere Technologie damit auch anderer Zugang der Sicherheitsbewertung

Leitold, H. & Konrad, D., Jul 2018, In : Datenschutz und Datensicherheit. 42, 7, p. 429-433

Research output: Contribution to journalArticleResearchpeer-review

Hunting Password Leaks in Android Applications

Feichtner, J., 2018, ICT Systems Security and Privacy Protection. Jan Janczewski, L. & Kutyłowski, M. (eds.). Cham: Springer International Publishing AG , Vol. 529. p. 278-292 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Inspection

Long-Chain Li and Na Alkyl Carbonates as Solid Electrolyte Interphase Components: Structure, Ion Transport, and Mechanical Properties

Schafzahl, L., Ehmann, H., Kriechbaum, M., Sattelkow, J., Ganner, T., Plank, H., Wilkening, M. & Freunberger, S. A., 22 May 2018, In : Chemistry of Materials. 30, 10, p. 3338-3345 8 p.

Research output: Contribution to journalArticleResearchpeer-review

Carbonates
Solid electrolytes
Transport properties
Electrolytes
Ions

On The Structure and Authorization Management of RESTful Web Services

Suzic, B., Prünster, B. & Ziegler, D., 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing. Association of Computing Machinery

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Web services
Application programming interfaces (API)
Data privacy
Security of data
Interoperability

SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform

Marsalek, A., Prünster, B., Suzic, B. & Zefferer, T., 2018, Information Systems Security - 14th International Conference, ICISS 2018, Proceedings. Springer Verlag Heidelberg, p. 345-363 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11281 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Privacy Preserving
Instant
Communication
Electronics
Business Process

Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining Processes

Ziegler, D., Prünster, B., Marsalek, A. & Kollmann, C., 28 Jul 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. Portugal: SciTePress - Science and Technology Publications, Vol. 1: SECRYPT. p. 380-387 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Smartphones
Program processors
Electronic money
Android (operating system)
2017

A Sustainable Architecture for Secure and Usable Mobile Signature Solutions

Zefferer, T., 2017, WEBIST 2015 - Selected and Revised Papers. 1 ed. Springer, p. 343 364 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Cloud technology options towards Free Flow of Data

DPSP WG, Jun 2017, 110 p.

Research output: Book/ReportOther reportResearch

Open Access
File
Data privacy
Security of data

Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth

Reimair, F., Feichtner, J., Ziegler, D., Kreuzhuber, S. & Zefferer, T., Jul 2017, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications. Portugal: SciTePress, Vol. 4. p. 367-374 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Data privacy
Security of data
Risk assessment
Hardware

Effect of trace elements on microstructure and material properties of an aluminium alloy

Pabel, T., Petkov, T., Schröttner, H., Albu, M., Rossmann-Perner, A. & Schumacher, P., 13 Sep 2017, 57th International Foundry Conference - Book of Abstracts. p. 93

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases

Reiter, A., Prünster, B. & Zefferer, T., 2017, Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. IEEE Press, p. 935-944

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Mobile devices
Energy conservation
Energy utilization
Bandwidth
Internet of things

ISAP - Towards Side-Channel Secure Authenticated Encryption

Dobraunig, C. E., Eichlseder, M., Mangard, S., Mendel, F. & Unterluggauer, T., 2017, In : IACR Transactions on Symmetric Cryptology. 2017, 1, p. 80-105

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Leveraging the adoption of electronic identities and electronic-signature solutions in Europe

Marsalek, A., Zefferer, T., Reimair, F., Karabat, Ç. & Soykan, E. U., 3 Apr 2017, 32nd Annual ACM Symposium on Applied Computing, SAC 2017. Association of Computing Machinery, Vol. Part F128005. p. 69-71 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Concretes

Ondrej Krivanek: A Research Life in EELS and Aberration Corrected STEM

Bosman, M. & Kothleitner, G., 1 Sep 2017, In : Ultramicroscopy. 180, 1 p.

Research output: Contribution to journalEditorialResearchpeer-review

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives

Chase, M., Derler, D., Goldfeder, S., Orlandi, C., Ramacher, S., Rechberger, C., Slamanig, D. & Zaverucha, G., 2017, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, USA, October 30 - November 3, 2017.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Privacy Technologies and Policy

Schweighofer, E. (ed.), Leitold, H. (ed.), Mitrakas, A. (ed.) & Rannenberg, K. (ed.), 2017, Graz: Springer Verlag.

Research output: Book/ReportBookResearchpeer-review

Open Access

Secure Policy-based Device-to-Device Offloading for Mobile Applications

Reiter, A., 2017, Proceedings of the Symposium on Applied Computing. Association of Computing Machinery, p. 516-521

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Mobile devices
Security of data
Servers
Virtual machine

Side-Channel Analysis of Keymill

Dobraunig, C. E., Eichlseder, M., Korak, T. & Mendel, F., 2017, Constructive Side-Channel Analysis and Secure Design: COSADE 2017. p. 138-152 (Lecture Notes in Computer Science; vol. 10348).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

STORK: a real, heterogeneous, large-scale eID management system

Ribeiro, C., Leitold, H., Esposito, S. & Mitzman, D., Jul 2017, In : International Journal of Information Security.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Electronic scales
Semantics
Interoperability
Identification (control systems)
Internet

Structuring the Scope: Enabling Adaptive and Multilateral Authorization Management

Suzic, B., Reiter, A. & Marsalek, A., Oct 2017, 2017 IEEE Conference on Communications and Network Security (CNS). Las Vegas: IEEE Press, p. 522-530 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Specifications
Web services
Automation
Semantics

SUNFISH ID1v1 – Identity Management and Access Control

SUNFISH WG, Jan 2017

Research output: Other contributionResearch

Access control
Security of data
Application programming interfaces (API)
International cooperation
Reusability

SUNFISH ID1v2 – Identity Management and Access Control at Work

SUNFISH WG, Nov 2017

Research output: Other contributionResearch

Access control
Security of data

The Net Rat: Rethinking Connected Services for Increased Security

Prünster, B., Reimair, F. & Reiter, A., Jul 2017, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications. SciTePress, Vol. 4: SECRYPT. p. 375-383 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Rats
Data privacy
Mobile devices
Personal computers

Transformation dynamics of Ni clusters into NiO rings under electron beam irradiation

Knez, D., Thaler, P., Volk, A., Kothleitner, G., Ernst, W. E. & Hofer, F., 1 May 2017, In : Ultramicroscopy. 176, p. 105-111 7 p.

Research output: Contribution to journalArticleResearchpeer-review

Electron beams
Irradiation
electron beams
Oxidation
oxidation

WebRTC: Your Privacy is at Risk

Reiter, A. & Marsalek, A., 2017, Proceedings of the Symposium on Applied Computing. Association of Computing Machinery, p. 664-669

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Communication
Application programming interfaces (API)
Mobile devices
Specifications
Secure communication
2016

An Ontology-based Interoperability Solution for Electronic-Identity Systems

Priesnitz Filho, W., Ribeiro, C. & Zefferer, T., 2016, IEEE International Conference on Services Computing (SCC 2016). p. 17-24

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Applied Dynamic Policy Selection

Reimair, F., Prünster, B., Reiter, A. & Ertler, C., 19 Oct 2016, 2016 IEEE Conference on Communications and Network Security (CNS 2016). 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Security systems
Information systems
Costs
Industry

Balancing Utility and Security: Securing Cloud Federations of Public Entities

Suzic, B., Prünster, B., Ziegler, D., Marsalek, A. & Reiter, A., 2016, OTM Confederated International Conferences: On the Move to Meaningful Internet Systems. Springer International Publishing AG , p. 943 - 961 18 p. (Lecture Notes in Computer Science (LNCS); no. 10033).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Public administration
Data privacy
Security of data
Scalability
Processing

Challenges for trustworthy (multi-)Cloud-based services in the Digital Single Market

DPSP Cluster WG, 28 Jan 2016, 31 p.

Research output: Other contributionResearch

Open Access
File

CrySIL: Bringing Crypto to the Modern User

Reimair, F., Teufl, P. & Zefferer, T., 22 Mar 2016, Web Information Systems and Technologies: 11th International Conference, WEBIST 2015, Lisbon, Portugal, May 20-22, 2015, Revised Selected Papers. Monfort, V., Krempels, K-H., Majchrzak, T. A. & Ẑ. T. (eds.). 1 ed. Springer, p. 70-90 20 p. (Lecture Notes in Business Information Processing; vol. 246).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Cryptography
Interoperability
Authentication
Computer hardware

Emulating U2F authenticator devices

Reimair, F., Kollmann, C. & Marsalek, A., 19 Oct 2016, 2016 IEEE Conference on Communications and Network Security (CNS 2016). 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Authentication
Smartphones
Smart cards
Hardware

FaaS: Federation-as-a-Service: The SUNFISH Cloud Federation Solution

Schiavo, F. P., Sassone, V., Nicoletti, L., Reiter, A. & Suzic, B., 14 Dec 2016, FaaS: Federation-as-a-Service: The SUNFISH Cloud Federation Solution.

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Open Access
File

Flexible and Secure Resource Sharing for Mobile Augmentation Systems

Reiter, A. & Zefferer, T., Apr 2016, 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Tar
Ubiquitous computing
Mobile devices
Computer programming languages
Electric power utilization

FutureTrust - Future Trust Services for Trustworthy Global Transactions

Hühnlein, D., Frosch, T., Schwenk, J., Piswanger, C-M., Sel, M., Hühnlein, T., Wich, T., Nemmert, D., Lottes, R., Baszanowski, S., Zeuner, V., Rauh, M., Somorovsky, J., Mladenov, V., Condovici, C., Leitold, H., Stalla-Bourdillon, S., Tsakalakis, N., Eichholz, J., Kamm, F-M. & 20 othersUrmann, J., Kühne, A., Wabisch, D., Dean, R., Shamah, J., Kapanadze, M., Ponte, N., Martins, J., Portela, R., Karabat, Ç., Stojičić, S., Nedeljkovic, S., Bouckaert, V., Defays, A., Anderson, B., Jonas, M., Hermanns, C., Schubert, T., Wegener, D. & Sazonov, A., 2016, Open Identity Summit 2016. Bonn: Gesellschaft für Informatik , p. 27 41 p. (Lecture Notes in Informatics; vol. P-264).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

GDPR & ePrivacy: APF 2017, Pre-Proceedings of the 5th ENISA Annual Privacy Forum

Austria, A-SIT. Z. F. S. I. (ed.), Schweighofer, E. (ed.), Mitrakas, A. (ed.) & Rannenberg, K. (ed.), 2016, Graz: Österreichische Computergesellschaft. 257 p.

Research output: Book/ReportBookResearchpeer-review

Practical Key Recovery Attack on MANTIS-5

Dobraunig, C. E., Eichlseder, M., Kales, D. & Mendel, F., 2016, In : IACR Transactions on Symmetric Cryptology. 2016, 2

Research output: Contribution to journalArticleResearchpeer-review

Securing Integration of Cloud Services in Cross-Domain Distributed Environments

Suzic, B., 2016, Proceedings of the 31st Annual ACM Symposium on Applied Computing. New York, NY, USA: Association of Computing Machinery, p. 398-405 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Industry
Chemical analysis