@misc{pirker_data_2020, address = {Wien}, title = {Data ...in {Chains}?}, url = {https://media.ccc.de/v/pw20-351-data-in-chains}, abstract = {Dieser Vortrag beschäftigt sich mit verschiedenen Aspekten der Speicherung von (privaten) Daten auf der Blockchain und ähnlichen verteilten Datenstrukturen.}, language = {Deutsch}, author = {Pirker, Martin}, month = oct, year = {2020}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec Security Management \& Privacy, Vortrag}, } @misc{pirker_digitale_2019, address = {Wien}, title = {Digitale {Probleme}....für {Alle}!}, url = {https://media.ccc.de/v/pw19-256-digitale-probleme-fr-alle-}, abstract = {Diese Vortrag bringt einen bunten Querschnitt von Nachrichten aus der IT-Sicherheitswelt, die in "normalen" Nachrichtenfeeds wohl kaum auftauchen, oder nicht wahrgenommen werden, die aber auf Grund der fortschreitenden Digitalisierung unserer Alltagswelt eigentlich Sicherheits- und Datenprivacy-Auswirkungen auf uns alle haben (könnten). Dieser Vortrag soll motivieren sich mit den eingesetzten modernen "digitalen" und "cloudigen" Tools etwas tiefergehend auseinanderzusetzen, anstatt reflexartig überall "Ja" bei der Installation zu klicken und ein "ist ja gratis" und ein "ich habe ja nichts zu verbergen" verhindert jede weitere Reflektion.}, author = {Pirker, Martin}, month = oct, year = {2019}, note = {Projekt: TARGET}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec Applied Security \& Data Science}, } @incollection{gawrock_ongoing_2009, address = {Wiesbaden}, title = {An ongoing {Game} of {Tetris}: {Integrating} {Trusted} {Computing} in {Java}, block-by-block}, isbn = {978-3-8348-0794-6 978-3-8348-9324-6}, shorttitle = {An ongoing {Game} of {Tetris}}, url = {https://link.springer.com/chapter/10.1007/978-3-8348-9324-6_7}, language = {en}, urldate = {2019-01-24}, booktitle = {Future of {Trust} in {Computing}}, publisher = {Vieweg+Teubner}, author = {Toegl, Ronald and Pirker, Martin}, editor = {Gawrock, David and Reimer, Helmut and Sadeghi, Ahmad-Reza and Vishik, Claire}, year = {2009}, doi = {10.1007/978-3-8348-9324-6_7}, keywords = {Extern}, pages = {60--67}, } @article{dietrich_can_2007, title = {Can you {Really} {Trust} your {Computer} {Today}?}, volume = {3}, number = {3}, journal = {ENISA quarterly}, author = {Dietrich, Kurt and Vedjda, Tobias and Tögl, Ronald and Pirker, Martin and Lipp, Peter}, year = {2007}, keywords = {Extern, ⛔ No DOI found}, } @article{balogh_agent-based_2014, title = {Agent-{Based} {Cloud} {Resource} {Management} for {Secure} {Cloud} {Infrastructures}}, volume = {33}, url = {https://cai.type.sk/content/2014/6/agent-based-cloud-resource-management-for-secure-cloud-infrastructures/}, language = {en}, journal = {Computing and Informatics}, author = {Balogh, Zoltn and Gatial, Emil and Hluch, Ladislav and Tögl, Ronald and Pirker, Martin and Hein, Daniel}, year = {2014}, keywords = {Extern, ⛔ No DOI found}, pages = {1333--1355}, } @article{gatial_securing_2012, title = {Securing {Agents} {Using} {Secure} {Docking} {Module}}, volume = {No. 15(1) 2012}, url = {http://www.uwm.edu.pl/wnt/technicalsc/tech_15_1/B08.pdf}, journal = {Technical Sciences}, author = {Gatial, Emil and Tögl, Ronald and Pirker, Martin}, year = {2012}, keywords = {Extern, peer-reviewed, ⛔ No DOI found}, } @inproceedings{pipek_revisiting_2019, address = {St. Poelten (Austria)}, title = {Revisiting the {Challenges} of {Input} {Parsing} for {Robust} and {Secure} {Software}}, url = {https://ieeexplore.ieee.org/document/9307665}, doi = {10/ghwvvb}, abstract = {A wide variety of programs exchange data in our internet-connected world and one of the perpetual security challenges is the ingestion of data produced by communication partners. The insufficient robustness in parsing and processing of input data by programs still leads to security incidents. This paper revisits and explores the problem of parsing input data, with a consideration of the programming language Rust. By its novel combination of features, Rust discourages certain programming errors which are the cause of common security issues. Consequently, this motivates its adoption in cases where a secure and robust implementation is required. Our exploration in this work suggests that Rust is a worthwhile programming language choice for implementation of input data parsing and processing.}, booktitle = {2019 {International} {Conference} on {Software} {Security} and {Assurance} ({ICSSA})}, publisher = {IEEE}, author = {Pipek, Thomas and Pirker, Martin}, year = {2019}, keywords = {Eintrag überprüfen, FH SP Cyber Security, Forschungsgruppe Secure Societies, Green OA, Institut für IT Sicherheitsforschung, Institutional Access, SP IT Sec Security Management \& Privacy, peer-reviewed}, } @inproceedings{pirker_curious_2020, title = {A {Curious} {Exploration} of {Malicious} {PDF} {Documents}}, isbn = {978-989-758-399-5}, url = {https://www.scitepress.org/PublicationsDetail.aspx?ID=a4IHFkdWePg=&t=1}, abstract = {The storage, modification and exchange of digital information are core processes in our internet connected world. Common document formats enable this digital information infrastructure. More specifically, the widely used PDF document format is a commodity container for digital information. Although PDF files are a well established format, users may not know that they contain not only simple textual information, but can also embed pieces of program code, sometimes malicious code. This paper explores the capabilities of the PDF format and the potential of its built-in functions for malicious purposes. PDF file processors that implement the full PDF standard also potentially enable credential phishing, loss of privacy, malicious code execution and similar attacks via PDF documents. Furthermore, this paper discusses the results of practically evaluated, working code snippets of PDF feature misuse and strategies to obfuscate and hide malicious code parts in a PDF document, while still conf orming to the PDF standard}, booktitle = {Proceedings of the 6th {International} {Conference} on {Information} {Systems} {Security} and {Privacy} - {Volume} 1: {ICISSP}}, author = {Pirker, Martin and Lindenhofer, Julian and Offenthaler, Rene}, month = feb, year = {2020}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec Security Management \& Privacy, closed Access, peer-reviewed}, } @misc{pirker_trusted_2018, address = {Finse}, title = {Trusted {Computing} {Basics}\&{Overview}}, author = {Pirker, Martin}, month = may, year = {2018}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec System \& Application Security, Vortrag}, } @inproceedings{pirker_lightweight_2012, address = {Porto, Portugal}, title = {Lightweight {Distributed} {Attestation} {For} {The} {Cloud}}, isbn = {978-989-8565-05-1}, url = {http://www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0003929105800585}, doi = {10/gh376r}, urldate = {2019-01-24}, booktitle = {Proceedings of the 2nd {International} {Conference} on {Cloud} {Computing} and {Services} {Science}}, publisher = {SciTePress - Science and and Technology Publications}, author = {Pirker, Martin and Winter, Johannes and Tögl, Ronald}, year = {2012}, keywords = {Extern}, pages = {580--585}, } @inproceedings{pirker_framework_2012, address = {Liverpool, United Kingdom}, title = {A {Framework} for {Privacy}-{Preserving} {Mobile} {Payment} on {Security} {Enhanced} {ARM} {TrustZone} {Platforms}}, isbn = {978-1-4673-2172-3 978-0-7695-4745-9}, url = {http://ieeexplore.ieee.org/document/6296107/}, doi = {10/gh376q}, urldate = {2019-01-24}, booktitle = {2012 {IEEE} 11th {International} {Conference} on {Trust}, {Security} and {Privacy} in {Computing} and {Communications}}, publisher = {IEEE}, author = {Pirker, Martin and Slamanig, Daniel}, month = jun, year = {2012}, keywords = {Extern}, pages = {1155--1160}, } @article{pirker_towards_2010, title = {Towards a {Virtual} {Trusted} {Platform}}, issn = {0948695X}, url = {http://www.jucs.org/jucs_16_4/towards_a_virtual_trusted/jucs_16_04_0531_0542_pirker.pdf}, doi = {10/gh376p}, language = {eng}, number = {4}, urldate = {2019-01-24}, journal = {JUCS - Journal of Universal Computer Science}, author = {Pirker, Martin and Toegl, Ronald}, month = feb, year = {2010}, keywords = {Extern}, } @inproceedings{hein_securing_2012, address = {Raleigh, North Carolina, USA}, title = {Securing mobile agents for crisis management support}, isbn = {978-1-4503-1662-0}, url = {http://dl.acm.org/citation.cfm?doid=2382536.2382550}, doi = {10/gh376m}, language = {en}, urldate = {2019-01-24}, booktitle = {Proceedings of the seventh {ACM} workshop on {Scalable} trusted computing - {STC} '12}, publisher = {ACM Press}, author = {Hein, Daniel M. and Toegl, Ronald and Pirker, Martin and Gatial, Emil and Balogh, Zoltán and Brandl, Hans and Hluchý, Ladislav}, year = {2012}, keywords = {Extern}, pages = {85}, } @inproceedings{pammer_security_2014, address = {Graz, Austria}, title = {Security concepts for a distributed architecture for activity logging and analysis}, isbn = {978-1-4503-2769-5}, url = {http://dl.acm.org/citation.cfm?doid=2637748.2638426}, doi = {10/gh376n}, language = {en}, urldate = {2019-01-24}, booktitle = {Proceedings of the 14th {International} {Conference} on {Knowledge} {Technologies} and {Data}-driven {Business} - i-{KNOW} '14}, publisher = {ACM Press}, author = {Pammer, Viktoria and Stern, Hermann and Edler, Stefan and Hein, Daniel and Pirker, Martin and Bloem, Roderick and Wertner, Alfred}, year = {2014}, keywords = {Extern}, pages = {1--6}, } @inproceedings{pirker_assessment_2016, title = {Assessment of {Server} {State} via {Inter}-{Clone} {Differences}}, doi = {10/gh375j}, publisher = {IEEE}, author = {Pirker, Martin and Nusser, Andreas}, year = {2016}, note = {Projekt: TARGET}, keywords = {Department Technologie, FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Josef Ressel Zentrum TARGET, Publikationstyp Schriftpublikation, peer-reviewed}, } @inproceedings{pirker_work-flow_2016, series = {{WWW} '16 {Companion}}, title = {A {Work}-{Flow} for {Empirical} {Exploration} of {Security} {Events}}, url = {http://www2016.net/proceedings/companion/p477.pdf}, doi = {10/gh375h}, booktitle = {25th {International} {Conference} {Companion} on {World} {Wide} {Web}}, publisher = {ACM}, author = {Pirker, Martin and Nusser, Andreas}, year = {2016}, note = {Projekt: TARGET}, keywords = {Department Technologie, FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Josef Ressel Zentrum TARGET, Publikationstyp Schriftpublikation, peer-reviewed}, } @inproceedings{valicek_creation_2017, address = {Altoona, PA}, title = {Creation and {Integration} of {Remote} {High} {Interaction} {Honeypots}}, isbn = {978-1-5386-4808-7}, url = {https://ieeexplore.ieee.org/document/8392617/}, doi = {10/gh375g}, urldate = {2019-01-24}, booktitle = {2017 {International} {Conference} on {Software} {Security} and {Assurance} ({ICSSA})}, publisher = {IEEE}, author = {Valicek, Martin and Schramm, Gregor and Pirker, Martin and Schrittwieser, Sebastian}, month = jul, year = {2017}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung}, pages = {50--55}, } @inproceedings{pirker_behavioural_2018, address = {Hamburg, Deutschland}, title = {Behavioural {Comparison} of {Systems} for {Anomaly} {Detection}}, doi = {10/gh3734}, booktitle = {Proceedings of the 13th {International} {Conference} on {Availability}, {Reliability} and {Security}}, author = {Pirker, Martin and Kochberger, Patrick and Schwandter, Stefan}, year = {2018}, keywords = {Department Technologie, FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Josef Ressel Zentrum TARGET, Publikationstyp Schriftpublikation, peer-reviewed}, } @misc{pirker_robustes_2019, address = {Wien}, title = {Robustes {Parsen} von {Inputdaten}}, url = {https://sec4dev.io/sessions/robustes-parsen-von-inputdaten}, abstract = {In unserer digitalen Welt kommunizieren unterschiedlichste Programme mit Hilfe von vielerlei Datenformaten miteinander. Oft werden Standardformate verwendet (z.B. XML oder JSON) weil diese in den Bibliotheken der gängigen Programmiersprachen leicht verfügbar sind. Mit der Annahme und weiteren Verarbeitung von Daten unbekannter Herkunft (z.B. "von irgendwoher" aus dem Internet) stellt sich auch immer die Sicherheitsfrage: Könnten geschickt manipulierte Daten in meiner Verarbeitung Probleme verursachen? Dieser Vortrag beschäftigt sich mit der Frage wie man Daten robust und sicher ins eigene Programm importieren kann. Oder anders formuliert, mit wieviel Aufwand kann man wie komplexe Daten einlesen und was kann man über die Sicherheit dieses exponierten Programmcodes dann noch aussagen?}, author = {Pirker, Martin}, month = feb, year = {2019}, note = {Projekt: TARGET}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec Applied Security \& Data Science}, } @misc{pirker_data_2020-1, address = {Wien}, title = {Data... on the {Blockchain}?}, url = {https://viennadatasciencegroup.at/}, author = {Pirker, Martin}, month = feb, year = {2020}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec Security Management \& Privacy, Vortrag}, } @misc{pirker_more_2019, address = {TU Wien}, type = {Invited {Talk}}, title = {More {Data} - {More} {Security}?}, url = {https://www.eventbrite.com/e/ai-among-us-todays-use-cases-of-applied-ai-tickets-78776670141}, abstract = {Viel mehr Daten, viel mehr Sicherheit? Im Vortrag werden die verschiedenen Stadien der Lösung und Umsetzung eines konkreten ML/AI Problems beleuchtet:Martin Pirker und sein Team wollen die folgende Forschungsfrage beantworten: „könnte man mit Anomaliedetektion neuartige Einbrüche erkennen?“. Dazu werden viele Daten benötigt - hierbei muss die Problematik der persönlichen Daten besonders berücksichtigt werden. Ist dies geschafft, werden die riesigen Datenberge durchforstet und entsprechend organisiert. Eine weitere Hürde ist das Implementierungs-Trade-Offzwischen der Speicher- und Prozessorleistung und den Deployment-Kosten.Am Ende der Entwicklung steht die Integration im kommerziellen Produkt und der "Explainability"der Ergebnisse und Bedienbarkeit für den Kunden}, author = {Pirker, Martin}, month = nov, year = {2019}, note = {Projekt: TARGET}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec Applied Security \& Data Science}, } @misc{pirker_big_2019, address = {Wien}, type = {Invited {Talk}}, title = {({Big}) {Data} ({Science}) für {Security}}, url = {https://www.meetup.com/de-DE/Vienna-Data-Science-Group-Meetup/events/259922553/}, author = {Pirker, Martin}, month = mar, year = {2019}, note = {Projekt: TARGET}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec Applied Security \& Data Science}, } @incollection{barthe_practical_2008, address = {Berlin, Heidelberg}, title = {A {Practical} {Approach} for {Establishing} {Trust} {Relationships} between {Remote} {Platforms} {Using} {Trusted} {Computing}}, volume = {4912}, isbn = {978-3-540-78662-7 978-3-540-78663-4}, url = {http://link.springer.com/10.1007/978-3-540-78663-4_12}, language = {en}, urldate = {2019-01-24}, booktitle = {Trustworthy {Global} {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Dietrich, Kurt and Pirker, Martin and Vejda, Tobias and Toegl, Ronald and Winkler, Thomas and Lipp, Peter}, editor = {Barthe, Gilles and Fournet, Cédric}, year = {2008}, doi = {10.1007/978-3-540-78663-4_12}, keywords = {Extern}, pages = {156--168}, } @incollection{lee_management_2011, address = {Berlin, Heidelberg}, title = {Management of {Integrity}-{Enforced} {Virtual} {Applications}}, volume = {187}, isbn = {978-3-642-22364-8 978-3-642-22365-5}, url = {http://link.springer.com/10.1007/978-3-642-22365-5_17}, urldate = {2019-01-24}, booktitle = {Secure and {Trust} {Computing}, {Data} {Management}, and {Applications}}, publisher = {Springer Berlin Heidelberg}, author = {Gissing, Michael and Toegl, Ronald and Pirker, Martin}, editor = {Lee, Changhoon and Seigneur, Jean-Marc and Park, James J. and Wagner, Roland R.}, year = {2011}, doi = {10.1007/978-3-642-22365-5_17}, keywords = {Extern}, pages = {138--145}, } @incollection{hutchison_trusted_2013, title = {Trusted {Identity} {Management} for {Overlay} {Networks}}, volume = {7863}, isbn = {978-3-642-38032-7 978-3-642-38033-4}, url = {http://link.springer.com/10.1007/978-3-642-38033-4_2}, urldate = {2019-01-24}, booktitle = {Information {Security} {Practice} and {Experience}}, publisher = {Springer Berlin Heidelberg}, author = {Kraxberger, Stefan and Toegl, Ronald and Pirker, Martin and Guijarro, Elisa Pintado and Millan, Guillermo Garcia}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Deng, Robert H. and Feng, Tao}, year = {2013}, doi = {10.1007/978-3-642-38033-4_2}, keywords = {Extern}, pages = {16--30}, } @incollection{hutchison_practical_2012, address = {Berlin, Heidelberg}, title = {Practical {Privacy} {Preserving} {Cloud} {Resource}-{Payment} for {Constrained} {Clients}}, volume = {7384}, isbn = {978-3-642-31679-1 978-3-642-31680-7}, url = {http://link.springer.com/10.1007/978-3-642-31680-7_11}, urldate = {2019-01-24}, booktitle = {Privacy {Enhancing} {Technologies}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Slamanig, Daniel and Winter, Johannes}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Fischer-Hübner, Simone and Wright, Matthew}, year = {2012}, doi = {10.1007/978-3-642-31680-7_11}, keywords = {Extern}, pages = {201--220}, } @incollection{hutchison_dynamic_2010, address = {Berlin, Heidelberg}, title = {Dynamic {Enforcement} of {Platform} {Integrity}}, volume = {6101}, isbn = {978-3-642-13868-3 978-3-642-13869-0}, url = {http://link.springer.com/10.1007/978-3-642-13869-0_18}, urldate = {2019-01-24}, booktitle = {Trust and {Trustworthy} {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Toegl, Ronald and Gissing, Michael}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Acquisti, Alessandro and Smith, Sean W. and Sadeghi, Ahmad-Reza}, year = {2010}, doi = {10.1007/978-3-642-13869-0_18}, keywords = {Extern}, pages = {265--272}, } @incollection{chen_privacyca_2009, address = {Berlin, Heidelberg}, title = {A {PrivacyCA} for {Anonymity} and {Trust}}, volume = {5471}, isbn = {978-3-642-00586-2 978-3-642-00587-9}, url = {http://link.springer.com/10.1007/978-3-642-00587-9_7}, urldate = {2019-01-24}, booktitle = {Trusted {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Toegl, Ronald and Hein, Daniel and Danner, Peter}, editor = {Chen, Liqun and Mitchell, Chris J. and Martin, Andrew}, year = {2009}, doi = {10.1007/978-3-642-00587-9_7}, keywords = {Extern}, pages = {101--119}, } @incollection{hutchison_semi-automated_2013, address = {Berlin, Heidelberg}, title = {Semi-automated {Prototyping} of a {TPM} v2 {Software} and {Hardware} {Simulation} {Platform}}, volume = {7904}, isbn = {978-3-642-38907-8 978-3-642-38908-5}, url = {http://link.springer.com/10.1007/978-3-642-38908-5_8}, urldate = {2019-01-24}, booktitle = {Trust and {Trustworthy} {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Winter, Johannes}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Huth, Michael and Asokan, N. and Čapkun, Srdjan and Flechais, Ivan and Coles-Kemp, Lizzie}, year = {2013}, doi = {10.1007/978-3-642-38908-5_8}, keywords = {Extern}, pages = {106--114}, } @incollection{hutchison_lightweight_2012, address = {Berlin, Heidelberg}, title = {Lightweight {Distributed} {Heterogeneous} {Attested} {Android} {Clouds}}, volume = {7344}, isbn = {978-3-642-30920-5 978-3-642-30921-2}, url = {http://link.springer.com/10.1007/978-3-642-30921-2_8}, urldate = {2019-01-24}, booktitle = {Trust and {Trustworthy} {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Winter, Johannes and Toegl, Ronald}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Katzenbeisser, Stefan and Weippl, Edgar and Camp, L. Jean and Volkamer, Melanie and Reiter, Mike and Zhang, Xinwen}, year = {2012}, doi = {10.1007/978-3-642-30921-2_8}, keywords = {Extern}, pages = {122--141}, } @incollection{chen_actvsm:_2011, address = {Berlin, Heidelberg}, title = {{acTvSM}: {A} {Dynamic} {Virtualization} {Platform} for {Enforcement} of {Application} {Integrity}}, volume = {6802}, isbn = {978-3-642-25282-2 978-3-642-25283-9}, shorttitle = {{acTvSM}}, url = {http://link.springer.com/10.1007/978-3-642-25283-9_22}, urldate = {2019-01-24}, booktitle = {Trusted {Systems}}, publisher = {Springer Berlin Heidelberg}, author = {Toegl, Ronald and Pirker, Martin and Gissing, Michael}, editor = {Chen, Liqun and Yung, Moti}, year = {2011}, doi = {10.1007/978-3-642-25283-9_22}, keywords = {Extern}, pages = {326--345}, } @incollection{hutchison_waltzing_2013, address = {Berlin, Heidelberg}, title = {Waltzing the {Bear}, or: {A} {Trusted} {Virtual} {Security} {Module}}, volume = {7868}, isbn = {978-3-642-40011-7 978-3-642-40012-4}, shorttitle = {Waltzing the {Bear}, or}, url = {http://link.springer.com/10.1007/978-3-642-40012-4_10}, urldate = {2019-01-24}, booktitle = {Public {Key} {Infrastructures}, {Services} and {Applications}}, publisher = {Springer Berlin Heidelberg}, author = {Toegl, Ronald and Reimair, Florian and Pirker, Martin}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and De Capitani di Vimercati, Sabrina and Mitchell, Chris}, year = {2013}, doi = {10.1007/978-3-642-40012-4_10}, keywords = {Extern}, pages = {145--160}, } @incollection{lipp_towards_2008, address = {Berlin, Heidelberg}, title = {Towards {Trust} {Services} for {Language}-{Based} {Virtual} {Machines} for {Grid} {Computing}}, volume = {4968}, isbn = {978-3-540-68978-2 978-3-540-68979-9}, url = {http://link.springer.com/10.1007/978-3-540-68979-9_4}, language = {en}, urldate = {2019-01-24}, booktitle = {Trusted {Computing} - {Challenges} and {Applications}}, publisher = {Springer Berlin Heidelberg}, author = {Vejda, Tobias and Toegl, Ronald and Pirker, Martin and Winkler, Thomas}, editor = {Lipp, Peter and Sadeghi, Ahmad-Reza and Koch, Klaus-Michael}, year = {2008}, doi = {10.1007/978-3-540-68979-9_4}, keywords = {Extern}, pages = {48--59}, } @incollection{hutchison_flexible_2012, address = {Berlin, Heidelberg}, title = {A {Flexible} {Software} {Development} and {Emulation} {Framework} for {ARM} {TrustZone}}, volume = {7222}, isbn = {978-3-642-32297-6 978-3-642-32298-3}, url = {http://link.springer.com/10.1007/978-3-642-32298-3_1}, urldate = {2019-01-24}, booktitle = {Trusted {Systems}}, publisher = {Springer Berlin Heidelberg}, author = {Winter, Johannes and Wiegele, Paul and Pirker, Martin and Tögl, Ronald}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Chen, Liqun and Yung, Moti and Zhu, Liehuang}, year = {2012}, doi = {10.1007/978-3-642-32298-3_1}, keywords = {Extern}, pages = {1--15}, } @misc{pirker_it_2018, title = {{IT} {Security} + {Data} {Science} for {Security}}, author = {Pirker, Martin}, month = apr, year = {2018}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Poster, SP IT Sec Applied Security \& Data Science}, } @misc{pirker_jrz_2018, title = {{JRZ} {Target}}, author = {Pirker, Martin}, month = apr, year = {2018}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Poster, SP IT Sec System \& Application Security}, }