@incollection{gawrock_ongoing_2009, address = {Wiesbaden}, title = {An ongoing {Game} of {Tetris}: {Integrating} {Trusted} {Computing} in {Java}, block-by-block}, isbn = {978-3-8348-0794-6 978-3-8348-9324-6}, shorttitle = {An ongoing {Game} of {Tetris}}, url = {https://link.springer.com/chapter/10.1007/978-3-8348-9324-6_7}, language = {en}, urldate = {2019-01-24}, booktitle = {Future of {Trust} in {Computing}}, publisher = {Vieweg+Teubner}, author = {Toegl, Ronald and Pirker, Martin}, editor = {Gawrock, David and Reimer, Helmut and Sadeghi, Ahmad-Reza and Vishik, Claire}, year = {2009}, doi = {10.1007/978-3-8348-9324-6_7}, keywords = {Extern}, pages = {60--67}, } @article{dietrich_can_2007, title = {Can you {Really} {Trust} your {Computer} {Today}?}, volume = {3}, number = {3}, journal = {ENISA quarterly}, author = {Dietrich, Kurt and Vedjda, Tobias and Tögl, Ronald and Pirker, Martin and Lipp, Peter}, year = {2007}, keywords = {Extern, ⛔ No DOI found}, } @article{balogh_agent-based_2014, title = {Agent-{Based} {Cloud} {Resource} {Management} for {Secure} {Cloud} {Infrastructures}}, volume = {33}, url = {https://cai.type.sk/content/2014/6/agent-based-cloud-resource-management-for-secure-cloud-infrastructures/}, language = {en}, journal = {Computing and Informatics}, author = {Balogh, Zoltn and Gatial, Emil and Hluch, Ladislav and Tögl, Ronald and Pirker, Martin and Hein, Daniel}, year = {2014}, keywords = {Extern, ⛔ No DOI found}, pages = {1333--1355}, } @article{gatial_securing_2012, title = {Securing {Agents} {Using} {Secure} {Docking} {Module}}, volume = {No. 15(1) 2012}, url = {http://www.uwm.edu.pl/wnt/technicalsc/tech_15_1/B08.pdf}, journal = {Technical Sciences}, author = {Gatial, Emil and Tögl, Ronald and Pirker, Martin}, year = {2012}, keywords = {Extern, peer-reviewed, ⛔ No DOI found}, } @misc{pirker_trusted_2018, address = {Finse}, title = {Trusted {Computing} {Basics}\&{Overview}}, author = {Pirker, Martin}, month = may, year = {2018}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec System \& Application Security, Vortrag}, } @inproceedings{pirker_lightweight_2012, address = {Porto, Portugal}, title = {Lightweight {Distributed} {Attestation} {For} {The} {Cloud}}, isbn = {978-989-8565-05-1}, url = {http://www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0003929105800585}, doi = {10/gh376r}, urldate = {2019-01-24}, booktitle = {Proceedings of the 2nd {International} {Conference} on {Cloud} {Computing} and {Services} {Science}}, publisher = {SciTePress - Science and and Technology Publications}, author = {Pirker, Martin and Winter, Johannes and Tögl, Ronald}, year = {2012}, keywords = {Extern}, pages = {580--585}, } @inproceedings{pirker_framework_2012, address = {Liverpool, United Kingdom}, title = {A {Framework} for {Privacy}-{Preserving} {Mobile} {Payment} on {Security} {Enhanced} {ARM} {TrustZone} {Platforms}}, isbn = {978-1-4673-2172-3 978-0-7695-4745-9}, url = {http://ieeexplore.ieee.org/document/6296107/}, doi = {10/gh376q}, urldate = {2019-01-24}, booktitle = {2012 {IEEE} 11th {International} {Conference} on {Trust}, {Security} and {Privacy} in {Computing} and {Communications}}, publisher = {IEEE}, author = {Pirker, Martin and Slamanig, Daniel}, month = jun, year = {2012}, keywords = {Extern}, pages = {1155--1160}, } @article{pirker_towards_2010, title = {Towards a {Virtual} {Trusted} {Platform}}, issn = {0948695X}, url = {http://www.jucs.org/jucs_16_4/towards_a_virtual_trusted/jucs_16_04_0531_0542_pirker.pdf}, doi = {10/gh376p}, language = {eng}, number = {4}, urldate = {2019-01-24}, journal = {JUCS - Journal of Universal Computer Science}, author = {Pirker, Martin and Toegl, Ronald}, month = feb, year = {2010}, keywords = {Extern}, } @inproceedings{hein_securing_2012, address = {Raleigh, North Carolina, USA}, title = {Securing mobile agents for crisis management support}, isbn = {978-1-4503-1662-0}, url = {http://dl.acm.org/citation.cfm?doid=2382536.2382550}, doi = {10/gh376m}, language = {en}, urldate = {2019-01-24}, booktitle = {Proceedings of the seventh {ACM} workshop on {Scalable} trusted computing - {STC} '12}, publisher = {ACM Press}, author = {Hein, Daniel M. and Toegl, Ronald and Pirker, Martin and Gatial, Emil and Balogh, Zoltán and Brandl, Hans and Hluchý, Ladislav}, year = {2012}, keywords = {Extern}, pages = {85}, } @inproceedings{pammer_security_2014, address = {Graz, Austria}, title = {Security concepts for a distributed architecture for activity logging and analysis}, isbn = {978-1-4503-2769-5}, url = {http://dl.acm.org/citation.cfm?doid=2637748.2638426}, doi = {10/gh376n}, language = {en}, urldate = {2019-01-24}, booktitle = {Proceedings of the 14th {International} {Conference} on {Knowledge} {Technologies} and {Data}-driven {Business} - i-{KNOW} '14}, publisher = {ACM Press}, author = {Pammer, Viktoria and Stern, Hermann and Edler, Stefan and Hein, Daniel and Pirker, Martin and Bloem, Roderick and Wertner, Alfred}, year = {2014}, keywords = {Extern}, pages = {1--6}, } @inproceedings{pirker_assessment_2016, title = {Assessment of {Server} {State} via {Inter}-{Clone} {Differences}}, doi = {10/gh375j}, publisher = {IEEE}, author = {Pirker, Martin and Nusser, Andreas}, year = {2016}, note = {Projekt: TARGET}, keywords = {Department Technologie, FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Josef Ressel Zentrum TARGET, Publikationstyp Schriftpublikation, peer-reviewed}, } @inproceedings{pirker_work-flow_2016, series = {{WWW} '16 {Companion}}, title = {A {Work}-{Flow} for {Empirical} {Exploration} of {Security} {Events}}, url = {http://www2016.net/proceedings/companion/p477.pdf}, doi = {10/gh375h}, booktitle = {25th {International} {Conference} {Companion} on {World} {Wide} {Web}}, publisher = {ACM}, author = {Pirker, Martin and Nusser, Andreas}, year = {2016}, note = {Projekt: TARGET}, keywords = {Department Technologie, FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Josef Ressel Zentrum TARGET, Publikationstyp Schriftpublikation, peer-reviewed}, } @inproceedings{valicek_creation_2017, address = {Altoona, PA}, title = {Creation and {Integration} of {Remote} {High} {Interaction} {Honeypots}}, isbn = {978-1-5386-4808-7}, url = {https://ieeexplore.ieee.org/document/8392617/}, doi = {10/gh375g}, urldate = {2019-01-24}, booktitle = {2017 {International} {Conference} on {Software} {Security} and {Assurance} ({ICSSA})}, publisher = {IEEE}, author = {Valicek, Martin and Schramm, Gregor and Pirker, Martin and Schrittwieser, Sebastian}, month = jul, year = {2017}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung}, pages = {50--55}, } @inproceedings{pirker_behavioural_2018, address = {Hamburg, Deutschland}, title = {Behavioural {Comparison} of {Systems} for {Anomaly} {Detection}}, doi = {10/gh3734}, booktitle = {Proceedings of the 13th {International} {Conference} on {Availability}, {Reliability} and {Security}}, author = {Pirker, Martin and Kochberger, Patrick and Schwandter, Stefan}, year = {2018}, keywords = {Department Technologie, FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Josef Ressel Zentrum TARGET, Publikationstyp Schriftpublikation, peer-reviewed}, } @misc{pirker_trusted_2018-1, address = {Finse}, title = {Trusted {Computing} – {Basics} and {Overview}}, author = {Pirker, Martin}, month = oct, year = {2018}, keywords = {FH SP Cyber Security, Institut für IT Sicherheitsforschung, SP IT Sec System \& Application Security, Vortrag}, } @incollection{barthe_practical_2008, address = {Berlin, Heidelberg}, title = {A {Practical} {Approach} for {Establishing} {Trust} {Relationships} between {Remote} {Platforms} {Using} {Trusted} {Computing}}, volume = {4912}, isbn = {978-3-540-78662-7 978-3-540-78663-4}, url = {http://link.springer.com/10.1007/978-3-540-78663-4_12}, language = {en}, urldate = {2019-01-24}, booktitle = {Trustworthy {Global} {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Dietrich, Kurt and Pirker, Martin and Vejda, Tobias and Toegl, Ronald and Winkler, Thomas and Lipp, Peter}, editor = {Barthe, Gilles and Fournet, Cédric}, year = {2008}, doi = {10.1007/978-3-540-78663-4_12}, keywords = {Extern}, pages = {156--168}, } @incollection{lee_management_2011, address = {Berlin, Heidelberg}, title = {Management of {Integrity}-{Enforced} {Virtual} {Applications}}, volume = {187}, isbn = {978-3-642-22364-8 978-3-642-22365-5}, url = {http://link.springer.com/10.1007/978-3-642-22365-5_17}, urldate = {2019-01-24}, booktitle = {Secure and {Trust} {Computing}, {Data} {Management}, and {Applications}}, publisher = {Springer Berlin Heidelberg}, author = {Gissing, Michael and Toegl, Ronald and Pirker, Martin}, editor = {Lee, Changhoon and Seigneur, Jean-Marc and Park, James J. and Wagner, Roland R.}, year = {2011}, doi = {10.1007/978-3-642-22365-5_17}, keywords = {Extern}, pages = {138--145}, } @incollection{hutchison_trusted_2013, title = {Trusted {Identity} {Management} for {Overlay} {Networks}}, volume = {7863}, isbn = {978-3-642-38032-7 978-3-642-38033-4}, url = {http://link.springer.com/10.1007/978-3-642-38033-4_2}, urldate = {2019-01-24}, booktitle = {Information {Security} {Practice} and {Experience}}, publisher = {Springer Berlin Heidelberg}, author = {Kraxberger, Stefan and Toegl, Ronald and Pirker, Martin and Guijarro, Elisa Pintado and Millan, Guillermo Garcia}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Deng, Robert H. and Feng, Tao}, year = {2013}, doi = {10.1007/978-3-642-38033-4_2}, keywords = {Extern}, pages = {16--30}, } @incollection{hutchison_practical_2012, address = {Berlin, Heidelberg}, title = {Practical {Privacy} {Preserving} {Cloud} {Resource}-{Payment} for {Constrained} {Clients}}, volume = {7384}, isbn = {978-3-642-31679-1 978-3-642-31680-7}, url = {http://link.springer.com/10.1007/978-3-642-31680-7_11}, urldate = {2019-01-24}, booktitle = {Privacy {Enhancing} {Technologies}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Slamanig, Daniel and Winter, Johannes}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Fischer-Hübner, Simone and Wright, Matthew}, year = {2012}, doi = {10.1007/978-3-642-31680-7_11}, keywords = {Extern}, pages = {201--220}, } @incollection{hutchison_dynamic_2010, address = {Berlin, Heidelberg}, title = {Dynamic {Enforcement} of {Platform} {Integrity}}, volume = {6101}, isbn = {978-3-642-13868-3 978-3-642-13869-0}, url = {http://link.springer.com/10.1007/978-3-642-13869-0_18}, urldate = {2019-01-24}, booktitle = {Trust and {Trustworthy} {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Toegl, Ronald and Gissing, Michael}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Acquisti, Alessandro and Smith, Sean W. and Sadeghi, Ahmad-Reza}, year = {2010}, doi = {10.1007/978-3-642-13869-0_18}, keywords = {Extern}, pages = {265--272}, } @incollection{chen_privacyca_2009, address = {Berlin, Heidelberg}, title = {A {PrivacyCA} for {Anonymity} and {Trust}}, volume = {5471}, isbn = {978-3-642-00586-2 978-3-642-00587-9}, url = {http://link.springer.com/10.1007/978-3-642-00587-9_7}, urldate = {2019-01-24}, booktitle = {Trusted {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Toegl, Ronald and Hein, Daniel and Danner, Peter}, editor = {Chen, Liqun and Mitchell, Chris J. and Martin, Andrew}, year = {2009}, doi = {10.1007/978-3-642-00587-9_7}, keywords = {Extern}, pages = {101--119}, } @incollection{hutchison_semi-automated_2013, address = {Berlin, Heidelberg}, title = {Semi-automated {Prototyping} of a {TPM} v2 {Software} and {Hardware} {Simulation} {Platform}}, volume = {7904}, isbn = {978-3-642-38907-8 978-3-642-38908-5}, url = {http://link.springer.com/10.1007/978-3-642-38908-5_8}, urldate = {2019-01-24}, booktitle = {Trust and {Trustworthy} {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Winter, Johannes}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Huth, Michael and Asokan, N. and Čapkun, Srdjan and Flechais, Ivan and Coles-Kemp, Lizzie}, year = {2013}, doi = {10.1007/978-3-642-38908-5_8}, keywords = {Extern}, pages = {106--114}, } @incollection{hutchison_lightweight_2012, address = {Berlin, Heidelberg}, title = {Lightweight {Distributed} {Heterogeneous} {Attested} {Android} {Clouds}}, volume = {7344}, isbn = {978-3-642-30920-5 978-3-642-30921-2}, url = {http://link.springer.com/10.1007/978-3-642-30921-2_8}, urldate = {2019-01-24}, booktitle = {Trust and {Trustworthy} {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Winter, Johannes and Toegl, Ronald}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Katzenbeisser, Stefan and Weippl, Edgar and Camp, L. Jean and Volkamer, Melanie and Reiter, Mike and Zhang, Xinwen}, year = {2012}, doi = {10.1007/978-3-642-30921-2_8}, keywords = {Extern}, pages = {122--141}, } @incollection{chen_actvsm:_2011, address = {Berlin, Heidelberg}, title = {{acTvSM}: {A} {Dynamic} {Virtualization} {Platform} for {Enforcement} of {Application} {Integrity}}, volume = {6802}, isbn = {978-3-642-25282-2 978-3-642-25283-9}, shorttitle = {{acTvSM}}, url = {http://link.springer.com/10.1007/978-3-642-25283-9_22}, urldate = {2019-01-24}, booktitle = {Trusted {Systems}}, publisher = {Springer Berlin Heidelberg}, author = {Toegl, Ronald and Pirker, Martin and Gissing, Michael}, editor = {Chen, Liqun and Yung, Moti}, year = {2011}, doi = {10.1007/978-3-642-25283-9_22}, keywords = {Extern}, pages = {326--345}, } @incollection{hutchison_waltzing_2013, address = {Berlin, Heidelberg}, title = {Waltzing the {Bear}, or: {A} {Trusted} {Virtual} {Security} {Module}}, volume = {7868}, isbn = {978-3-642-40011-7 978-3-642-40012-4}, shorttitle = {Waltzing the {Bear}, or}, url = {http://link.springer.com/10.1007/978-3-642-40012-4_10}, urldate = {2019-01-24}, booktitle = {Public {Key} {Infrastructures}, {Services} and {Applications}}, publisher = {Springer Berlin Heidelberg}, author = {Toegl, Ronald and Reimair, Florian and Pirker, Martin}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and De Capitani di Vimercati, Sabrina and Mitchell, Chris}, year = {2013}, doi = {10.1007/978-3-642-40012-4_10}, keywords = {Extern}, pages = {145--160}, } @incollection{lipp_towards_2008, address = {Berlin, Heidelberg}, title = {Towards {Trust} {Services} for {Language}-{Based} {Virtual} {Machines} for {Grid} {Computing}}, volume = {4968}, isbn = {978-3-540-68978-2 978-3-540-68979-9}, url = {http://link.springer.com/10.1007/978-3-540-68979-9_4}, language = {en}, urldate = {2019-01-24}, booktitle = {Trusted {Computing} - {Challenges} and {Applications}}, publisher = {Springer Berlin Heidelberg}, author = {Vejda, Tobias and Toegl, Ronald and Pirker, Martin and Winkler, Thomas}, editor = {Lipp, Peter and Sadeghi, Ahmad-Reza and Koch, Klaus-Michael}, year = {2008}, doi = {10.1007/978-3-540-68979-9_4}, keywords = {Extern}, pages = {48--59}, } @incollection{hutchison_flexible_2012, address = {Berlin, Heidelberg}, title = {A {Flexible} {Software} {Development} and {Emulation} {Framework} for {ARM} {TrustZone}}, volume = {7222}, isbn = {978-3-642-32297-6 978-3-642-32298-3}, url = {http://link.springer.com/10.1007/978-3-642-32298-3_1}, urldate = {2019-01-24}, booktitle = {Trusted {Systems}}, publisher = {Springer Berlin Heidelberg}, author = {Winter, Johannes and Wiegele, Paul and Pirker, Martin and Tögl, Ronald}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Chen, Liqun and Yung, Moti and Zhu, Liehuang}, year = {2012}, doi = {10.1007/978-3-642-32298-3_1}, keywords = {Extern}, pages = {1--15}, } @misc{pirker_it_2018, title = {{IT} {Security} + {Data} {Science} for {Security}}, author = {Pirker, Martin}, month = apr, year = {2018}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Poster, SP IT Sec Applied Security \& Data Science}, } @misc{pirker_jrz_2018, title = {{JRZ} {Target}}, author = {Pirker, Martin}, month = apr, year = {2018}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Poster, SP IT Sec System \& Application Security}, }