@misc{pirker_data_2020, address = {Wien}, title = {Data ...in {Chains}?}, url = {https://media.ccc.de/v/pw20-351-data-in-chains}, abstract = {Dieser Vortrag beschäftigt sich mit verschiedenen Aspekten der Speicherung von (privaten) Daten auf der Blockchain und ähnlichen verteilten Datenstrukturen.}, language = {Deutsch}, author = {Pirker, Martin}, month = oct, year = {2020}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec Security Management \& Privacy, Vortrag}, } @book{pirker_data_2020-1, address = {Wien}, title = {Data ...in {Chains}?}, url = {https://media.ccc.de/v/pw20-351-data-in-chains}, abstract = {Dieser Vortrag beschäftigt sich mit verschiedenen Aspekten der Speicherung von (privaten) Daten auf der Blockchain und ähnlichen verteilten Datenstrukturen.}, language = {Deutsch}, author = {Pirker, Martin}, year = {2020}, keywords = {FH SP Cyber Security, Institut für IT Sicherheitsforschung, SP IT Sec Security Management \& Privacy, Vortrag}, } @misc{pirker_digitale_2019, address = {Wien}, title = {Digitale {Probleme}....für {Alle}!}, url = {https://media.ccc.de/v/pw19-256-digitale-probleme-fr-alle-}, abstract = {Diese Vortrag bringt einen bunten Querschnitt von Nachrichten aus der IT-Sicherheitswelt, die in "normalen" Nachrichtenfeeds wohl kaum auftauchen, oder nicht wahrgenommen werden, die aber auf Grund der fortschreitenden Digitalisierung unserer Alltagswelt eigentlich Sicherheits- und Datenprivacy-Auswirkungen auf uns alle haben (könnten). Dieser Vortrag soll motivieren sich mit den eingesetzten modernen "digitalen" und "cloudigen" Tools etwas tiefergehend auseinanderzusetzen, anstatt reflexartig überall "Ja" bei der Installation zu klicken und ein "ist ja gratis" und ein "ich habe ja nichts zu verbergen" verhindert jede weitere Reflektion.}, author = {Pirker, Martin}, month = oct, year = {2019}, note = {Projekt: TARGET}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec Applied Security \& Data Science}, } @book{pirker_digitale_2019-1, address = {Wien}, title = {Digitale {Probleme}....für {Alle}!}, url = {https://media.ccc.de/v/pw19-256-digitale-probleme-fr-alle-}, abstract = {Diese Vortrag bringt einen bunten Querschnitt von Nachrichten aus der IT-Sicherheitswelt, die in "normalen" Nachrichtenfeeds wohl kaum auftauchen, oder nicht wahrgenommen werden, die aber auf Grund der fortschreitenden Digitalisierung unserer Alltagswelt eigentlich Sicherheits- und Datenprivacy-Auswirkungen auf uns alle haben (könnten). Dieser Vortrag soll motivieren sich mit den eingesetzten modernen "digitalen" und "cloudigen" Tools etwas tiefergehend auseinanderzusetzen, anstatt reflexartig überall "Ja" bei der Installation zu klicken und ein "ist ja gratis" und ein "ich habe ja nichts zu verbergen" verhindert jede weitere Reflektion.}, author = {Pirker, Martin}, year = {2019}, keywords = {FH SP Cyber Security, Institut für IT Sicherheitsforschung, SP IT Sec Applied Security \& Data Science}, } @inproceedings{pirker_obstacles_2021, title = {Obstacles and {Challenges} in {Transforming} {Applications} for {Distributed} {Data} {Ledger} {Integration}}, doi = {10/gn622r}, abstract = {The application opportunities of distributed ledger technologies (DLT) for replicated, shared and synchronized data, across multiple nodes in a network, may create new possibilities in computing. There are notable differences between applications designed from scratch for being DLT-enabled and established IT applications that assume fundamentally a centralized computing architecture. This short paper reflects on the challenges in transforming established, conventional IT applications to be DLT-enabled. If such a transformation can be implemented successfully, repeatedly, and with acceptable effort, this means that today’s currently deployed IT applications may subsequently take advantage of beneficial properties of DLT. However, there are still a variety of aspects that need to be considered—this short paper contributes to that discussion.}, booktitle = {Proceedings of the 16th {International} {Workshop} on {Frontiers} in {Availability}, {Reli}- ability and {Security} ({FARES})}, author = {Pirker, Martin and Piller, Ernst}, month = aug, year = {2021}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec Applied Security \& Data Science, Vortrag, best, peer-reviewed}, } @inproceedings{eigner_towards_2021, address = {Rhodes, Greece}, title = {Towards {Resilient} {Artificial} {Intelligence}: {Survey} and {Research} {Issues}}, url = {https://ieeexplore.ieee.org/document/9527986}, doi = {10.1109/CSR51186.2021.9527986}, booktitle = {Proceedings of the 2021 {IEEE} {International} {Conference} on {Cyber} {Security} and {Resilience}}, publisher = {IEEE}, author = {Eigner, Oliver and Eresheim, Sebastian and Kieseberg, Peter and Klausner, Lukas Daniel and Pirker, Martin and Priebe, Torsten and Tjoa, Simon and Marulli, Fiammetta and Mercaldo, Francesco and Priebe, Torsten}, year = {2021}, keywords = {Center for Artificial Intelligence, FH SP Cyber Security, FH SP Data Analytics \& Visual Computing, Forschungsgruppe Data Intelligence, Institut für IT Sicherheitsforschung, SP IT Sec Applied Security \& Data Science, SP IT Sec System \& Application Security, Vortrag, Wiss. Beitrag, best, peer-reviewed}, pages = {536--542}, } @misc{pirker_secure_2021, address = {Vienna}, type = {Online {Stream}}, title = {Secure {Messaging} - {Revisited}}, abstract = {Dieser Vortrag beschäftigt sich mit Security und Privacy Aspekten von elektronischen Nachrichten. Die Situation der andauernden Pandemie bewirkt(e) einen weiteren Schub in der Digitalisierung unserer täglichen Lebensrealität. Sozial distanziert bieten digitale Dienste über das Internet DIE Möglichkeit(en) zur Kommunikation. Dies motiviert sich in diesem Vortrag erneut (siehe vorheriger PW Vortrag 2017) mit den Security und Privacy Aspekten von digitalen Nachrichten(bzw. -plattformen) auseinanderzusetzen.}, language = {Deutsch}, author = {Pirker, Martin}, month = oct, year = {2021}, keywords = {Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec Security Management \& Privacy, Vortrag, Wiss. Beitrag}, } @article{balogh_agent-based_2014, title = {Agent-{Based} {Cloud} {Resource} {Management} for {Secure} {Cloud} {Infrastructures}}, volume = {33}, url = {https://cai.type.sk/content/2014/6/agent-based-cloud-resource-management-for-secure-cloud-infrastructures/}, language = {en}, journal = {Computing and Informatics}, author = {Balogh, Zoltn and Gatial, Emil and Hluch, Ladislav and Tögl, Ronald and Pirker, Martin and Hein, Daniel}, year = {2014}, keywords = {Extern, ⛔ No DOI found}, pages = {1333--1355}, } @article{balogh_agent-based_2014-1, title = {Agent-{Based} {Cloud} {Resource} {Management} for {Secure} {Cloud} {Infrastructures}}, volume = {33}, url = {https://cai.type.sk/content/2014/6/agent-based-cloud-resource-management-for-secure-cloud-infrastructures/}, language = {en}, journal = {Computing and Informatics}, author = {Balogh, Zoltn and Gatial, Emil and Hluch, Ladislav and Tögl, Ronald and Pirker, Martin and Hein, Daniel}, year = {2014}, keywords = {Extern, ⛔ No DOI found}, pages = {1333--1355}, } @inproceedings{pipek_revisiting_2019, address = {St. Poelten (Austria)}, title = {Revisiting the {Challenges} of {Input} {Parsing} for {Robust} and {Secure} {Software}}, url = {https://ieeexplore.ieee.org/document/9307665}, doi = {10/ghwvvb}, abstract = {A wide variety of programs exchange data in our internet-connected world and one of the perpetual security challenges is the ingestion of data produced by communication partners. The insufficient robustness in parsing and processing of input data by programs still leads to security incidents. This paper revisits and explores the problem of parsing input data, with a consideration of the programming language Rust. By its novel combination of features, Rust discourages certain programming errors which are the cause of common security issues. Consequently, this motivates its adoption in cases where a secure and robust implementation is required. Our exploration in this work suggests that Rust is a worthwhile programming language choice for implementation of input data parsing and processing.}, booktitle = {2019 {International} {Conference} on {Software} {Security} and {Assurance} ({ICSSA})}, publisher = {IEEE}, author = {Pipek, Thomas and Pirker, Martin}, year = {2019}, keywords = {Eintrag überprüfen, FH SP Cyber Security, Forschungsgruppe Secure Societies, Green OA, Institut für IT Sicherheitsforschung, Institutional Access, SP IT Sec Security Management \& Privacy, peer-reviewed}, } @inproceedings{pirker_curious_2020, title = {A {Curious} {Exploration} of {Malicious} {PDF} {Documents}}, isbn = {978-989-758-399-5}, url = {https://www.scitepress.org/PublicationsDetail.aspx?ID=a4IHFkdWePg=&t=1}, abstract = {The storage, modification and exchange of digital information are core processes in our internet connected world. Common document formats enable this digital information infrastructure. More specifically, the widely used PDF document format is a commodity container for digital information. Although PDF files are a well established format, users may not know that they contain not only simple textual information, but can also embed pieces of program code, sometimes malicious code. This paper explores the capabilities of the PDF format and the potential of its built-in functions for malicious purposes. PDF file processors that implement the full PDF standard also potentially enable credential phishing, loss of privacy, malicious code execution and similar attacks via PDF documents. Furthermore, this paper discusses the results of practically evaluated, working code snippets of PDF feature misuse and strategies to obfuscate and hide malicious code parts in a PDF document, while still conf orming to the PDF standard}, booktitle = {Proceedings of the 6th {International} {Conference} on {Information} {Systems} {Security} and {Privacy} - {Volume} 1: {ICISSP}}, author = {Pirker, Martin and Lindenhofer, Julian and Offenthaler, Rene}, month = feb, year = {2020}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec Security Management \& Privacy, closed Access, peer-reviewed}, } @inproceedings{pirker_behavioural_2018, address = {Hamburg, Deutschland}, title = {Behavioural {Comparison} of {Systems} for {Anomaly} {Detection}}, doi = {10/gh3734}, booktitle = {Proceedings of the 13th {International} {Conference} on {Availability}, {Reliability} and {Security}}, author = {Pirker, Martin and Kochberger, Patrick and Schwandter, Stefan}, year = {2018}, keywords = {Department Technologie, FH SP Cyber Security, Institut für IT Sicherheitsforschung, Josef Ressel Zentrum TARGET, Publikationstyp Schriftpublikation, peer-reviewed}, } @inproceedings{valicek_creation_2017, address = {Altoona, PA}, title = {Creation and {Integration} of {Remote} {High} {Interaction} {Honeypots}}, isbn = {978-1-5386-4808-7}, url = {https://ieeexplore.ieee.org/document/8392617/}, doi = {10/gh375g}, urldate = {2019-01-24}, booktitle = {2017 {International} {Conference} on {Software} {Security} and {Assurance} ({ICSSA})}, publisher = {IEEE}, author = {Valicek, Martin and Schramm, Gregor and Pirker, Martin and Schrittwieser, Sebastian}, month = jul, year = {2017}, keywords = {FH SP Cyber Security, Institut für IT Sicherheitsforschung}, pages = {50--55}, } @inproceedings{pirker_work-flow_2016, series = {{WWW} '16 {Companion}}, title = {A {Work}-{Flow} for {Empirical} {Exploration} of {Security} {Events}}, url = {http://www2016.net/proceedings/companion/p477.pdf}, doi = {10/gh375h}, booktitle = {25th {International} {Conference} {Companion} on {World} {Wide} {Web}}, publisher = {ACM}, author = {Pirker, Martin and Nusser, Andreas}, year = {2016}, keywords = {Department Technologie, FH SP Cyber Security, Institut für IT Sicherheitsforschung, Josef Ressel Zentrum TARGET, Publikationstyp Schriftpublikation, peer-reviewed}, } @inproceedings{pirker_assessment_2016, title = {Assessment of {Server} {State} via {Inter}-{Clone} {Differences}}, doi = {10/gh375j}, publisher = {IEEE}, author = {Pirker, Martin and Nusser, Andreas}, year = {2016}, keywords = {Department Technologie, FH SP Cyber Security, Institut für IT Sicherheitsforschung, Josef Ressel Zentrum TARGET, Publikationstyp Schriftpublikation, peer-reviewed}, } @inproceedings{pirker_framework_2012, address = {Liverpool, United Kingdom}, title = {A {Framework} for {Privacy}-{Preserving} {Mobile} {Payment} on {Security} {Enhanced} {ARM} {TrustZone} {Platforms}}, isbn = {978-1-4673-2172-3 978-0-7695-4745-9}, url = {http://ieeexplore.ieee.org/document/6296107/}, doi = {10/gh376q}, urldate = {2019-01-24}, booktitle = {2012 {IEEE} 11th {International} {Conference} on {Trust}, {Security} and {Privacy} in {Computing} and {Communications}}, publisher = {IEEE}, author = {Pirker, Martin and Slamanig, Daniel}, month = jun, year = {2012}, keywords = {Extern}, pages = {1155--1160}, } @inproceedings{pammer_security_2014, address = {Graz, Austria}, title = {Security concepts for a distributed architecture for activity logging and analysis}, isbn = {978-1-4503-2769-5}, url = {http://dl.acm.org/citation.cfm?doid=2637748.2638426}, doi = {10/gh376n}, language = {en}, urldate = {2019-01-24}, booktitle = {Proceedings of the 14th {International} {Conference} on {Knowledge} {Technologies} and {Data}-driven {Business} - i-{KNOW} '14}, publisher = {ACM Press}, author = {Pammer, Viktoria and Stern, Hermann and Edler, Stefan and Hein, Daniel and Pirker, Martin and Bloem, Roderick and Wertner, Alfred}, year = {2014}, keywords = {Extern}, pages = {1--6}, } @inproceedings{pipek_revisiting_2020, address = {St. Poelten (Austria)}, title = {Revisiting the {Challenges} of {Input} {Parsing} for {Robust} and {Secure} {Software}}, url = {https://ieeexplore.ieee.org/document/9307665}, doi = {10/ghwvvb}, abstract = {A wide variety of programs exchange data in our internet-connected world and one of the perpetual security challenges is the ingestion of data produced by communication partners. The insufficient robustness in parsing and processing of input data by programs still leads to security incidents. This paper revisits and explores the problem of parsing input data, with a consideration of the programming language Rust. By its novel combination of features, Rust discourages certain programming errors which are the cause of common security issues. Consequently, this motivates its adoption in cases where a secure and robust implementation is required. Our exploration in this work suggests that Rust is a worthwhile programming language choice for implementation of input data parsing and processing.}, booktitle = {2019 {International} {Conference} on {Software} {Security} and {Assurance} ({ICSSA})}, publisher = {IEEE}, author = {Pipek, Thomas and Pirker, Martin}, year = {2020}, keywords = {Eintrag überprüfen, FH SP Cyber Security, Green OA, Institut für IT Sicherheitsforschung, Institutional Access, SP IT Sec Security Management \& Privacy, peer-reviewed}, } @misc{pirker_trusted_2018, address = {Finse}, title = {Trusted {Computing} {Basics}\&{Overview}}, author = {Pirker, Martin}, month = may, year = {2018}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec System \& Application Security, Vortrag}, } @book{pirker_it_2018, title = {{IT} {Security} + {Data} {Science} for {Security}}, author = {Pirker, Martin}, month = apr, year = {2018}, keywords = {FH SP Cyber Security, Institut für IT Sicherheitsforschung, Poster, SP IT Sec Applied Security \& Data Science}, } @book{pirker_jrz_2018, title = {{JRZ} {Target}}, author = {Pirker, Martin}, month = apr, year = {2018}, keywords = {FH SP Cyber Security, Institut für IT Sicherheitsforschung, Poster, SP IT Sec System \& Application Security}, } @incollection{toegl_waltzing_2013, address = {Berlin, Heidelberg}, title = {Waltzing the {Bear}, or: {A} {Trusted} {Virtual} {Security} {Module}}, volume = {7868}, isbn = {978-3-642-40011-7 978-3-642-40012-4}, shorttitle = {Waltzing the {Bear}, or}, url = {http://link.springer.com/10.1007/978-3-642-40012-4_10}, urldate = {2019-01-24}, booktitle = {Public {Key} {Infrastructures}, {Services} and {Applications}}, publisher = {Springer Berlin Heidelberg}, author = {Toegl, Ronald and Reimair, Florian and Pirker, Martin}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and De Capitani di Vimercati, Sabrina and Mitchell, Chris}, year = {2013}, doi = {10.1007/978-3-642-40012-4_10}, keywords = {Extern}, pages = {145--160}, } @incollection{pirker_semi-automated_2013, address = {Berlin, Heidelberg}, title = {Semi-automated {Prototyping} of a {TPM} v2 {Software} and {Hardware} {Simulation} {Platform}}, volume = {7904}, isbn = {978-3-642-38907-8 978-3-642-38908-5}, url = {http://link.springer.com/10.1007/978-3-642-38908-5_8}, urldate = {2019-01-24}, booktitle = {Trust and {Trustworthy} {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Winter, Johannes}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Huth, Michael and Asokan, N. and Čapkun, Srdjan and Flechais, Ivan and Coles-Kemp, Lizzie}, year = {2013}, doi = {10.1007/978-3-642-38908-5_8}, keywords = {Extern}, pages = {106--114}, } @incollection{kraxberger_trusted_2013, title = {Trusted {Identity} {Management} for {Overlay} {Networks}}, volume = {7863}, isbn = {978-3-642-38032-7 978-3-642-38033-4}, url = {http://link.springer.com/10.1007/978-3-642-38033-4_2}, urldate = {2019-01-24}, booktitle = {Information {Security} {Practice} and {Experience}}, publisher = {Springer Berlin Heidelberg}, author = {Kraxberger, Stefan and Toegl, Ronald and Pirker, Martin and Guijarro, Elisa Pintado and Millan, Guillermo Garcia}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Deng, Robert H. and Feng, Tao}, year = {2013}, doi = {10.1007/978-3-642-38033-4_2}, keywords = {Extern}, pages = {16--30}, } @book{pirker_big_2019, address = {Wien}, title = {({Big}) {Data} ({Science}) für {Security}}, url = {https://www.meetup.com/de-DE/Vienna-Data-Science-Group-Meetup/events/259922553/}, author = {Pirker, Martin}, year = {2019}, note = {Type: Invited Talk}, keywords = {FH SP Cyber Security, Institut für IT Sicherheitsforschung, SP IT Sec Applied Security \& Data Science}, } @book{pirker_robustes_2019, address = {Wien}, title = {Robustes {Parsen} von {Inputdaten}}, url = {https://sec4dev.io/sessions/robustes-parsen-von-inputdaten}, abstract = {In unserer digitalen Welt kommunizieren unterschiedlichste Programme mit Hilfe von vielerlei Datenformaten miteinander. Oft werden Standardformate verwendet (z.B. XML oder JSON) weil diese in den Bibliotheken der gängigen Programmiersprachen leicht verfügbar sind. Mit der Annahme und weiteren Verarbeitung von Daten unbekannter Herkunft (z.B. "von irgendwoher" aus dem Internet) stellt sich auch immer die Sicherheitsfrage: Könnten geschickt manipulierte Daten in meiner Verarbeitung Probleme verursachen? Dieser Vortrag beschäftigt sich mit der Frage wie man Daten robust und sicher ins eigene Programm importieren kann. Oder anders formuliert, mit wieviel Aufwand kann man wie komplexe Daten einlesen und was kann man über die Sicherheit dieses exponierten Programmcodes dann noch aussagen?}, author = {Pirker, Martin}, month = feb, year = {2019}, keywords = {FH SP Cyber Security, Institut für IT Sicherheitsforschung, SP IT Sec Applied Security \& Data Science}, } @book{pirker_more_2019, address = {TU Wien}, title = {More {Data} - {More} {Security}?}, url = {https://www.eventbrite.com/e/ai-among-us-todays-use-cases-of-applied-ai-tickets-78776670141}, abstract = {Viel mehr Daten, viel mehr Sicherheit? Im Vortrag werden die verschiedenen Stadien der Lösung und Umsetzung eines konkreten ML/AI Problems beleuchtet:Martin Pirker und sein Team wollen die folgende Forschungsfrage beantworten: „könnte man mit Anomaliedetektion neuartige Einbrüche erkennen?“. Dazu werden viele Daten benötigt - hierbei muss die Problematik der persönlichen Daten besonders berücksichtigt werden. Ist dies geschafft, werden die riesigen Datenberge durchforstet und entsprechend organisiert. Eine weitere Hürde ist das Implementierungs-Trade-Offzwischen der Speicher- und Prozessorleistung und den Deployment-Kosten.Am Ende der Entwicklung steht die Integration im kommerziellen Produkt und der "Explainability"der Ergebnisse und Bedienbarkeit für den Kunden}, author = {Pirker, Martin}, month = nov, year = {2019}, note = {Type: Invited Talk}, keywords = {FH SP Cyber Security, Institut für IT Sicherheitsforschung, SP IT Sec Applied Security \& Data Science}, } @book{pirker_data_2020-2, address = {Wien}, title = {Data... on the {Blockchain}?}, url = {https://viennadatasciencegroup.at/}, author = {Pirker, Martin}, month = feb, year = {2020}, keywords = {FH SP Cyber Security, Institut für IT Sicherheitsforschung, SP IT Sec Security Management \& Privacy, Vortrag}, } @inproceedings{pirker_curious_2020-1, title = {A {Curious} {Exploration} of {Malicious} {PDF} {Documents}}, isbn = {978-989-758-399-5}, url = {https://www.scitepress.org/PublicationsDetail.aspx?ID=a4IHFkdWePg=&t=1}, abstract = {The storage, modification and exchange of digital information are core processes in our internet connected world. Common document formats enable this digital information infrastructure. More specifically, the widely used PDF document format is a commodity container for digital information. Although PDF files are a well established format, users may not know that they contain not only simple textual information, but can also embed pieces of program code, sometimes malicious code. This paper explores the capabilities of the PDF format and the potential of its built-in functions for malicious purposes. PDF file processors that implement the full PDF standard also potentially enable credential phishing, loss of privacy, malicious code execution and similar attacks via PDF documents. Furthermore, this paper discusses the results of practically evaluated, working code snippets of PDF feature misuse and strategies to obfuscate and hide malicious code parts in a PDF document, while still conf orming to the PDF standard}, booktitle = {Proceedings of the 6th {International} {Conference} on {Information} {Systems} {Security} and {Privacy} - {Volume} 1: {ICISSP}}, author = {Pirker, Martin and Lindenhofer, Julian and Offenthaler, Rene}, month = feb, year = {2020}, keywords = {Eintrag überprüfen, FH SP Cyber Security, Institut für IT Sicherheitsforschung, Open Access, SP IT Sec Security Management \& Privacy, peer-reviewed}, } @book{pirker_trusted_2018-1, address = {Finse}, title = {Trusted {Computing} {Basics}\&{Overview}}, author = {Pirker, Martin}, year = {2018}, keywords = {FH SP Cyber Security, Institut für IT Sicherheitsforschung, SP IT Sec System \& Application Security, Vortrag}, } @book{pirker_trusted_2018-2, address = {Finse}, title = {Trusted {Computing} {Basics}\&{Overview}}, author = {Pirker, Martin}, year = {2018}, keywords = {FH SP Cyber Security, Institut für IT Sicherheitsforschung, SP IT Sec System \& Application Security, Vortrag}, } @inproceedings{pirker_framework_2012-1, address = {Liverpool, United Kingdom}, title = {A {Framework} for {Privacy}-{Preserving} {Mobile} {Payment} on {Security} {Enhanced} {ARM} {TrustZone} {Platforms}}, isbn = {978-1-4673-2172-3 978-0-7695-4745-9}, url = {http://ieeexplore.ieee.org/document/6296107/}, doi = {10/gh376q}, urldate = {2019-01-24}, booktitle = {2012 {IEEE} 11th {International} {Conference} on {Trust}, {Security} and {Privacy} in {Computing} and {Communications}}, publisher = {IEEE}, author = {Pirker, Martin and Slamanig, Daniel}, month = jun, year = {2012}, keywords = {Extern}, pages = {1155--1160}, } @inproceedings{pammer_security_2014-1, address = {Graz, Austria}, title = {Security concepts for a distributed architecture for activity logging and analysis}, isbn = {978-1-4503-2769-5}, url = {http://dl.acm.org/citation.cfm?doid=2637748.2638426}, doi = {10/gh376n}, language = {en}, urldate = {2019-01-24}, booktitle = {Proceedings of the 14th {International} {Conference} on {Knowledge} {Technologies} and {Data}-driven {Business} - i-{KNOW} '14}, publisher = {ACM Press}, author = {Pammer, Viktoria and Stern, Hermann and Edler, Stefan and Hein, Daniel and Pirker, Martin and Bloem, Roderick and Wertner, Alfred}, year = {2014}, keywords = {Extern}, pages = {1--6}, } @inproceedings{pirker_assessment_2016-1, title = {Assessment of {Server} {State} via {Inter}-{Clone} {Differences}}, doi = {10/gh375j}, publisher = {IEEE}, author = {Pirker, Martin and Nusser, Andreas}, year = {2016}, note = {Projekt: TARGET}, keywords = {Department Technologie, FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Josef Ressel Zentrum TARGET, Publikationstyp Schriftpublikation, peer-reviewed}, } @inproceedings{pirker_work-flow_2016-1, series = {{WWW} '16 {Companion}}, title = {A {Work}-{Flow} for {Empirical} {Exploration} of {Security} {Events}}, url = {http://www2016.net/proceedings/companion/p477.pdf}, doi = {10/gh375h}, booktitle = {25th {International} {Conference} {Companion} on {World} {Wide} {Web}}, publisher = {ACM}, author = {Pirker, Martin and Nusser, Andreas}, year = {2016}, note = {Projekt: TARGET}, keywords = {Department Technologie, FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Josef Ressel Zentrum TARGET, Publikationstyp Schriftpublikation, peer-reviewed}, } @inproceedings{valicek_creation_2017-1, address = {Altoona, PA}, title = {Creation and {Integration} of {Remote} {High} {Interaction} {Honeypots}}, isbn = {978-1-5386-4808-7}, url = {https://ieeexplore.ieee.org/document/8392617/}, doi = {10/gh375g}, urldate = {2019-01-24}, booktitle = {2017 {International} {Conference} on {Software} {Security} and {Assurance} ({ICSSA})}, publisher = {IEEE}, author = {Valicek, Martin and Schramm, Gregor and Pirker, Martin and Schrittwieser, Sebastian}, month = jul, year = {2017}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung}, pages = {50--55}, } @inproceedings{pirker_behavioural_2018-1, address = {Hamburg, Deutschland}, title = {Behavioural {Comparison} of {Systems} for {Anomaly} {Detection}}, doi = {10/gh3734}, booktitle = {Proceedings of the 13th {International} {Conference} on {Availability}, {Reliability} and {Security}}, author = {Pirker, Martin and Kochberger, Patrick and Schwandter, Stefan}, year = {2018}, keywords = {Department Technologie, FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Josef Ressel Zentrum TARGET, Publikationstyp Schriftpublikation, peer-reviewed}, } @misc{pirker_robustes_2019-1, address = {Wien}, title = {Robustes {Parsen} von {Inputdaten}}, url = {https://sec4dev.io/sessions/robustes-parsen-von-inputdaten}, abstract = {In unserer digitalen Welt kommunizieren unterschiedlichste Programme mit Hilfe von vielerlei Datenformaten miteinander. Oft werden Standardformate verwendet (z.B. XML oder JSON) weil diese in den Bibliotheken der gängigen Programmiersprachen leicht verfügbar sind. Mit der Annahme und weiteren Verarbeitung von Daten unbekannter Herkunft (z.B. "von irgendwoher" aus dem Internet) stellt sich auch immer die Sicherheitsfrage: Könnten geschickt manipulierte Daten in meiner Verarbeitung Probleme verursachen? Dieser Vortrag beschäftigt sich mit der Frage wie man Daten robust und sicher ins eigene Programm importieren kann. Oder anders formuliert, mit wieviel Aufwand kann man wie komplexe Daten einlesen und was kann man über die Sicherheit dieses exponierten Programmcodes dann noch aussagen?}, author = {Pirker, Martin}, month = feb, year = {2019}, note = {Projekt: TARGET}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec Applied Security \& Data Science}, } @misc{pirker_trusted_2018-3, address = {Finse}, title = {Trusted {Computing} – {Basics} and {Overview}}, author = {Pirker, Martin}, month = oct, year = {2018}, keywords = {FH SP Cyber Security, Institut für IT Sicherheitsforschung, SP IT Sec System \& Application Security, Vortrag}, } @misc{pirker_data_2020-3, address = {Wien}, title = {Data... on the {Blockchain}?}, url = {https://viennadatasciencegroup.at/}, author = {Pirker, Martin}, month = feb, year = {2020}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec Security Management \& Privacy, Vortrag}, } @misc{pirker_more_2019-1, address = {TU Wien}, type = {Invited {Talk}}, title = {More {Data} - {More} {Security}?}, url = {https://www.eventbrite.com/e/ai-among-us-todays-use-cases-of-applied-ai-tickets-78776670141}, abstract = {Viel mehr Daten, viel mehr Sicherheit? Im Vortrag werden die verschiedenen Stadien der Lösung und Umsetzung eines konkreten ML/AI Problems beleuchtet:Martin Pirker und sein Team wollen die folgende Forschungsfrage beantworten: „könnte man mit Anomaliedetektion neuartige Einbrüche erkennen?“. Dazu werden viele Daten benötigt - hierbei muss die Problematik der persönlichen Daten besonders berücksichtigt werden. Ist dies geschafft, werden die riesigen Datenberge durchforstet und entsprechend organisiert. Eine weitere Hürde ist das Implementierungs-Trade-Offzwischen der Speicher- und Prozessorleistung und den Deployment-Kosten.Am Ende der Entwicklung steht die Integration im kommerziellen Produkt und der "Explainability"der Ergebnisse und Bedienbarkeit für den Kunden}, author = {Pirker, Martin}, month = nov, year = {2019}, note = {Projekt: TARGET}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec Applied Security \& Data Science}, } @misc{pirker_big_2019-1, address = {Wien}, type = {Invited {Talk}}, title = {({Big}) {Data} ({Science}) für {Security}}, url = {https://www.meetup.com/de-DE/Vienna-Data-Science-Group-Meetup/events/259922553/}, author = {Pirker, Martin}, month = mar, year = {2019}, note = {Projekt: TARGET}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec Applied Security \& Data Science}, } @incollection{hutchison_trusted_2013, title = {Trusted {Identity} {Management} for {Overlay} {Networks}}, volume = {7863}, isbn = {978-3-642-38032-7 978-3-642-38033-4}, url = {http://link.springer.com/10.1007/978-3-642-38033-4_2}, urldate = {2019-01-24}, booktitle = {Information {Security} {Practice} and {Experience}}, publisher = {Springer Berlin Heidelberg}, author = {Kraxberger, Stefan and Toegl, Ronald and Pirker, Martin and Guijarro, Elisa Pintado and Millan, Guillermo Garcia}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Deng, Robert H. and Feng, Tao}, year = {2013}, doi = {10.1007/978-3-642-38033-4_2}, keywords = {Extern}, pages = {16--30}, } @incollection{hutchison_practical_2012, address = {Berlin, Heidelberg}, title = {Practical {Privacy} {Preserving} {Cloud} {Resource}-{Payment} for {Constrained} {Clients}}, volume = {7384}, isbn = {978-3-642-31679-1 978-3-642-31680-7}, url = {http://link.springer.com/10.1007/978-3-642-31680-7_11}, urldate = {2019-01-24}, booktitle = {Privacy {Enhancing} {Technologies}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Slamanig, Daniel and Winter, Johannes}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Fischer-Hübner, Simone and Wright, Matthew}, year = {2012}, doi = {10.1007/978-3-642-31680-7_11}, keywords = {Extern}, pages = {201--220}, } @incollection{hutchison_semi-automated_2013, address = {Berlin, Heidelberg}, title = {Semi-automated {Prototyping} of a {TPM} v2 {Software} and {Hardware} {Simulation} {Platform}}, volume = {7904}, isbn = {978-3-642-38907-8 978-3-642-38908-5}, url = {http://link.springer.com/10.1007/978-3-642-38908-5_8}, urldate = {2019-01-24}, booktitle = {Trust and {Trustworthy} {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Winter, Johannes}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Huth, Michael and Asokan, N. and Čapkun, Srdjan and Flechais, Ivan and Coles-Kemp, Lizzie}, year = {2013}, doi = {10.1007/978-3-642-38908-5_8}, keywords = {Extern}, pages = {106--114}, } @incollection{hutchison_lightweight_2012, address = {Berlin, Heidelberg}, title = {Lightweight {Distributed} {Heterogeneous} {Attested} {Android} {Clouds}}, volume = {7344}, isbn = {978-3-642-30920-5 978-3-642-30921-2}, url = {http://link.springer.com/10.1007/978-3-642-30921-2_8}, urldate = {2019-01-24}, booktitle = {Trust and {Trustworthy} {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Winter, Johannes and Toegl, Ronald}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Katzenbeisser, Stefan and Weippl, Edgar and Camp, L. Jean and Volkamer, Melanie and Reiter, Mike and Zhang, Xinwen}, year = {2012}, doi = {10.1007/978-3-642-30921-2_8}, keywords = {Extern}, pages = {122--141}, } @incollection{hutchison_waltzing_2013, address = {Berlin, Heidelberg}, title = {Waltzing the {Bear}, or: {A} {Trusted} {Virtual} {Security} {Module}}, volume = {7868}, isbn = {978-3-642-40011-7 978-3-642-40012-4}, shorttitle = {Waltzing the {Bear}, or}, url = {http://link.springer.com/10.1007/978-3-642-40012-4_10}, urldate = {2019-01-24}, booktitle = {Public {Key} {Infrastructures}, {Services} and {Applications}}, publisher = {Springer Berlin Heidelberg}, author = {Toegl, Ronald and Reimair, Florian and Pirker, Martin}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and De Capitani di Vimercati, Sabrina and Mitchell, Chris}, year = {2013}, doi = {10.1007/978-3-642-40012-4_10}, keywords = {Extern}, pages = {145--160}, } @incollection{hutchison_flexible_2012, address = {Berlin, Heidelberg}, title = {A {Flexible} {Software} {Development} and {Emulation} {Framework} for {ARM} {TrustZone}}, volume = {7222}, isbn = {978-3-642-32297-6 978-3-642-32298-3}, url = {http://link.springer.com/10.1007/978-3-642-32298-3_1}, urldate = {2019-01-24}, booktitle = {Trusted {Systems}}, publisher = {Springer Berlin Heidelberg}, author = {Winter, Johannes and Wiegele, Paul and Pirker, Martin and Tögl, Ronald}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Chen, Liqun and Yung, Moti and Zhu, Liehuang}, year = {2012}, doi = {10.1007/978-3-642-32298-3_1}, keywords = {Extern}, pages = {1--15}, } @misc{pirker_it_2018-1, title = {{IT} {Security} + {Data} {Science} for {Security}}, author = {Pirker, Martin}, month = apr, year = {2018}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Poster, SP IT Sec Applied Security \& Data Science}, } @misc{pirker_jrz_2018-1, title = {{JRZ} {Target}}, author = {Pirker, Martin}, month = apr, year = {2018}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Poster, SP IT Sec System \& Application Security}, } @incollection{gawrock_ongoing_2009, address = {Wiesbaden}, title = {An ongoing {Game} of {Tetris}: {Integrating} {Trusted} {Computing} in {Java}, block-by-block}, isbn = {978-3-8348-0794-6 978-3-8348-9324-6}, shorttitle = {An ongoing {Game} of {Tetris}}, url = {https://link.springer.com/chapter/10.1007/978-3-8348-9324-6_7}, language = {en}, urldate = {2019-01-24}, booktitle = {Future of {Trust} in {Computing}}, publisher = {Vieweg+Teubner}, author = {Toegl, Ronald and Pirker, Martin}, editor = {Gawrock, David and Reimer, Helmut and Sadeghi, Ahmad-Reza and Vishik, Claire}, year = {2009}, doi = {10.1007/978-3-8348-9324-6_7}, keywords = {Extern}, pages = {60--67}, } @incollection{toegl_ongoing_2009, address = {Wiesbaden}, title = {An ongoing {Game} of {Tetris}: {Integrating} {Trusted} {Computing} in {Java}, block-by-block}, isbn = {978-3-8348-0794-6 978-3-8348-9324-6}, shorttitle = {An ongoing {Game} of {Tetris}}, url = {https://link.springer.com/chapter/10.1007/978-3-8348-9324-6_7}, language = {en}, urldate = {2019-01-24}, booktitle = {Future of {Trust} in {Computing}}, publisher = {Vieweg+Teubner}, author = {Toegl, Ronald and Pirker, Martin}, editor = {Gawrock, David and Reimer, Helmut and Sadeghi, Ahmad-Reza and Vishik, Claire}, year = {2009}, doi = {10.1007/978-3-8348-9324-6_7}, keywords = {Extern}, pages = {60--67}, } @article{dietrich_can_2007, title = {Can you {Really} {Trust} your {Computer} {Today}?}, volume = {3}, number = {3}, journal = {ENISA quarterly}, author = {Dietrich, Kurt and Vedjda, Tobias and Tögl, Ronald and Pirker, Martin and Lipp, Peter}, year = {2007}, keywords = {Extern, ⛔ No DOI found}, } @article{dietrich_can_2007-1, title = {Can you {Really} {Trust} your {Computer} {Today}?}, volume = {3}, number = {3}, journal = {ENISA quarterly}, author = {Dietrich, Kurt and Vedjda, Tobias and Tögl, Ronald and Pirker, Martin and Lipp, Peter}, year = {2007}, keywords = {Extern, ⛔ No DOI found}, } @inproceedings{pirker_securing_nodate, title = {Securing the {Linux} {Boot} {Process} – {From} {Start} to {Finish}}, isbn = {978-989-758-491-6}, doi = {10/gpgzsd}, abstract = {The security of the operating system is a prominent feature in today’s Linux distributions. A common security practice is to encrypt the hard drive, to protect the data at rest. The UEFI Forum released the secure boot specification, an optional boot process protocol that improves security during boot up on secure boot enabled hardware. A combination of secure boot with the Linux operating system, along with full disk encryption in an effort to implement maximum security is non-trivial. This paper explores the challenges of this undertaking and reports on a practical evaluation with five major Linux distributions, how far they support these security features by default and what can be improved manually.}, language = {English}, booktitle = {Pro- ceedings of the 7th {International} {Conference} on {Information} {Systems} {Security} and {Privacy} ({ICISSP}), {SCITEPRESS} (link)}, author = {Pirker, Martin and Hagl, Jakob and Mann, Oliver}, note = {Projekt: Blockchain Security}, keywords = {FH SP Cyber Security, Institut für IT Sicherheitsforschung, SP IT Sec Security Management \& Privacy, Vortrag, peer-reviewed}, pages = {604--610}, } @article{gatial_securing_2012, title = {Securing {Agents} {Using} {Secure} {Docking} {Module}}, volume = {No. 15(1) 2012}, url = {http://www.uwm.edu.pl/wnt/technicalsc/tech_15_1/B08.pdf}, journal = {Technical Sciences}, author = {Gatial, Emil and Tögl, Ronald and Pirker, Martin}, year = {2012}, keywords = {Extern, peer-reviewed, ⛔ No DOI found}, } @article{gatial_securing_2012-1, title = {Securing {Agents} {Using} {Secure} {Docking} {Module}}, volume = {No. 15(1) 2012}, url = {http://www.uwm.edu.pl/wnt/technicalsc/tech_15_1/B08.pdf}, journal = {Technical Sciences}, author = {Gatial, Emil and Tögl, Ronald and Pirker, Martin}, year = {2012}, keywords = {Extern, peer-reviewed, ⛔ No DOI found}, } @article{pirker_towards_2010, title = {Towards a {Virtual} {Trusted} {Platform}}, issn = {0948695X}, url = {http://www.jucs.org/jucs_16_4/towards_a_virtual_trusted/jucs_16_04_0531_0542_pirker.pdf}, doi = {10/gh376p}, language = {eng}, number = {4}, urldate = {2019-01-24}, journal = {JUCS - Journal of Universal Computer Science}, author = {Pirker, Martin and Toegl, Ronald}, month = feb, year = {2010}, keywords = {Extern}, } @inproceedings{hein_securing_2012, address = {Raleigh, North Carolina, USA}, title = {Securing mobile agents for crisis management support}, isbn = {978-1-4503-1662-0}, url = {http://dl.acm.org/citation.cfm?doid=2382536.2382550}, doi = {10/gh376m}, language = {en}, urldate = {2019-01-24}, booktitle = {Proceedings of the seventh {ACM} workshop on {Scalable} trusted computing - {STC} '12}, publisher = {ACM Press}, author = {Hein, Daniel M. and Toegl, Ronald and Pirker, Martin and Gatial, Emil and Balogh, Zoltán and Brandl, Hans and Hluchý, Ladislav}, year = {2012}, keywords = {Extern}, pages = {85}, } @inproceedings{pirker_lightweight_2012, address = {Porto, Portugal}, title = {Lightweight {Distributed} {Attestation} {For} {The} {Cloud}}, isbn = {978-989-8565-05-1}, url = {http://www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0003929105800585}, doi = {10/gh376r}, urldate = {2019-01-24}, booktitle = {Proceedings of the 2nd {International} {Conference} on {Cloud} {Computing} and {Services} {Science}}, publisher = {SciTePress - Science and and Technology Publications}, author = {Pirker, Martin and Winter, Johannes and Tögl, Ronald}, year = {2012}, keywords = {Extern}, pages = {580--585}, } @incollection{winter_flexible_2012, address = {Berlin, Heidelberg}, title = {A {Flexible} {Software} {Development} and {Emulation} {Framework} for {ARM} {TrustZone}}, volume = {7222}, isbn = {978-3-642-32297-6 978-3-642-32298-3}, url = {http://link.springer.com/10.1007/978-3-642-32298-3_1}, urldate = {2019-01-24}, booktitle = {Trusted {Systems}}, publisher = {Springer Berlin Heidelberg}, author = {Winter, Johannes and Wiegele, Paul and Pirker, Martin and Tögl, Ronald}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Chen, Liqun and Yung, Moti and Zhu, Liehuang}, year = {2012}, doi = {10.1007/978-3-642-32298-3_1}, keywords = {Extern}, pages = {1--15}, } @incollection{toegl_actvsm_2011, address = {Berlin, Heidelberg}, title = {{acTvSM}: {A} {Dynamic} {Virtualization} {Platform} for {Enforcement} of {Application} {Integrity}}, volume = {6802}, isbn = {978-3-642-25282-2 978-3-642-25283-9}, shorttitle = {{acTvSM}}, url = {http://link.springer.com/10.1007/978-3-642-25283-9_22}, urldate = {2019-01-24}, booktitle = {Trusted {Systems}}, publisher = {Springer Berlin Heidelberg}, author = {Toegl, Ronald and Pirker, Martin and Gissing, Michael}, editor = {Chen, Liqun and Yung, Moti}, year = {2011}, doi = {10.1007/978-3-642-25283-9_22}, keywords = {Extern}, pages = {326--345}, } @incollection{vejda_towards_2008, address = {Berlin, Heidelberg}, title = {Towards {Trust} {Services} for {Language}-{Based} {Virtual} {Machines} for {Grid} {Computing}}, volume = {4968}, isbn = {978-3-540-68978-2 978-3-540-68979-9}, url = {http://link.springer.com/10.1007/978-3-540-68979-9_4}, language = {en}, urldate = {2019-01-24}, booktitle = {Trusted {Computing} - {Challenges} and {Applications}}, publisher = {Springer Berlin Heidelberg}, author = {Vejda, Tobias and Toegl, Ronald and Pirker, Martin and Winkler, Thomas}, editor = {Lipp, Peter and Sadeghi, Ahmad-Reza and Koch, Klaus-Michael}, year = {2008}, doi = {10.1007/978-3-540-68979-9_4}, keywords = {Extern}, pages = {48--59}, } @incollection{pirker_privacyca_2009, address = {Berlin, Heidelberg}, title = {A {PrivacyCA} for {Anonymity} and {Trust}}, volume = {5471}, isbn = {978-3-642-00586-2 978-3-642-00587-9}, url = {http://link.springer.com/10.1007/978-3-642-00587-9_7}, urldate = {2019-01-24}, booktitle = {Trusted {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Toegl, Ronald and Hein, Daniel and Danner, Peter}, editor = {Chen, Liqun and Mitchell, Chris J. and Martin, Andrew}, year = {2009}, doi = {10.1007/978-3-642-00587-9_7}, keywords = {Extern}, pages = {101--119}, } @incollection{pirker_practical_2012, address = {Berlin, Heidelberg}, title = {Practical {Privacy} {Preserving} {Cloud} {Resource}-{Payment} for {Constrained} {Clients}}, volume = {7384}, isbn = {978-3-642-31679-1 978-3-642-31680-7}, url = {http://link.springer.com/10.1007/978-3-642-31680-7_11}, urldate = {2019-01-24}, booktitle = {Privacy {Enhancing} {Technologies}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Slamanig, Daniel and Winter, Johannes}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Fischer-Hübner, Simone and Wright, Matthew}, year = {2012}, doi = {10.1007/978-3-642-31680-7_11}, keywords = {Extern}, pages = {201--220}, } @incollection{pirker_lightweight_2012-1, address = {Berlin, Heidelberg}, title = {Lightweight {Distributed} {Heterogeneous} {Attested} {Android} {Clouds}}, volume = {7344}, isbn = {978-3-642-30920-5 978-3-642-30921-2}, url = {http://link.springer.com/10.1007/978-3-642-30921-2_8}, urldate = {2019-01-24}, booktitle = {Trust and {Trustworthy} {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Winter, Johannes and Toegl, Ronald}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Katzenbeisser, Stefan and Weippl, Edgar and Camp, L. Jean and Volkamer, Melanie and Reiter, Mike and Zhang, Xinwen}, year = {2012}, doi = {10.1007/978-3-642-30921-2_8}, keywords = {Extern}, pages = {122--141}, } @incollection{pirker_dynamic_2010, address = {Berlin, Heidelberg}, title = {Dynamic {Enforcement} of {Platform} {Integrity}}, volume = {6101}, isbn = {978-3-642-13868-3 978-3-642-13869-0}, url = {http://link.springer.com/10.1007/978-3-642-13869-0_18}, urldate = {2019-01-24}, booktitle = {Trust and {Trustworthy} {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Toegl, Ronald and Gissing, Michael}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Acquisti, Alessandro and Smith, Sean W. and Sadeghi, Ahmad-Reza}, year = {2010}, doi = {10.1007/978-3-642-13869-0_18}, keywords = {Extern}, pages = {265--272}, } @incollection{dietrich_practical_2008, address = {Berlin, Heidelberg}, title = {A {Practical} {Approach} for {Establishing} {Trust} {Relationships} between {Remote} {Platforms} {Using} {Trusted} {Computing}}, volume = {4912}, isbn = {978-3-540-78662-7 978-3-540-78663-4}, url = {http://link.springer.com/10.1007/978-3-540-78663-4_12}, language = {en}, urldate = {2019-01-24}, booktitle = {Trustworthy {Global} {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Dietrich, Kurt and Pirker, Martin and Vejda, Tobias and Toegl, Ronald and Winkler, Thomas and Lipp, Peter}, editor = {Barthe, Gilles and Fournet, Cédric}, year = {2008}, doi = {10.1007/978-3-540-78663-4_12}, keywords = {Extern}, pages = {156--168}, } @incollection{gissing_management_2011, address = {Berlin, Heidelberg}, title = {Management of {Integrity}-{Enforced} {Virtual} {Applications}}, volume = {187}, isbn = {978-3-642-22364-8 978-3-642-22365-5}, url = {http://link.springer.com/10.1007/978-3-642-22365-5_17}, urldate = {2019-01-24}, booktitle = {Secure and {Trust} {Computing}, {Data} {Management}, and {Applications}}, publisher = {Springer Berlin Heidelberg}, author = {Gissing, Michael and Toegl, Ronald and Pirker, Martin}, editor = {Lee, Changhoon and Seigneur, Jean-Marc and Park, James J. and Wagner, Roland R.}, year = {2011}, doi = {10.1007/978-3-642-22365-5_17}, keywords = {Extern}, pages = {138--145}, } @inproceedings{pirker_lightweight_2012-2, address = {Porto, Portugal}, title = {Lightweight {Distributed} {Attestation} {For} {The} {Cloud}}, isbn = {978-989-8565-05-1}, url = {http://www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0003929105800585}, doi = {10/gh376r}, urldate = {2019-01-24}, booktitle = {Proceedings of the 2nd {International} {Conference} on {Cloud} {Computing} and {Services} {Science}}, publisher = {SciTePress - Science and and Technology Publications}, author = {Pirker, Martin and Winter, Johannes and Tögl, Ronald}, year = {2012}, keywords = {Extern}, pages = {580--585}, } @article{pirker_towards_2010-1, title = {Towards a {Virtual} {Trusted} {Platform}}, issn = {0948695X}, url = {http://www.jucs.org/jucs_16_4/towards_a_virtual_trusted/jucs_16_04_0531_0542_pirker.pdf}, doi = {10/gh376p}, language = {eng}, number = {4}, urldate = {2019-01-24}, journal = {JUCS - Journal of Universal Computer Science}, author = {Pirker, Martin and Toegl, Ronald}, month = feb, year = {2010}, keywords = {Extern}, } @inproceedings{hein_securing_2012-1, address = {Raleigh, North Carolina, USA}, title = {Securing mobile agents for crisis management support}, isbn = {978-1-4503-1662-0}, url = {http://dl.acm.org/citation.cfm?doid=2382536.2382550}, doi = {10/gh376m}, language = {en}, urldate = {2019-01-24}, booktitle = {Proceedings of the seventh {ACM} workshop on {Scalable} trusted computing - {STC} '12}, publisher = {ACM Press}, author = {Hein, Daniel M. and Toegl, Ronald and Pirker, Martin and Gatial, Emil and Balogh, Zoltán and Brandl, Hans and Hluchý, Ladislav}, year = {2012}, keywords = {Extern}, pages = {85}, } @incollection{barthe_practical_2008, address = {Berlin, Heidelberg}, title = {A {Practical} {Approach} for {Establishing} {Trust} {Relationships} between {Remote} {Platforms} {Using} {Trusted} {Computing}}, volume = {4912}, isbn = {978-3-540-78662-7 978-3-540-78663-4}, url = {http://link.springer.com/10.1007/978-3-540-78663-4_12}, language = {en}, urldate = {2019-01-24}, booktitle = {Trustworthy {Global} {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Dietrich, Kurt and Pirker, Martin and Vejda, Tobias and Toegl, Ronald and Winkler, Thomas and Lipp, Peter}, editor = {Barthe, Gilles and Fournet, Cédric}, year = {2008}, doi = {10.1007/978-3-540-78663-4_12}, keywords = {Extern}, pages = {156--168}, } @incollection{lee_management_2011, address = {Berlin, Heidelberg}, title = {Management of {Integrity}-{Enforced} {Virtual} {Applications}}, volume = {187}, isbn = {978-3-642-22364-8 978-3-642-22365-5}, url = {http://link.springer.com/10.1007/978-3-642-22365-5_17}, urldate = {2019-01-24}, booktitle = {Secure and {Trust} {Computing}, {Data} {Management}, and {Applications}}, publisher = {Springer Berlin Heidelberg}, author = {Gissing, Michael and Toegl, Ronald and Pirker, Martin}, editor = {Lee, Changhoon and Seigneur, Jean-Marc and Park, James J. and Wagner, Roland R.}, year = {2011}, doi = {10.1007/978-3-642-22365-5_17}, keywords = {Extern}, pages = {138--145}, } @incollection{hutchison_dynamic_2010, address = {Berlin, Heidelberg}, title = {Dynamic {Enforcement} of {Platform} {Integrity}}, volume = {6101}, isbn = {978-3-642-13868-3 978-3-642-13869-0}, url = {http://link.springer.com/10.1007/978-3-642-13869-0_18}, urldate = {2019-01-24}, booktitle = {Trust and {Trustworthy} {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Toegl, Ronald and Gissing, Michael}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Acquisti, Alessandro and Smith, Sean W. and Sadeghi, Ahmad-Reza}, year = {2010}, doi = {10.1007/978-3-642-13869-0_18}, keywords = {Extern}, pages = {265--272}, } @incollection{chen_privacyca_2009, address = {Berlin, Heidelberg}, title = {A {PrivacyCA} for {Anonymity} and {Trust}}, volume = {5471}, isbn = {978-3-642-00586-2 978-3-642-00587-9}, url = {http://link.springer.com/10.1007/978-3-642-00587-9_7}, urldate = {2019-01-24}, booktitle = {Trusted {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Toegl, Ronald and Hein, Daniel and Danner, Peter}, editor = {Chen, Liqun and Mitchell, Chris J. and Martin, Andrew}, year = {2009}, doi = {10.1007/978-3-642-00587-9_7}, keywords = {Extern}, pages = {101--119}, } @incollection{chen_actvsm:_2011, address = {Berlin, Heidelberg}, title = {{acTvSM}: {A} {Dynamic} {Virtualization} {Platform} for {Enforcement} of {Application} {Integrity}}, volume = {6802}, isbn = {978-3-642-25282-2 978-3-642-25283-9}, shorttitle = {{acTvSM}}, url = {http://link.springer.com/10.1007/978-3-642-25283-9_22}, urldate = {2019-01-24}, booktitle = {Trusted {Systems}}, publisher = {Springer Berlin Heidelberg}, author = {Toegl, Ronald and Pirker, Martin and Gissing, Michael}, editor = {Chen, Liqun and Yung, Moti}, year = {2011}, doi = {10.1007/978-3-642-25283-9_22}, keywords = {Extern}, pages = {326--345}, } @incollection{lipp_towards_2008, address = {Berlin, Heidelberg}, title = {Towards {Trust} {Services} for {Language}-{Based} {Virtual} {Machines} for {Grid} {Computing}}, volume = {4968}, isbn = {978-3-540-68978-2 978-3-540-68979-9}, url = {http://link.springer.com/10.1007/978-3-540-68979-9_4}, language = {en}, urldate = {2019-01-24}, booktitle = {Trusted {Computing} - {Challenges} and {Applications}}, publisher = {Springer Berlin Heidelberg}, author = {Vejda, Tobias and Toegl, Ronald and Pirker, Martin and Winkler, Thomas}, editor = {Lipp, Peter and Sadeghi, Ahmad-Reza and Koch, Klaus-Michael}, year = {2008}, doi = {10.1007/978-3-540-68979-9_4}, keywords = {Extern}, pages = {48--59}, }