Security Management & Privacy

The focus "Security Management & Privacy" deals with two important topics, which, especially due to the General Data Protection Regulation (GDPR), intervene deeply in organizations as well as the way security has to be integrated into organizations.
Security Management

Security Management pursues the goal of effectively and efficiently implementing compliance and security requirements and coordinating information security activities. The main topics researched in this area include risk and emergency management, measurement and evaluation of information security, and approaches to aligning security strategy with corporate strategy. In addition, there is research in the field of situational awareness and providing operational security insight.

Privacy

The subject area Privacy deals with methods for the protection of personal information. Here, technologies for the protection of privacy as well as the effects of the loss of personal information are discussed. Our activities in this area include the analysis of Privacy Enhancing Technologies (PETs), such as: anonymization networks, web privacy, and cryptographic protocols. Other areas of activity include the misuse of personal information for social engineering attacks and the usability of existing privacy technologies. 

Research Staff

  • Junior Researcher Institute of IT Security Research
  • Department of Computer Science and Security
  • Interim Academic Director IT Security (BA)
  • Academic Director IT Security (BA)
  • Lecturer
  • Department of Computer Science and Security
P: +43/2742/313 228 639
P: +43/676/847 228 639
  • Lecturer
  • Department of Computer Science and Security
P: +43/676/847 228 636
  • Research Assistant Institute of IT Security Research
  • Department of Computer Science and Security
  • Head of Department
  • Academic Director Cyber Security and Resilience (MA)
  • Academic Director Information Security (MA)
  • International Coordinator
  • Department of Computer Science and Security
P: +43/676/847 228 641
  • Research Assistant Institute of IT Security Research
  • Department of Computer Science and Security
P: +43/676/847 228 688

Projects

upribox - Usable Privacy Box

The project "usable privacy box" (upribox) developes a software and creates a device that protects internet privacy and ensures data security.

KIF – Cryptography for Wireless Communication

A highly secure and durable cryptography for wireless communication integrating radio data. – High frequency data transmission may allow for the traffic of the future.

Publications

Pipek, T., & Pirker, M. (2020, December 31). Revisiting the Challenges of Input Parsing for Robust and Secure Software. 2019 International Conference on Software Security and Assurance (ICSSA). ICSSA 2019 (25.-26.07.2019), St. Poelten (Austria). https://doi.org/10/ghwvvb
Pirker, M. (2020, October 30). Data ...in Chains? PrivacyWeek Wien, Wien. https://fahrplan.privacyweek.at/pw20/talk/UQ87MV/
Pirker, M. (2020, February 26). Data... on the Blockchain? Knowledgefeed #33 @ Vienna Data Science Group, Wien. https://viennadatasciencegroup.at/
Tavolato, P., Schölnast, H., & Tavolato-Wötzl, C. (2020). Analytical Modelling of Cyber-Physical Systems Applying Kinetic Gas Theory to Anomaly Detection in Networks. Journal of Computer Virology and Hacking Techniques Volume, Springer Link(16), 93–101. https://link.springer.com/article/10.1007/s11416-020-00349-9
Pirker, M., Lindenhofer, J., & Offenthaler, R. (2020, February 25). A Curious Exploration of Malicious PDF Documents. Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP. 6th International Conference on Information Systems Security and Privacy. https://www.scitepress.org/PublicationsDetail.aspx?ID=a4IHFkdWePg=&t=1
Luh, R., Temper, M., Tjoa, S., Schrittwieser, S., & Janicke, H. (2019). PenQuest: a gamified attacker/defender meta model for cyber security assessment and education. Journal of Computer Virology and Hacking Techniques. https://doi.org/10/gh378z
Schrittwieser, S. (2019, September 26). Sicherheit von Container-Virtualisierung [Invited Talk]. IDC Security Roadshow Vienna, Wien. https://idcitsecurity.com/2019/vienna/
Kieseberg, P. (2019, August 29). Keynote: Authentication of the future - a challenge to privacy? [Invited talk]. BASS-Workshop, Canterbury, United Kingdom.
Luh, R. (2019). Advanced Threat Intelligence: Interpretation of Anomalous Behavior in Ubiquitous Kernel Processes [Dissertation]. De Monfort University Leicester. https://dora.dmu.ac.uk/handle/2086/18527
Piller, E. (2019, June 27). Hochsichere, langzeitige Kryptografie für kabellose Kommunikation mit Integration von Funkmessdaten [Konferenz]. KIRAS Sicherheitskonferenz, Wien. https://www.kiras.at/aktuelles/veranstaltungen/?tx_yag_pi1%5Bc710%5D%5BalbumUid%5D=10&tx_yag_pi1%5Bc710%5D%5BgalleryUid%5D=4&tx_yag_pi1%5BitemListc710%5D%5BpagerCollection%5D%5Bpage%5D=1&tx_yag_pi1%5Baction%5D=list&tx_yag_pi1%5Bcontroller%5D=ItemList&cHash=48055c39eb2e0eda5c01585f88fdfc01
Vitunskaite, M., He, Y., Brandstetter, T., & Janicke, H. (2019). Smart cities and cyber security: Are we there yet?A comparative study on the role of standards, third party risk management and security ownership. Computers & Security, 83, 313–331. https://doi.org/10/gh378x
Wenzl, M., Merzdovnik, G., Ullrich, J., & Weippl, E. (2019). From Hack to Elaborate Technique—A Survey on Binary Rewriting. ACM Computing Surveys, 52(3 / Artikel 49). https://doi.org/10.1145/3316415
Kieseberg, P. (2019, April 24). Die DSGVO und das Problem der Löschung von Daten in Datenbanken. FFH Forum, FH Wiener Neustadt.
Gafic, M. (2019, April 24). Analyse der Wechselwirkungen von Datenschutz und Informationssicherheit unter Verwendung einer DSGVO Ontologie. FFH Forum, FH Wiener Neustadt.
Kieseberg, P. (2019, March 29). Das Darknet. VHS, Science, Planetarium Wien.
Kieseberg, P. (2019, January 29). Privacy Diskussion: Wie viel sind Sie wert? Security Day, FH St. Pölten.
Riegler, B. (2019, January 29). Internet Privacy. Security Day, FH St. Pölten.
Sramec, D. (2018, November 16). Sicherheitsrisiken und Gegenmaßnahmen für DevOps-Umgebungen. IT-SECX, St. Pölten, Austria. https://itsecx.fhstp.ac.at/wp-content/uploads/2018/11/04_Dominik-Sramec_FH-St.-P%C3%B6lten.pdf
Amiri, F., Quirchmayr, G., & Kieseberg, P. (2018). Sensitive Data Anonymization Using Genetic Algorithms for SOM-based Clustering. 9.
Kieseberg, Peter. (2018, September 13). COIN – Big Data Analytics. Beirat, Fachhochschule St. Pölten.
Kieseberg, Peter. (2018, June 21). Underground Marketplaces. Beirat, Fachhochschule St. Pölten.
Kieseberg, Peter. (2018, June 20). Darknet „how to“. Studiengangsbeirat, Fachhochschule St. Pölten.
Kieseberg, Peter. (2018, May 27). Alles unter Kontrolle. Diskussionsrunde Cinema Paradiso, Cinema Paradiso, St. Pölten.
Kieseberg, P. (2018, January 5). Data Literacy. ÖKZ.
Kieseberg, Peter. (2018, April 18). Datenschutz. Dialogmarketing, Fachhochschule St. Pölten.
Kieseberg, P. (2018, April 14). Datenschutzmanagement und - organisation.
Kieseberg, Peter. (2018). Big Data Analytics - Datenschutz in der automatisierten Analyse.
Kieseberg, P. (2018, November 4). Das Darknet. Lecture, Vienna, VHS Urania.
Kieseberg, P. (2018, January 18). Digitale Forensik.
Amiri, F., Quirchmayr, G., & Kieseberg, P. (2018). A Machine Learning Approach for Privacy-preservation in E-business Applications: Proceedings of the 15th International Joint Conference on E-Business and Telecommunications, 443–452. https://doi.org/10/gh38cd
Geko, M., & Tjoa, S. (2018). An Ontology Capturing the Interdependence of the General Data Protection Regulation (GDPR) and Information Security. CECC 2018: Proceedings of the Central European Cybersecurity Conference 2018. CECC 2018: Proceedings of the Central European Cybersecurity Conference 2018, Ljubljana, Slovenia. https://doi.org/10/gfxqw4
Rieger, D., & Tjoa, S. (2018). A Readiness Model for Measuring the Maturity of Cyber Security Incident Management. International Conference on Intelligent Networking and Collaborative Systems (INCoS-2018).
Zamyatin, A., Stifter, N., Judmayer, A., Schindler, P., & Weippl, E. R. (2018). A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice. 5th Workshop on Bitcoin and Blockchain Research. 5th Workshop on Bitcoin and Blockchain Research. https://eprint.iacr.org/2018/087.pdf
Kieseberg, Peter. (2018, April 12). Security & Reproducibility in Health System Research. DEXHELPP, TU Wien.
Goebel, R., Chander, A., Holzinger, K., Lecue, F., Akata, Z., Stumpf, S., Kieseberg, P., & Holzinger, A. (2018). Explainable AI: The New 42? In A. Holzinger, P. Kieseberg, A. M. Tjoa, & E. Weippl (Eds.), Machine Learning and Knowledge Extraction (Vol. 11015, pp. 295–303). Springer International Publishing. https://doi.org/10.1007/978-3-319-99740-7_21
Kieseberg, P. (2018, January 30). Privacy Diskussion: Wie viel sind Sie wert? Security Day, FH St. Pölten.
Österreicher, G. (2018, January 30). Internet Privacy. Security Day, FH St. Pölten.
Weippl, E. (2018). Thema „Sicherer Entwicklungsprozess für Produktionssysteme“ [Keynote]. RuhrSec.
Tjoa, S. (2018). Big Challenges – Future cyber-security challenges and the role of software security and assurance in the era of IoT, industry 4.0 and big data. ICSSA Konferenz, Seoul, South Korea.
Kieseberg, P., Neuner, S., Schrittwieser, S., & Schmiedecker, M. (2017). Real-time Forensics through Endpoint Visibility. International Conference on Digital Forensics & Cyber Crime (ICDF2C). https://www.sba-research.org/wp-content/uploads/publications/fleetForensics.pdf
KAUSPADIENE, L., CENYS, A., GORANIN, N., TJOA, S., & RAMANAUSKAITE, S. (2017). High-Level Self-Sustaining Information Security Management Framework. Baltic J. Modern Computing, 5, 107–123. https://doi.org/10/gh372r
Weippl, E. R. (2017). Wie funktioniert eine Blockchain wirklich. http://idcitsecurity.com/vienna_de/agenda
Weippl, E. (2017). Bitcoins, Crypocurrencies und Smart Contracts. 14. Österreichischer IT-Sicherheitstag, Klagenfurt. https://www.syssec.at/sitag2017prog/
Piller, E. (2017). Blockchains: Von den Potentialen der IT-Sicherheit für den Unternehmenserfolg. Konferenz Blockchain.
Piller, E. (2017). Sicherheit bei Geschäftsmodellen von Anfang an mitdenken. IKT Sicherheitskonferenz des BMLVS, Villach.
Piller, E. (2017). Beschaffung unter Berücksichtigung der IT-Sicherheit, Piller Ernst. Springer Vieweg Verlag.
Haslinger, D., & Lang-Muhr, C. (2016). Business Continuity & Desaster Recovery als Planspiel umgesetzt. Kompetenzorientiert Lehren Und Prüfen. Tag der Lehre, St. Pölten.
Travniček, R., Höllwarth, T., Árpád, G., Haidvogl, G., & Lang-Muhr, C. (2016). Enterprise Mobility - Market, products and technical approaches; relevant organisational and legal aspects. EuroCloud. https://www.eurocloud.at/projekte/publikationen/leitfaeden.html
Tjoa, A. M., & Tjoa, S. (2016). The Role of ICT to Achieve the UN Sustainable Development Goals (SDG). ICT for Promoting Human Development and Protecting the Environment, 3–13. https://doi.org/10.1007/978-3-319-44447-5_1
Österreicher, G., Pötzelsberger, G., & Piller, E. (2016). Moderne Beschaffung mit Berücksichtigung von IT-Security. 214–223.
Brandstetter, T. (2015, January 12). Schlachtfeld Internet – Wenn das Netz zur Waffe wird. TV-Beitrag ARD.
Brandstetter, T. (2015, November 6). Vielgehacktes Österreich vs. Regulatorien: Das neue Cybersicherheitsgesetz [Podiumsdiskussion]. IT-SeCX, St. Pölten, Austria.
Reisinger, P. (2015, November 6). Studie Informationssicherheit in Deutschland, Österreich und der Schweiz 2015. IT-SeCX, St. Pölten, Austria.
Haslinger, D., & Fischer, B. (2015, November 6). Jahresrückblick. IT-SeCX, St. Pölten, Austria.
Hellwig, O., Quirchmayr, G., Huber, E., Mischitz, T., & Huber, M. (2015). Towards a CERT-Communication Model as Basis to Software Assurance. 10th International Conference on Availability, Reliability and Security (ARES).
Koinig, U., Tjoa, S., & Ryoo, J. (2015). Contrology - an ontology-based cloud assurance approach. IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE).
Huber, M. (2015). Prozesse und Werkzeuge zur Veröffentlichung von Sicherheitsempfehlungen. In Sicherheit in Cyber-Netzwerken (pp. 91–106). Springer Verlag.
Piller, E. (2015, November 30). Sachverständigengutachten laut Registrierkassensicherheitsverordnung. Hauptverband der Gerichtssachverständigen, Landesverband Wien, NÖ, Burgenland.
Piller, E. (2015, October 15). Gezielte Cyberangriffe - der Schutz fängt schon bei der Beschaffung an [Key Note]. IT Security Herbst 2015.
Piller, E. (2015, June 24). Gezielte Cyberangriffe auf Unternehmen. Gezielte Cyberangriffe auf Unternehmen - Gefahren und Chancen für Österreichs Wirtschaft.
Piller, E. (2015, September 25). Herausforderungen der Digitalisierung [Festrede]. European Researchers Night.
Tjoa, S., & Rybnicek, M. (2015). Modellierung und Simulation kritischer IKT Infrastrukturen und deren Abhängigkeiten. In Cyber Attack Information System - Erfahrungen und Erkenntnisse aus der IKT-Sicherheitsforschung. Vieweg+Teubner Verlag.
Rybnicek, M., Tjoa, S., & Poisel, R. (2014). Simulation-based Cyber-Attack Assessment of Critical Infrastructures. Lecture Notes in Business Information Processing. 10th International Workshop on Enterprise & Organizational Modeling and Simulation (EOMAS 2014), Thessaloniki, Griechenland.
Kieseberg, P., Schrittwieser, S., Mulazzani, M., Echizen, I., & Weippl, E. (2014). An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata. Special Issue on Security and Privacy in Business Networking.
Wöhrer, A., Kaniovskyi, Y., & Kobler, M. (2013). Modding and Cloud Gaming: Business Considerations and Technical Aspects. International Conference on Internet and Web Applications and Services (ICIW).
Schrattenholzer, M., Ruzicka, M., Rybnicek, M., Poisel, R., & Tjoa, S. (2013). Wer spielt gewinnt. D-A-CH Security.
Rybnicek, M., Poisel, R., Ruzicka, M., & Tjoa, S. (2012). A Generic Approach to Critical Infrastructures Modeling and Simulation. ASE International Conference on Cyber Security.
Piller, E. (2012). Netzbasierte Infrastrukturleistungsmodelle und deren Übertragbarkeit auf IP-Infrastrukturn. In Netzneutralität und Netzbewirtschaftung - Multimedia in Telekommunikationsnetzwerken (pp. 137–147). Nomos Verlag.
Tjoa, S., Jakoubi, S., Goluch, G., Kitzler, G., Goluch, S., & Quirchmayr, G. (2011). A Formal Approach Enabling Risk-aware Business Process Modeling and Simulation. IEEE Transactions on Services Computing, 4(2), 153–166.
Jakoubi, S., Tjoa, S., Goluch, S., & Kitzler, G. (2010). Risk-Aware Business Process Management - Establishing the Link Between Business and Security. In Complex Intelligent Systems and Their Applications (Vol. 41, pp. 109–135). Springer-Verlag.
Fischer, B. (2010). Ein anonymes Service sicher betreiben mit OnionCat. Hackin9, 3.
Fischer, B. (2010). Ein Anonymes Internet. Hackin9, 2.
Tjoa, S., Jakoubi, S., Goluch, S., & Kitzler, G. (2010). Planning Dynamic Activity and Resource Allocations Using a Risk-Aware Business Process Management Approach. International Conference on Availability, Reliability, and Security (ARES"10), 268–274.
Jakoubi, S., Tjoa, S., Goluch, S., & Kitzler, G. (2010). A Formal Approach Towards Risk-Aware Service Level Analysis and Planning. International Conference on Availability, Reliability, and Security (ARES"10), 180–187.
Jakoubi, S., Neubauer, T., & Tjoa, S. (2009). A roadmap to risk-aware business process management. IEEE Asia-Pacific Services Computing Conference (IEEE APSCC"09), 23–27.
Fischer, B. (2009). OnionCat - An anonymous Internet Overlay. Privacy Enhancing Technologies Convention, 1–8.
Fischer, B. (2008). OnionCat - A Tor-based Anonymous VPN. 25th Chaos Communication Congress-Nothing to Hide, 1–6.