Zurück

Dipl.-Ing. Dr. Martin Pirker Bakk.

  • Senior Researcher
    Josef Ressel-Zentrum für konsolidierte Erkennung gezielter Angriffe
  • Department Informatik und Security
Arbeitsplatz: D - Heinrich Schneidmadl-Straße 15
T: +43/2742/313 228 690

Studiengänge

  • Information Security (MA)
  • IT Security (BA)

Departments

  • Informatik und Security

Download CV

Ausgewählte Publikationen

Pirker, M., Kochberger, P., & Schwandter, S. (2018). Behavioural Comparison of Systems for Anomaly Detection. In Proceedings of the 13th International Conference on Availability, Reliability and Security. Hamburg, Deutschland.
Pirker, M., & Nusser, A. (2016). A Work-Flow for Empirical Exploration of Security Events. In 25th International Conference Companion on World Wide Web. ACM. https://doi.org/10.1145/2872518.2888607
Pirker, M., & Nusser, A. (2016). Assessment of Server State via Inter-Clone Differences. Presented at the 2016 International Conference on Software Security and Assurance (ICSSA), IEEE.

Projekte

Publikationen

Pirker, M. (2018, April 12). IT Security + Data Science for Security.
Pirker, M. (2018, September). Trusted Computing – Basics and Overview. Presented at the COINS Winter School, Finse.
Pirker, M. (2018, June). Trusted Computing Basics&Overview. Presented at the COINS information security winter school, Finse.
Pirker, M. (2018, April 13). JRZ Target.
Pirker, M., Kochberger, P., & Schwandter, S. (2018). Behavioural Comparison of Systems for Anomaly Detection. In Proceedings of the 13th International Conference on Availability, Reliability and Security. Hamburg, Deutschland.
Valicek, M., Schramm, G., Pirker, M., & Schrittwieser, S. (2017). Creation and Integration of Remote High Interaction Honeypots. In 2017 International Conference on Software Security and Assurance (ICSSA) (pp. 50–55). Altoona, PA: IEEE. https://doi.org/10.1109/ICSSA.2017.21
Pirker, M., & Nusser, A. (2016). A Work-Flow for Empirical Exploration of Security Events. In 25th International Conference Companion on World Wide Web. ACM. https://doi.org/10.1145/2872518.2888607
Pirker, M., & Nusser, A. (2016). Assessment of Server State via Inter-Clone Differences. Presented at the 2016 International Conference on Software Security and Assurance (ICSSA), IEEE.
Pammer, V., Stern, H., Edler, S., Hein, D., Pirker, M., Bloem, R., & Wertner, A. (2014). Security concepts for a distributed architecture for activity logging and analysis. In Proceedings of the 14th International Conference on Knowledge Technologies and Data-driven Business - i-KNOW "14 (pp. 1–6). Graz, Austria: ACM Press. https://doi.org/10.1145/2637748.2638426
Balogh, Z., Gatial, E., Hluch, L., Tögl, R., Pirker, M., & Hein, D. (2014). Agent-Based Cloud Resource Management for Secure Cloud Infrastructures. Computing and Informatics, 33, 1333–1355.
Kraxberger, S., Toegl, R., Pirker, M., Guijarro, E. P., & Millan, G. G. (2013). Trusted Identity Management for Overlay Networks. In R. H. Deng & T. Feng (Eds.), Information Security Practice and Experience (Vol. 7863, pp. 16–30). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-38033-4_2
Pirker, M., & Winter, J. (2013). Semi-automated Prototyping of a TPM v2 Software and Hardware Simulation Platform. In M. Huth, N. Asokan, S. Čapkun, I. Flechais, & L. Coles-Kemp (Eds.), Trust and Trustworthy Computing (Vol. 7904, pp. 106–114). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-38908-5_8
Toegl, R., Reimair, F., & Pirker, M. (2013). Waltzing the Bear, or: A Trusted Virtual Security Module. In S. De Capitani di Vimercati & C. Mitchell (Eds.), Public Key Infrastructures, Services and Applications (Vol. 7868, pp. 145–160). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-40012-4_10
Pirker, M., & Slamanig, D. (2012). A Framework for Privacy-Preserving Mobile Payment on Security Enhanced ARM TrustZone Platforms. In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 1155–1160). Liverpool, United Kingdom: IEEE. https://doi.org/10.1109/TrustCom.2012.28
Pirker, M., Slamanig, D., & Winter, J. (2012). Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients. In S. Fischer-Hübner & M. Wright (Eds.), Privacy Enhancing Technologies (Vol. 7384, pp. 201–220). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-31680-7_11
Hein, D. M., Toegl, R., Pirker, M., Gatial, E., Balogh, Z., Brandl, H., & Hluchý, L. (2012). Securing mobile agents for crisis management support. In Proceedings of the seventh ACM workshop on Scalable trusted computing - STC "12 (p. 85). Raleigh, North Carolina, USA: ACM Press. https://doi.org/10.1145/2382536.2382550
Gatial, E., Tögl, R., & Pirker, M. (2012). Securing Agents Using Secure Docking Module. Technical Sciences, No. 15(1) 2012.
Winter, J., Wiegele, P., Pirker, M., & Tögl, R. (2012). A Flexible Software Development and Emulation Framework for ARM TrustZone. In L. Chen, M. Yung, & L. Zhu (Eds.), Trusted Systems (Vol. 7222, pp. 1–15). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-32298-3_1
Pirker, M., Winter, J., & Toegl, R. (2012). Lightweight Distributed Heterogeneous Attested Android Clouds. In S. Katzenbeisser, E. Weippl, L. J. Camp, M. Volkamer, M. Reiter, & X. Zhang (Eds.), Trust and Trustworthy Computing (Vol. 7344, pp. 122–141). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-30921-2_8
Pirker, M., Winter, J., & Tögl, R. (2012). Lightweight Distributed Attestation For The Cloud. In Proceedings of the 2nd International Conference on Cloud Computing and Services Science (pp. 580–585). Porto, Portugal: SciTePress - Science and and Technology Publications. https://doi.org/10.5220/0003929105800585
Gissing, M., Toegl, R., & Pirker, M. (2011). Management of Integrity-Enforced Virtual Applications. In C. Lee, J.-M. Seigneur, J. J. Park, & R. R. Wagner (Eds.), Secure and Trust Computing, Data Management, and Applications (Vol. 187, pp. 138–145). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-22365-5_17
Toegl, R., Pirker, M., & Gissing, M. (2011). acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity. In L. Chen & M. Yung (Eds.), Trusted Systems (Vol. 6802, pp. 326–345). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-25283-9_22
Pirker, M., & Toegl, R. (2010). Towards a Virtual Trusted Platform. JUCS - Journal of Universal Computer Science, (4). https://doi.org/10.3217/jucs-016-04-0531
Pirker, M., Toegl, R., & Gissing, M. (2010). Dynamic Enforcement of Platform Integrity. In A. Acquisti, S. W. Smith, & A.-R. Sadeghi (Eds.), Trust and Trustworthy Computing (Vol. 6101, pp. 265–272). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-13869-0_18
Toegl, R., & Pirker, M. (2009). An ongoing Game of Tetris: Integrating Trusted Computing in Java, block-by-block. In D. Gawrock, H. Reimer, A.-R. Sadeghi, & C. Vishik (Eds.), Future of Trust in Computing (pp. 60–67). Wiesbaden: Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9324-6_7
Pirker, M., Toegl, R., Hein, D., & Danner, P. (2009). A PrivacyCA for Anonymity and Trust. In L. Chen, C. J. Mitchell, & A. Martin (Eds.), Trusted Computing (Vol. 5471, pp. 101–119). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-00587-9_7
Dietrich, K., Pirker, M., Vejda, T., Toegl, R., Winkler, T., & Lipp, P. (2008). A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing. In G. Barthe & C. Fournet (Eds.), Trustworthy Global Computing (Vol. 4912, pp. 156–168). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-78663-4_12
Vejda, T., Toegl, R., Pirker, M., & Winkler, T. (2008). Towards Trust Services for Language-Based Virtual Machines for Grid Computing. In P. Lipp, A.-R. Sadeghi, & K.-M. Koch (Eds.), Trusted Computing - Challenges and Applications (Vol. 4968, pp. 48–59). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-68979-9_4
Dietrich, K., Vedjda, T., Tögl, R., Pirker, M., & Lipp, P. (2007). Can you Really Trust your Computer Today? ENISA Quarterly, 3(3).