Team

FH-Prof. Dipl.-Ing. Dr. Martin Pirker Bakk.

  • Senior Researcher
    Josef Ressel Zentrum für Blockchain-Technologien und Sicherheitsmanagement
  • Department Informatik und Security
Arbeitsplatz: B - Campus-Platz 1
T: +43/2742/313 228 690

Studiengänge

  • IT Security (BA)
  • Cyber Security and Resilience (MA)
  • Information Security (MA)

Departments

  • Informatik und Security

Download CV

Ausgewählte Publikationen

Projekte

Publikationen

Pirker, M. (2021, October 29). Secure Messaging - Revisited [Online Stream]. Privacyweek, Vienna.
Pirker, M., & Piller, E. (2021, August 17). Obstacles and Challenges in Transforming Applications for Distributed Data Ledger Integration. Proceedings of the 16th International Workshop on Frontiers in Availability, Reli- Ability and Security (FARES). ARES 2021: The 16th International Conference on Availability, Reliability and Security. https://doi.org/10/gn622r
Eigner, O., Eresheim, S., Kieseberg, P., Klausner, L. D., Pirker, M., Priebe, T., Tjoa, S., Marulli, F., Mercaldo, F., & Priebe, T. (2021). Towards Resilient Artificial Intelligence: Survey and Research Issues. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience, 536–542. https://doi.org/10.1109/CSR51186.2021.9527986
Pipek, T., & Pirker, M. (2020, Dezember). Revisiting the Challenges of Input Parsing for Robust and Secure Software. 2019 International Conference on Software Security and Assurance (ICSSA). https://doi.org/10/ghwvvb
Pirker, M. (2020, October 30). Data ...in Chains? PrivacyWeek Wien, Wien. https://fahrplan.privacyweek.at/pw20/talk/UQ87MV/
Pirker, M. (2020). Data ...in Chains? https://fahrplan.privacyweek.at/pw20/talk/UQ87MV/
Pirker, M. (2020, February 26). Data... on the Blockchain? Knowledgefeed #33 @ Vienna Data Science Group, Wien. https://viennadatasciencegroup.at/
Pirker, M. (2020). Data... on the Blockchain? https://viennadatasciencegroup.at/
Pirker, M., Lindenhofer, J., & Offenthaler, R. (2020, February). A Curious Exploration of Malicious PDF Documents. Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP. https://www.scitepress.org/PublicationsDetail.aspx?ID=a4IHFkdWePg=&t=1
Pirker, M., Lindenhofer, J., & Offenthaler, R. (2020, February 25). A Curious Exploration of Malicious PDF Documents. Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP. 6th International Conference on Information Systems Security and Privacy. https://www.scitepress.org/PublicationsDetail.aspx?ID=a4IHFkdWePg=&t=1
Pirker, M. (2019, November 22). More Data - More Security? [Invited Talk]. TOP Alumni Club, TU Wien. https://www.eventbrite.com/e/ai-among-us-todays-use-cases-of-applied-ai-tickets-78776670141
Pirker, M. (2019). More Data - More Security? https://www.eventbrite.com/e/ai-among-us-todays-use-cases-of-applied-ai-tickets-78776670141
Pirker, M. (2019, October 23). Digitale Probleme....für Alle! PrivacyWeek, Wien. https://fahrplan.privacyweek.at/pw19/talk/N98QNQ/
Pirker, M. (2019). Digitale Probleme....für Alle! https://fahrplan.privacyweek.at/pw19/talk/N98QNQ/
Pirker, M. (2019, March 29). (Big) Data (Science) für Security [Invited Talk]. Vienna Data Science Group, Wien. https://www.meetup.com/de-DE/Vienna-Data-Science-Group-Meetup/events/259922553/
Pirker, M. (2019). (Big) Data (Science) für Security. https://www.meetup.com/de-DE/Vienna-Data-Science-Group-Meetup/events/259922553/
Pirker, M. (2019, February 26). Robustes Parsen von Inputdaten. Sec4dev, Wien. https://sec4dev.io/sessions/robustes-parsen-von-inputdaten
Pirker, M. (2019). Robustes Parsen von Inputdaten. https://sec4dev.io/sessions/robustes-parsen-von-inputdaten
Pipek, T., & Pirker, M. (2019). Revisiting the Challenges of Input Parsing for Robust and Secure Software. 2019 International Conference on Software Security and Assurance (ICSSA). ICSSA 2019 (25.-26.07.2019), St. Poelten (Austria). https://doi.org/10/ghwvvb
Pirker, M. (2018). IT Security + Data Science for Security.
Pirker, M. (2018, May 10). Trusted Computing Basics&Overview. COINS information security winter school, Finse.
Pirker, M. (2018, October 5). Trusted Computing – Basics and Overview. COINS Winter School, Finse.
Pirker, M. (2018). Trusted Computing Basics&Overview.
Pirker, M. (2018). Trusted Computing Basics&Overview.
Pirker, M. (2018). JRZ Target.
Pirker, M. (2018). IT Security + Data Science for Security.
Pirker, M. (2018). JRZ Target.
Pirker, M., Kochberger, P., & Schwandter, S. (2018). Behavioural Comparison of Systems for Anomaly Detection. Proceedings of the 13th International Conference on Availability, Reliability and Security. https://doi.org/10/gh3734
Pirker, M., Kochberger, P., & Schwandter, S. (2018). Behavioural Comparison of Systems for Anomaly Detection. Proceedings of the 13th International Conference on Availability, Reliability and Security. ARES 2018, Hamburg, Deutschland. https://doi.org/10/gh3734
Valicek, M., Schramm, G., Pirker, M., & Schrittwieser, S. (2017). Creation and Integration of Remote High Interaction Honeypots. 2017 International Conference on Software Security and Assurance (ICSSA), 50–55. https://doi.org/10/gh375g
Valicek, M., Schramm, G., Pirker, M., & Schrittwieser, S. (2017). Creation and Integration of Remote High Interaction Honeypots. 2017 International Conference on Software Security and Assurance (ICSSA), 50–55. https://doi.org/10/gh375g
Pirker, M., & Nusser, A. (2016). A Work-Flow for Empirical Exploration of Security Events. 25th International Conference Companion on World Wide Web. https://doi.org/10/gh375h
Pirker, M., & Nusser, A. (2016). Assessment of Server State via Inter-Clone Differences. https://doi.org/10/gh375j
Pirker, M., & Nusser, A. (2016). A Work-Flow for Empirical Exploration of Security Events. 25th International Conference Companion on World Wide Web. 25th International Conference Companion on World Wide Web. https://doi.org/10/gh375h
Pirker, M., & Nusser, A. (2016). Assessment of Server State via Inter-Clone Differences. 2016 International Conference on Software Security and Assurance (ICSSA). https://doi.org/10/gh375j
Balogh, Z., Gatial, E., Hluch, L., Tögl, R., Pirker, M., & Hein, D. (2014). Agent-Based Cloud Resource Management for Secure Cloud Infrastructures. Computing and Informatics, 33, 1333–1355. https://cai.type.sk/content/2014/6/agent-based-cloud-resource-management-for-secure-cloud-infrastructures/
Pammer, V., Stern, H., Edler, S., Hein, D., Pirker, M., Bloem, R., & Wertner, A. (2014). Security concepts for a distributed architecture for activity logging and analysis. Proceedings of the 14th International Conference on Knowledge Technologies and Data-Driven Business - i-KNOW "14, 1–6. https://doi.org/10/gh376n
Balogh, Z., Gatial, E., Hluch, L., Tögl, R., Pirker, M., & Hein, D. (2014). Agent-Based Cloud Resource Management for Secure Cloud Infrastructures. Computing and Informatics, 33, 1333–1355. https://cai.type.sk/content/2014/6/agent-based-cloud-resource-management-for-secure-cloud-infrastructures/
Pammer, V., Stern, H., Edler, S., Hein, D., Pirker, M., Bloem, R., & Wertner, A. (2014). Security concepts for a distributed architecture for activity logging and analysis. Proceedings of the 14th International Conference on Knowledge Technologies and Data-Driven Business - i-KNOW "14, 1–6. https://doi.org/10/gh376n
Pirker, M., & Winter, J. (2013). Semi-automated Prototyping of a TPM v2 Software and Hardware Simulation Platform. In M. Huth, N. Asokan, S. Čapkun, I. Flechais, & L. Coles-Kemp (Eds.), Trust and Trustworthy Computing (Vol. 7904, pp. 106–114). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-38908-5_8
Kraxberger, S., Toegl, R., Pirker, M., Guijarro, E. P., & Millan, G. G. (2013). Trusted Identity Management for Overlay Networks. In R. H. Deng & T. Feng (Eds.), Information Security Practice and Experience (Vol. 7863, pp. 16–30). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-38033-4_2
Toegl, R., Reimair, F., & Pirker, M. (2013). Waltzing the Bear, or: A Trusted Virtual Security Module. In S. De Capitani di Vimercati & C. Mitchell (Eds.), Public Key Infrastructures, Services and Applications (Vol. 7868, pp. 145–160). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-40012-4_10
Kraxberger, S., Toegl, R., Pirker, M., Guijarro, E. P., & Millan, G. G. (2013). Trusted Identity Management for Overlay Networks. In D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, R. H. Deng, & T. Feng (Eds.), Information Security Practice and Experience (Vol. 7863, pp. 16–30). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-38033-4_2
Pirker, M., & Winter, J. (2013). Semi-automated Prototyping of a TPM v2 Software and Hardware Simulation Platform. In D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, M. Huth, N. Asokan, S. Čapkun, I. Flechais, & L. Coles-Kemp (Eds.), Trust and Trustworthy Computing (Vol. 7904, pp. 106–114). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-38908-5_8
Toegl, R., Reimair, F., & Pirker, M. (2013). Waltzing the Bear, or: A Trusted Virtual Security Module. In D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, S. De Capitani di Vimercati, & C. Mitchell (Eds.), Public Key Infrastructures, Services and Applications (Vol. 7868, pp. 145–160). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-40012-4_10
Pirker, M., & Slamanig, D. (2012). A Framework for Privacy-Preserving Mobile Payment on Security Enhanced ARM TrustZone Platforms. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 1155–1160. https://doi.org/10/gh376q
Pirker, M., & Slamanig, D. (2012). A Framework for Privacy-Preserving Mobile Payment on Security Enhanced ARM TrustZone Platforms. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 1155–1160. https://doi.org/10/gh376q
Pirker, M., Winter, J., & Toegl, R. (2012). Lightweight Distributed Heterogeneous Attested Android Clouds. In S. Katzenbeisser, E. Weippl, L. J. Camp, M. Volkamer, M. Reiter, & X. Zhang (Eds.), Trust and Trustworthy Computing (Vol. 7344, pp. 122–141). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-30921-2_8
Pirker, M., Slamanig, D., & Winter, J. (2012). Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients. In S. Fischer-Hübner & M. Wright (Eds.), Privacy Enhancing Technologies (Vol. 7384, pp. 201–220). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-31680-7_11
Winter, J., Wiegele, P., Pirker, M., & Tögl, R. (2012). A Flexible Software Development and Emulation Framework for ARM TrustZone. In L. Chen, M. Yung, & L. Zhu (Eds.), Trusted Systems (Vol. 7222, pp. 1–15). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-32298-3_1
Gatial, E., Tögl, R., & Pirker, M. (2012). Securing Agents Using Secure Docking Module. Technical Sciences, No. 15(1) 2012. http://www.uwm.edu.pl/wnt/technicalsc/tech_15_1/B08.pdf
Hein, D. M., Toegl, R., Pirker, M., Gatial, E., Balogh, Z., Brandl, H., & Hluchý, L. (2012). Securing mobile agents for crisis management support. Proceedings of the Seventh ACM Workshop on Scalable Trusted Computing - STC "12, 85. https://doi.org/10/gh376m
Pirker, M., Winter, J., & Tögl, R. (2012). Lightweight Distributed Attestation For The Cloud. Proceedings of the 2nd International Conference on Cloud Computing and Services Science, 580–585. https://doi.org/10/gh376r
Gatial, E., Tögl, R., & Pirker, M. (2012). Securing Agents Using Secure Docking Module. Technical Sciences, No. 15(1) 2012. http://www.uwm.edu.pl/wnt/technicalsc/tech_15_1/B08.pdf
Hein, D. M., Toegl, R., Pirker, M., Gatial, E., Balogh, Z., Brandl, H., & Hluchý, L. (2012). Securing mobile agents for crisis management support. Proceedings of the Seventh ACM Workshop on Scalable Trusted Computing - STC "12, 85. https://doi.org/10/gh376m
Pirker, M., Winter, J., & Tögl, R. (2012). Lightweight Distributed Attestation For The Cloud. Proceedings of the 2nd International Conference on Cloud Computing and Services Science, 580–585. https://doi.org/10/gh376r
Pirker, M., Winter, J., & Toegl, R. (2012). Lightweight Distributed Heterogeneous Attested Android Clouds. In D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, S. Katzenbeisser, E. Weippl, L. J. Camp, M. Volkamer, … X. Zhang (Eds.), Trust and Trustworthy Computing (Vol. 7344, pp. 122–141). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-30921-2_8
Winter, J., Wiegele, P., Pirker, M., & Tögl, R. (2012). A Flexible Software Development and Emulation Framework for ARM TrustZone. In D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, L. Chen, M. Yung, & L. Zhu (Eds.), Trusted Systems (Vol. 7222, pp. 1–15). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-32298-3_1
Pirker, M., Slamanig, D., & Winter, J. (2012). Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients. In D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, S. Fischer-Hübner, & M. Wright (Eds.), Privacy Enhancing Technologies (Vol. 7384, pp. 201–220). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-31680-7_11
Toegl, R., Pirker, M., & Gissing, M. (2011). acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity. In L. Chen & M. Yung (Eds.), Trusted Systems (Vol. 6802, pp. 326–345). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-25283-9_22
Gissing, M., Toegl, R., & Pirker, M. (2011). Management of Integrity-Enforced Virtual Applications. In C. Lee, J.-M. Seigneur, J. J. Park, & R. R. Wagner (Eds.), Secure and Trust Computing, Data Management, and Applications (Vol. 187, pp. 138–145). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-22365-5_17
Gissing, M., Toegl, R., & Pirker, M. (2011). Management of Integrity-Enforced Virtual Applications. In C. Lee, J.-M. Seigneur, J. J. Park, & R. R. Wagner (Eds.), Secure and Trust Computing, Data Management, and Applications (Vol. 187, pp. 138–145). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-22365-5_17
Toegl, R., Pirker, M., & Gissing, M. (2011). acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity. In L. Chen & M. Yung (Eds.), Trusted Systems (Vol. 6802, pp. 326–345). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-25283-9_22
Pirker, M., & Toegl, R. (2010). Towards a Virtual Trusted Platform. JUCS - Journal of Universal Computer Science, 4. https://doi.org/10/gh376p
Pirker, M., & Toegl, R. (2010). Towards a Virtual Trusted Platform. JUCS - Journal of Universal Computer Science, 4. https://doi.org/10/gh376p
Pirker, M., Toegl, R., & Gissing, M. (2010). Dynamic Enforcement of Platform Integrity. In A. Acquisti, S. W. Smith, & A.-R. Sadeghi (Eds.), Trust and Trustworthy Computing (Vol. 6101, pp. 265–272). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-13869-0_18
Pirker, M., Toegl, R., & Gissing, M. (2010). Dynamic Enforcement of Platform Integrity. In D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, A. Acquisti, S. W. Smith, & A.-R. Sadeghi (Eds.), Trust and Trustworthy Computing (Vol. 6101, pp. 265–272). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-13869-0_18
Toegl, R., & Pirker, M. (2009). An ongoing Game of Tetris: Integrating Trusted Computing in Java, block-by-block. In D. Gawrock, H. Reimer, A.-R. Sadeghi, & C. Vishik (Eds.), Future of Trust in Computing (pp. 60–67). Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9324-6_7
Pirker, M., Toegl, R., Hein, D., & Danner, P. (2009). A PrivacyCA for Anonymity and Trust. In L. Chen, C. J. Mitchell, & A. Martin (Eds.), Trusted Computing (Vol. 5471, pp. 101–119). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-00587-9_7
Toegl, R., & Pirker, M. (2009). An ongoing Game of Tetris: Integrating Trusted Computing in Java, block-by-block. In D. Gawrock, H. Reimer, A.-R. Sadeghi, & C. Vishik (Eds.), Future of Trust in Computing (pp. 60–67). Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9324-6_7
Pirker, M., Toegl, R., Hein, D., & Danner, P. (2009). A PrivacyCA for Anonymity and Trust. In L. Chen, C. J. Mitchell, & A. Martin (Eds.), Trusted Computing (Vol. 5471, pp. 101–119). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-00587-9_7
Dietrich, K., Pirker, M., Vejda, T., Toegl, R., Winkler, T., & Lipp, P. (2008). A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing. In G. Barthe & C. Fournet (Eds.), Trustworthy Global Computing (Vol. 4912, pp. 156–168). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-78663-4_12
Vejda, T., Toegl, R., Pirker, M., & Winkler, T. (2008). Towards Trust Services for Language-Based Virtual Machines for Grid Computing. In P. Lipp, A.-R. Sadeghi, & K.-M. Koch (Eds.), Trusted Computing - Challenges and Applications (Vol. 4968, pp. 48–59). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-68979-9_4
Dietrich, K., Pirker, M., Vejda, T., Toegl, R., Winkler, T., & Lipp, P. (2008). A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing. In G. Barthe & C. Fournet (Eds.), Trustworthy Global Computing (Vol. 4912, pp. 156–168). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-78663-4_12
Vejda, T., Toegl, R., Pirker, M., & Winkler, T. (2008). Towards Trust Services for Language-Based Virtual Machines for Grid Computing. In P. Lipp, A.-R. Sadeghi, & K.-M. Koch (Eds.), Trusted Computing - Challenges and Applications (Vol. 4968, pp. 48–59). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-68979-9_4
Dietrich, K., Vedjda, T., Tögl, R., Pirker, M., & Lipp, P. (2007). Can you Really Trust your Computer Today? ENISA Quarterly, 3(3). https://www.enisa.europa.eu/publications/eqr-archive/issues/eqr-q3-2007-vol.-3-no.-3/at_download/issue
Dietrich, K., Vedjda, T., Tögl, R., Pirker, M., & Lipp, P. (2007). Can you Really Trust your Computer Today? ENISA Quarterly, 3(3). https://www.enisa.europa.eu/publications/eqr-archive/issues/eqr-q3-2007-vol.-3-no.-3/at_download/issue
Pirker, M., Hagl, J., & Mann, O. (n.d.). Securing the Linux Boot Process – From Start to Finish. Pro- Ceedings of the 7th International Conference on Information Systems Security and Privacy (ICISSP), SCITEPRESS (Link), 604–610. https://doi.org/10/gpgzsd