Zurück

FH-Prof. Dipl.-Ing. Dr. Martin Pirker Bakk.

  • Senior Researcher
    Josef Ressel Zentrum für Blockchain-Technologien und Sicherheitsmanagement
Arbeitsplatz: B - Campus-Platz 1
T: +43/2742/313 228 690
M: +43/676/847 228 690

Studiengänge

  • Cyber Security and Resilience (MA)
  • IT Security (BA)
  • Information Security (MA)

Departments

  • Informatik und Security

Download CV

Projekte

Publikationen

Pirker, M., & Haas, R. (2024). The State of Boot Integrity on Linux - a Brief Review. ARES "24: Proceedings of the 19th International Conference on Availability, Reliability and Security, 1–6. https://doi.org/10.1145/3664476.3670910
Pirker, M., & Haas, R. (2024). A Brief Reflection on Trusted Platform Module Support. Proceedings of the 10th International Conference on Information Systems Security and Privacy, 890–898. https://doi.org/10.5220/0012466400003648
Pirker, M. (2024, February 28). A Brief Reflection on Trusted Platform Module Support [Vortrag]. 10th International Conference on Information Systems Security and Privacy, Rome, Italy.
König, L., Pirker, M., Geyer, H., Feldmann, M., Tjoa, S., & Kieseberg, P. (2023). DISA - A Blockchain-Based Distributed Information Security Audit. Information Integration and Web Intelligence, 27–34. https://doi.org/10.1007/978-3-031-48316-5_4
Pirker, M. (2023, April 20). Digitale Technologien Verbindung und Vernetzen – auf immer neuen Wegen. 16. Forschungsforum der Österreichischen Fachhochschulen, St. Pölten (Austria). http://ffhoarep.fh-ooe.at/handle/123456789/1728
König, L., Feldmann, M., Pirker, M., & Kieseberg, P. (2023, April). Management von Informationssicherheitsaudits mithilfe von Verteilten Systemen und Blockchains. 16. Forschungsforum der Österreichischen Fachhochschulen, St. Pölten. http://ffhoarep.fh-ooe.at/handle/123456789/1732
Pirker, M. (2022, October 19). IT-Security und AI vor dem Hintergrund des AI Acts. 1. Vernetzungstreffen im Rahmen des AI Policy Forums, Wien.
Pirker, M., & Schüpany, M. (2022). A Revisit of Attestable Nodes for Networked Applications. Proceedings of the 17th International Conference on Availability, Reliability and Security (ARES), 1–7. https://doi.org/10.1145/3538969.3544433
Pirker, M. (2022, March 17). Trustworthy AI - a reflection [Vortrag]. Online Round Table: Security Trends – Bedrohungsanalysen, AI & Cybersecurity, Online Event. https://www.conect.at/veranstaltung/online-round-table-security-risk-und-compliance-management-trends-2
Pirker, M. (2021, October 29). Secure Messaging - Revisited [Online Stream]. Privacyweek, Vienna.
Pirker, M., & Piller, E. (2021, August 17). Obstacles and Challenges in Transforming Applications for Distributed Data Ledger Integration. Proceedings of the 16th International Workshop on Frontiers in Availability, Reli- Ability and Security (FARES). ARES 2021: The 16th International Conference on Availability, Reliability and Security. https://doi.org/10/gn622r
Eigner, O., Eresheim, S., Kieseberg, P., Klausner, L. D., Pirker, M., Priebe, T., Tjoa, S., Marulli, F., Mercaldo, F., & Priebe, T. (2021). Towards Resilient Artificial Intelligence: Survey and Research Issues. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience, 536–542. https://doi.org/10.1109/CSR51186.2021.9527986
Pipek, T., & Pirker, M. (2020, Dezember). Revisiting the Challenges of Input Parsing for Robust and Secure Software. 2019 International Conference on Software Security and Assurance (ICSSA). https://doi.org/10/ghwvvb
Pirker, M. (2020, October 30). Data ...in Chains? PrivacyWeek Wien, Wien. https://media.ccc.de/v/pw20-351-data-in-chains
Pirker, M. (2020). Data ...in Chains? https://media.ccc.de/v/pw20-351-data-in-chains
Pirker, M. (2020, February 26). Data... on the Blockchain? Knowledgefeed #33 @ Vienna Data Science Group, Wien. https://viennadatasciencegroup.at/
Pirker, M., Lindenhofer, J., & Offenthaler, R. (2020, February). A Curious Exploration of Malicious PDF Documents. Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP. https://www.scitepress.org/PublicationsDetail.aspx?ID=a4IHFkdWePg=&t=1
Pirker, M. (2020). Data... on the Blockchain? https://viennadatasciencegroup.at/
Pirker, M., Lindenhofer, J., & Offenthaler, R. (2020, February 25). A Curious Exploration of Malicious PDF Documents. Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP. 6th International Conference on Information Systems Security and Privacy. https://www.scitepress.org/PublicationsDetail.aspx?ID=a4IHFkdWePg=&t=1
Pirker, M. (2019, November 22). More Data - More Security? [Invited Talk]. TOP Alumni Club, TU Wien. https://www.eventbrite.com/e/ai-among-us-todays-use-cases-of-applied-ai-tickets-78776670141
Pirker, M. (2019). More Data - More Security? https://www.eventbrite.com/e/ai-among-us-todays-use-cases-of-applied-ai-tickets-78776670141
Pirker, M. (2019, October 23). Digitale Probleme....für Alle! PrivacyWeek, Wien. https://media.ccc.de/v/pw19-256-digitale-probleme-fr-alle-
Pirker, M. (2019). Digitale Probleme....für Alle! https://media.ccc.de/v/pw19-256-digitale-probleme-fr-alle-
Pirker, M. (2019, March 29). (Big) Data (Science) für Security [Invited Talk]. Vienna Data Science Group, Wien. https://www.meetup.com/de-DE/Vienna-Data-Science-Group-Meetup/events/259922553/
Pirker, M. (2019). (Big) Data (Science) für Security. https://www.meetup.com/de-DE/Vienna-Data-Science-Group-Meetup/events/259922553/
Pirker, M. (2019, February 26). Robustes Parsen von Inputdaten. Sec4dev, Wien. https://sec4dev.io/sessions/robustes-parsen-von-inputdaten
Pirker, M. (2019). Robustes Parsen von Inputdaten. https://sec4dev.io/sessions/robustes-parsen-von-inputdaten
Pipek, T., & Pirker, M. (2019). Revisiting the Challenges of Input Parsing for Robust and Secure Software. 2019 International Conference on Software Security and Assurance (ICSSA). ICSSA 2019 (25.-26.07.2019), St. Poelten (Austria). https://doi.org/10/ghwvvb
Pirker, M. (2018). IT Security + Data Science for Security.
Pirker, M. (2018, May 10). Trusted Computing Basics&Overview. COINS information security winter school, Finse.
Pirker, M. (2018, October 5). Trusted Computing – Basics and Overview. COINS Winter School, Finse.
Pirker, M. (2018). Trusted Computing Basics&Overview.
Pirker, M. (2018). Trusted Computing Basics&Overview.
Pirker, M. (2018). JRZ Target.
Pirker, M. (2018). IT Security + Data Science for Security.
Pirker, M. (2018). JRZ Target.
Pirker, M., Kochberger, P., & Schwandter, S. (2018). Behavioural Comparison of Systems for Anomaly Detection. Proceedings of the 13th International Conference on Availability, Reliability and Security. ARES 2018, Hamburg, Deutschland. https://doi.org/10/gh3734
Pirker, M., Kochberger, P., & Schwandter, S. (2018). Behavioural Comparison of Systems for Anomaly Detection. Proceedings of the 13th International Conference on Availability, Reliability and Security. https://doi.org/10/gh3734
Valicek, M., Schramm, G., Pirker, M., & Schrittwieser, S. (2017). Creation and Integration of Remote High Interaction Honeypots. 2017 International Conference on Software Security and Assurance (ICSSA), 50–55. https://doi.org/10/gh375g
Valicek, M., Schramm, G., Pirker, M., & Schrittwieser, S. (2017). Creation and Integration of Remote High Interaction Honeypots. 2017 International Conference on Software Security and Assurance (ICSSA), 50–55. https://doi.org/10/gh375g
Pirker, M., & Nusser, A. (2016). A Work-Flow for Empirical Exploration of Security Events. 25th International Conference Companion on World Wide Web. 25th International Conference Companion on World Wide Web. https://doi.org/10/gh375h
Pirker, M., & Nusser, A. (2016). Assessment of Server State via Inter-Clone Differences. 2016 International Conference on Software Security and Assurance (ICSSA). https://doi.org/10/gh375j
Pirker, M., & Nusser, A. (2016). A Work-Flow for Empirical Exploration of Security Events. 25th International Conference Companion on World Wide Web. https://doi.org/10/gh375h
Pirker, M., & Nusser, A. (2016). Assessment of Server State via Inter-Clone Differences. https://doi.org/10/gh375j
Pammer, V., Stern, H., Edler, S., Hein, D., Pirker, M., Bloem, R., & Wertner, A. (2014). Security concepts for a distributed architecture for activity logging and analysis. Proceedings of the 14th International Conference on Knowledge Technologies and Data-Driven Business - i-KNOW "14, 1–6. https://doi.org/10/gh376n
Balogh, Z., Gatial, E., Hluch, L., Tögl, R., Pirker, M., & Hein, D. (2014). Agent-Based Cloud Resource Management for Secure Cloud Infrastructures. Computing and Informatics, 33, 1333–1355. https://cai.type.sk/content/2014/6/agent-based-cloud-resource-management-for-secure-cloud-infrastructures/
Pammer, V., Stern, H., Edler, S., Hein, D., Pirker, M., Bloem, R., & Wertner, A. (2014). Security concepts for a distributed architecture for activity logging and analysis. Proceedings of the 14th International Conference on Knowledge Technologies and Data-Driven Business - i-KNOW "14, 1–6. https://doi.org/10/gh376n
Balogh, Z., Gatial, E., Hluch, L., Tögl, R., Pirker, M., & Hein, D. (2014). Agent-Based Cloud Resource Management for Secure Cloud Infrastructures. Computing and Informatics, 33, 1333–1355. https://cai.type.sk/content/2014/6/agent-based-cloud-resource-management-for-secure-cloud-infrastructures/
Toegl, R., Reimair, F., & Pirker, M. (2013). Waltzing the Bear, or: A Trusted Virtual Security Module. In D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, S. De Capitani di Vimercati, & C. Mitchell (Eds.), Public Key Infrastructures, Services and Applications (Vol. 7868, pp. 145–160). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-40012-4_10
Pirker, M., & Winter, J. (2013). Semi-automated Prototyping of a TPM v2 Software and Hardware Simulation Platform. In D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, M. Huth, N. Asokan, S. Čapkun, I. Flechais, & L. Coles-Kemp (Eds.), Trust and Trustworthy Computing (Vol. 7904, pp. 106–114). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-38908-5_8
Kraxberger, S., Toegl, R., Pirker, M., Guijarro, E. P., & Millan, G. G. (2013). Trusted Identity Management for Overlay Networks. In D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, R. H. Deng, & T. Feng (Eds.), Information Security Practice and Experience (Vol. 7863, pp. 16–30). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-38033-4_2
Toegl, R., Reimair, F., & Pirker, M. (2013). Waltzing the Bear, or: A Trusted Virtual Security Module. In S. De Capitani di Vimercati & C. Mitchell (Eds.), Public Key Infrastructures, Services and Applications (Vol. 7868, pp. 145–160). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-40012-4_10
Pirker, M., & Winter, J. (2013). Semi-automated Prototyping of a TPM v2 Software and Hardware Simulation Platform. In M. Huth, N. Asokan, S. Čapkun, I. Flechais, & L. Coles-Kemp (Eds.), Trust and Trustworthy Computing (Vol. 7904, pp. 106–114). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-38908-5_8
Kraxberger, S., Toegl, R., Pirker, M., Guijarro, E. P., & Millan, G. G. (2013). Trusted Identity Management for Overlay Networks. In R. H. Deng & T. Feng (Eds.), Information Security Practice and Experience (Vol. 7863, pp. 16–30). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-38033-4_2
Pirker, M., & Slamanig, D. (2012). A Framework for Privacy-Preserving Mobile Payment on Security Enhanced ARM TrustZone Platforms. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 1155–1160. https://doi.org/10/gh376q
Pirker, M., & Slamanig, D. (2012). A Framework for Privacy-Preserving Mobile Payment on Security Enhanced ARM TrustZone Platforms. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 1155–1160. https://doi.org/10/gh376q
Winter, J., Wiegele, P., Pirker, M., & Tögl, R. (2012). A Flexible Software Development and Emulation Framework for ARM TrustZone. In D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, L. Chen, M. Yung, & L. Zhu (Eds.), Trusted Systems (Vol. 7222, pp. 1–15). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-32298-3_1
Hein, D. M., Toegl, R., Pirker, M., Gatial, E., Balogh, Z., Brandl, H., & Hluchý, L. (2012). Securing mobile agents for crisis management support. Proceedings of the Seventh ACM Workshop on Scalable Trusted Computing - STC "12, 85. https://doi.org/10/gh376m
Pirker, M., Winter, J., & Tögl, R. (2012). Lightweight Distributed Attestation For The Cloud. Proceedings of the 2nd International Conference on Cloud Computing and Services Science, 580–585. https://doi.org/10/gh376r
Hein, D. M., Toegl, R., Pirker, M., Gatial, E., Balogh, Z., Brandl, H., & Hluchý, L. (2012). Securing mobile agents for crisis management support. Proceedings of the Seventh ACM Workshop on Scalable Trusted Computing - STC "12, 85. https://doi.org/10/gh376m
Pirker, M., Winter, J., & Tögl, R. (2012). Lightweight Distributed Attestation For The Cloud. Proceedings of the 2nd International Conference on Cloud Computing and Services Science, 580–585. https://doi.org/10/gh376r
Gatial, E., Tögl, R., & Pirker, M. (2012). Securing Agents Using Secure Docking Module. Technical Sciences, No. 15(1) 2012. http://www.uwm.edu.pl/wnt/technicalsc/tech_15_1/B08.pdf
Gatial, E., Tögl, R., & Pirker, M. (2012). Securing Agents Using Secure Docking Module. Technical Sciences, No. 15(1) 2012. http://www.uwm.edu.pl/wnt/technicalsc/tech_15_1/B08.pdf
Pirker, M., Winter, J., & Toegl, R. (2012). Lightweight Distributed Heterogeneous Attested Android Clouds. In D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, S. Katzenbeisser, E. Weippl, L. J. Camp, M. Volkamer, … X. Zhang (Eds.), Trust and Trustworthy Computing (Vol. 7344, pp. 122–141). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-30921-2_8
Pirker, M., Slamanig, D., & Winter, J. (2012). Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients. In D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, S. Fischer-Hübner, & M. Wright (Eds.), Privacy Enhancing Technologies (Vol. 7384, pp. 201–220). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-31680-7_11
Winter, J., Wiegele, P., Pirker, M., & Tögl, R. (2012). A Flexible Software Development and Emulation Framework for ARM TrustZone. In L. Chen, M. Yung, & L. Zhu (Eds.), Trusted Systems (Vol. 7222, pp. 1–15). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-32298-3_1
Pirker, M., Winter, J., & Toegl, R. (2012). Lightweight Distributed Heterogeneous Attested Android Clouds. In S. Katzenbeisser, E. Weippl, L. J. Camp, M. Volkamer, M. Reiter, & X. Zhang (Eds.), Trust and Trustworthy Computing (Vol. 7344, pp. 122–141). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-30921-2_8
Pirker, M., Slamanig, D., & Winter, J. (2012). Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients. In S. Fischer-Hübner & M. Wright (Eds.), Privacy Enhancing Technologies (Vol. 7384, pp. 201–220). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-31680-7_11
Toegl, R., Pirker, M., & Gissing, M. (2011). acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity. In L. Chen & M. Yung (Eds.), Trusted Systems (Vol. 6802, pp. 326–345). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-25283-9_22
Gissing, M., Toegl, R., & Pirker, M. (2011). Management of Integrity-Enforced Virtual Applications. In C. Lee, J.-M. Seigneur, J. J. Park, & R. R. Wagner (Eds.), Secure and Trust Computing, Data Management, and Applications (Vol. 187, pp. 138–145). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-22365-5_17
Toegl, R., Pirker, M., & Gissing, M. (2011). acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity. In L. Chen & M. Yung (Eds.), Trusted Systems (Vol. 6802, pp. 326–345). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-25283-9_22
Gissing, M., Toegl, R., & Pirker, M. (2011). Management of Integrity-Enforced Virtual Applications. In C. Lee, J.-M. Seigneur, J. J. Park, & R. R. Wagner (Eds.), Secure and Trust Computing, Data Management, and Applications (Vol. 187, pp. 138–145). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-22365-5_17
Pirker, M., & Toegl, R. (2010). Towards a Virtual Trusted Platform. JUCS - Journal of Universal Computer Science, 4. https://doi.org/10/gh376p
Pirker, M., & Toegl, R. (2010). Towards a Virtual Trusted Platform. JUCS - Journal of Universal Computer Science, 4. https://doi.org/10/gh376p
Pirker, M., Toegl, R., & Gissing, M. (2010). Dynamic Enforcement of Platform Integrity. In D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, A. Acquisti, S. W. Smith, & A.-R. Sadeghi (Eds.), Trust and Trustworthy Computing (Vol. 6101, pp. 265–272). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-13869-0_18
Pirker, M., Toegl, R., & Gissing, M. (2010). Dynamic Enforcement of Platform Integrity. In A. Acquisti, S. W. Smith, & A.-R. Sadeghi (Eds.), Trust and Trustworthy Computing (Vol. 6101, pp. 265–272). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-13869-0_18
Toegl, R., & Pirker, M. (2009). An ongoing Game of Tetris: Integrating Trusted Computing in Java, block-by-block. In D. Gawrock, H. Reimer, A.-R. Sadeghi, & C. Vishik (Eds.), Future of Trust in Computing (pp. 60–67). Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9324-6_7
Toegl, R., & Pirker, M. (2009). An ongoing Game of Tetris: Integrating Trusted Computing in Java, block-by-block. In D. Gawrock, H. Reimer, A.-R. Sadeghi, & C. Vishik (Eds.), Future of Trust in Computing (pp. 60–67). Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9324-6_7
Pirker, M., Toegl, R., Hein, D., & Danner, P. (2009). A PrivacyCA for Anonymity and Trust. In L. Chen, C. J. Mitchell, & A. Martin (Eds.), Trusted Computing (Vol. 5471, pp. 101–119). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-00587-9_7
Pirker, M., Toegl, R., Hein, D., & Danner, P. (2009). A PrivacyCA for Anonymity and Trust. In L. Chen, C. J. Mitchell, & A. Martin (Eds.), Trusted Computing (Vol. 5471, pp. 101–119). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-00587-9_7
Vejda, T., Toegl, R., Pirker, M., & Winkler, T. (2008). Towards Trust Services for Language-Based Virtual Machines for Grid Computing. In P. Lipp, A.-R. Sadeghi, & K.-M. Koch (Eds.), Trusted Computing - Challenges and Applications (Vol. 4968, pp. 48–59). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-68979-9_4
Dietrich, K., Pirker, M., Vejda, T., Toegl, R., Winkler, T., & Lipp, P. (2008). A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing. In G. Barthe & C. Fournet (Eds.), Trustworthy Global Computing (Vol. 4912, pp. 156–168). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-78663-4_12
Vejda, T., Toegl, R., Pirker, M., & Winkler, T. (2008). Towards Trust Services for Language-Based Virtual Machines for Grid Computing. In P. Lipp, A.-R. Sadeghi, & K.-M. Koch (Eds.), Trusted Computing - Challenges and Applications (Vol. 4968, pp. 48–59). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-68979-9_4
Dietrich, K., Pirker, M., Vejda, T., Toegl, R., Winkler, T., & Lipp, P. (2008). A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing. In G. Barthe & C. Fournet (Eds.), Trustworthy Global Computing (Vol. 4912, pp. 156–168). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-78663-4_12
Dietrich, K., Vedjda, T., Tögl, R., Pirker, M., & Lipp, P. (2007). Can you Really Trust your Computer Today? ENISA Quarterly, 3(3).
Dietrich, K., Vedjda, T., Tögl, R., Pirker, M., & Lipp, P. (2007). Can you Really Trust your Computer Today? ENISA Quarterly, 3(3).
Pirker, M., Hagl, J., & Mann, O. (n.d.). Securing the Linux Boot Process – From Start to Finish. Pro- Ceedings of the 7th International Conference on Information Systems Security and Privacy (ICISSP), SCITEPRESS (Link), 604–610. https://doi.org/10/gpgzsd