Dipl.-Ing. Dr. Martin Pirker Bakk.

  • Senior Researcher
    Josef Ressel-Zentrum für konsolidierte Erkennung gezielter Angriffe
  • Department Informatik und Security
Arbeitsplatz: D - Heinrich Schneidmadl-Straße 15
T: +43/2742/313 228 690


  • IT Security (BA)
  • Information Security (MA)


  • Informatik und Security

Download CV

Ausgewählte Publikationen



Pirker, M. (2019, November). More Data - More Security? Invited Talk presented at the TOP Alumni Club, TU Wien.
Pirker, M. (2019, October). Digitale Probleme....für Alle! Presented at the PrivacyWeek, Wien.
Pirker, M. (2019, March). (Big) Data (Science) für Security. Invited Talk presented at the Vienna Data Science Group, Wien.
Pirker, M. (2019, February). Robustes Parsen von Inputdaten. Presented at the Sec4dev, Wien.
Pirker, M. (2018, April 12). IT Security + Data Science for Security.
Pirker, M. (2018, September). Trusted Computing – Basics and Overview. Presented at the COINS Winter School, Finse.
Pirker, M. (2018, June). Trusted Computing Basics&Overview. Presented at the COINS information security winter school, Finse.
Pirker, M. (2018, April 13). JRZ Target.
Pirker, M., Kochberger, P., & Schwandter, S. (2018). Behavioural Comparison of Systems for Anomaly Detection. In Proceedings of the 13th International Conference on Availability, Reliability and Security. Hamburg, Deutschland.
Valicek, M., Schramm, G., Pirker, M., & Schrittwieser, S. (2017). Creation and Integration of Remote High Interaction Honeypots. In 2017 International Conference on Software Security and Assurance (ICSSA) (pp. 50–55). Altoona, PA: IEEE. https://doi.org/10.1109/ICSSA.2017.21
Pirker, M., & Nusser, A. (2016). A Work-Flow for Empirical Exploration of Security Events. In 25th International Conference Companion on World Wide Web. ACM. https://doi.org/10.1145/2872518.2888607
Pirker, M., & Nusser, A. (2016). Assessment of Server State via Inter-Clone Differences. Presented at the 2016 International Conference on Software Security and Assurance (ICSSA), IEEE.
Pammer, V., Stern, H., Edler, S., Hein, D., Pirker, M., Bloem, R., & Wertner, A. (2014). Security concepts for a distributed architecture for activity logging and analysis. In Proceedings of the 14th International Conference on Knowledge Technologies and Data-driven Business - i-KNOW "14 (pp. 1–6). Graz, Austria: ACM Press. https://doi.org/10.1145/2637748.2638426
Balogh, Z., Gatial, E., Hluch, L., Tögl, R., Pirker, M., & Hein, D. (2014). Agent-Based Cloud Resource Management for Secure Cloud Infrastructures. Computing and Informatics, 33, 1333–1355.
Toegl, R., Reimair, F., & Pirker, M. (2013). Waltzing the Bear, or: A Trusted Virtual Security Module. In S. De Capitani di Vimercati & C. Mitchell (Eds.), Public Key Infrastructures, Services and Applications (Vol. 7868, pp. 145–160). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-40012-4_10
Kraxberger, S., Toegl, R., Pirker, M., Guijarro, E. P., & Millan, G. G. (2013). Trusted Identity Management for Overlay Networks. In R. H. Deng & T. Feng (Eds.), Information Security Practice and Experience (Vol. 7863, pp. 16–30). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-38033-4_2
Pirker, M., & Winter, J. (2013). Semi-automated Prototyping of a TPM v2 Software and Hardware Simulation Platform. In M. Huth, N. Asokan, S. Čapkun, I. Flechais, & L. Coles-Kemp (Eds.), Trust and Trustworthy Computing (Vol. 7904, pp. 106–114). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-38908-5_8
Pirker, M., & Slamanig, D. (2012). A Framework for Privacy-Preserving Mobile Payment on Security Enhanced ARM TrustZone Platforms. In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 1155–1160). Liverpool, United Kingdom: IEEE. https://doi.org/10.1109/TrustCom.2012.28
Winter, J., Wiegele, P., Pirker, M., & Tögl, R. (2012). A Flexible Software Development and Emulation Framework for ARM TrustZone. In L. Chen, M. Yung, & L. Zhu (Eds.), Trusted Systems (Vol. 7222, pp. 1–15). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-32298-3_1
Hein, D. M., Toegl, R., Pirker, M., Gatial, E., Balogh, Z., Brandl, H., & Hluchý, L. (2012). Securing mobile agents for crisis management support. In Proceedings of the seventh ACM workshop on Scalable trusted computing - STC "12 (p. 85). Raleigh, North Carolina, USA: ACM Press. https://doi.org/10.1145/2382536.2382550
Gatial, E., Tögl, R., & Pirker, M. (2012). Securing Agents Using Secure Docking Module. Technical Sciences, No. 15(1) 2012.
Pirker, M., Winter, J., & Toegl, R. (2012). Lightweight Distributed Heterogeneous Attested Android Clouds. In S. Katzenbeisser, E. Weippl, L. J. Camp, M. Volkamer, M. Reiter, & X. Zhang (Eds.), Trust and Trustworthy Computing (Vol. 7344, pp. 122–141). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-30921-2_8
Pirker, M., Slamanig, D., & Winter, J. (2012). Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients. In S. Fischer-Hübner & M. Wright (Eds.), Privacy Enhancing Technologies (Vol. 7384, pp. 201–220). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-31680-7_11
Pirker, M., Winter, J., & Tögl, R. (2012). Lightweight Distributed Attestation For The Cloud. In Proceedings of the 2nd International Conference on Cloud Computing and Services Science (pp. 580–585). Porto, Portugal: SciTePress - Science and and Technology Publications. https://doi.org/10.5220/0003929105800585
Gissing, M., Toegl, R., & Pirker, M. (2011). Management of Integrity-Enforced Virtual Applications. In C. Lee, J.-M. Seigneur, J. J. Park, & R. R. Wagner (Eds.), Secure and Trust Computing, Data Management, and Applications (Vol. 187, pp. 138–145). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-22365-5_17
Toegl, R., Pirker, M., & Gissing, M. (2011). acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity. In L. Chen & M. Yung (Eds.), Trusted Systems (Vol. 6802, pp. 326–345). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-25283-9_22
Pirker, M., & Toegl, R. (2010). Towards a Virtual Trusted Platform. JUCS - Journal of Universal Computer Science, (4). https://doi.org/10.3217/jucs-016-04-0531
Pirker, M., Toegl, R., & Gissing, M. (2010). Dynamic Enforcement of Platform Integrity. In A. Acquisti, S. W. Smith, & A.-R. Sadeghi (Eds.), Trust and Trustworthy Computing (Vol. 6101, pp. 265–272). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-13869-0_18
Toegl, R., & Pirker, M. (2009). An ongoing Game of Tetris: Integrating Trusted Computing in Java, block-by-block. In D. Gawrock, H. Reimer, A.-R. Sadeghi, & C. Vishik (Eds.), Future of Trust in Computing (pp. 60–67). Wiesbaden: Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9324-6_7
Pirker, M., Toegl, R., Hein, D., & Danner, P. (2009). A PrivacyCA for Anonymity and Trust. In L. Chen, C. J. Mitchell, & A. Martin (Eds.), Trusted Computing (Vol. 5471, pp. 101–119). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-00587-9_7
Vejda, T., Toegl, R., Pirker, M., & Winkler, T. (2008). Towards Trust Services for Language-Based Virtual Machines for Grid Computing. In P. Lipp, A.-R. Sadeghi, & K.-M. Koch (Eds.), Trusted Computing - Challenges and Applications (Vol. 4968, pp. 48–59). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-68979-9_4
Dietrich, K., Pirker, M., Vejda, T., Toegl, R., Winkler, T., & Lipp, P. (2008). A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing. In G. Barthe & C. Fournet (Eds.), Trustworthy Global Computing (Vol. 4912, pp. 156–168). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-78663-4_12
Dietrich, K., Vedjda, T., Tögl, R., Pirker, M., & Lipp, P. (2007). Can you Really Trust your Computer Today? ENISA Quarterly, 3(3).