Dipl.-Ing. Dr. Martin Pirker Bakk.

  • Senior Researcher
    Josef Ressel Zentrum für Blockchain-Technologien und Sicherheitsmanagement
  • Department Informatik und Security
Arbeitsplatz: B - Campus-Platz 1
T: +43/2742/313 228 690


  • Cyber Security and Resilience (MA)
  • Information Security (MA)
  • IT Security (BA)


  • Informatik und Security

Download CV

Ausgewählte Publikationen



Eigner, O., Eresheim, S., Kieseberg, P., Klausner, L. D., Pirker, M., Priebe, T., Tjoa, S., Marulli, F., & Mercaldo, F. (2021). Towards Resilient Artificial Intelligence: Survey and Research Issues. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience, 536–542. https://doi.org/10.1109/CSR51186.2021.9527986
Pipek, T., & Pirker, M. (2020, December 31). Revisiting the Challenges of Input Parsing for Robust and Secure Software. 2019 International Conference on Software Security and Assurance (ICSSA). ICSSA 2019 (25.-26.07.2019), St. Poelten (Austria). https://doi.org/10/ghwvvb
Pirker, M. (2020, October 30). Data ...in Chains? PrivacyWeek Wien, Wien. https://fahrplan.privacyweek.at/pw20/talk/UQ87MV/
Pirker, M. (2020, February 26). Data... on the Blockchain? Knowledgefeed #33 @ Vienna Data Science Group, Wien. https://viennadatasciencegroup.at/
Pirker, M., Lindenhofer, J., & Offenthaler, R. (2020, February 25). A Curious Exploration of Malicious PDF Documents. Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP. 6th International Conference on Information Systems Security and Privacy. https://www.scitepress.org/PublicationsDetail.aspx?ID=a4IHFkdWePg=&t=1
Pirker, M. (2019, November 22). More Data - More Security? [Invited Talk]. TOP Alumni Club, TU Wien. https://www.eventbrite.com/e/ai-among-us-todays-use-cases-of-applied-ai-tickets-78776670141
Pirker, M. (2019, October 23). Digitale Probleme....für Alle! PrivacyWeek, Wien. https://fahrplan.privacyweek.at/pw19/talk/N98QNQ/
Pirker, M. (2019, March 29). (Big) Data (Science) für Security [Invited Talk]. Vienna Data Science Group, Wien. https://www.meetup.com/de-DE/Vienna-Data-Science-Group-Meetup/events/259922553/
Pirker, M. (2019, February 26). Robustes Parsen von Inputdaten. Sec4dev, Wien. https://sec4dev.io/sessions/robustes-parsen-von-inputdaten
Pirker, M. (2018). IT Security + Data Science for Security.
Pirker, M. (2018, May 10). Trusted Computing Basics&Overview. COINS information security winter school, Finse.
Pirker, M. (2018). JRZ Target.
Pirker, M., Kochberger, P., & Schwandter, S. (2018). Behavioural Comparison of Systems for Anomaly Detection. Proceedings of the 13th International Conference on Availability, Reliability and Security. ARES 2018, Hamburg, Deutschland. https://doi.org/10/gh3734
Valicek, M., Schramm, G., Pirker, M., & Schrittwieser, S. (2017). Creation and Integration of Remote High Interaction Honeypots. 2017 International Conference on Software Security and Assurance (ICSSA), 50–55. https://doi.org/10/gh375g
Pirker, M., & Nusser, A. (2016). A Work-Flow for Empirical Exploration of Security Events. 25th International Conference Companion on World Wide Web. 25th International Conference Companion on World Wide Web. https://doi.org/10/gh375h
Pirker, M., & Nusser, A. (2016). Assessment of Server State via Inter-Clone Differences. 2016 International Conference on Software Security and Assurance (ICSSA). https://doi.org/10/gh375j
Pammer, V., Stern, H., Edler, S., Hein, D., Pirker, M., Bloem, R., & Wertner, A. (2014). Security concepts for a distributed architecture for activity logging and analysis. Proceedings of the 14th International Conference on Knowledge Technologies and Data-Driven Business - i-KNOW "14, 1–6. https://doi.org/10/gh376n
Balogh, Z., Gatial, E., Hluch, L., Tögl, R., Pirker, M., & Hein, D. (2014). Agent-Based Cloud Resource Management for Secure Cloud Infrastructures. Computing and Informatics, 33, 1333–1355. https://cai.type.sk/content/2014/6/agent-based-cloud-resource-management-for-secure-cloud-infrastructures/
Pirker, M., & Winter, J. (2013). Semi-automated Prototyping of a TPM v2 Software and Hardware Simulation Platform. In M. Huth, N. Asokan, S. Čapkun, I. Flechais, & L. Coles-Kemp (Eds.), Trust and Trustworthy Computing (Vol. 7904, pp. 106–114). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-38908-5_8
Kraxberger, S., Toegl, R., Pirker, M., Guijarro, E. P., & Millan, G. G. (2013). Trusted Identity Management for Overlay Networks. In R. H. Deng & T. Feng (Eds.), Information Security Practice and Experience (Vol. 7863, pp. 16–30). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-38033-4_2
Toegl, R., Reimair, F., & Pirker, M. (2013). Waltzing the Bear, or: A Trusted Virtual Security Module. In S. De Capitani di Vimercati & C. Mitchell (Eds.), Public Key Infrastructures, Services and Applications (Vol. 7868, pp. 145–160). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-40012-4_10
Pirker, M., & Slamanig, D. (2012). A Framework for Privacy-Preserving Mobile Payment on Security Enhanced ARM TrustZone Platforms. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 1155–1160. https://doi.org/10/gh376q
Hein, D. M., Toegl, R., Pirker, M., Gatial, E., Balogh, Z., Brandl, H., & Hluchý, L. (2012). Securing mobile agents for crisis management support. Proceedings of the Seventh ACM Workshop on Scalable Trusted Computing - STC "12, 85. https://doi.org/10/gh376m
Gatial, E., Tögl, R., & Pirker, M. (2012). Securing Agents Using Secure Docking Module. Technical Sciences, No. 15(1) 2012. http://www.uwm.edu.pl/wnt/technicalsc/tech_15_1/B08.pdf
Pirker, M., Winter, J., & Tögl, R. (2012). Lightweight Distributed Attestation For The Cloud. Proceedings of the 2nd International Conference on Cloud Computing and Services Science, 580–585. https://doi.org/10/gh376r
Pirker, M., Winter, J., & Toegl, R. (2012). Lightweight Distributed Heterogeneous Attested Android Clouds. In S. Katzenbeisser, E. Weippl, L. J. Camp, M. Volkamer, M. Reiter, & X. Zhang (Eds.), Trust and Trustworthy Computing (Vol. 7344, pp. 122–141). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-30921-2_8
Pirker, M., Slamanig, D., & Winter, J. (2012). Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients. In S. Fischer-Hübner & M. Wright (Eds.), Privacy Enhancing Technologies (Vol. 7384, pp. 201–220). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-31680-7_11
Winter, J., Wiegele, P., Pirker, M., & Tögl, R. (2012). A Flexible Software Development and Emulation Framework for ARM TrustZone. In L. Chen, M. Yung, & L. Zhu (Eds.), Trusted Systems (Vol. 7222, pp. 1–15). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-32298-3_1
Toegl, R., Pirker, M., & Gissing, M. (2011). acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity. In L. Chen & M. Yung (Eds.), Trusted Systems (Vol. 6802, pp. 326–345). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-25283-9_22
Gissing, M., Toegl, R., & Pirker, M. (2011). Management of Integrity-Enforced Virtual Applications. In C. Lee, J.-M. Seigneur, J. J. Park, & R. R. Wagner (Eds.), Secure and Trust Computing, Data Management, and Applications (Vol. 187, pp. 138–145). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-22365-5_17
Pirker, M., & Toegl, R. (2010). Towards a Virtual Trusted Platform. JUCS - Journal of Universal Computer Science, 4. https://doi.org/10/gh376p
Pirker, M., Toegl, R., & Gissing, M. (2010). Dynamic Enforcement of Platform Integrity. In A. Acquisti, S. W. Smith, & A.-R. Sadeghi (Eds.), Trust and Trustworthy Computing (Vol. 6101, pp. 265–272). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-13869-0_18
Toegl, R., & Pirker, M. (2009). An ongoing Game of Tetris: Integrating Trusted Computing in Java, block-by-block. In D. Gawrock, H. Reimer, A.-R. Sadeghi, & C. Vishik (Eds.), Future of Trust in Computing (pp. 60–67). Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9324-6_7
Pirker, M., Toegl, R., Hein, D., & Danner, P. (2009). A PrivacyCA for Anonymity and Trust. In L. Chen, C. J. Mitchell, & A. Martin (Eds.), Trusted Computing (Vol. 5471, pp. 101–119). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-00587-9_7
Dietrich, K., Pirker, M., Vejda, T., Toegl, R., Winkler, T., & Lipp, P. (2008). A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing. In G. Barthe & C. Fournet (Eds.), Trustworthy Global Computing (Vol. 4912, pp. 156–168). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-78663-4_12
Vejda, T., Toegl, R., Pirker, M., & Winkler, T. (2008). Towards Trust Services for Language-Based Virtual Machines for Grid Computing. In P. Lipp, A.-R. Sadeghi, & K.-M. Koch (Eds.), Trusted Computing - Challenges and Applications (Vol. 4968, pp. 48–59). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-68979-9_4
Dietrich, K., Vedjda, T., Tögl, R., Pirker, M., & Lipp, P. (2007). Can you Really Trust your Computer Today? ENISA Quarterly, 3(3). https://www.enisa.europa.eu/publications/eqr-archive/issues/eqr-q3-2007-vol.-3-no.-3/at_download/issue