Josef Ressel Center for User-friendly Secure Mobile Environments
Publications
“Applying Smart Cards for Security Critical Mobile Applications”, Johannes Kepler University Linz, Institue of Networks and Security, Linz, 2018.
, “Bridging the Gap in Privacy-Preserving Revocation: Practical and Scalable Revocation of Mobile eIDs”, in Proceedings of the 33rd Annual ACM Symposium on Applied Computing (SAC '18), Pau, France, 2018, pp. 1601–1609.
, “Mobile Match-on-Card Authentication Using Offline-Simplified Models with Gait and Face Biometrics”, IEEE Transactions on Mobile Computing (TMC), vol. 17, no. 11, pp. 2578–2590, 2018. Findling_18_MobileMatchon.pdf (1.48 MB)
, “Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers”, in Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany, 2018.
, “AmDL Framework: APDU Protocol Reference”, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, 2017.
, “AmDL Framework: API Design Documentation”, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, 2017.
, “AmDL Protocol Design”, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, 2017.
, “Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools”, in Security and Privacy (EuroS&P), 2017 IEEE European Symposium on, Paris, France, 2017, pp. 319–333.
, “Continuous Mobile Face Authentication”, Department of Mobile Computing, School of Informatics, Communication and Media, University of Applied Sciences Upper Austria, Hagenberg, 2017. Altenhofer_17_ContinuousMobileFace.pdf (2.18 MB)
, “CORMORANT Framework: API Reference”, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, 2017.
“Cruel Intentions – Intent-basierte Exploits”, Vienna University of Technology, Vienna, Austria, 2017.
, “Evaluating the Placement of Arm-Worn Devices for Recognizing Variations of Dynamic Hand Gestures”, Journal of Mobile Multimedia (JMM), vol. 12, no. 3-4, p. 242, 2017. Kefer_17_EvaluatingPlacementArm.pdf (668.9 KB)
, “Extensibility in a Privacy-preserving eID: Towards a Mobile eID System for Real-world Identification and Offline Verification”, in 12th IFIP International Summer School on Privacy and Identity Management – Pre-proceedings, 2017.
, “An Extensible and Privacy-preserving Mobile eID System for Real-world Identification and Offline Verification”, in 12th IFIP International Summer School on Privacy and Identity Management – Extended Abstracts, 2017.
, “Implicit Biometric Authentication for Smartphones”, Johannes Kepler University Linz, Institute of Networks and Security, Linz, Austria, 2017.
, “A Large-Scale, Long-Term Analysis of Mobile Device Usage Characteristics”, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 1, no. 2, 2017. Hintze_17_LargeScaleLong.pdf (1.34 MB)
, “Lightweight Address Hopping for Defending the IPv6 IoT”, in Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio Calabria, Italy, 2017.
, “Mobile Wrist Vein Authentication Using SIFT Features”, Department of Mobile Computing, School of Informatics, Communication and Media, University of Applied Sciences Upper Austria, Hagenberg, 2017. Fernandez_17_MobileWristVeinThesis.pdf (3.89 MB)
, “Mobile Wrist Vein Authentication Using SIFT Features”, in Abstract from EUROCAST, Las Palmas, Spain, 2017, pp. 140-141. Fernandez_17_MobileWristVein_extended_abstract.pdf (100.05 KB)
, “Mobile Wrist Vein Authentication Using SIFT Features”, in Proc. Eurocast 2017, Las Palmas, Spain, 2017, vol. LNCS 10671, pp. 205-213. Fernandez_17_MobileWristVein_camera_ready.pdf (1.52 MB)
, “NFC-Schließsysteme auf Basis von FIDO U2F und EMV”, University of Applied Sciences Upper Austria, Embedded Systems Design, Hagenberg, Austria, 2017.
, “A performance assessment of network address shuffling in IoT systems”, in Computer Aided Systems Theory – EUROCAST 2017, Las Palmas, Gran Canaria, 2017, vol. LNCS 10671, pp. 197–204.
, “A performance assessment of network address shuffling in IoT systems”, in Computer Aided Systems Theory (EUROCAST 2017) – Extended Abstracts, Las Palmas, Gran Canaria, 2017, pp. 138–139.
, “Predicting Casino Statistics using Context Data”, University of Applied Sciences Upper Austria, Embedded Systems Design, Hagenberg, Austria, 2017.
, “Protecting Touch: Authenticated App-To-Server Channels for Mobile Devices Using NFC Tags”, Information, vol. 8, no. 3:81, 2017.
, “Risikoadaptive Authentifizierungsstrategien für mobile Endgeräte”, FHDW Paderborn, Paderborn, Germany, 2017.
, “Security and Privacy in Mobile Environments”, Vienna University of Technology, Faculty of Informatics, Vienna, Austria, 2017.
, “ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices”, IEEE Transactions on Mobile Computing (IEEE TMC), vol. 16, no. 4, p. 1175, 2017. findling2017shake.pdf (6.54 MB)
, “Smartphone-based Gait Recognition: From Authentication to Imitation”, IEEE Transactions on Mobile Computing, 2017.
, “Unobtrusive Mutual Mobile Authentication with Biometrics and Mobile Device Motion”, JKU Johannes Kepler University Linz, Linz, 2017. Findling_17_UnobtrusiveMutualMobile.pdf (5.36 MB)
, “User-friendly Secure Mobile Environments (Final Report for JRC u’smile)”, University of Applied Sciences Upper Austria and SBA Research, JR-Center u'smile, Hagenberg, 2017.
, “u'smile – Secure Mobile Environments”, ERCIM News, vol. 109, pp. 53–54, 2017.
, “Wi-Fi Data Transmission: Android & iOS Interoperability”, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, 2017. Hengstberger - Tchnical Report WifiDirect (Feb 2017).pdf (603.86 KB)
, “Accelerometer based Gait Recognition using Adapted Gaussian Mixture Models”, in Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, 2016, pp. 288-291. p288-muaaz.pdf (507.06 KB)
, “Browser History Stealing with Captive Wi-Fi Portals”, in Security and Privacy Workshops (SPW), 2016 IEEE, San Jose, CA, USA, 2016, pp. 234–240.
, “Combinatorial Methods in Security Testing”, IEEE Computer, vol. 49, no. 10, pp. 80–83, 2016.
, “Comparing the Placement of Two Arm-Worn Devices for Recognizing Dynamic Hand Gestures”, in Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, 2016, pp. 99-104. p99-kefer.pdf (442.02 KB)
, “Continuous Biometric Authentication using Electrocardiographic (ECG) Data”, Department of Mobile Computing, School of Informatics, Communication and Media, University of Applied Sciences Upper Austria, Hagenberg, 2016. Pummer_16_ContinuousBiometricAuthentication.pdf (10.33 MB)
, “DAMN - A Debugging and Manipulation Tool for Android Applications”, in Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, 2016, pp. 40-44. p40-schoiber.pdf (221.04 KB)
, “DAMN – a Debugging Tool for Source Code Reverse Engineering and Dynamic Manipulation Live on Android Devices”, University of Applied Sciences Upper Austria, Hagenberg, 2016. Schoiber_MSc_DAMN.pdf (2.22 MB)
, “Entwicklung und Evaluierung eines BadUSB-Sticks zum Abhören von Netzwerkverbindungen”, University of Applied Sciences Upper Austria, Hagenberg, 2016. Wolfmayr_MSc_BadUSBNetworkMonitor.pdf (11.47 MB)
, “Executing Arbitrary Code in the Context of the Smartcard System Service”, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, arXiv:1601.05833 [cs.CR], Computing Research Repository (CoRR), arXiv.org/corr, 2016. Roland - Executing Arbitrary Code in the Context of the Smartcard System Service (V2.0, Jan 2016).pdf (1.07 MB)
, “Location-based Risk Assessment for Mobile Authentication”, in 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp Adjunct 2016, Heidelberg, Germany, September 12-16, 2016, Heidelberg, Germany, 2016, pp. 85–88.
, “Mobile Gait Match-on-Card Authentication from Acceleration Data with Offline-Simplified Models”, in Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, 2016, pp. 250-260. p250-findling.pdf (568.8 KB)
, “Notary-Assisted Certificate Pinning for Improved Security of Android Apps”, in Availability, Reliability and Security (ARES), 2016 11th International Conference on, Salzburg, Austria, 2016, pp. 365–371.
, “Open Mobile API: Accessing the UICC on Android Devices”, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, arXiv:1601.03027 [cs.CR], Computing Research Repository (CoRR), arXiv.org/corr, 2016. Roland, Hoelzl - Open Mobile API - Accessing the UICC on Android Devices (Jan 2016).pdf (1.04 MB)
, “PhonyKeyboard: Sensorenhanced Keystroke Dynamics Authentication on Mobile Devices”, Johannes Kepler University Linz, Institute of Networks and Security, Linz, Austria, 2016.
, “Picky: Efficient and Reproducible Sharing of Large Datasets Using Merkle-Trees”, in 2016 IEEE 24th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), London, UK, 2016. picky_preprint.pdf (893.06 KB)
, “Pin it! Improving Android network security at runtime”, in IFIP Networking Conference (IFIP Networking) and Workshops, 2016, Vienna, Austria, 2016, pp. 297–305.
, “Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?”, ACM Computing Surveys, vol. 49, no. 1:4, 2016.
, “Real-World Identification: Towards a Privacy-Aware Mobile eID for Physical and Offline Verification”, in Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, 2016, pp. 280-283. p280-holzl.pdf (200.75 KB)
, “TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach”, in Software Quality, Reliability and Security (QRS), 2016 IEEE International Conference on, Vienna, Austria, 2016.
, “Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services”, in Data and Applications Security and Privacy XXX (DBSec 2016), Trento, Italy, 2016, vol. LNCS 9766/2016, pp. 331–346.
, “An Advanced Security Policy System for Android”, University of Applied Sciences Upper Austria, Mobile Computing, Hagenberg, Austria, 2015.
, “Bluetooth Low Energy Sniffing on Android”, University of Applied Sciences Upper Austria, Hagenberg, 2015.
, “Confidence and Risk Estimation Plugins for Multi-Modal Authentication on Mobile Devices using CORMORANT”, in 13th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2015), Brussels, Belgium, 2015, pp. 384–388. Hintze_15_ConfidenceandRisk.pdf (560.81 KB)
, “CORMORANT: Towards Continuous Risk-Aware Multi-Modal Cross-Device Authentication”, in Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp 2015), Osaka, Japan, 2015, pp. 169–172. Hintze_15_CORMORANT:TowardsContinuous_posterpaper.pdf (555.14 KB)
, “Cross Pocket Gait Authentication using Mobile Phone Based Accelerometer Sensor”, Computer Aided Systems Theory – EUROCAST 2015, vol. LNCS 9520/2015. Springer, Las Palmas, Gran Canaria, pp. 731–738, 2015.
, “Evaluation of Contactless Smartcard Antennas”, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, arXiv:1507.06427 [cs.CR], Computing Research Repository (CoRR), arXiv.org/corr, 2015. Roland, Hoelzl - Evaluation of Contactless Smartcard Antennas (Jun 2015).pdf (4.6 MB)
, , “Key Code Recognition: Case Study of Automatically Deriving the Code of a Physical Key from Mobile Device Camera Images for the EVVA A key profile”, University of Applied Sciences Upper Austria, Hagenberg, 2015. Findling_15_KeyCodeRecognition:.pdf (3.19 MB)
, “KVM based virtualization for Android devices”, University of Applied Sciences Upper Austria, Mobile Computing, Hagenberg, Austria, 2015.
, “Network Security Challenges in Android Applications”, in Availability, Reliability and Security (ARES), 2015 10th International Conference on, Toulouse, France, 2015, pp. 327–332.
, “Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing”, in Financial Cryptography and Data Security (FC 2015), San Juan, Puerto Rico, 2015, vol. 8976/2015, pp. 274–280.
, “Only play in your comfort zone: interaction methods for improving security awareness on mobile devices”, Personal and Ubiquitous Computing, vol. 19, no. 5-6, p. 954, 2015. preprint.pdf (6.09 MB)
, “Optimal Derotation of Shared Acceleration Time Series by Determining Relative Spatial Alignment”, International Journal of Pervasive Computing and Communications (IJPCC), vol. 11, no. 4, p. 466, 2015. Mayrhofer_15_OptimalDerotationOf.pdf (1.61 MB)
, “Password manager integration for Android”, University of Applied Sciences Upper Austria, Mobile Computing, Hagenberg, Austria, 2015.
, “A Password-authenticated Secure Channel for App to Java Card Applet Communication”, International Journal of Pervasive Computing and Communications (IJPCC), vol. 11, no. 4, 2015.
, “Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia”, 14th International Conference on Mobile and Ubiquitous Multimedia (MUM '15). ACM, Linz, Austria, p. 443, 2015.
, “QR Code Security – How Secure and Usable Apps Can Protect Users Against Malicious QR Codes”, in Availability, Reliability and Security (ARES), 2015 10th International Conference on, Toulouse, France, 2015, pp. 230–237.
, “Security and privacy of smartphone messaging applications”, International Journal of Pervasive Computing and Communications, vol. 11, no. 2, pp. 132–150, 2015.
, Security Issues in Mobile NFC Devices. Cham: Springer, 2015, p. 185.
, “Security tests for mobile applications–-Why using TLS/SSL is not enough”, in Software Testing, Verification and Validation Workshops (ICSTW), 2015 IEEE Eighth International Conference on, Graz, Austria, 2015, pp. 69–73.
, “Straightjacket: Tightening Process Execution Policies at Runtime”, Vienna University of Technology, Vienna, Austria, 2015.
, “Towards Device-to-User Authentication: Protecting Against Phishing Hardware by Ensuring Mobile Device Authenticity using Vibration Patterns”, in 14th International Conference on Mobile and Ubiquitous Multimedia (MUM '15), Linz, Austria, 2015, pp. 131–136. Findling_15_TowardsDeviceto.pdf (138.91 KB)
, “Towards Transparent Multi-Device-Authentication”, in 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, Osaka, Japan, 2015, pp. 435-440.
, “AES-SEC: Improving Software Obfuscation through Hardware-Assistance”, in Availability, Reliability and Security (ARES), 2014 Ninth International Conference on, Fribourg, Switzerland, 2014, pp. 184–191.
, “An architecture for secure mobile devices”, Security and Communication Networks, vol. 8, no. 10, pp. 1958-1970, 2014.
, “Cloud-gestützte Speichermedien auf Basis von NFC”, University of Applied Sciences Upper Austria, Embedded Systems Design, Hagenberg, Austria, 2014.
, “Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation”, Computers & Security, vol. 42, no. May 2014, pp. 13–26, 2014.
, “Diversity in Locked and Unlocked Mobile Device Usage”, in UbiComp/ISWC 2014 Programming Competition, UbiComp '14 Adjunct: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, 2014, pp. 379-384. Hintze_14_DiversityinLocked.pdf (327 KB)
, “Emulator für NFC-Smartcards zur Demonstration von Relaying-Angriffen”, University of Applied Sciences Upper Austria, Embedded Systems Design, Hagenberg, Austria, 2014.
, “Enter Sandbox: Android Sandbox Comparison”, in Proceedings of the IEEE Mobile Security Technologies workshop (MoST), 2014.
, “Guidelines for secure user interface handling”, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, 2014.
, “HotPatch Framework”, SBA Research, JR-Center u'smile, Hagenberg, 2014.
, “IMSI-Catch Me If You Can: IMSI-Catcher-Catchers”, in Annual Computer Security Applications Conference (ACSAC), New Orleans, Louisiana, USA, 2014.
, “Individuelle Verschleierung von Standortinformationen für Anwendungen auf mobilen Endgeräten”, Vienna University of Technology, Vienna, 2014.
, “Managing the life cycle of Java Card applets in other Java virtual machines”, International Journal of Pervasive Computing and Communications, vol. 10, no. 3, pp. 291–312, 2014.
, “Metacommunication”, FH Campus Wien, Vienna, Austria, 2014.
, “Methods of Graphical authentication – Grafische Authentisierungs Methoden auf dem Prüfstand”, FH Campus Wien, Vienna, Austria, 2014.
, “Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel”, in Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2014), 2014.
, “Mobile Device Usage Characteristics: The Effect of Context and Form Factor on Locked and Unlocked Usage”, in Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2014), New York, NY, USA, 2014, pp. 105-114. Hintze_14_MobileDeviceUsage.pdf (722.63 KB)
, “Mobile Testing Guidelines”, SBA Research, JR-Center u'smile, Vienna, 2014.
, “Optimal Derotation of Shared Acceleration Time Series by Determining Relative Spatial Alignment”, in Proc. iiWAS 2014: 16th International Conference on Information Integration and Web-based Applications & Services, 2014, pp. 71-78. Mayrhofer_14_OptimalDerotationShared.pdf (1.47 MB)
, “Orientation Independent Cell Phone Based Gait Authentication”, in Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2014), 2014, pp. 161-164.
, “Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations”, in SIN '14 Proceedings of the 7th International Conference on Security of Information and Networks, 2014, p. 434.
, “A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices”, in Information Security Conference (ISC 2014), Hong Kong, 2014. usmile-ISC14-SecureBoot.pdf (643.58 KB)
, “Prototypical implementation and demonstration of context sensing and reasoning on embedded mobile devices for estimating current context aspects”, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, 2014.
, “Prototypical Implementation and Demonstration of Multiple Multi-Channel Device Authentication Protocols Using Embedded Sensors on Various Off-the-shelf Mobile Phones”, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, 2014.
, “QR Code Security: A Survey of Attacks and Challenges for Usable Security”, in International Conference on Human Aspects of Information Security, Privacy and Trust at the 16th International Conference on Human-Computer Interaction (HCI), 2014, vol. 8533/2014 (LNCS), pp. 79–90.
, “Requirement Analysis for Library Swapping in Mobile Operating Systems”, SBA Research, JR-Center u'smile, Vienna, 2014.
, “Requirements for Secure Input and Output on Personal Mobile Devices and an Analysis of Advantages/Disadvantages of Different Solutions”, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, 2014.
, “Security and trust in context-aware applications”, Personal and Ubiquitous Computing, vol. 18, pp. 115–116, 2014.
, “Security Challenges in Mobile Middleware”, Vienna University of Technology, Vienna, 2014.
, “Security-Sensitive Applications on Android Devices using NFC Secure Elements”, University of Applied Sciences Upper Austria, Hagenberg, 2014.
, “ShakeUnlock: Securely Unlock Mobile Devices by Shaking them Together”, in Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia, New York, NY, USA, 2014, pp. 165-174. Findling_14_ShakeUnlockSecure.pdf (3.69 MB)
, “A Survey of User Interaction for Spontaneous Device Association”, ACM Computing Surveys, 2014.
, “Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices”, in SIN '14 Proceedings of the 7th International Conference on Security of Information and Networks, 2014, p. 17.
, “(Ab)using foreign VMs: Running Java Card Applets in non-Java Card Virtual Machines”, in Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013), 2013, pp. 286–292.
, “Analysis of Compass Sensor Accuracy on Several Mobile Devices in an Industrial Environment”, in Second International Workshop on Mobile Computing Platforms and Technologies (MCPT 2013), colocated with Eurocast 2013, Las Palmas, Gran Canaria, 2013, pp. 381–389.
, “An Analysis of Different Approaches to Gait Recognition Using Cell Phone Based Accelerometers”, in 11th International Conference on Advances in Mobile Computing and Multimedia, (MoMM 2013), Vienna, Austria, 2013.
, “Android Application Obfuscation”, SBA Research, JR-Center u'smile, Vienna, 2013.
, “Appinspect: large-scale evaluation of social networking apps”, in Proceedings of the first ACM conference on Online social networks, 2013, pp. 143–154.
, “Applying Relay Attacks to Google Wallet”, in Proceedings of the Fifth International Workshop on Near Field Communication (NFC 2013), Zurich, Switzerland, 2013.
, “Comparison of the Usability and Security of NFC's Different Operating Modes in Mobile Devices”, e & i Elektrotechnik und Informationstechnik, vol. 130, no. 7, pp. 201–206, 2013.
, “Debugging and Rapid Prototyping of NFC Secure Element Applications”, in Mobile Computing, Applications, and Services (MobiCASE 2013), 2013, vol. 130/2014, LNICST, pp. 298–313.
, “Mobile security improvements through privileged applications”, SBA Research, JR-Center u'smile, Vienna, 2013.
, “Pan Shot Face Unlock: Towards Unlocking Personal Mobile Devices using Stereo Vision and Biometric Face Information from multiple Perspectives”, University of Applied Sciences Upper Austria, Hagenberg, 2013. findling_13_msc_thesis.pdf (24.89 MB)
, “Personal Data Service: Accessing and Aggregating Personal Data”, in "My Life, Shared" - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312), A. Acquisti, I. Krontiris, M. Langheinrich, and M.A. Sasse (eds.), Dagstuhl Reports., vol. 3, issue 7, Dagstuhl Publishing, Germany: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2013, pp. 87–92.
, “Quantifying the Impact of Device-level Encryption Extensions on Android OS”, University of Applied Sciences Upper Austria, Mobile Computing, Hagenberg, Austria, 2013.
, “Range Face Segmentation: Face Detection and Segmentation for Authentication in Mobile Device Range Images”, in Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM 2013), Vienna, Austria, 2013, pp. 260–269. findling_13_range_face_segmentation.pdf (1.31 MB)
, “Requirements Analysis for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices”, in Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM 2013), Vienna, Austria, 2013, pp. 249–252.
, “Requirements for changes to common software security assessment frameworks for effective practical security testing of mobile services”, SBA Research, JR-Center u'smile, Vienna, 2013.
, “Requirements for Mobile Application Virtualization and Mobile TPM/SE Integration”, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, 2013.
, “Security and Privacy Implications of Third-Party Access to Online Social Networks”, Vienna University of Technology, Faculty of Informatics, Vienna, Austria, 2013.
, “Security Issues in Mobile NFC Devices”, Johannes Kepler University Linz, Department of Computational Perception, Linz, Austria, 2013.
, “Sichere Speicherung von sensiblen Informationen auf Smartphones”, University of Applied Sciences Technikum Wien, Vienna, 2013.
, “Towards an Open Ecosystem for Embedded Tamper Resistant Hardware in Mobile Devices”, in Adjunct Proceedings the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013), Zürich, Switzerland, 2013.
, “Towards Pan Shot Face Unlock: Using Biometric Face Information from Different Perspectives to Unlock Mobile Devices”, International Journal of Pervasive Computing and Communications, vol. 9, no. 3, pp. 190–208, 2013.
, “Towards Secure Personal Device Unlock using Stereo Camera Pan Shots”, in Second International Workshop on Mobile Computing Platforms and Technologies (MCPT 2013), colocated with Eurocast 2013, Las Palmas, Gran Canaria, 2013. findling_13_stereo_pan_shot_face_unlock.pdf (524.84 KB)
, “Towards the Principal Applicability of a Zone Concept to Create a User-Friendly Secure Mobile Environment”, in Adjunct Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013), 2013.
, “A Transparent and Continuous Biometric Authentication Framework for User-Friendly Secure Mobile Environments”, in Adjunct Proceedings the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013). Zürich, Switzerland, 2013.
, “UACAP: A Unified Auxiliary Channel Authentication Protocol”, IEEE Transactions on Mobile Computing, vol. 12, pp. 710–721, 2013.
, “Visualizations and Switching Mechanisms for Security Zones”, in Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013), Vienna, Austria, 2013, pp. 278–281.
, “When Users Cannot Verify Digital Signatures: On the Difficulties of Securing Mobile Devices”, in Proceedings of the 2013 IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013, pp. 1579–1584 .
, “Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack”, University of Applied Sciences Upper Austria, Hagenberg, arXiv:1209.0875 [cs.CR], Computing Research Repository (CoRR), arXiv.org/corr, 2012.
, “Influence of different walking speeds and surfaces on accelerometer-based biometric gait recognition”, in Proceedings of 35th International Conference on Telecommunications and Signal Processing (TSP), 2012, pp. 508–512.
, “Practical Attack Scenarios on Secure Element-enabled Mobile Devices”, in Proceedings of the Fourth International Workshop on Near Field Communication (NFC 2012), Helsinki, Finland, 2012, pp. 19–24.
, “Relay Attacks on Secure Element-enabled Mobile Devices: Virtual Pickpocketing Revisited”, in Information Security and Privacy Research, Heraklion, Creete, Greece, 2012, vol. IFIP AICT 376/2012, pp. 1–12.
, “SAPHE - Simple Accelerometer based wireless Pairing with HEuristic trees”, in Proceedings of the 10th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2012), 2012.
, “Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare?”, in 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, Newcastle, UK, 2012.
, “Towards a Practical, Scalable Self-Localization System for Android Phones Based on WLAN Fingerprinting”, in Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on, 2012, pp. 98-101.
, “Towards Face Unlock: On the Difficulty of Reliably Detecting Faces on Mobile Phones”, in Proceedings of the 10th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2012), Bali, Indonesia, 2012, pp. 275–280. findling_12_towards_face_unlock.pdf (1.05 MB)
, “Towards usable authentication on mobile phones: An evaluation of speaker and face recognition on off-the-shelf handsets”, in Proc. IWSSI/SPMU 2012: 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, colocated with Pervasive 2012, 2012.
,