Publications

Export 70 results:
Author Title Type [ Year(Asc)]
2016
Muaaz, M. and Mayrhofer, R., Accelerometer based Gait Recognition using Adapted Gaussian Mixture Models, in Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, 2016, pp. 288-291. p288-muaaz.pdf (507.06 KB)
Kefer, K., Holzmann, C., and Findling, R. D., Comparing the Placement of Two Arm-Worn Devices for Recognizing Dynamic Hand Gestures, in Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, 2016, pp. 99-104. p99-kefer.pdf (442.02 KB)
Pummer, C., Continuous Biometric Authentication using Electrocardiographic (ECG) Data, Department of Mobile Computing, School of Informatics, Communication and Media, University of Applied Sciences Upper Austria, Hagenberg, 2016. Pummer_16_ContinuousBiometricAuthentication.pdf (10.33 MB)
Schoiber, G., Mayrhofer, R., and Hölzl, M., DAMN - A Debugging and Manipulation Tool for Android Applications, in Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, 2016, pp. 40-44. p40-schoiber.pdf (221.04 KB)
Schoiber, G., DAMN – a Debugging Tool for Source Code Reverse Engineering and Dynamic Manipulation Live on Android Devices, University of Applied Sciences Upper Austria, Hagenberg, 2016. Schoiber_MSc_DAMN.pdf (2.22 MB)
Wolfmayr, D., Entwicklung und Evaluierung eines BadUSB-Sticks zum Abhören von Netzwerkverbindungen, University of Applied Sciences Upper Austria, Hagenberg, 2016. Wolfmayr_MSc_BadUSBNetworkMonitor.pdf (11.47 MB)
Roland, M., Executing Arbitrary Code in the Context of the Smartcard System Service, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, arXiv:1601.05833 [cs.CR], Computing Research Repository (CoRR), arXiv.org/corr, 2016. Roland - Executing Arbitrary Code in the Context of the Smartcard System Service (V2.0, Jan 2016).pdf (1.07 MB)
Hintze, D., Scholz, S., Koch, E., and Mayrhofer, R., Location-based Risk Assessment for Mobile Authentication, in 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp Adjunct 2016, Heidelberg, Germany, September 12-16, 2016, Heidelberg, Germany, 2016, p. 85--88.
Findling, R. D., Hölzl, M., and Mayrhofer, R., Mobile Gait Match-on-Card Authentication from Acceleration Data with Offline-Simplified Models, in Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, 2016, pp. 250-260. p250-findling.pdf (568.8 KB)
Roland, M. and Hölzl, M., Open Mobile API: Accessing the UICC on Android Devices, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, arXiv:1601.03027 [cs.CR], Computing Research Repository (CoRR), arXiv.org/corr, 2016. Roland, Hoelzl - Open Mobile API - Accessing the UICC on Android Devices (Jan 2016).pdf (1.04 MB)
Hölzl, M., Roland, M., and Mayrhofer, R., Real-World Identification: Towards a Privacy-Aware Mobile eID for Physical and Offline Verification, in Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, 2016, pp. 280-283. p280-holzl.pdf (200.75 KB)
2015
Koller, P., Bluetooth Low Energy Sniffing on Android, University of Applied Sciences Upper Austria, Hagenberg, 2015.
Hintze, D., Muaaz, M., Findling, R. D., Scholz, S., Koch, E., and Mayrhofer, R., Confidence and Risk Estimation Plugins for Multi-Modal Authentication on Mobile Devices using CORMORANT, in 13th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2015), Brussels, Belgium, 2015, p. 384--388.
Hintze, D., Findling, R. D., Muaaz, M., Koch, E., and Mayrhofer, R., CORMORANT: Towards Continuous Risk-Aware Multi-Modal Cross-Device Authentication, in Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp 2015), Osaka, Japan, 2015, p. 169--172. Hintze_15_CORMORANT:TowardsContinuous_posterpaper.pdf (555.14 KB)
Muaaz, M. and Mayrhofer, R., Cross Pocket Gait Authentication using Mobile Phone Based Accelerometer Sensor, Fifteenth International Conference on Computer Aided Systems Theory. 2015.
Roland, M. and Hölzl, M., Evaluation of Contactless Smartcard Antennas, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, arXiv:1507.06427 [cs.CR], Computing Research Repository (CoRR), arXiv.org/corr, 2015. Roland, Hoelzl - Evaluation of Contactless Smartcard Antennas (Jun 2015).pdf (4.6 MB)
Findling, R. D., Key Code Recognition: Case Study of Automatically Deriving the Code of a Physical Key from Mobile Device Camera Images for the EVVA A key profile, University of Applied Sciences Upper Austria, Hagenberg, 2015. Findling_15_KeyCodeRecognition:.pdf (3.19 MB)
Riedl, P., Mayrhofer, R., Möller, A., Kranz, M., Lettner, F., Holzmann, C., and Koelle, M., Only play in your comfort zone: interaction methods for improving security awareness on mobile devices, Personal and Ubiquitous Computing, vol. 19, no. 5-6, p. 954, 2015. preprint.pdf (6.09 MB)
Mayrhofer, R., Hlavacs, H., and Findling, R. D., Optimal Derotation of Shared Acceleration Time Series by Determining Relative Spatial Alignment, International Journal of Pervasive Computing and Communications (IJPCC), vol. 11, no. 4, 2015. Mayrhofer_15_OptimalDerotationOf.pdf (1.61 MB)
Hölzl, M., Asnake, E., Mayrhofer, R., and Roland, M., A Password-authenticated Secure Channel for App to Java Card Applet Communication, International Journal of Pervasive Computing and Communications (IJPCC), vol. 11, no. 4, 2015.
Holzmann, C., Mayrhofer, R., Häkkilä, J., Rukzio, E., and Roland, M., Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia, 14th International Conference on Mobile and Ubiquitous Multimedia (MUM '15). ACM, Linz, Austria, p. 443, 2015.
Roland, M., Security Issues in Mobile NFC Devices. Cham: Springer, 2015, p. 185.
Findling, R. D. and Mayrhofer, R., Towards Device-to-User Authentication: Protecting Against Phishing Hardware by Ensuring Mobile Device Authenticity using Vibration Patterns, in 14th International Conference on Mobile and Ubiquitous Multimedia (MUM '15), Linz, Austria, 2015, p. 131--136. Findling_15_TowardsDeviceto.pdf (138.91 KB)
Hintze, D., Towards Transparent Multi-Device-Authentication, in 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, Osaka, Japan, 2015, pp. 435-440.
2014
Mayrhofer, R., An architecture for secure mobile devices, Security and Communication Networks, vol. 8, no. 10, pp. 1958-1970, 2014.
Schrittwieser, S., Katzenbeisser, S., Kieseberg, P., Huber, M., Leithner, M., Mulazzani, M., and Weippl, E. R., Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation, Computers & Security, vol. 42, no. May 2014, p. 13--26, 2014.
Hintze, D., Findling, R. D., Muaaz, M., Scholz, S., and Mayrhofer, R., Diversity in Locked and Unlocked Mobile Device Usage, in UbiComp/ISWC 2014 Programming Competition, UbiComp '14 Adjunct: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, 2014, pp. 379-384. Hintze_14_DiversityinLocked.pdf (327 KB)
Neuner, S., Van der Veen, V., Lindorfer, M., Huber, M., Merzdovnik, G., Mulazzani, M., and Weippl, E. R., Enter Sandbox: Android Sandbox Comparison, in Proceedings of the IEEE Mobile Security Technologies workshop (MoST), 2014.
Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., and Weippl, E. R., IMSI-Catch Me If You Can: IMSI-Catcher-Catchers, in Annual Computer Security Applications Conference (ACSAC), New Orleans, Louisiana, USA, 2014.
Hochreiner, C., Individuelle Verschleierung von Standortinformationen für Anwendungen auf mobilen Endgeräten, Vienna University of Technology, Vienna, 2014.
Roland, M., Langer, J., and Mayrhofer, R., Managing the life cycle of Java Card applets in other Java virtual machines, International Journal of Pervasive Computing and Communications, vol. 10, no. 3, p. 291--312, 2014.
Hölzl, M., Asnake, E., Mayrhofer, R., and Roland, M., Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel, in Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2014), 2014.
Hintze, D., Findling, R. D., Scholz, S., and Mayrhofer, R., Mobile Device Usage Characteristics: The Effect of Context and Form Factor on Locked and Unlocked Usage, in Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2014), New York, NY, USA, 2014, pp. 105-114. Hintze_14_MobileDeviceUsage.pdf (722.63 KB)
Mayrhofer, R., Hlavacs, H., and Findling, R. D., Optimal Derotation of Shared Acceleration Time Series by Determining Relative Spatial Alignment, in Proc. iiWAS 2014: 16th International Conference on Information Integration and Web-based Applications & Services, 2014, pp. 71-78. Mayrhofer_14_OptimalDerotationShared.pdf (1.47 MB)
Muaaz, M. and Mayrhofer, R., Orientation Independent Cell Phone Based Gait Authentication, in Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2014), 2014, pp. 161-164.
Aufner, P., Merzdovnik, G., Huber, M., and Weippl, E. R., Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations, in SIN '14 Proceedings of the 7th International Conference on Security of Information and Networks, 2014, p. 434.
González, J., Hölzl, M., Riedl, P., Bonnet, P., and Mayrhofer, R., A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices, in Information Security Conference (ISC 2014), Hong Kong, 2014. usmile-ISC14-SecureBoot.pdf (643.58 KB)
Krombholz, K., Frühwirt, P., Kieseberg, P., Kapsalis, I., Huber, M., and Weippl, E. R., QR Code Security: A Survey of Attacks and Challenges for Usable Security, in International Conference on Human Aspects of Information Security, Privacy and Trust at the 16th International Conference on Human-Computer Interaction (HCI), 2014, vol. 8533/2014 (LNCS), p. 79--90.
Mayrhofer, R., Schmidtke, H. R., and Sigg, S., Security and trust in context-aware applications, Personal and Ubiquitous Computing, vol. 18, p. 115--116, 2014.
Aufner, P., Security Challenges in Mobile Middleware, Vienna University of Technology, Vienna, 2014.
Asnake, E., Security-Sensitive Applications on Android Devices using NFC Secure Elements, University of Applied Sciences Upper Austria, Hagenberg, 2014.
Findling, R. D., Muaaz, M., Hintze, D., and Mayrhofer, R., ShakeUnlock: Securely Unlock Mobile Devices by Shaking them Together, in Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia, New York, NY, USA, 2014, pp. 165-174. Findling_14_ShakeUnlockSecure.pdf (3.69 MB)
Ki Chong, M., Mayrhofer, R., and Gellersen, H., A Survey of User Interaction for Spontaneous Device Association, ACM Computing Surveys, 2014.
Hochreiner, C., Huber, M., Merzdovnik, G., and Weippl, E. R., Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices, in SIN '14 Proceedings of the 7th International Conference on Security of Information and Networks, 2014, p. 17.
2013
Roland, M., Langer, J., and Mayrhofer, R., (Ab)using foreign VMs: Running Java Card Applets in non-Java Card Virtual Machines, in Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013), 2013, p. 286--292.
Hölzl, M., Neumeier, R., and Ostermayer, G., Analysis of Compass Sensor Accuracy on Several Mobile Devices in an Industrial Environment, in Second International Workshop on Mobile Computing Platforms and Technologies (MCPT 2013), colocated with Eurocast 2013, Las Palmas, Gran Canaria, 2013, p. 381--389.
Muaaz, M. and Mayrhofer, R., An Analysis of Different Approaches to Gait Recognition Using Cell Phone Based Accelerometers, in 11th International Conference on Advances in Mobile Computing and Multimedia, (MoMM 2013), Vienna, Austria, 2013.
Huber, M., Mulazzani, M., Schrittwieser, S., and Weippl, E. R., Appinspect: large-scale evaluation of social networking apps, in Proceedings of the first ACM conference on Online social networks, 2013, p. 143--154.
Roland, M. and Langer, J., Comparison of the Usability and Security of NFC's Different Operating Modes in Mobile Devices, e & i Elektrotechnik und Informationstechnik, vol. 130, no. 7, p. 201--206, 2013.
Roland, M., Debugging and Rapid Prototyping of NFC Secure Element Applications, in Mobile Computing, Applications, and Services (MobiCASE 2013), 2013, vol. 130/2014, LNICST, p. 298--313.
Findling, R. D., Pan Shot Face Unlock: Towards Unlocking Personal Mobile Devices using Stereo Vision and Biometric Face Information from multiple Perspectives, University of Applied Sciences Upper Austria, Hagenberg, 2013. findling_13_msc_thesis.pdf (24.89 MB)
Acquisti, A., Bettini, C., Böhme, R., Castelluccia, C., Dimitriou, T., Dürr, F., Estrin, D., Friedewald, M., Ganti, R. K., Grossklags, J., Mayrhofer, R., Phillips, D., Rannenberg, K., Sadeh, N., and Scipioni, M., Personal Data Service: Accessing and Aggregating Personal Data, in "My Life, Shared" - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312), A. Acquisti, I. Krontiris, M. Langheinrich, and M.A. Sasse (eds.), Dagstuhl Reports., vol. 3, issue 7, Dagstuhl Publishing, Germany: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2013, p. 87--92.
Findling, R. D., Wenny, F., Holzmann, C., and Mayrhofer, R., Range Face Segmentation: Face Detection and Segmentation for Authentication in Mobile Device Range Images, in Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM 2013), Vienna, Austria, 2013, p. 260--269. findling_13_range_face_segmentation.pdf (1.31 MB)
Hölzl, M., Mayrhofer, R., and Roland, M., Requirements for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices, in Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM 2013), Vienna, Austria, 2013, p. 249--252.
Wultsch, Z., Sichere Speicherung von sensiblen Informationen auf Smartphones, University of Applied Sciences Technikum Wien, Vienna, 2013.
Hölzl, M., Towards an Open Ecosystem for Embedded Tamper Resistant Hardware in Mobile Devices, in Adjunct Proceedings the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013), Zürich, Switzerland, 2013.
Findling, R. D. and Mayrhofer, R., Towards Pan Shot Face Unlock: Using Biometric Face Information from Different Perspectives to Unlock Mobile Devices, International Journal of Pervasive Computing and Communications, vol. 9, no. 3, p. 190--208, 2013.
Findling, R. D. and Mayrhofer, R., Towards Secure Personal Device Unlock using Stereo Camera Pan Shots, in Second International Workshop on Mobile Computing Platforms and Technologies (MCPT 2013), colocated with Eurocast 2013, Las Palmas, Gran Canaria, 2013. findling_13_stereo_pan_shot_face_unlock.pdf (524.84 KB)
Riedl, P., Towards the Principal Applicability of a Zone Concept to Create a User-Friendly Secure Mobile Environment, in Adjunct Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013), 2013.
Muaaz, M., A Transparent and Continuous Biometric Authentication Framework for User-Friendly Secure Mobile Environments, in Adjunct Proceedings the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013). Zürich, Switzerland, 2013.
Mayrhofer, R., Fuss, J., and Ion, I., UACAP: A Unified Auxiliary Channel Authentication Protocol, IEEE Transactions on Mobile Computing, vol. 12, pp. 710–721, 2013.
Riedl, P., Koller, P., Mayrhofer, R., Möller, A., Koelle, M., and Kranz, M., Visualizations and Switching Mechanisms for Security Zones, in Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013), Vienna, Austria, 2013, p. 278--281.
Mayrhofer, R., When Users Cannot Verify Digital Signatures: On the Difficulties of Securing Mobile Devices, in Proceedings of the 2013 IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013, p. 1579--1584 .
2012
Muaaz, M. and Nickel, C., Influence of different walking speeds and surfaces on accelerometer-based biometric gait recognition, in Proceedings of 35th International Conference on Telecommunications and Signal Processing (TSP), 2012, p. 508--512.
Groza, B. and Mayrhofer, R., SAPHE - Simple Accelerometer based wireless Pairing with HEuristic trees, in Proceedings of the 10th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2012), 2012.
Riedl, P. and Mayrhofer, R., Towards a Practical, Scalable Self-Localization System for Android Phones Based on WLAN Fingerprinting, in Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on, 2012, pp. 98-101.
Findling, R. D. and Mayrhofer, R., Towards Face Unlock: On the Difficulty of Reliably Detecting Faces on Mobile Phones, in Proceedings of the 10th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2012), Bali, Indonesia, 2012, p. 275--280. findling_12_towards_face_unlock.pdf (1.05 MB)
Mayrhofer, R. and Kaiser, T., Towards usable authentication on mobile phones: An evaluation of speaker and face recognition on off-the-shelf handsets, in Proc. IWSSI/SPMU 2012: 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, colocated with Pervasive 2012, 2012.
yorandomusmilelink