Josef Ressel Center for User-friendly Secure Mobile Environments
Publications
Filters: Author is Georg Merzdovnik [Clear All Filters]
“Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools”, in Security and Privacy (EuroS&P), 2017 IEEE European Symposium on, Paris, France, 2017, pp. 319–333.
, “Lightweight Address Hopping for Defending the IPv6 IoT”, in Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio Calabria, Italy, 2017.
, “A performance assessment of network address shuffling in IoT systems”, in Computer Aided Systems Theory – EUROCAST 2017, Las Palmas, Gran Canaria, 2017, vol. LNCS 10671, pp. 197–204.
, “A performance assessment of network address shuffling in IoT systems”, in Computer Aided Systems Theory (EUROCAST 2017) – Extended Abstracts, Las Palmas, Gran Canaria, 2017, pp. 138–139.
, “Security and Privacy in Mobile Environments”, Vienna University of Technology, Faculty of Informatics, Vienna, Austria, 2017.
, “User-friendly Secure Mobile Environments (Final Report for JRC u’smile)”, University of Applied Sciences Upper Austria and SBA Research, JR-Center u'smile, Hagenberg, 2017.
, “u'smile – Secure Mobile Environments”, ERCIM News, vol. 109, pp. 53–54, 2017.
, “Browser History Stealing with Captive Wi-Fi Portals”, in Security and Privacy Workshops (SPW), 2016 IEEE, San Jose, CA, USA, 2016, pp. 234–240.
, “Notary-Assisted Certificate Pinning for Improved Security of Android Apps”, in Availability, Reliability and Security (ARES), 2016 11th International Conference on, Salzburg, Austria, 2016, pp. 365–371.
, “Pin it! Improving Android network security at runtime”, in IFIP Networking Conference (IFIP Networking) and Workshops, 2016, Vienna, Austria, 2016, pp. 297–305.
, “Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?”, ACM Computing Surveys, vol. 49, no. 1:4, 2016.
, “Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services”, in Data and Applications Security and Privacy XXX (DBSec 2016), Trento, Italy, 2016, vol. LNCS 9766/2016, pp. 331–346.
, “Network Security Challenges in Android Applications”, in Availability, Reliability and Security (ARES), 2015 10th International Conference on, Toulouse, France, 2015, pp. 327–332.
, “AES-SEC: Improving Software Obfuscation through Hardware-Assistance”, in Availability, Reliability and Security (ARES), 2014 Ninth International Conference on, Fribourg, Switzerland, 2014, pp. 184–191.
, “Enter Sandbox: Android Sandbox Comparison”, in Proceedings of the IEEE Mobile Security Technologies workshop (MoST), 2014.
, “Mobile Testing Guidelines”, SBA Research, JR-Center u'smile, Vienna, 2014.
, “Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations”, in SIN '14 Proceedings of the 7th International Conference on Security of Information and Networks, 2014, p. 434.
, “Requirement Analysis for Library Swapping in Mobile Operating Systems”, SBA Research, JR-Center u'smile, Vienna, 2014.
, “Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices”, in SIN '14 Proceedings of the 7th International Conference on Security of Information and Networks, 2014, p. 17.
, “Android Application Obfuscation”, SBA Research, JR-Center u'smile, Vienna, 2013.
,