Josef Ressel Center for User-friendly Secure Mobile Environments
Publications
Filters: Author is Edgar R. Weippl [Clear All Filters]
“Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools”, in Security and Privacy (EuroS&P), 2017 IEEE European Symposium on, Paris, France, 2017, pp. 319–333.
, “Lightweight Address Hopping for Defending the IPv6 IoT”, in Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio Calabria, Italy, 2017.
, “A performance assessment of network address shuffling in IoT systems”, in Computer Aided Systems Theory – EUROCAST 2017, Las Palmas, Gran Canaria, 2017, vol. LNCS 10671, pp. 197–204.
, “A performance assessment of network address shuffling in IoT systems”, in Computer Aided Systems Theory (EUROCAST 2017) – Extended Abstracts, Las Palmas, Gran Canaria, 2017, pp. 138–139.
, “User-friendly Secure Mobile Environments (Final Report for JRC u’smile)”, University of Applied Sciences Upper Austria and SBA Research, JR-Center u'smile, Hagenberg, 2017.
, “u'smile – Secure Mobile Environments”, ERCIM News, vol. 109, pp. 53–54, 2017.
, “Browser History Stealing with Captive Wi-Fi Portals”, in Security and Privacy Workshops (SPW), 2016 IEEE, San Jose, CA, USA, 2016, pp. 234–240.
, “Notary-Assisted Certificate Pinning for Improved Security of Android Apps”, in Availability, Reliability and Security (ARES), 2016 11th International Conference on, Salzburg, Austria, 2016, pp. 365–371.
, “Pin it! Improving Android network security at runtime”, in IFIP Networking Conference (IFIP Networking) and Workshops, 2016, Vienna, Austria, 2016, pp. 297–305.
, “Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?”, ACM Computing Surveys, vol. 49, no. 1:4, 2016.
, “Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services”, in Data and Applications Security and Privacy XXX (DBSec 2016), Trento, Italy, 2016, vol. LNCS 9766/2016, pp. 331–346.
, “Network Security Challenges in Android Applications”, in Availability, Reliability and Security (ARES), 2015 10th International Conference on, Toulouse, France, 2015, pp. 327–332.
, “Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing”, in Financial Cryptography and Data Security (FC 2015), San Juan, Puerto Rico, 2015, vol. 8976/2015, pp. 274–280.
, “QR Code Security – How Secure and Usable Apps Can Protect Users Against Malicious QR Codes”, in Availability, Reliability and Security (ARES), 2015 10th International Conference on, Toulouse, France, 2015, pp. 230–237.
, “Security and privacy of smartphone messaging applications”, International Journal of Pervasive Computing and Communications, vol. 11, no. 2, pp. 132–150, 2015.
, “Security tests for mobile applications–-Why using TLS/SSL is not enough”, in Software Testing, Verification and Validation Workshops (ICSTW), 2015 IEEE Eighth International Conference on, Graz, Austria, 2015, pp. 69–73.
, “AES-SEC: Improving Software Obfuscation through Hardware-Assistance”, in Availability, Reliability and Security (ARES), 2014 Ninth International Conference on, Fribourg, Switzerland, 2014, pp. 184–191.
, “Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation”, Computers & Security, vol. 42, no. May 2014, pp. 13–26, 2014.
, “Enter Sandbox: Android Sandbox Comparison”, in Proceedings of the IEEE Mobile Security Technologies workshop (MoST), 2014.
, “IMSI-Catch Me If You Can: IMSI-Catcher-Catchers”, in Annual Computer Security Applications Conference (ACSAC), New Orleans, Louisiana, USA, 2014.
, “Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations”, in SIN '14 Proceedings of the 7th International Conference on Security of Information and Networks, 2014, p. 434.
, “QR Code Security: A Survey of Attacks and Challenges for Usable Security”, in International Conference on Human Aspects of Information Security, Privacy and Trust at the 16th International Conference on Human-Computer Interaction (HCI), 2014, vol. 8533/2014 (LNCS), pp. 79–90.
, “Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices”, in SIN '14 Proceedings of the 7th International Conference on Security of Information and Networks, 2014, p. 17.
, “Appinspect: large-scale evaluation of social networking apps”, in Proceedings of the first ACM conference on Online social networks, 2013, pp. 143–154.
,