Publications

Filters: Author is Edgar R. Weippl  [Clear All Filters]
2017
Merzdovnik, G., Huber, M., Buhov, D., Nikiforakis, N., Neuner, S., Schmiedecker, M., and Weippl, E. R., Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools, in Security and Privacy (EuroS&P), 2017 IEEE European Symposium on, Paris, France, 2017, pp. 319–333.
Judmayer, A., Ullrich, J., Merzdovnik, G., Voyiatzis, A. G., and Weippl, E. R., Lightweight Address Hopping for Defending the IPv6 IoT, in Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio Calabria, Italy, 2017.
Merzdovnik, G., Judmayer, A., Voyiatzis, A. G., and Weippl, E. R., A performance assessment of network address shuffling in IoT systems, in Computer Aided Systems Theory – EUROCAST 2017, Las Palmas, Gran Canaria, 2017, vol. LNCS 10671, pp. 197–204.
Merzdovnik, G., Judmayer, A., Voyiatzis, A. G., and Weippl, E. R., A performance assessment of network address shuffling in IoT systems, in Computer Aided Systems Theory (EUROCAST 2017) – Extended Abstracts, Las Palmas, Gran Canaria, 2017, pp. 138–139.
Mayrhofer, R., Weippl, E. R., Buhov, D., Findling, R. D., Hintze, D., Hölzl, M., Merzdovnik, G., Muaaz, M., and Roland, M., User-friendly Secure Mobile Environments (Final Report for JRC u’smile), University of Applied Sciences Upper Austria and SBA Research, JR-Center u'smile, Hagenberg, 2017.
Merzdovnik, G., Buhov, D., Voyiatzis, A. G., and Weippl, E. R., u'smile – Secure Mobile Environments, ERCIM News, vol. 109, pp. 53–54, 2017.
2016
Dabrowski, A., Merzdovnik, G., Kommenda, N., and Weippl, E. R., Browser History Stealing with Captive Wi-Fi Portals, in Security and Privacy Workshops (SPW), 2016 IEEE, San Jose, CA, USA, 2016, pp. 234–240.
Merzdovnik, G., Buhov, D., Voyiatzis, A. G., and Weippl, E. R., Notary-Assisted Certificate Pinning for Improved Security of Android Apps, in Availability, Reliability and Security (ARES), 2016 11th International Conference on, Salzburg, Austria, 2016, pp. 365–371.
Buhov, D., Huber, M., Merzdovnik, G., and Weippl, E. R., Pin it! Improving Android network security at runtime, in IFIP Networking Conference (IFIP Networking) and Workshops, 2016, Vienna, Austria, 2016, pp. 297–305.
Schrittwieser, S., Katzenbeisser, S., Kinder, J., Merzdovnik, G., and Weippl, E. R., Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?, ACM Computing Surveys, vol. 49, no. 1:4, 2016.
Merzdovnik, G., Falb, K., Schmiedecker, M., Voyiatzis, A. G., and Weippl, E. R., Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services, in Data and Applications Security and Privacy XXX (DBSec 2016), Trento, Italy, 2016, vol. LNCS 9766/2016, pp. 331–346.
2015
Buhov, D., Huber, M., Merzdovnik, G., Weippl, E. R., and Dimitrova, V., Network Security Challenges in Android Applications, in Availability, Reliability and Security (ARES), 2015 10th International Conference on, Toulouse, France, 2015, pp. 327–332.
Krombholz, K., Dabrowski, A., Smith, M., and Weippl, E. R., Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing, in Financial Cryptography and Data Security (FC 2015), San Juan, Puerto Rico, 2015, vol. 8976/2015, pp. 274–280.
Krombholz, K., Frühwirt, P., Rieder, T., Kapsalis, I., Ullrich, J., and Weippl, E. R., QR Code Security – How Secure and Usable Apps Can Protect Users Against Malicious QR Codes, in Availability, Reliability and Security (ARES), 2015 10th International Conference on, Toulouse, France, 2015, pp. 230–237.
Mueller, R., Schrittwieser, S., Fruehwirt, P., Kieseberg, P., and Weippl, E. R., Security and privacy of smartphone messaging applications, International Journal of Pervasive Computing and Communications, vol. 11, no. 2, pp. 132–150, 2015.
Kieseberg, P., Frühwirt, P., Schrittwieser, S., and Weippl, E. R., Security tests for mobile applications–-Why using TLS/SSL is not enough, in Software Testing, Verification and Validation Workshops (ICSTW), 2015 IEEE Eighth International Conference on, Graz, Austria, 2015, pp. 69–73.
2014
Schrittwieser, S., Katzenbeisser, S., Merzdovnik, G., Kieseberg, P., and Weippl, E. R., AES-SEC: Improving Software Obfuscation through Hardware-Assistance, in Availability, Reliability and Security (ARES), 2014 Ninth International Conference on, Fribourg, Switzerland, 2014, pp. 184–191.
Schrittwieser, S., Katzenbeisser, S., Kieseberg, P., Huber, M., Leithner, M., Mulazzani, M., and Weippl, E. R., Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation, Computers & Security, vol. 42, no. May 2014, pp. 13–26, 2014.
Neuner, S., Van der Veen, V., Lindorfer, M., Huber, M., Merzdovnik, G., Mulazzani, M., and Weippl, E. R., Enter Sandbox: Android Sandbox Comparison, in Proceedings of the IEEE Mobile Security Technologies workshop (MoST), 2014.
Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., and Weippl, E. R., IMSI-Catch Me If You Can: IMSI-Catcher-Catchers, in Annual Computer Security Applications Conference (ACSAC), New Orleans, Louisiana, USA, 2014.
Aufner, P., Merzdovnik, G., Huber, M., and Weippl, E. R., Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations, in SIN '14 Proceedings of the 7th International Conference on Security of Information and Networks, 2014, p. 434.
Krombholz, K., Frühwirt, P., Kieseberg, P., Kapsalis, I., Huber, M., and Weippl, E. R., QR Code Security: A Survey of Attacks and Challenges for Usable Security, in International Conference on Human Aspects of Information Security, Privacy and Trust at the 16th International Conference on Human-Computer Interaction (HCI), 2014, vol. 8533/2014 (LNCS), pp. 79–90.
Hochreiner, C., Huber, M., Merzdovnik, G., and Weippl, E. R., Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices, in SIN '14 Proceedings of the 7th International Conference on Security of Information and Networks, 2014, p. 17.
2013
Huber, M., Mulazzani, M., Schrittwieser, S., and Weippl, E. R., Appinspect: large-scale evaluation of social networking apps, in Proceedings of the first ACM conference on Online social networks, 2013, pp. 143–154.