We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Smoothing the Ride: Providing a Seamless Upgrade Path from Established Cross-Border eID Workflows Towards eID Wallet Systems
Czerny R., Kollmann C., Podgorelec B., Prünster B., Zefferer T.
SECRYPT 2023 - Proceedings of the 20th International Conference on Security and Cryptography, 20th International Conference on Security and Cryptography: SECRYPT 2023, 460-468, (Proceedings of the International Conference on Security and Cryptography; vol. 1)
A Security-Evaluation Framework for Mobile Cross-Border e-Government Solutions
Zefferer T., Prünster B., Kollmann C., Corici A., Alber L., Czerny R., Podgorelec B.
DGO '23: Proceedings of the 24th Annual International Conference on Digital Government Research, 24th Annual International Conference on Digital Government Research, 536–543, (ACM International Conference Proceeding Series)
Towards a Mobile-First Cross-Border eID Framework
Czerny R., Kollmann C., Podgorelec B., Prünster B., Zefferer T.
Proceedings of the 24th Annual International Conference on Digital Government Research - Together in the Unstable World, 24th Annual International Conference on Digital Government Research, 526–535, (ACM International Conference Proceeding Series)
Total Eclipse of the Heart – Disrupting the InterPlanetary File System
Prünster B., Marsalek A., Zefferer T.
31st USENIX Security Symposium, 31st USENIX Security Symposium, 3735-3752
AndroTIME: Identifying Timing Side Channels in the Android API
Palfinger G., Prünster B., Ziegler D.
Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 1849-1856
AndroPRINT: Analysing the Fingerprintability of the Android API
Palfinger G., Prünster B.
Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES 2020, 15th International Conference on Availability, Reliability and Security, (ACM International Conference Proceeding Series)
Multiply, Divide, and Conquer - Making Fully Decentralised Access Control a Reality
Prünster B., Palfinger G., Ziegler D.
Network and System Security - 14th International Conference, NSS 2020, Proceedings, 14th International Conference on Network and System Security, 311-326, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12570 LNCS)
Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs
Fasllija E., Enişer H., Prünster B.
15th EAI International Conference on Security and Privacy in Communication Networks, 15th EAI International Conference on Security and Privacy in Communication Networks
Prying CoW: Inferring Secrets Across Virtual Machine Boundaries
Palfinger G., Prünster B., Ziegler D.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 16th International Joint Conference on e-Business and Telecommunications, 187 - 197
Fides – Unleashing the Full Potential of Remote Attestation
Prünster B., Palfinger G., Kollmann C.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, SciTePress - Science and Technology Publications, 314--321
Master of Puppets: Trusting Silicon in the Fight for Practical Security in Fully Decentralised Peer-to-Peer Networks
Prünster B., Fasllija E., Mocher D.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, SciTePress - Science and Technology Publications, 252--259
SeDiCom
Marsalek A., Prünster B., Suzic B., Zefferer T.
Information Systems Security - 14th International Conference, ICISS 2018, Proceedings, 14th International Conference on Information Systems Security, 345-363, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11281 LNCS)
SUNFISH ID1v2 – Identity Management and Access Control at Work
Reiter A., Suzic B., Leitold H., Marsalek A., Prünster B., Ziegler D.
Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases
Reiter A., Prünster B., Zefferer T.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, IEEE Press, 935-944
SUNFISH ID1v1 – Identity Management and Access Control
Reiter A., Suzic B., Leitold H., Marsalek A., Prünster B., Ziegler D.