Direkt zum Inhalt
Imagebild stilisiertes Gehirn

Publikationen & Patente

Top-Publikationen

Anomaly Detection & Cyber Threat Intelligence

 

Cyber-Physical Systems

  • Friedberg I., Hong X., Mclaughlin K., Smith P., Miller P.C.: "Evidential Network Modeling for Cyber-Physical System State Inference," IEEE Access, vol. 5, pp. 17149-17164, 2017.
  • Friedberg I., McLaughlin K., Smith P., Laverty D., Sezer S.: "STPA-SafeSec: Safety and security analysis for cyber-physical systems," Journal of Information Security and Applications, vol. 34, no. 2, pp. 183-196, June 2017.
  • Langer L., Skopik F., Smith P., Kammerstetter M.: "From old to new: Assessing cybersecurity risks for an evolving smart grid," Computers & Security, vol. 62, pp. 165-176, Sep. 2016.
  • Paudel S., Smith P., Zseby T.: “Stealthy Attacks on Smart Grid PMU State Estimation,” 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany, August 2018, Article 16, 10 pages. DOI: https://doi.org/10.1145/3230833.3230868

 

Cyber Range & Training

  • Kucek S. and Leitner M., “Training the Human-in-the-Loop in Industrial Cyber Ranges,” in Proceedings ofthe 1st European Advances in Digital Transformation Conference 2018, 2018.
  • Skopik F., Páhi T. and Leitner M., Eds., Cyber Situational Awareness in Public-Private-Partnerships: Organisationsübergreifende Cyber-Sicherheitsvorfälle effektiv bewältigen. Springer Vieweg, 2018.
  • Frank M., Leitner M. and Pahi T., “Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education,” in 2017 IEEE 15th IntlConf on Dependable, Autonomic and Secure Computing, 15th IntlConf on Pervasive Intelligence and Computing, 3rd IntlConf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2017, pp. 38–46.
  • Leitner M., Pahi T. and Skopik F., “Situational Awareness for Strategic Decision Making on a National Level,” in Collaborative CyberThreatIntelligence, F. Skopik, Ed. CRC Press, 2017, pp. 225–276.

 

Cryptography

  • Derler D., Samelin K., Slamanig D., Striecks Ch. Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based. In Proc. NDSS 2019
  • Derler D., Jager T., Slamanig D., Striecks Ch. Bloom Filter Encryption and Applications to Efficient Forward-Secret Key Exchange. In Proc. EUROCRYPT 2018
  • Derler D., Krenn S., Lorünser T., Ramacher S., Slamanig D., Striecks Ch. Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications. In Proc. PKC 2018
  • Stangl J., Lorünser T., Manoj Pudukotai Dinakarrao S. A fast and resource efficient FPGA implementation of secret sharing for storage applications. In Proc. DATE 2018
  • Krenn S., Lorünser T., Salzer A., Striecks Ch. Towards Attribute-Based Credentials in the Cloud. In Proc. CANS 2017
  • Chase M., Derler D., Goldfeder S., Orlandi C., Ramacher S., Rechberger Ch., Slamanig D., Zaverucha G.: Post Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives.  ACM Conference on Computer and Communications Security 2017
  • Pacher Ch., Abidin A., Lorünser T., Peev M., Ursin R., Zeilinger A., Larsson J.:, Attacks on quantum key distribution protocols that employ non-ITS authentication. In Quantum Information Processing 15(1) 2016

 

Pentesting

  • B. Aichernig, H. Brandl, E. Jöbstl, W. Krenn, R. Schlick, and S. Tiran, “MoMuT::UML model-based mutation testing for UML,” in Software testing, verification and validation (icst), 2015 ieee 8th international conference on, 2015, pp. 1-8.
  • P. Daca, T. A. Henzinger, W. Krenn, and D. Ničković, “Compositional specifications for ioco testing,” in Software testing, verification and validation (icst), seventh international conference on, 2014, pp. 373-382.
  • B. K. Aichernig, K. Hörmaier, F. Lorber, D. Ničković, R. Schlick, D. Simoneau, and S. Tiran, “Integration of Requirements Engineering and Test-Case Generation via OSLC,” in Qsic ’14: proceedings of the 2014 14th international conference on quality software, Dallas, USA, 2014, p. 117–126.
  • B. K. Aichernig, K. Hörmaier, and F. Lorber, “Debugging with timed automata mutations,” in Computer safety, reliability, and security, A. Bondavalli and F. Di Giandomenico, Eds., Springer International Publishing, 2014, vol. 8666, pp. 49-64.
  • B. K. Aichernig, E. Jöbstl, and S. Tiran, “Model-based mutation testing via symbolic refinement checking,” Science of computer programming, 2014.
  • B. K. Aichernig, H. Brandl, E. Jöbstl, W. Krenn, R. Schlick, and S. Tiran, “Killing strategies for model-based mutation testing,” Software testing, verification and reliability, p. n/a–n/a, 2014.
  • B. K. Aichernig, J. Auer, E. Jöbstl, R. Korošec, W. Krenn, R. Schlick, and B. V. Schmidt, “Model-based mutation testing of an industrial measurement device,” in Tests and proofs, M. Seidl and N. Tillmann, Eds., Springer International Publishing, 2014, vol. 8570, p. 1–19.
  • W. Krenn, D. Ničković, and L. Tec, “Incremental language inclusion checking for networks of timed automata,” in Formal modeling and analysis of timed systems, V. Braberman and L. Fribourg, Eds., Springer Berlin Heidelberg, 2013, vol. 8053, pp. 152-167.
  • W. Krenn, R. Schlick, and B. K. Aichernig, “Mapping UML to labeled transition systems for test-case generation: a translation via object-oriented action systems,” in Proceedings of the 8th international conference on formal methods for components and objects, Berlin, Heidelberg, 2010, p. 186–207.
  • B. K. Aichernig, H. Brandl, and W. Krenn, “Qualitative action systems,” in Formal methods and software engineering, D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, K. Breitman, and A. Cavalcanti, Eds., Berlin, Heidelberg: Springer Berlin Heidelberg, 2009, vol. 5885, p. 206–225.

 

Risk Management

  • Schauer S., Grafenauer T., König S., Warum M. and Rass S., “Estimating Cascading Effects in Cyber-Physical Critical Infrastructures”, in The 14th International Conference on Critical Information Infrastructures Security, Linköping, Sweden, 2019
  • König S. and Schauer S., “Cascading Threats in Critical Infrastructures with Control Systems”, in Proceedings of ISCRAM 2019, Valencia, Spain, 2019
  • Grafenauer T., König S., Rass S. and Schauer S., „A Simulation Tool for Cascading Effects in Interdependent Critical Infrastructures“, in Proceedings of the 13th International Conference on Availability, Reliability and Security  - ARES 2018, Hamburg, Germany, 2018, S. 1–8.
  • König S. and Rass S., „Stochastic Dependencies Between Critical Infrastructures“, in SECURWARE 2017, The Eleventh International Conference on Emerging Security Information, Systems and Technologies, Rome, Italy, 2017, S. 106–110.
  • Schauer S., König S., Latzenhofer M., Rass S. and Grafenauer T., „Analyzing Cascading Effects among Critical Infrastructures : The CERBERUS Approach“, in Proceedings of ISCRAM 2018, Rochester, USA, 2018.

 

 

 

Patents

Anomaly Detection & Cyber Threat Intelligence

  • Landauer M., Skopik F., Wurzenberger M. (2019): EP19153037.7 - Method for detecting anormal operating states) ("Time Series Analysis EP"), European Patent pending, January 2019.
  • Wurzenberger M., Landauer M., Skopik F., Fiedler R. (2018): A50461/2018 - Verfahren zur Charakterisierung des Zustands eines Computersystems ("Grammatikerkennung AT"), Austrian Patent pending, June 2018.
  • Wurzenberger M., Skopik F. (2018): EP18160444.8 - Method for detecting normal operating states in a working process ("Maschinendatensaetze EP"), European Patent pending, March 2018.
  • Landauer M., Skopik F., Wurzenberger M. (2018): A50156/2018 - Verfahren zur Erkennung von anormalen Betriebszuständen (engl.: Method for detecting anormal operating states) ("Time Series Analysis AT"), Austrian Patent pending, February 2018.
  • Fiedler R., Skopik F., Wurzenberger M. (2017): EP3267625 - Method for detecting anomolous states in a computer network ("Bioclustering EP"), European Patent granted, September 2018.
  • Wurzenberger M., Skopik F. (2017): A50233/2017 - Verfahren zur Erkennung des normalen Betriebszustands eines Arbeitsprozesses (engl.: Method for detecting normal operating states in a working process) ("Maschinendatensaetze AT"), Austrian Patent pending, March 2017.
  • Fiedler R., Skopik F., Wurzenberger M. (2016): A50601/2016 (AT 518.805) - Verfahren zur Detektion von anomalen Zuständen in einem Computernetzwerk (engl.: Method for detecting anomolous states in a computer network) ("Bioclustering AT"), Austrian Patent granted, May 2018.
  • Skopik F., Fiedler R. (2016): EP1416597.2-1853 - Method for detecting deviations from a given standard state ("AECID EP"), European Patent granted, June 2016.
  • Skopik F., Fiedler R. (2013): A50292/2013 (AT 514.215) - Verfahren zur Feststellung von Abweichungen von einem vorgegebenen Normalzustand (engl.: Method for detecting deviations from a given standard state) ("AECID AT"), Austrian Patent granted, April 2013.

 

    Cryptography

    • Lorünser T., Krenn S., Schrenk B., Pacher Ch. A method for creating and distributing cryptographic keys. AT519476B1, 2017
    • Krenn S., Lorünser T. Method for testing the availability and integrity of a distributed data stored object. AT518910B1, 2016
    • Krenn S., Lorünser T., Striecks Ch. Method for exchanging data fields of certified documents. AT519025B1, 2016