[1]
|
M. Rigger, R. Schatz, R. Mayrhofer, M. Grimmer, and H. Mössenböck,
“Sulong, and thanks for all the bugs: Finding errors in c programs by
abstracting from the native execution model,” in Proceedings of the
Twenty-Third International Conference on Architectural Support for
Programming Languages and Operating Systems, ASPLOS 2018, 2018.
[ bib |
DOI ]
|
[2]
|
M. Muaaz and R. Mayrhofer, “Accelerometer based gait recognition using adapted
gaussian mixture models,” in Proceedings of the 14th International
Conference on Advances in Mobile Computing and Multimedia (MoMM 2016),
(Singapore), pp. 288--291, ACM, 11/2016 2016.
[ bib |
DOI ]
|
[3]
|
G. Schoiber, R. Mayrhofer, and M. Hölzl, “DAMN - a debugging and
manipulation tool for android applications,” in Proceedings of the 14th
International Conference on Advances in Mobile Computing and Multimedia (MoMM
2016), (Singapore), pp. 40--44, ACM, ACM, 11/2016 2016.
[ bib |
DOI ]
|
[4]
|
M. Hölzl, M. Roland, and R. Mayrhofer, “Real-world identification: Towards a
privacy-aware mobile eID for physical and offline verification,” in
Proceedings of the 14th International Conference on Advances in Mobile
Computing and Multimedia (MoMM 2016), (Singapore), p. 280–283, ACM, ACM,
11/2016 2016.
[ bib |
DOI |
Abstract ]
|
[5]
|
R. D. Findling, M. Hölzl, and R. Mayrhofer, “Mobile gait match-on-card
authentication from acceleration data with offline-simplified models,” in
Proceedings of the 14th International Conference on Advances in Mobile
Computing and Multimedia (MoMM 2016), (Singapore), pp. 250--260, ACM, ACM,
11/2016 2016.
[ bib |
DOI |
Abstract ]
|
[6]
|
D. Hintze, S. Scholz, E. Koch, and R. Mayrhofer, “Location-based risk
assessment for mobile authentication,” in 2016 ACM International Joint
Conference on Pervasive and Ubiquitous Computing, UbiComp Adjunct 2016,
Heidelberg, Germany, September 12-16, 2016, (Heidelberg, Germany),
pp. 85--88, ACM, ACM, 09/2016 2016.
[ bib |
DOI |
Abstract ]
|
[7]
|
D. Hintze, R. D. Findling, M. Muaaz, E. Koch, and R. Mayrhofer, “CORMORANT:
Towards continuous risk-aware multi-modal cross-device authentication,” in
Proceedings of the 2015 ACM International Joint Conference on Pervasive
and Ubiquitous Computing and Proceedings of the 2015 ACM International
Symposium on Wearable Computers: Adjunct Publication (UbiComp 2015), UbiComp
'15, (New York, NY, USA), pp. 169--172, ACM, 2015.
[ bib |
DOI |
http ]
|
[8]
|
D. Hintze, M. Muaaz, R. D. Findling, S. Scholz, E. Koch, and R. Mayrhofer,
“Confidence and risk estimation plugins for multi-modal authentication on
mobile devices using CORMORANT,” in 13th International Conference on
Advances in Mobile Computing and Multimedia (MoMM 2015), (Brussels,
Belgium), p. 384–388, ACM, ACM, 12/2015 2015.
[ bib |
DOI |
Abstract ]
|
[9]
|
M. Muaaz and R. Mayrhofer, “Cross pocket gait authentication using mobile
phone based accelerometer sensor,” in Proc. EUROCAST 2015: 15th
International Conference on Computer Aided Systems Theory, LNCS,
pp. 731--738, Feb. 2015.
[ bib |
DOI ]
|
[10]
|
R. D. Findling and R. Mayrhofer, “Towards device-to-user authentication:
Protecting against phishing hardware by ensuring mobile device authenticity
using vibration patterns,” in Proc. MUM 2015: 14th International
Conference on Mobile and Ubiquitous Multimedia, ACM, Dec. 2015.
[ bib |
Abstract ]
|
[11]
|
D. Hintze, R. D. Findling, S. Scholz, and R. Mayrhofer, “Mobile device usage
characteristics: The effect of context and form factor on locked and unlocked
usage,” in Proc. MoMM 2014: 12th International Conference on Advances
in Mobile Computing and Multimedia, (New York, NY, USA), pp. 105--114, ACM
Press, December 2014.
[ bib |
DOI |
conference link |
.pdf |
Abstract ]
|
[12]
|
M. Muaaz and R. Mayrhofer, “Orientation independent cell phone based gait
authentication,” in Proc. MoMM 2014: 12th International Conference on
Advances in Mobile Computing and Multimedia, (New York, NY, USA),
pp. 161--164, ACM Press, December 2014.
[ bib |
DOI |
conference link |
.pdf |
Abstract ]
|
[13]
|
R. D. Findling, M. Muaaz, D. Hintze, and R. Mayrhofer, “Shakeunlock: Securely
unlock mobile devices by shaking them together,” in Proc. MoMM 2014:
12th International Conference on Advances in Mobile Computing and
Multimedia, (New York, NY, USA), pp. 165--174, ACM Press, December 2014.
awarded best MoMM 2014 paper.
[ bib |
DOI |
conference link |
.pdf |
Abstract ]
|
[14]
|
R. Mayrhofer, H. Hlavacs, and R. D. Findling, “Optimal derotation of shared
acceleration time series by determining relative spatial alignment,” in
Proc. iiWAS 2014: 16th International Conference on Information Integration
and Web-based Applications & Services, (New York, NY, USA), pp. 71--78, ACM
Press, December 2014.
awarded best iiWAS 2014 paper.
[ bib |
conference link |
.pdf |
Abstract ]
|
[15]
|
D. Hintze, R. D. Findling, M. Muaaz, S. Scholz, and R. Mayrhofer, “Diversity
in locked and unlocked mobile device usage,” in Proceedings of the 2014
ACM International Joint Conference on Pervasive and Ubiquitous Computing:
Adjunct Publication (UbiComp 2014), pp. 379--384, ACM Press, 2014.
winner of UbiComp/ISWC 2014 Programming Competition.
[ bib |
DOI |
conference link |
http |
Abstract ]
|
[16]
|
M. Hölzl, E. Asnake, R. Mayrhofer, and M. Roland, “Mobile application to
java card applet communication using a password-authenticated secure
channel,” in Proc. MoMM 2014: 12th International Conference on
Advances in Mobile Computing and Multimedia, (New York, NY, USA),
pp. 147--156, ACM Press, Dec. 2014.
[ bib |
DOI |
conference link |
.pdf |
Abstract ]
|
[17]
|
J. González, M. Hölzl, P. Riedl, P. Bonnet, and R. Mayrhofer, “A
practical hardware-assisted approach to customize trusted boot for mobile
devices,” in Information Security Conference (ISC 2014), (Hong Kong),
Springer International Publishing, Springer International Publishing, 2014.
[ bib ]
|
[18]
|
R. Findling, F. Wenny, C. Holzmann, and R. Mayrhofer, “Range face
segmentation: Face detection and segmentation for authentication in mobile
device range images,” in Proc. MoMM 2013: 11th International
Conference on Advances in Mobile Computing and Multimedia, (New York, NY,
USA), pp. 260--269, ACM Press, December 2013.
[ bib |
conference link |
.pdf |
Abstract ]
|
[19]
|
M. Hölzl, R. Mayrhofer, and M. Roland, “Requirements for an open ecosystem
for embedded tamper resistant hardware on mobile devices,” in Proc.
MoMM 2013: 11th International Conference on Advances in Mobile Computing
and Multimedia, (New York, NY, USA), pp. 249--252, ACM Press, December 2013.
[ bib |
conference link |
.pdf |
Abstract ]
|
[20]
|
M. Muaaz and R. Mayrhofer, “An analysis of different approaches to gait
recognition using cell phone based accelerometer,” in Proc. MoMM
2013: 11th International Conference on Advances in Mobile Computing and
Multimedia, (New York, NY, USA), pp. 293--300, ACM Press, December 2013.
[ bib |
conference link |
.pdf ]
|
[21]
|
P. Riedl, P. Koller, R. Mayrhofer, M. Kranz, A. Möller, and M. Koelle,
“Visualizations and switching mechanisms for security zones,” in Proc.
MoMM 2013: 11th International Conference on Advances in Mobile Computing
and Multimedia, (New York, NY, USA), pp. 278--281, ACM Press, December 2013.
[ bib |
conference link |
.pdf ]
|
[22]
|
M. Roland, J. Langer, and R. Mayrhofer, “(ab)using foreign vms: Running java
card applets in non-java card virtual machines,” in Proc. MoMM 2013:
11th International Conference on Advances in Mobile Computing and
Multimedia, (New York, NY, USA), pp. 286--292, ACM Press, December 2013.
[ bib |
conference link |
.pdf ]
|
[23]
|
R. Mayrhofer, “When users cannot verify digital signatures: On the
difficulties of securing mobile devices,” in Proc. HPCC 2013: 15th
IEEE International Conference on High Performance Computing and
Communications, (Washington, DC, USA), pp. 1579--1584, IEEE CS Press,
November 2013.
[ bib |
conference link |
.pdf ]
|
[24]
|
R. Findling and R. Mayrhofer, “Towards secure personal device unlock using
stereo camera pan shots,” in Proc. EUROCAST 2013: 14th International
Conference on ComputerAided Systems Theory, LNCS, (Berlin, Heidelberg,
Wien), pp. 417--425, Springer-Verlag, February 2013.
[ bib |
conference link |
.pdf ]
|
[25]
|
R. Findling and R. Mayrhofer, “Towards face unlock: On the difficulty of
reliably detecting faces on mobile phones,” in Proc. MoMM 2012: 10th
International Conference on Advances in Mobile Computing and Multimedia,
(New York, NY, USA), ACM Press, December 2012.
[ bib |
conference link |
.pdf ]
|
[26]
|
B. Groza and R. Mayrhofer, “SAPHE - simple accelerometer based wireless
pairing with heuristic trees,” in Proc. MoMM 2012: 10th International
Conference on Advances in Mobile Computing and Multimedia, (New York, NY,
USA), pp. 161--168, ACM Press, December 2012.
[ bib |
conference link |
.pdf ]
|
[27]
|
R. Mayrhofer and T. Kaiser, “Towards usable authentication on mobile phones:
An evaluation of speaker and face recognition on off-the-shelf handsets,” in
Proc. IWSSI/SPMU 2012: 4th International Workshop on Security and
Privacy in Spontaneous Interaction and Mobile Phone Use, colocated with
Pervasive 2012, June 2012.
available online at http://www.medien.ifi.lmu.de/iwssi2011/.
[ bib |
conference link |
.pdf |
Abstract ]
|
[28]
|
P. Riedl and R. Mayrhofer, “Towards a practical, scalable self-localization
system for Android phones based on WLAN fingerprinting,” in Proc.
ICDCSW 2012: 32nd International Conference on Distributed Computing Systems
Workshops, (Washington, DC, USA), pp. 98--101, IEEE CS Press, June 2012.
[ bib |
DOI |
.pdf |
Abstract ]
|
[29]
|
M. Tschernuth, M. Lettner, and R. Mayrhofer, “Unify localization using user
interface description languages and a navigation context-aware translation
tool,” in Proc. EICS 2012: 4th ACM SIGCHI symposium on Engineering
interactive computing systems, pp. 179--188, ACM, June 2012.
[ bib |
DOI |
conference link |
Abstract ]
|
[30]
|
P. Klingelhuber and R. Mayrhofer, “Private Notes: Encrypted xml notes
synchronization and sharing with untrusted web services,” in Proc.
iiWAS2011: 13th International Conference on Information Integration and
Web-based Applications & Services, (New York, NY, USA), ACM Press, December
2011.
[ bib |
conference link |
.pdf |
Abstract ]
|
[31]
|
M. Lettner, M. Tschernuth, and R. Mayrhofer, “Feature interaction analysis in
mobile phones: on the borderline between application functionalities and
platform components,” in Proc. MoMM 2011: 9th International
Conference on Advances in Mobile Computing and Multimedia, (New York, NY,
USA), pp. 268--272, ACM Press, December 2011.
[ bib ]
|
[32]
|
M. Lettner, M. Tschernuth, and R. Mayrhofer, “A critical review of applied mda
for embedded devices: Identification of problem classes and discussing
porting efforts in practice,” in Proc. MODELS 2011: ACM/IEEE 14th
International Conference on Model Driven Engineering Languages and Systems,
LNCS, (Berlin, Heidelberg, Wien), Springer-Verlag, October 2011.
[ bib |
conference link |
Abstract ]
|
[33]
|
S. Höbarth and R. Mayrhofer, “A framework for on-device privilege escalation
exploit execution on Android,” in Proc. IWSSI/SPMU 2011: 3rd
International Workshop on Security and Privacy in Spontaneous Interaction and
Mobile Phone Use, colocated with Pervasive 2011, June 2011.
[ bib |
conference link |
.pdf |
Abstract ]
|
[34]
|
M. Lettner, M. Tschernuth, and R. Mayrhofer, “Mobile platform architecture
review: Android, iPhone, Qt,” in Proc. EUROCAST 2011: 13th
International Conference on Computer Aided Systems Theory, Part II,
vol. 6928 of LNCS, (Berlin, Heidelberg, Wien), pp. 545--552,
Springer-Verlag, February 2011.
[ bib |
conference link |
.pdf ]
|
[35]
|
R. Mayrhofer and C. Holzmann, “Friends Radar: Towards a private P2P
location sharing platform,” in Proc. EUROCAST 2011: 13th
International Conference on Computer Aided Systems Theory, Part II,
vol. 6928 of LNCS, (Berlin, Heidelberg, Wien), pp. 528--536,
Springer-Verlag, February 2011.
[ bib |
conference link |
.pdf ]
|
[36]
|
M. Tschernuth, M. Lettner, and R. Mayrhofer, “Evaluation of descriptive user
interface methodologies for mobile devices,” in Proc. EUROCAST 2011:
13th International Conference on Computer Aided Systems Theory, Part II,
vol. 6928 of LNCS, (Berlin, Heidelberg, Wien), pp. 520--527,
Springer-Verlag, February 2011.
[ bib |
conference link |
.pdf ]
|
[37]
|
R. Mayrhofer, A. Sommer, and S. Saral, “Air-Writing: A platform for
scalable, privacy-preserving, spatial group messaging,” in Proc.
iiWAS2010: 12th International Conference on Information Integration and
Web-based Applications & Services, (New York, NY, USA), pp. 181--189, ACM
Press, November 2010.
[ bib |
conference link |
.pdf |
Abstract ]
|
[38]
|
V. Kumar, A. Fensel, S. Tomic, R. Mayrhofer, and T. Pellegrini, “User created
machine-readable policies for energy efficiency in smart homes,” in
Proc. UCSE 2010, co-located with Ubicomp 2010, September 2010.
[ bib |
conference link |
.pdf |
Abstract ]
|
[39]
|
R. Mayrhofer, S. Winkler, H. Hlavacs, M. Affenzeller, and S. Schneider, “On
structural identification of 2d regression functions for in-door bluetooth
localization,” in Proc. EUROCAST 2009, vol. 5717 of LNCS,
(Berlin, Heidelberg, Wien), pp. 801--808, Springer-Verlag, February 2009.
[ bib |
.pdf ]
|
[40]
|
H. Radi and R. Mayrhofer, “Towards alternative user interfaces for capturing
and managing tasks with mobile devices,” in Proc. MoMM 2008: 6th
International Conference on Advances in Mobile Computing and Multimedia,
pp. 272--275, November 2008.
[ bib |
conference link |
.pdf |
Abstract ]
|
[41]
|
R. Mayrhofer and H. Gellersen, “Shake well before use: two implementations for
implicit context authentication,” in Adjunct Proc. Ubicomp 2007,
pp. 72--75, September 2007.
[ bib |
conference link |
.pdf |
Abstract ]
|
[42]
|
R. Mayrhofer, H. Gellersen, and M. Hazas, “Security by spatial reference:
Using relative positioning to authenticate devices for spontaneous
interaction,” in Proc. Ubicomp 2007: 9th International Conference on
Ubiquitous Computing, vol. 4717 of LNCS, (Berlin, Heidelberg, Wien),
pp. 199--216, Springer-Verlag, September 2007.
[ bib |
conference link |
.pdf |
Abstract ]
|
[43]
|
R. Mayrhofer, “The candidate key protocol for generating secret shared keys
from similar sensor data streams,” in Proc. ESAS 2007: 4th European
Workshop on Security and Privacy in Ad hoc and Sensor Networks, vol. 4572 of
LNCS, (Berlin, Heidelberg, Wien), pp. 1--15, Springer-Verlag, July
2007.
[ bib |
conference link |
.pdf |
Abstract ]
|
[44]
|
R. Mayrhofer and H. Gellersen, “Shake well before use: Authentication based on
accelerometer data,” in Proc. Pervasive 2007: 5th International
Conference on Pervasive Computing, vol. 4480 of LNCS, (Berlin,
Heidelberg, Wien), pp. 144--161, Springer-Verlag, May 2007.
awarded best Pervasive 2007 paper.
[ bib |
conference link |
.pdf |
Abstract ]
|
[45]
|
R. Mayrhofer and M. Welch, “A human-verifiable authentication protocol using
visible laser light,” in Proc. ARES 2007: 2nd International
Conference on Availability, Reliability and Security, (Washington, DC, USA),
pp. 1143--1147, IEEE CS Press, April 2007.
[ bib |
conference link |
.pdf |
Abstract ]
|
[46]
|
R. Mayrhofer, “Towards an open source toolkit for ubiquitous device
authentication,” in Workshops Proc. PerCom 2007: 5th IEEE
International Conference on Pervasive Computing and Communications,
(Washington, DC, USA), pp. 247--252, IEEE CS Press, March 2007.
Track PerSec 2007: 4th IEEE International Workshop on Pervasive
Computing and Communication Security.
[ bib |
conference link |
.pdf |
Abstract ]
|
[47]
|
R. Mayrhofer and H. Gellersen, “On the security of ultrasound as out-of-band
channel,” in Proc. IPDPS 2007: 21st IEEE International Parallel and
Distributed Processing Symposium, (Washington, DC, USA), p. 321, IEEE CS
Press, March 2007.
Track SSN 2007: 3rd International Workshop on Security in Systems
and Networks.
[ bib |
conference link |
.pdf |
Abstract ]
|
[48]
|
R. Mayrhofer, “Extending the growing neural gas classifier for context
recognition,” in Proc. EUROCAST 2007: 11th International Conference
on Computer Aided Systems Theory, vol. 4739 of LNCS, (Berlin,
Heidelberg, Wien), pp. 920--927, Springer-Verlag, February 2007.
[ bib |
conference link |
.pdf |
Abstract ]
|
[49]
|
R. Mayrhofer, “A context authentication proxy for IPSec using spatial
reference,” in Proc. TwUC 2006: 1st International Workshop on
Trustworthy Ubiquitous Computing, pp. 449--462, Austrian Computer Society
(OCG), December 2006.
awarded best iiWAS/MoMM 2006 workshop paper.
[ bib |
conference link |
.pdf |
Abstract ]
|
[50]
|
R. Mayrhofer, “Technische Hintergründe für das rechtliche Handeln im
Internet,” in Aktuelles zum Internet-Recht, pp. 1--16,
proLibris.at, December 2005.
[ bib |
conference link |
.pdf |
Abstract ]
|
[51]
|
A. Ferscha, M. Hechinger, R. Mayrhofer, E. Chtcherbina, M. Franz, M. dos
Santos Rocha, and A. Zeidler, “Bridging the gap with P2P patterns,” in
Proceedings of the Workshop on Smart Object Systems, September 2005.
in conjunction with the Seventh International Conference on
Ubiquitous Computing (UbiComp 2005).
[ bib |
conference link |
.pdf |
Abstract ]
|
[52]
|
R. Mayrhofer, “Context prediction based on context histories: Expected
benefits, issues and current state-of-the-art,” in Proc. ECHISE 2005:
1st International Workshop on Exploiting Context Histories in Smart
Environments (T. Prante, B. Meyers, G. Fitzpatrick, and L. D. Harvel, eds.),
May 2005.
part of the Third International Conference on Pervasive Computing
(PERVASIVE 2005).
[ bib |
conference link |
.pdf |
Abstract ]
|
[53]
|
R. Mayrhofer, “Eine Architektur zur Kontextvorhersage,” in
Ausgezeichnete Informatikdissertationen 2004, vol. D-5 of Series of
the German Informatics society (GI), pp. 125--134, Lecture Notes in
Informatics (LNI), May 2005.
[ bib |
.pdf |
Abstract ]
|
[54]
|
A. Ferscha, M. Hechinger, R. Mayrhofer, M. dos Santos Rocha, M. Franz, and
R. Oberhauser, “Digital Aura,” in Advances in Pervasive Computing
(A. Ferscha, H. Hörtner, and G. Kotsis, eds.), vol. 176, pp. 405--410,
Austrian Computer Society (OCG), April 2004.
part of the Second International Conference on Pervasive Computing
(Pervasive 2004).
[ bib |
conference link |
video |
.pdf |
Abstract ]
|
[55]
|
R. Mayrhofer, “An architecture for context prediction,” in Advances in
Pervasive Computing (A. Ferscha, H. Hörtner, and G. Kotsis, eds.),
vol. 176, pp. 65--72, Austrian Computer Society (OCG), April 2004.
part of the Second International Conference on Pervasive Computing
(PERVASIVE 2004).
[ bib |
conference link |
.pdf |
Abstract ]
|
[56]
|
R. Mayrhofer, H. Radi, and A. Ferscha, “A context prediction code and data
base,” in Proceedings of the Benchmarks and a Database for Context
Recognition Workshop (H. Junker, P. Lukowicz, and J. Mäntyjarvi, eds.),
pp. 20--26, ETH Zurich, April 2004.
part of the Second International Conference on Pervasive Computing
(PERVASIVE 2004).
[ bib |
conference link |
.pdf |
Abstract ]
|
[57]
|
H. Radi, R. Mayrhofer, and A. Ferscha, “A notebook sensory data set for
context recognition,” in Proceedings of the Benchmarks and a Database
for Context Recognition Workshop (H. Junker, P. Lukowicz, and
J. Mäntyjarvi, eds.), pp. 17--19, ETH Zurich, April 2004.
part of the Second International Conference on Pervasive Computing
(PERVASIVE 2004).
[ bib |
conference link |
.pdf |
Abstract ]
|
[58]
|
A. Ferscha, M. Hechinger, R. Mayrhofer, and R. Oberhauser, “A light-weight
component model for peer-to-peer applications,” in Proceedings MDC04:
2nd International Workshop on Mobile Distributed Computing, (Washington, DC,
USA), pp. 520--527, IEEE CS Press, March 2004.
[ bib |
conference link |
.pdf |
Abstract ]
|
[59]
|
R. Mayrhofer, H. Radi, and A. Ferscha, “Feature extraction in wireless
personal and local area networks,” in Proc. MWCN 2003: 5th
International Conference on Mobile and Wireless Communications Networks,
pp. 195--198, World Scientific, October 2003.
[ bib |
conference link |
.pdf |
Abstract ]
|
[60]
|
R. Mayrhofer, H. Radi, and A. Ferscha, “Recognizing and predicting context by
learning from user behavior,” in Proc. MoMM 2003: 1st International
Conference On Advances in Mobile Multimedia (W. S. G. Kotsis, A. Ferscha and
K. Ibrahim, eds.), vol. 171, pp. 25--35, Austrian Computer Society (OCG),
September 2003.
[ bib |
conference link |
http |
.pdf |
Abstract ]
|
[61]
|
R. Mayrhofer, F. Ortner, A. Ferscha, and M. Hechinger, “Securing passive
objects in mobile ad-hoc peer-to-peer networks,” in Electronic Notes in
Theoretical Computer Science (R. Focardi and G. Zavattaro, eds.), vol. 85.3,
Elsevier Science, June 2003.
[ bib |
conference link |
.pdf |
Abstract ]
|
[62]
|
R. Mayrhofer, M. Affenzeller, H. Prähofer, G. Höfer, and A. Fried, “DEVS
simulation of spiking neural networks,” in Cybernetics and Systems:
Proc. EMCSR 2002: 16th European Meeting on Cybernetics and Systems
Research (R. Trappl, ed.), vol. 2, pp. 573--578, Austrian Society for
Cybernetic Studies, April 2002.
[ bib |
conference link |
.ps |
Abstract ]
|
[63]
|
M. Affenzeller and R. Mayrhofer, “Generic heuristics for combinatorial
optimization problems,” in Proceedings of the 9th International
Conference on Operational Research (KOI2002), pp. 83--92, 2002.
[ bib |
.ps ]
|