Abstract-Band - Fakultät für Informatik, TU Wien - Technische ...
Abstract-Band - Fakultät für Informatik, TU Wien - Technische ...
Abstract-Band - Fakultät für Informatik, TU Wien - Technische ...
Erfolgreiche ePaper selbst erstellen
Machen Sie aus Ihren PDF Publikationen ein blätterbares Flipbook mit unserer einzigartigen Google optimierten e-Paper Software.
Komponente entwickelt, die exemplarisch einen Anonymisierungsservice <strong>für</strong><br />
die medizinischen Daten anbietet, systemunabhängige Schnittstellen <strong>für</strong> eine<br />
patientensychronisierte Anwendung zur Verfügung stellt und einen Patienten<br />
Master-Index (PMI) implementiert. Das entwickelte Frontend <strong>für</strong> die medizinischen<br />
Daten implementiert einen Großteil der in openEHR vorgesehenen<br />
Eingabeelemente und unterstützt die Darstellung von Templates. Die<br />
implementierte serviceorientierte Architektur ermöglicht die systemunabhängige<br />
Verwaltung und Verarbeitung von patientensynchronisierten Anwendungen<br />
innerhalb eines KIS und stellt Methoden bereit, welche Anbindungen<br />
<strong>für</strong> webbasierte, Intra- und Internet basierte Software bieten.<br />
Andrej Lehotsky<br />
Structuring and Enhancing IT Security in Core Mobile Phone Use Cases<br />
Studium: Masterstudium Software Engineering & Internet Computing<br />
Betreuer: Ao.Univ.Prof. Dr. Thomas Grechenig<br />
Mobile phones are emerging to personal mobile devices, which can already<br />
replace a personal computer in many use cases. But their overall security<br />
mechanisms are not sufficient. The data stored in today's devices are much<br />
more personal then data stored on any other device we use. The focus in this<br />
thesis are operating systems and additional installed applications. The mobile<br />
phone attack surface is examined and based on it, possible and by<br />
researchers documented examples of threats are summarized. Since the<br />
mobile and fixed environments have their differences, these are outlined as<br />
the consideration for improvement approaches. Because of the human factor,<br />
some results of awareness surveys are presented and discussed. Due to<br />
limited resources of mobile phones (mainly power supply and size and/or<br />
weight), the current research in this field mainly concentrates on off-device<br />
(cloud) security services. These off-device security services are now the only<br />
solution to save power supply consumption while inferring possible attacks.<br />
Another focus is the virtualization and problems interconnected with<br />
installation of new applications. Summing up, this thesis proposes a mobile<br />
phone attack surface including open problems, which have to be solved to<br />
improve the overall security of mobile phones.<br />
Martina Lindorfer<br />
Detecting Environment-Sensitive Malware<br />
Studium: Masterstudium Software Engineering & Internet Computing<br />
Betreuer: Privatdoz. Dr. Engin Kirda<br />
76<br />
Malware poses one of the Internets major security threats today. Due to the<br />
vast amount of new malware samples emerging every day, researchers and<br />
Anti-Virus vendors rely on dynamic malware analysis sandboxes such as<br />
Anubis to automatically analyze malicious code in a controlled environment.