Rene Mayrhofer

Current Position: 
Head of Institute
Contact: 

Phone: +43 (0)732 / 2468 - 4121
E-mail: rmatins [dot] jku [dot] at or rene [dot] mayrhoferatjku [dot] at
For students: If you have any questions about my lectures (grades, course applications, etc.), please send your inquiries to officeatins [dot] jku [dot] at

OpenPGP key fingerprint: 717A 033B BB45 A2B3 28CF B84B A1E5 2A7E 249B C034 (new, preferred) and 7FE4 0DB5 61EC C645 B2F1 C847 ABB4 8F0D C3C2 4BDE (old, deprcated, use only for verifying my old signatures)

your key id :

Keybase: https://keybase.io/rmayr
Twitter: https://twitter.com/rene_mobile
Wire: rmatins [dot] jku [dot] at

Office hours: 
Tuesday: 10:00-11:00 or by appointment

vTab_employee

About

Head of Institute

Since September 2014, I act as the head of the Institute for Networks and Security and head of the Josef Ressel Center for User-friendly Secure Mobile Environments (since October 2012). Previously, I held professorships in Mobile Computing at Upper Austria University of Applied Sciences (2010-2014), at University of Vienna, AT (2008-2009), and before that a Marie Curie Fellowship at the University of Lancaster, UK (2005-2008). My main research interests are security and usability, and I am trying to combine both to create secure systems that are still usable by non-technical users. I received my venia docendi (Habilitation, 2009) from University of Vienna, AT, and my PhD (officially Doctor technicae - "Dr. techn." submitted in 2004, Promotio sub auspiciis Praesidentis rei publicae in 2005) and  masters ("Dipl.-Ing.", 2002) degrees from Johannes Kepler University of Linz, AT.

Recently, I was involved with organizing a number of academic events:

I am a regular PC member and reviewer for numerous conferences and journal in the areas of Networking, Security, and Mobile/Ubiquitous/Pervasive Computing. For a list of citations, see e.g. my ResearchGate, Google Scholar, ACM Authorizer, or Semantic Scholar profiles.

Research Interests: 
Usable security, Digital Identities, Secure Code, Secure communication protocols and cryptography
Publications
Conference Paper
Aichhorn, A., Mayrhofer R., Krammer H., & Kern T. (2016).  Realization of Line Current Differential Protection over IP-based Networks using IEEE 1588 for Synchronous Sampling. 13th International Conference on Development in Power System Protection 2016 (DPSP).
Schoiber, G., Mayrhofer R., & Hölzl M. (2016).  DAMN - A Debugging and Manipulation Tool for Android Applications. MoMM'16,November 28 - 30, 2016, Singapore, Singapore.
Muaaz, M., & Mayrhofer R. (2015).  Cross Pocket Gait Authentication using Mobile Phone Based Accelerometer Sensor. Fifteenth International Conference on Computer Aided Systems Theory.
Hintze, D., Findling R. Dieter, Muaaz M., Koch E., & Mayrhofer R. (2015).  Cormorant: Towards Continuous Risk-aware Multi-modal Cross-device Authentication. Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers. 169–172.
Findling, R. Dieter, Muaaz M., Hintze D., & Mayrhofer R. (2014).  ShakeUnlock: Securely Unlock Mobile Devices by Shaking them Together. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 165-174.
Hintze, D., Findling R. Dieter, Scholz S., & Mayrhofer R. (2014).  Mobile Device Usage Characteristics: The Effect of Context and Form Factor on Locked and Unlocked Usage. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 105-114.
Muaaz, M., & Mayrhofer R. (2014).  Orientation Independent Cell Phone Based Gait Authentication. Proc. {MoMM} 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 161–164.
Muaaz, M., & Mayrhofer R. (2014).  Orientation Independent Cell Phone Based Gait Authentication. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 161-164.
Hölzl, M., Asnake E., Mayrhofer R., & Roland M. (2014).  Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 147-156. (554.86 KB)
Hintze, D., Findling R. Dieter, Muaaz M., Scholz S., & Mayrhofer R. (2014).  Diversity in Locked and Unlocked Mobile Device Usage. Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp 2014). 379-384.
Mayrhofer, R., Hlavacs H., & Findling R. Dieter (2014).  Optimal Derotation of Shared Acceleration Time Series by Determining Relative Spatial Alignment. Proc. iiWAS 2014: 16th International Conference on Information Integration and Web-based Applications & Services. 71-78.
Findling, R. Dieter, Wenny F., Holzmann C., & Mayrhofer R. (2013).  Range Face Segmentation: Face Detection and Segmentation for Authentication in Mobile Device Range Images. Proc. MoMM 2013: 11th International Conference on Advances in Mobile Computing and Multimedia. 260–269.
Roland, M., Langer J., & Mayrhofer R. (2013).  (Ab)using foreign VMs: Running Java Card Applets in non-Java Card Virtual Machines. Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013). 286–292.
Hölzl, M., Mayrhofer R., & Roland M. (2013).  Requirements for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices. Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia. 249–252. (546.43 KB)
Findling, R. Dieter, & Mayrhofer R. (2013).  Towards Secure Personal Device Unlock using Stereo Camera Pan Shots. Second International Workshop on Mobile Computing Platforms and Technologies (MCPT 2013), colocated with Eurocast 2013.
Riedl, P., Koller P., Mayrhofer R., Möller A., Koelle M., & Kranz M. (2013).  Visualizations and Switching Mechanisms for Security Zones. Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013). 278–281.
Muaaz, M., & Mayrhofer R. (2013).  An Analysis of Different Approaches to Gait Recognition Using Cell Phone Based Accelerometers. 11th International Conference on Advances in Mobile Computing and Multimedia, (MoMM 2013), Vienna, Austria.
Mayrhofer, R. (2013).  When Users Cannot Verify Digital Signatures: On the Difficulties of Securing Mobile Devices. Proceedings of the 2013 IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing. 1579–1584.
Tschernuth, M., Lettner M., & Mayrhofer R. (2012).  Unify localization using user interface description languages and a navigation context-aware translation tool. Proc. {EICS 2012}: 4th ACM SIGCHI symposium on Engineering interactive computing systems. 179–188.
Groza, B., & Mayrhofer R. (2012).  SAPHE - Simple Accelerometer based wireless Pairing with HEuristic trees. Proc. MoMM 2012: 10th International Conference on Advances in Mobile Computing and Multimedia.
Riedl, P., & Mayrhofer R. (2012).  Towards a Practical, Scalable Self-Localization System for Android Phones Based on WLAN Fingerprinting. Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on. 98-101.
Findling, R. Dieter, & Mayrhofer R. (2012).  Towards Face Unlock: On the Difficulty of Reliably Detecting Faces on Mobile Phones. Proc. MoMM 2012: 10th International Conference on Advances in Mobile Computing and Multimedia. 275–280.
Mayrhofer, R., & Kaiser T. (2012).  Towards usable authentication on mobile phones: An evaluation of speaker and face recognition on off-the-shelf handsets. Proc. IWSSI/SPMU 2012: 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, colocated with Pervasive 2012.
Lettner, M., Tschernuth M., & Mayrhofer R. (2011).  Mobile Platform Architecture Review: Android, iPhone, Qt. Proc. {EUROCAST 2011}: 13th International Conference on Computer Aided Systems Theory, Part II. 6928, 545–552.
Klingelhuber, P., & Mayrhofer R. (2011).  Private Notes: Encrypted XML Notes Synchronization and Sharing with Untrusted Web Services. Proc. {iiWAS2011}: 13th International Conference on Information Integration and Web-based Applications & Services.
Mayrhofer, R., & Holzmann C. (2011).  \emphFriends Radar: Towards a Private P2P Location Sharing Platform. Proc. {EUROCAST 2011}: 13th International Conference on Computer Aided Systems Theory, Part II. 6928, 528–536.
Lettner, M., Tschernuth M., & Mayrhofer R. (2011).  A Critical Review of Applied MDA for Embedded Devices: Identification of Problem Classes and Discussing Porting Efforts in Practice. Proc. {MODELS 2011}: ACM/IEEE 14th International Conference on Model Driven Engineering Languages and Systems.
Tschernuth, M., Lettner M., & Mayrhofer R. (2011).  Evaluation of Descriptive User Interface Methodologies for Mobile Devices. Proc. {EUROCAST 2011}: 13th International Conference on Computer Aided Systems Theory, Part II. 6928, 520–527.
Höbarth, S., & Mayrhofer R. (2011).  A framework for on-device privilege escalation exploit execution on Android. Proc. {IWSSI/SPMU 2011}: 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, colocated with {Pervasive 2011}.
Lettner, M., Tschernuth M., & Mayrhofer R. (2011).  Feature interaction analysis in mobile phones: on the borderline between application functionalities and platform components. Proc. {MoMM} 2011: 9th International Conference on Advances in Mobile Computing and Multimedia. 268–272.
Mayrhofer, R., Sommer A., & Saral S. (2010).  Air-Writing: A Platform for Scalable, Privacy-Preserving, Spatial Group Messaging. Proc. {iiWAS2010}: 12th International Conference on Information Integration and Web-based Applications & Services. 181–189.
Radi, H., & Mayrhofer R. (2008).  Towards Alternative User Interfaces for Capturing and Managing Tasks with Mobile Devices. Proc. {MoMM} 2008: 6th International Conference on Advances in Mobile Computing and Multimedia. 272–275.
Mayrhofer, R., & Gellersen H. (2007).  Shake well before use: Authentication based on Accelerometer Data. Proc. {Pervasive 2007}: 5th International Conference on Pervasive Computing. 4480, 144–161.
Mayrhofer, R., Gellersen H., & Hazas M. (2007).  Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction. Proc. {Ubicomp 2007}: 9th International Conference on Ubiquitous Computing. 4717, 199–216.
Mayrhofer, R. (2007).  Towards an Open Source Toolkit for Ubiquitous Device Authentication. Workshops Proc. {PerCom 2007}: 5th {IEEE} International Conference on Pervasive Computing and Communications. 247–252.
Mayrhofer, R. (2007).  Extending the Growing Neural Gas Classifier for Context Recognition. Proc. {EUROCAST} 2007: 11th International Conference on Computer Aided Systems Theory. 4739, 920–927.
Mayrhofer, R. (2007).  The Candidate Key Protocol for Generating Secret Shared Keys From Similar Sensor Data Streams. Proc. {ESAS 2007}: 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks. 4572, 1–15.
Mayrhofer, R., & Welch M. (2007).  A Human-Verifiable Authentication Protocol Using Visible Laser Light. Proc. {ARES 2007}: 2nd International Conference on Availability, Reliability and Security. 1143–1147.
Mayrhofer, R., & Gellersen H. (2007).  On the Security of Ultrasound as Out-of-band Channel. Proc. {IPDPS 2007}: 21st {IEEE} International Parallel and Distributed Processing Symposium. 321.
Mayrhofer, R. (2006).  A Context Authentication Proxy for IPSec using Spatial Reference. Proc. {TwUC} 2006: 1st International Workshop on Trustworthy Ubiquitous Computing. 449–462.
Mayrhofer, R. (2005).  Context Prediction based on Context Histories: Expected Benefits, Issues and Current State-of-the-Art. (Prante, T.., Meyers B.., Fitzpatrick G.., & Harvel L.. D., Ed.).Proc. {ECHISE 2005}: 1st International Workshop on Exploiting Context Histories in Smart Environments.
Mayrhofer, R. (2005).  Eine Architektur zur Kontextvorhersage. {A}usgezeichnete {I}nformatikdissertationen 2004. D-5, 125–134.
Mayrhofer, R. (2005).  Technische Hintergründe für das rechtliche Handeln im Internet. {A}ktuelles zum {I}nternet-{R}echt. 1–16.
Ferscha, A., Hechinger M., Mayrhofer R., Chtcherbina E., Franz M., Rocha M. dos Santos, et al. (2005).  Bridging the Gap with P2P Patterns. Proceedings of the Workshop on Smart Object Systems.
Ferscha, A., Hechinger M., Mayrhofer R., & Oberhauser R. (2004).  A Light-Weight Component Model for Peer-to-Peer Applications. Proceedings {MDC04}: 2nd International Workshop on Mobile Distributed Computing. 520–527.
Ferscha, A., Hechinger M., Mayrhofer R., Rocha M. dos Santos, Franz M., & Oberhauser R. (2004).  Digital Aura. (Ferscha, A., Hörtner H.., & Kotsis G.., Ed.).Advances in Pervasive Computing. 176, 405–410.
Mayrhofer, R., Radi H., & Ferscha A. (2003).  Feature Extraction in Wireless Personal and Local Area Networks. Proc. {MWCN 2003}: 5th International Conference on Mobile and Wireless Communications Networks. 195–198.
Mayrhofer, R., Ortner F., Ferscha A., & Hechinger M. (2003).  Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks. (Focardi, R.., & Zavattaro G.., Ed.).Electronic Notes in Theoretical Computer Science. 85.3,
Mayrhofer, R., Radi H., & Ferscha A. (2003).  Recognizing and Predicting Context by Learning from User Behavior. (, & Ibrahim K.., Ed.).Proc. {MoMM 2003}: 1st International Conference On Advances in Mobile Multimedia. 171, 25–35.
Mayrhofer, R., Affenzeller M., Prähofer H., Höfer G., & Fried A. (2002).  DEVS Simulation of Spiking Neural Networks. (Trappl, R., Ed.).Cybernetics and Systems: Proc. {EMCSR} 2002: 16th European Meeting on Cybernetics and Systems Research. 2, 573–578.
Affenzeller, M., & Mayrhofer R. (2002).  Generic Heuristics for Combinatorial Optimization Problems. Proceedings of the 9th International Conference on Operational Research ({KOI2002}). 83–92.
Magazine Article
Aichhorn, A., Krammer H., Mayrhofer R., & Kern T. (2016).  IP-based communications for Line current Differential Protection. PAC World Magazine (Protection Automation & Control).
Journal Article
Hölzl, M., Asnake E., Mayrhofer R., & Roland M. (2015).  A Password-authenticated Secure Channel for App to Java Card Applet Communication. International Journal of Pervasive Computing and Communications (IJPCC). 11, 374-397. (618.42 KB)
Roland, M., Langer J., & Mayrhofer R. (2014).  Managing the life cycle of Java Card applets in other Java virtual machines. International Journal of Pervasive Computing and Communications. 10, 291–312.
Mayrhofer, R. (2014).  An Architecture for Secure Mobile Devices. Security and Communication Networks.
Mayrhofer, R., Fuss J., & Ion I. (2013).  UACAP: A Unified Auxiliary Channel Authentication Protocol. IEEE Transactions on Mobile Computing. 12, 710–721.
Mayrhofer, R., Sommer A., & Saral S. (2012).  Air-Writing: A Platform for Scalable, Privacy-Preserving, Spatial Group Messaging. International Journal of Pervasive Computing and Communications ({IJPCC}). 8, 53–78.
Mayrhofer, R., & Gellersen H. (2009).  Shake well before use: Intuitive and Secure Pairing of Mobile Devices. IEEE Transactions on Mobile Computing. 8, 792–806.
Mayrhofer, R., & Gellersen H. (2008).  Spontaneous Mobile Device Authentication based on Sensor Data. Information Security Technical Report. 13, 136–150.
Mayrhofer, R., Radi H., & Ferscha A. (2004).  Recognizing and Predicting Context by Learning from User Behavior. Radiomatics: Journal of Communication Engineering, special issue on Advances in Mobile Multimedia. 1, 30–42.
Ferscha, A., Hechinger M., Mayrhofer R., & Oberhauser R. (2004).  A Peer-to-Peer Light-Weight Component Model for Context-Aware Smart Space Applications. International Journal of Wireless and Mobile Computing ({IJWMC}), special issue on Mobile Distributed Computing.
Book
[Anonymous] (2014).  Special Issue: The confluence and synergy of mobile computing and multimedia with pervasive computing and communication. (Chen, L. Luke, Mayrhofer R., & Steinbauer M., Ed.).International Journal of Pervasive Computing and Communications. 10,
[Anonymous] (2014).  Special Issue on Security and Trust in Context-Aware Applications. (Schmidtke, H. R., Sigg S., & Mayrhofer R., Ed.).Personal and Ubiquitous Computing.
[Anonymous] (2009).  Special Issue: Secure Spontaneous Interaction. (Mayrhofer, R., Nyberg K., & Kindberg T., Ed.).International Journal on Security and Networks.
Mayrhofer, R. (2005).  An Architecture for Context Prediction. Schriften der Johannes-Kepler-Universität Linz. C 45,
Report
Miscellaneous
Conference Proceedings
Book Chapter
Radi, H., Mayrhofer R., & Ferscha A. (2004).  A Notebook Sensory Data Set for Context Recognition. (Junker, H.., Lukowicz P.., & Mäntyjarvi J.., Ed.).Proceedings of the Benchmarks and a Database for Context Recognition Workshop. 17–19.
Mayrhofer, R., Radi H., & Ferscha A. (2004).  A Context Prediction Code and Data Base. (Junker, H.., Lukowicz P.., & Mäntyjarvi J.., Ed.).Proceedings of the Benchmarks and a Database for Context Recognition Workshop. 20–26.
Mayrhofer, R. (2004).  An Architecture for Context Prediction. (Ferscha, A., Hörtner H.., & Kotsis G.., Ed.).Advances in Pervasive Computing. 176, 65–72.
Thesis