TU Wien Informatics

About

The “Internet of Things” (IoT) is commonly anticipated with numerous applications including but not limited to manufacturing, power grids, buildings, rescue and relief operations, environmental monitoring, and traffic management.

Yet, complex applications in the IoT realm are inconceivable without increased mutual penetration of IT systems and automation technology. The integrated automation equipment is responsible for measuring, open and closed loop control, monitoring, supervision, diagnosis, and optimization. Following the divide and conquer paradigm, the push for distribution of processing functions is unbowed, while the heterogeneity of technologies used in automation remains a major obstacle.

On the other side, demands are made on the field of informatics to design, implement and validate (secure and safe) system architectures that allow for a seamless integration and combination of those different systems.For this reason, our research focus is put on the general theme of distributed automation and “automation systems integration”, moving away from manual integration to machine-aided solutions.

This includes the analysis and enhancement of industrial communication technologies (wired and wireless), guaranteeing specific quality of services for dependable distributed systems with safety and security in mind. Also, the integration of automation systems exploiting information modeling and knowledge representation is addressed, e.g. based on the vision and technologies of the Semantic Web.

Another aspect is the incorporation of research on safe programming languages, which by construction lead to increased safety and reliability of the created artifacts for safety-critical applications. To ensure extensibility and interoperability, additional effort is put in standardization and thus in the research of and collaboration on existing and emerging standards. Results of these research directions aim to enable not only human-to-machine but in particular genuine machine-to-machine communications, with consideration of extensibility, reliability and safety. Incarnations of the research results will thus add to applications of the “Industrial Internet of Things” (IIoT) including but not limited to the domains of cyber-physical production systems (Industry 4.0), smart grids, and intelligent buildings.

The research Unit Automation Systems is part of the Institute of Computer Engineering.

Johann Blieberger
Johann Blieberger J. Blieberger

Associate Professor
Ao.Univ.Prof. DI Dr.

Wolfgang Kastner
Wolfgang Kastner W. Kastner

Head of Research Unit
Ao.Univ.Prof. DI Dr.

Markus Bader
Markus Bader M. Bader

Senior Lecturer
DI Dr.

Patrick Heinrich Denzler
Patrick Heinrich Denzler P. Denzler

PreDoc Researcher
DI(FH) / MSc MBA

Monika di Angelo
Monika di Angelo M. di Angelo

PostDoc Researcher
Ass.Prof. DI Mag. Dr.

Dieter Etz
Dieter Etz D. Etz

PreDoc Researcher
DI(FH) / MBA

Thomas Frühwirth
Thomas Frühwirth T. Frühwirth

PreDoc Researcher
DI / BSc

Martin Kronegger
Martin Kronegger M. Kronegger

Senior Lecturer
DI Dr.

Angelika Susanne Metzger
Angelika Susanne Metzger A. Metzger

PreDoc Researcher
Dipl. Univ. / MSc MA

Jürgen Pannosch
Jürgen Pannosch J. Pannosch

PreDoc Researcher
DI / BSc

Thomas Preindl
Thomas Preindl T. Preindl

PreDoc Researcher
DI / BSc

Franz Josef Preyser
Franz Josef Preyser F. Preyser

Senior Lecturer
DI / BSc

Philipp Raich
Philipp Raich P. Raich

PreDoc Researcher
DI / BSc

Daniel Ramsauer
Daniel Ramsauer D. Ramsauer

PreDoc Researcher
DI / BSc

Mahyar Shariat
Mahyar Shariat M. Shariat

PreDoc Researcher

Gernot Steindl
Gernot Steindl G. Steindl

PreDoc Researcher
DI DI / BSc

Ulrike Weisz
Ulrike Weisz U. Weisz

Office Services
Mag. Dr.

Lukas Krammer
Lukas Krammer L. Krammer

Lecturer
DI Dr. / Bakk.

2020W

2021S

 

2020

2019

2018

2017

2016

2015

2014

2013

2012

2011

2010

2009

  • FIRE: FInding Rogue nEtworks / B. Stone-Gross, A. Moser, C. Krügel, E. Kirda, K. Almaroth / Talk: Annual Computer Security Applications Conference (ACSAC), Honolulu, Hawaii, USA; 2009-12-07 - 2009-12-11; in: "25th Annual Computer Security Applications Conference (ACSAC)", (2009)
  • Congestion control in building automation networks: Considerations for KNX / G. Neugschwandtner, W. Kastner / Talk: 35th Annual Conference of the IEEE Industrial Electronics Society (IECON 2009), Porto, Portugal; 2009-11-03 - 2009-11-05; in: "Proceedings of the 35th Annual Conference of the IEEE Industrial Electronics Society (IECON 2009)", (2009), 6 pages
  • Functional Safety in Building Automation / W. Kastner, T. Novak / Talk: 14th IEEE International Conference on Emerging Technologies and Factory Automation, Mallorca, Spain; 2009-09-22 - 2009-09-26; in: "Proceedings 14th IEEE International Conference on Emerging Technologies and Factory Automation", (2009)
  • System Management Standards for Traffic Management Systems / C. Stögerer, W. Kastner / Talk: 14th IEEE International Conference on Emerging Technologies and Factory Automation, Mallorca, Spain; 2009-09-22 - 2009-09-26; in: "Proceedings 14th IEEE International Conference on Emerging Technologies and Factory Automation", (2009)
  • Automatically Generating Models for Botnet Detection / P. Wurzinger, L. Bilge, E. Kirda, C. Krügel, T. Holz, J. Göbel / Talk: European Symposium on Research in Computer Security (ESORICS), Saint Malo, Brittany, France; 2009-09-21 - 2009-09-25; in: "14th European Symposium on Research in Computer Security (ESORICS 2009)", (2009)
  • Defending Browsers against Drive-by Downloads: Mitigating Heap-spraying Code Injection Attacks / P. Wurzinger, M. Egele, E. Kirda, C. Krügel / Talk: Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Milan, Italy; 2009-07-09 - 2009-07-10; in: "Sixth Conference on Detection of Intrusions and Malware & Vulnerability Assessment", (2009)
  • Enhanced Control Application Development in Building Automation / F. Praus, W. Granzer, W. Kastner / Talk: 7th IEEE International Conference on Industrial Informatics, Cardiff, UK; 2009-06-23 - 2009-06-26; in: "7th IEEE International Conference on Industrial Informatics (INDIN '09)", Proceedings 7th IEEE International Conference on Industrial Informatics (INDIN '09), (2009), 390 - 395
  • Securing IP Backbones in Building Automation Networks / W. Granzer, D. Lechner, F. Praus, W. Kastner / Talk: 7th IEEE International Conference on Industrial Informatics, Cardiff, UK; 2009-06-23 - 2009-06-26; in: "Proceedings 7th IEEE International Concerence on Industrial Informatics", Proceedings 7th IEEE International Conference on Industrial Informatics (INDIN '09),, (2009), 410 - 415
  • Effective and Efficient Malware Detection at the End Host / P. Milani Comparetti, C. Kolbitsch, E. Kirda, C. Krügel, Z. Xiaoyong, W. Xiaofeng / Talk: Usenix Security Symposium, Montreal, Canada; 2009-06-14 - 2009-06-19; in: "usenix 2009", (2009)
  • SWAP: Mitigating XSS Attacks using a Reverse Proxy / C. Krügel, Ch. Platzer, E. Kirda, C. Ludl, P. Wurzinger / Talk: International Workshop on Software Engineering for Secure Systems (SESS), Vancouver, Canada; 2009-05-19; in: "SESS proceedings", (2009)
  • Prospex: Protocol Specification Extraction / P. Milani Comparetti, G. Wondracek, C. Krügel, E. Kirda / Talk: IEEE Symposium on Security and Privacy, The Claremont ressort, Oakland, California; 2009-05-17 - 2009-05-20; in: "Proceedings of the IEEE Symposium on Security and Privacy", IEEE, (2009), ISBN: 978-0-7695-3633-0; 110 - 125
  • Removing Web Spam Links from Search Engine Results / E. Kirda, M. Egele, Ch. Krügel / Poster: Conference of the European Institute for Computer Antivirus Research (EICAR), Berlin; 2009-05-11 - 2009-05-12; in: "EICAR proceedings", (2009)
  • Mitigating Drive-by Download Attacks: Challenges and Open Problems / M. Egele, E. Kirda, Ch. Krügel / Talk: Open Research Problems in Network Security Workshop, Zurich; 2009-04-23 - 2009-04-24; in: "Open Research Problems in Network Security Workshop", (2009)
  • , Insights Into Current Malware Behavior / U. Bayer, E. Kirda, C. Krügel, D. Balzarotti, I. Habibi / Talk: USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), Boston, MA, USA; 2009-04-21; in: "2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)", (2009)
  • Scalable, Behavior-Based Malware Clustering / U. Bayer, E. Kirda, Ch. Krügel, P. Milani Comparetti, C. Hlauschek / Talk: Network and Distributed System Security Symposium (NDSS), San Diego; 2009-02-08 - 2009-02-11; in: "16th Annual Network and Distributed System Security Symposium (NDSS 2009)", NDSS Proceedings, (2009)
  • Exemplarische Vertiefungen / S. Bachl, A. Mauczka, W. Schramm, F. Fankhauser / in: "Softwaretechnik. Mit Fallbeispielen aus realen Entwicklungsprojekten.", Pearson Studium, München, Germany, 2009, ISBN: 978-3-8689-4007-7, 651 - 668
  • Usability Engineering in der Softwareentwicklung / K. Kappel, C. Wimmer, S. Bachl / in: "Softwaretechnik. Mit Fallbeispielen aus realen Entwicklungsprojekten.", Pearson Studium, München, Germany, 2009, ISBN: 978-3-8689-4007-7, 523 - 592
  • Data communications for distributed building automation / W. Kastner, G. Neugschwandtner / in: "Embedded Systems Handbook, Second Edition, Volume 2: Networked Embedded Systems", issued by: R. Zurawski; CRC Press, Boca Raton, 2009, ISBN: 978-1-4398-0761-3, 29-1 - 29-34
  • Removing web spam links from search engine results / C. Kolbitsch, M. Egele, Ch. Platzer / Journal in Computer Virology, Online First (2009), 11416; 1 - 12
  • Server-Side Bot Detection in Massively Multiplayer Online Games / Stefan Mitterhofer, Ch. Platzer, E. Kirda, Ch. Krügel / IEEE Security & Privacy, 7 (2009), 3; 29 - 36
  • Graphentheoretische Verfügbarkeitsanalyse für die Eisenbahninfrastruktur / J. Blieberger, N. Ostermann, A. Schöbel / Signal&Draht, 101 (2009), 9; 33 - 36

2008

2007

  • Improving Signature Testing Through Dynamic Data Flow Analysis / D. Balzarotti, W. Robertson, Ch. Krügel, G. Vigna / Talk: Annual Computer Security Applications Conference (ACSAC), Miami, USA; 2007-12-10; in: "Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)", (2007), 22 - 32
  • Secure Input for Web Applications / M. Szydlowski, Ch. Krügel, E. Kirda / Talk: Annual Computer Security Applications Conference (ACSAC), Miami, USA; 2007-12-10; in: "Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)", (2007), 1 - 11
  • Limits of Static Analysis for Malware Detection / A. Moser, Ch. Krügel, E. Kirda / Talk: Annual Computer Security Applications Conference (ACSAC), Miami, USA; 2007-12-10; in: "Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)", (2007), 12 - 21
  • Plug and Play in Distributed Home and in Building Automation Systems: An Introduction / G. Neugschwandtner / Talk: Konnex Scientific Conference, Duisburg; 2007-11-15 - 2007-11-16; in: "Proceedings Konnex Scientific Conference", (2007), 10 pages
  • Calimero: Next Generation / B. Malinowsky, G. Neugschwandtner, W. Kastner / Talk: Konnex Scientific Conference, Dusiburg; 2007-11-15 - 2007-11-16; in: "Proceedings Konnex Scientific Conference", (2007), 10 pages
  • BACnet over KNX / W. Granzer, W. Kastner / Talk: Konnex Scientific Conference, Dusiburg; 2007-11-15 - 2007-11-16; in: "Proceedings Konnex Scientific Conference", (2007), 19 pages
  • Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis / H. Yin, D. Song, M. Egele, Ch. Krügel, E. Kirda / Talk: ACM Conference on Computer and Communications Security (CCS), Washington, USA; 2007-10-29; in: "Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS)", (2007), 1 - 12
  • Detecting System Emulators / T. Raffetseder, Ch. Krügel, E. Kirda / Talk: Information Security Conference (ISC), Valparaiso, Chile; 2007-10-09; in: "Proceedings of the Information Security Conference (ISC )", (2007), 1 - 18
  • A Simulation Framework for Fault-Tolerant Clock Synchronization in Industrial Automation Networks / F. Praus, W. Granzer, G. Georg, T. Sauter / Talk: IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Patras; 2007-09-25 - 2007-09-27; in: "Proceedings of 12th IEEE Conference on Emerging Technologies and Factory Automation (ETFA '07)", (2007), 1465 - 1472
  • Multicast Communication in Wireless Home and Building Automation: ZigBee and DCMP / C. Reinisch, W. Kastner, G. Neugschwandtner / Talk: IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Patras; 2007-09-25 - 2007-09-27; in: "Proceedings of 12th IEEE Conference on Emerging Technologies and Factory Automation (ETFA '07)", (2007), 1380 - 1383
  • Automatisch sicher / W. Kastner / Talk: Beckhoff Symposium, Zell am See (invited); 2007-09-20 - 2007-09-21; in: "Der Mensch im Zentrum der intelligenten Gebäudeautomation", (2007), 85 - 97
  • A Layout-Similarity-Based Approach for Detecting Phishing Pages / A. Rosiello, Ch. Krügel, E. Kirda, F. Ferrandi / Talk: IEEE International Conference on Security and Privacy in Communication Networks (SecureComm), Nizza, Frankreich; 2007-09-17; in: "Proceedings of the IEEE International Conference on Security and Privacy in Communication Networks (SecureComm)", (2007), 1 - 10
  • Mining Specifications of Malicious Behavior / M. Christodorescu, S. Jha, Ch. Krügel / Talk: European Software Engineering Conference (ESEC), Dubrovnik, Kroatien; 2007-09-03; in: "Proceedings of the European Software Engineering Conference (ESEC)", (2007), 1 - 10
  • Designing Tangible Tabletop Interfaces for Patients in Rehabilitation / M. Leitner, M. Tomitsch, T. Költringer, K. Kappel, T. Grechenig / Talk: Conference & Workshop on Assistive Technologies for People with Vision & Hearing Impairments: Assistive Technology for All Ages, CVHI 2007, Granada, Spain; 2007-08-28 - 2007-08-31; in: "Proceedings of the Conference and Workshop on Assistive Technology for People with Vision and Hearing Impairments", M. Hersh (ed.); (2007), 7 pages
  • Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters / C. Karlberger, G. Bayler, Ch. Krügel, E. Kirda / Talk: Usenix Workshop on Offensive Technologies (WOOT), Boston, USA; 2007-08-06; in: "Usenix Workshop on Offensive Technologies (WOOT)", (2007), 1 - 7
  • Considering a technical realization of a neuro-psychoanalytical model of the mind / D. Dietrich, G. Fodor, W. Kastner, M. Ulieru / Talk: 1st International Engineering & Neuro-Psychoanalysis Forum (ENF 2007), Wien; 2007-07-23; in: "Proceedings of ENF 2007 - 1st International Engineering & Neuro-Psychoanalysis Forum", (2007), 13 - 20
  • Wireless Technologies in Home and Building Automation / C. Reinisch, W. Kastner, G. Neugschwandtner, W. Granzer / Talk: IEEE International Conference on Industrial Informatics - INDIN 2007, Wien; 2007-07-23 - 2007-07-27; in: "Proceedings 5th IEEE International Conference on Industrial Informatics", (2007), 93 - 98
  • Web Services in Building Automation: Mapping KNX to oBIX / M. Neugschwandtner, G. Neugschwandtner, W. Kastner / Talk: IEEE International Conference on Industrial Informatics - INDIN 2007, Wien; 2007-07-23 - 2007-07-27; in: "Proceedings 5th IEEE International Conference on Industrial Informatics", (2007), 87 - 92
  • On the Effectiveness of Techniques to Detect Phishing Sites / C. Ludl, S. McAllister, E. Kirda, Ch. Krügel / Talk: Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Luzern, Schweiz; 2007-07-12; in: "Proceedings of the Detection of Intrusions and Malware and Vulnerability Assessment Conference (DIMVA)", (2007), 1 - 20
  • Synchronous Consensus with Mortal Byzantines / J. Widder, G. Gridling, B. Weiss, J. Blanquart / Talk: IEEE Conference on Dependable Systems and Networks (DSN), Edinburgh; 2007-06-25 - 2007-06-28; in: "Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks", (2007)
  • Static Detection of Livelocks in Ada Multitasking Programs / J. Blieberger, B. Burgstaller, R. Mittermayr / Talk: Reliable Software Technologies - Ada-Europe, Geneva, Switzerland; 2007-06-25 - 2007-06-29; in: "Proc. Ada-Europe 2007", Springer-Verlag, LNCS 4498 (2007), ISBN: 978-3-540-73229-7; 69 - 83
  • Dynamic Spyware Analysis / M. Egele, Ch. Krügel, E. Kirda, H. Yin, D. Song / Talk: Usenix Annual Technical Conference (ATC), Santa Clara, USA; 2007-06-17; in: "Proceedings of the Usenix Annual Technical Conference", (2007), 1 - 14
  • TwoStick: Writing with a Game Controller / T. Költringer, P. Isokoski, T. Grechenig / Talk: Graphics Interface 2007, Montreal, Canada; 2007-05-28 - 2007-05-30; in: "Proceedings of Graphics Interface 2007 (GI 2007)", Ch. Healey, E. Lank (ed.); ACM International Conference Proceeding Series, 234 (2007), ISBN: 0713-5424, ISSN: 978-1-56881-337-0; 103 - 110
  • Exploring Multiple Execution Paths for Malware Analysis / A. Moser, Ch. Krügel, E. Kirda / Talk: IEEE Symposium on Security and Privacy, Oakland, USA; 2007-05-20; in: "Proceedings of the IEEE Symposium on Security and Privacy", (2007), 1 - 15
  • Building Anti-Phishing Browser Plug-Ins: An Experience Report / T. Raffetseder, E. Kirda, Ch. Krügel / Talk: International Workshop on Software Engineering for Secure Systems (SESS), Minneapolis, USA; 2007-05-19; in: "3rd International Workshop on Software Engineering for Secure Systems (SESS)", IEEE Computer Society, (2007), ISBN: 978-0-7695-2830-4; 1 - 7
  • Understanding Spatial Mobile Service Discovery using Pointing and Touching. / T. Költringer, M. Tomitsch, K. Kappel, M. Zrno, T. Grechenig / Poster: CHI 2007 Workshop on "Mobile Spatial Interaction", San Jose, California, USA; 2007-04-28 - 2007-05-03; in: "ACM CHI 2007 Workshop on Mobile Spatial Interaction", (2007), 4 pages
  • Game Controller Text Entry with Alphabetic and Multi-Tap Selection Keyboards / T. Költringer, M. Ngo Van, T. Grechenig / Talk: ACM Conference on Human Factors in Computing Systems (CHI 2007), San Jose, California, USA; 2007-04-28 - 2007-05-03; in: "Extended Abstracts of the ACM Conference on Human Factors in Computing Systems", ACM Press, (2007), ISBN: 978-1-59593-642-4; 2513 - 2518
  • A new Elimination-Based Data Flow Analysis Framework Using Annotated Decomposition Trees / B. Scholz, J. Blieberger / Talk: International Conference on Compiler Construction, Braga, Portugal; 2007-03-26 - 2007-03-30; in: "Proc. ETAPS'07", LNCS, Springer-Verlag, 4420 (2007), ISBN: 978-3-540-71228-2; 202 - 217
  • Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis / Ph. Vogt, F. Nentwich, N. Jovanovic, Ch. Krügel, E. Kirda, G. Vigna / Talk: Network and Distributed System Security Symposium (NDSS), San Diego, USA; 2007-02-27; in: "Proceedings of the Network and Distributed System Security Symposium (NDSS)", (2007), 1 - 12
  • Extending .NET Security to Unmanaged Code / P. Klinkoff, Ch. Krügel, E. Kirda, G. Vigna / International Journal of Information Security, 6 (2007), 6; 417 - 428
  • Trends in der Gebäudeautomation: Wireless Automation Networks / W. Kastner / megaTECH (invited), 1/2 (2007), 2007; 46

2006

2005

2004

2003

2002

2001

2000

1999

1998

1997

1996

1995

1994

1993

1992

1991

1990

  • Informatik / J. Blieberger, G. Schildt, U. Schmid, S. Stöckler / Springer, Vienna, 1990, ISBN: 3-211-82232-1; 390 pages
  • Periphere Geräte / G. Schildt / in: "Informatik", Springer, Vienna, 1990, ISBN: 3-211-82232-1, 205 - 221
  • Betriebssysteme / U. Schmid / in: "Informatik", Springer, Wien, 1990, ISBN: 3-211-82232-1, 222 - 350
  • Maschinen-Codes / S. Stöckler / in: "Informatik", Springer, Vienna, 1990, ISBN: 3-211-82232-1, 168 - 205
  • Micro-Codes / S. Stöckler / in: "Informatik", Springer, Vienna, 1990, ISBN: 3-211-82232-1, 143 - 165
  • Logische Schaltungen / S. Stöckler / in: "Informatik", Springer, Vienna, 1990, ISBN: 3-211-82232-1, 110 - 142
  • Boolesche Algebra / S. Stöckler / in: "Informatik", Springer, Vienna, 1990, ISBN: 3-211-82232-1, 87 - 104
  • CASE-Systeme / J. Blieberger / in: "Informatik", Springer, Vienna, 1990, ISBN: 3-211-82232-1, 360 - 361
  • Höhere Programmiersprachen / J. Blieberger / in: "Informatik", Springer, Vienna, 1990, ISBN: 3-211-82232-1, 354 - 359
  • Assemblersprachen / J. Blieberger / in: "Informatik", Springer, Vienna, 1990, ISBN: 3-211-82232-1, 351 - 359
  • Zahlendarstellungen / J. Blieberger / in: "Informatik", Springer, Vienna, 1990, ISBN: 3-211-82232-1, 47 - 73
  • Codierungstheorie / J. Blieberger / in: "Informatik", Springer, Vienna, 1990, ISBN: 3-211-82232-1, 24 - 46
  • Informationstheorie / J. Blieberger / in: "Informatik", Springer, Vienna, 1990, ISBN: 3-211-82232-1, 14 - 23
  • Real-Time Simulation (RTS) - Beschreibung (TR 183/1-27) / S. Stöckler / 1990

1989

1987

1983

 

2020

2019

2018

2017

2016

2015

2014

2013

2012

2011

2010

2009

2008

2007

2006

2005

2004

2003

2002

2001

2000

1999

1998

1997

1996

1995

1994

1993

1992

1991

1990

1989

1988

 

  • Christopher Krügel: Wirtschaftskammerpreis
    2005 / Wirtschaftskammern / Austria
  • Christopher Krügel: EIB Scientific Award for Excellent Diploma Thesis
    2000 / Germany
  • Monika di Angelo: Mobilitätsstipendium der TU Wien für hervorragende Dissertation
    1989 / Lions-Förderpreis

Soon, this page will include additional information such as reference projects, conferences, events, and other research activities.

Until then, please visit Automation Systems’ research profile in TISS .