Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Josef Scharinger is active.

Publication


Featured researches published by Josef Scharinger.


availability, reliability and security | 2008

NFC Devices: Security and Privacy

Gerald Madlmayr; Josef Langer; Christian Kantner; Josef Scharinger

The aim of this paper is to show security measures for NFC (Near Field Communication) use cases and devices. We give a brief overview over NFC technology and evaluate the implementation of NFC in devices. Out of this technology review we derive different use cases and applications based on NFC technology. Based on the use cases we show assets and interfaces of an NFC device that could be a possible target of an attacker. In the following we apply different attacks against the operation modes to show how applications and devices could be protected against such attacks. The information collected is consolidated in a set of threats giving guidelines on how to improve security and overcome privacy issues. This allows integrating NFC technology in a secure way for the end consumer.


Journal of Electronic Imaging | 1998

Fast encryption of image data using chaotic Kolmogorov flows

Josef Scharinger

To guarantee security and privacy in image and video archival applications, efficient bulk encryption techniques are necessary which are easily implementable in soft- and hardware and are able to cope with the vast amounts of data involved. Experience has shown that block-oriented symmetric product ciphers constitute an adequate design paradigm for resolving this task, since they can offer a very high level of security as well as very high encryption rates. In this contribution we introduce a new product cipher which encrypts large blocks of plaintext by repeated intertwined application of substitution and permutation operations. While almost all of the current product ciphers use fixed (predefined) permutation operations on small data blocks, our approach involves parametrizable (keyed) permutations on large data blocks (whole images) induced by specific chaotic systems (Kolmogorov flows). By combining these highly unstable dynamics with an adaption of a very fast shift register based pseudo-random number generator, we obtain a new class of computationally secure product ciphers which offer many features that make them superior to contemporary bulk encryption systems when aiming at efficient image and video data encryption.


international conference on mobile business | 2008

Managing an NFC Ecosystem

Gerald Madlmayr; Josef Langer; Josef Scharinger

Whereas several NFC trials are already established around the world, currently there are no mass rolls out yet. This is due to several technical as well as administrative issues that have to be dealt with before rolling out such a system. In this paper we present an approach for managing the B2B relations in an near field communication (NFC) ecosystem offering services based on card emulation like loyalty, payment and ticketing. Out of experiences made from trials we show which services are needed in order to manage such an ecosystem and to provide convenience to the user. Further more we discuss functional aspects of such an ecosystem, the parties involved as well as their benefit for participating. Although the technology already given allows a smooth interaction for the consumer, the infrastructure behind the scene is complex and requires the cooperation on different levels to ensure interoperability and a thriving contactless scheme to be deployed.


international conference on mobile business | 2007

The benefit of using SIM application toolkit in the context of near field communication applications

Gerald Madlmayr; Oliver Dillinger; Josef Langer; Christoph Schaffer; Christian Kantner; Josef Scharinger

NFC is one of the most promising technologies in handsets for business applications like ticketing or payment. Actually those applications require a secure store for keeping sensitive data. Using the SIM card as a removable secure element for proximity applications is one option. We will elaborate a comprehensive study on the requirements and impacts of using the SIM card as a secure store for proximity applications, presenting the pros and cons of combining NFC with the SIM card in handsets. Based on these facts we worked out a concept and necessary processes for an NFC ecosystem based on a SAM. Hence we line out two different approaches for managing applications in the secure element. Finally the effects of this implementation on mobile network operators and application providers as well as consumers are summarized.


2013 5th International Workshop on Near Field Communication (NFC) | 2013

Applying relay attacks to Google Wallet

Michael Roland; Josef Langer; Josef Scharinger

The recent emergence of Near Field Communication (NFC) enabled smart phones resulted in an increasing interest in NFC security. Several new attack scenarios, using NFC devices either as attack platform or as device under attack, have been discovered. One of them is the software-based relay attack. In this paper we evaluate the feasibility of the software-based relay attack in an existing mobile contactless payment system. We give an in-depth analysis of Google Wallets credit card payment functionality. We describe our prototypical relay system that we used to successfully mount the software-based relay attack on Google Wallet. We discuss the practicability and threat potential of the attack and provide several possible workarounds. Finally, we analyze Googles approach to solving the issue of software-based relay attacks in their recent releases of Google Wallet.


2012 4th International Workshop on Near Field Communication | 2012

Practical Attack Scenarios on Secure Element-Enabled Mobile Devices

Michael Roland; Josef Langer; Josef Scharinger

Near Field Communications card emulation mode is a way to put virtual smart cards into mobile phones. A recently launched application is Google Wallet. Google Wallet turns a phone into a credit card, a prepaid card and a tool to collect gift certificates and discounts. Card emulation mode uses dedicated smart card chips, which are considered to fulfill high security standards. Therefore, card emulation mode is also considered to be safe and secure. However, an NFC-enabled mobile phone introduces a significantly different threat vector. Especially a mobile phones permanent connectivity to a global network and the possibility to install arbitrary applications onto smart phones open up for several new attack scenarios. This paper gives an overview of the new risks imposed by mobile connectivity and untrusted mobile phone applications. The various APIs for secure element access on different mobile phone platforms and their access control mechanisms are analyzed. The security aspects of mobile phones are explained. Finally, two practical attack scenarios, a method to perform a denial of service (DoS) attack against a secure element and a method to remotely use the applications on a victims secure element without the victims knowledge, are highlighted.


intelligent robots and systems | 2010

Active perception and scene modeling by planning with probabilistic 6D object poses

Robert Eidenberger; Josef Scharinger

This paper presents an approach to probabilistic active perception planning for scene modeling in cluttered and realistic environments. When dealing with complex, multi-object scenes with arbitrary object positions, the estimation of 6D poses including their expected uncertainties is essential. The scene model keeps track of the probabilistic object hypotheses over several sequencing sensing actions to represent the real object constellation.


2011 Third International Workshop on Near Field Communication | 2011

Security Vulnerabilities of the NDEF Signature Record Type

Michael Roland; Josef Langer; Josef Scharinger

The NFC Forum has released a first candidate for their Signature Record Type Definition. This specification adds digital signatures to the NFC Data Exchange Format (NDEF), which is a standardized format for storing formatted data on NFC (Near Field Communication) tags and for transporting data across a peer-to-peer links between NFC devices. With an increasing number of applications of the NFC and NDEF technology, more and more security threats became apparent. The signature record type is supposed to increase security for NDEF application by providing authenticity and integrity to the NDEF data. This paper takes a close look on the recently published Signature Record Type Definition and discusses its various security aspects. First, we introduce the signature record type and its usage. After that, we analyze the security aspects of the current signature method. Finally, we disclose multiple security vulnerabilities of the current Signature Record Type Definition and propose measures to avoid them.


Clinical Eeg and Neuroscience | 2011

Accuracy of a P300 Speller for People with Motor Impairments: a Comparison

Rupert Ortner; Fabio Aloise; Robert Prückl; Francesca Schettini; Veronika Putz; Josef Scharinger; Eloy Opisso; Ursula Costa; Christoph Guger

A Brain-Computer Interface (BCI) provides a completely new output pathway that can provide an additional option for a person to express himself/her self if he/she suffers a disorder like amyotrophic lateral sclerosis (ALS), brainstem stroke, brain or spinal cord injury or other diseases which impair the function of the common output pathways which are responsible for the control of muscles. For a P300 based BCI a matrix of randomly flashing characters is presented to the participant. To spell a character the person has to attend to it and to count how many times the character flashes. Although most BCIs are designed to help people with disabilities, they are mainly tested on healthy, young subjects who may achieve better results than people with impairments. In this study we compare measurements, performed on people suffering motor impairments, such as stroke or ALS, to measurements performed on healthy people. The overall accuracy of the persons with motor impairments reached 70.1% in comparison to 91% obtained for the group of healthy subjects. When looking at single subjects, one interesting example shows that under certain circumstances, when it is difficult for a patient to concentrate on one character for a longer period of time, the accuracy is higher when fewer flashes (i.e., stimuli) are presented. Furthermore, the influence of several tuning parameters is discussed as it shows that for some participants adaptations for achieving valuable spelling results are required. Finally, exclusion criteria for people who are not able to use the device are defined.


smart card research and advanced application conference | 2008

Management of Multiple Cards in NFC-Devices

Gerald Madlmayr; Oliver Dillinger; Josef Langer; Josef Scharinger

Near Field Communication (NFC) currently is one of the most promising technologies in handsets for contactless applications like ticketing or payment. These applications require a secure store for keeping sensitive data. Combining NFC with integrated smartcard chips in a mobile device allows the emulation of different cards. Representing each secure element with different UIDs poses several problems. Thus we propose an approach with a fixed UID dedicated to a Secure Element Controller (SEC). This approach allows an optimized backwards compatibility to already established reader infrastructures but also the communication in peer-to-peer mode with other NFC devices. Additionally the communication over peer-to-peer as well as the internal mode of secure elements at the same time is possible. This is approach poses a flexible alternative to the implementations proposed so far. In addition when there are to multiple, removable secure elements in a device it is ensured that the secure elements are only used by authorized user/devices. The SEC in this case handles the communication between the secure elements as well as their authentication.

Collaboration


Dive into the Josef Scharinger's collaboration.

Top Co-Authors

Avatar

Josef Langer

Applied Science Private University

View shared research outputs
Top Co-Authors

Avatar

Christoph Guger

Rensselaer Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar

Gerald Madlmayr

Vienna University of Technology

View shared research outputs
Top Co-Authors

Avatar

Franz Pichler

Johannes Kepler University of Linz

View shared research outputs
Top Co-Authors

Avatar

Kyousuke Kamada

Asahikawa Medical University

View shared research outputs
Top Co-Authors

Avatar

Christoph Kapeller

Johannes Kepler University of Linz

View shared research outputs
Top Co-Authors

Avatar

Hiroshi Ogawa

Asahikawa Medical University

View shared research outputs
Top Co-Authors

Avatar

Christian Kantner

Johannes Kepler University of Linz

View shared research outputs
Top Co-Authors

Avatar

Christoph Sulzbachner

Austrian Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Juergen Kogler

Austrian Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge