Aljosha Judmayer

Aljosha_bw_109x183

is security analyst and researcher at SBA Research.

  • E-Mail
  • Phone: +43 (1) 505 36 88
  • Fax: +43 (1) 505 88 88
  • PGP: 0xE687AADD
  • PGP Fingerprint: 4016 59DB D4E0 A908 FCDF 7BFB A40D 40AC E687 AADD

Research Interest

His research focuses on cryptographic currency technologies, network security and resilience aspects of distributed systems.

Bio

Aljosha Judmayer received a master’s degree in Software Engineering and Internet Computing at the TU Wien. He has five plus years experience in penetration testing as IT security consultant. At the moment, he is working as IT security researcher at SBA Research, where he is also working towards his Ph.D. degree on applications of cryptographic currencies and resilience aspects of distributed systems. His research interests include cryptographic currency technologies as well as network and systems security.

Publications

  • Georg Merzdovnik and Aljosha Judmayer and Artemios G. Voyiatzis and Edgar R. Weippl, "A performance assessment of network address shuffling in IoT systems," in 16th International Conference on Computer Aided Systems Theory (EUROCAST 2017), 2017. BibTeX | PDF
    @INPROCEEDINGS{Merzdovnik2017performance,
      Author = {Georg Merzdovnik and Aljosha Judmayer and {Artemios G.} Voyiatzis and {Edgar R.} Weippl},
      title = {A performance assessment of network address shuffling in IoT systems},
      booktitle = {16th International Conference on Computer Aided Systems Theory (EUROCAST 2017)},
      year = {2017},
      month = {2},
      pdf = {http://eurocast2017.fulp.ulpgc.es/sites/default/files/Eurocast_2017_Extended_Abstract_Book.pdf},
      }
  • Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and Edgar R. Weippl, "The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy," in International Conference on Financial Cryptography and Data Security (FC), 2016. BibTeX | PDF
    @INPROCEEDINGS{Krombholz2016Other,
      Author = {Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy},
      booktitle = {International Conference on Financial Cryptography and Data Security (FC)},
      year = {2016},
      month = {2},
      pdf = {TheOtherSideOfTheCoin_FC16preConf.pdf},
      }
  • Aljosha Judmayer and Edgar R. Weippl, "Cryptographic Currencies Crash Course (C4): Tutorial," in 25th International Conference on World Wide Web (WWW 2016), 2016. BibTeX | PDF
    @INPROCEEDINGS{Judmayer2016Cryptographic,
      Author = {Aljosha Judmayer and {Edgar R.} Weippl},
      title = {Cryptographic Currencies Crash Course (C4): Tutorial},
      booktitle = {25th International Conference on World Wide Web (WWW 2016)},
      year = {2016},
      month = {4},
      pdf = {http://www2016.net/proceedings/companion/p1021.pdf},
      }
  • Aljosha Judmayer and Edgar R. Weippl, "Condensed Cryptographic Currencies Crash Course (C5)," in 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016. BibTeX | PDF
    @INPROCEEDINGS{Judmayer2016Condensed,
      Author = {Aljosha Judmayer and {Edgar R.} Weippl},
      title = {Condensed Cryptographic Currencies Crash Course (C5)},
      booktitle = {2016 {ACM} {SIGSAC} Conference on Computer and Communications Security},
      year = {2016},
      month = {10},
      pdf = {http://dl.acm.org/citation.cfm?id=2976754},
      }

View all publications

  • Georg Merzdovnik and Aljosha Judmayer and Artemios G. Voyiatzis and Edgar R. Weippl, "A performance assessment of network address shuffling in IoT systems," in 16th International Conference on Computer Aided Systems Theory (EUROCAST 2017), 2017. BibTeX | PDF
    @INPROCEEDINGS{Merzdovnik2017performance,
      Author = {Georg Merzdovnik and Aljosha Judmayer and {Artemios G.} Voyiatzis and {Edgar R.} Weippl},
      title = {A performance assessment of network address shuffling in IoT systems},
      booktitle = {16th International Conference on Computer Aided Systems Theory (EUROCAST 2017)},
      year = {2017},
      month = {2},
      pdf = {http://eurocast2017.fulp.ulpgc.es/sites/default/files/Eurocast_2017_Extended_Abstract_Book.pdf},
      }
  • Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and Edgar R. Weippl, "The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy," in International Conference on Financial Cryptography and Data Security (FC), 2016. BibTeX | PDF
    @INPROCEEDINGS{Krombholz2016Other,
      Author = {Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy},
      booktitle = {International Conference on Financial Cryptography and Data Security (FC)},
      year = {2016},
      month = {2},
      pdf = {TheOtherSideOfTheCoin_FC16preConf.pdf},
      }
  • Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and Edgar R. Weippl, "Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin," in Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V., 2016. BibTeX
    @INPROCEEDINGS{Krombholz2016bare,
      Author = {Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and {Edgar R.} Weippl},
      title = {Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin},
      booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V.},
      year = {2016},
      month = {4},
      }
  • Aljosha Judmayer and Edgar R. Weippl, "Cryptographic Currencies Crash Course (C4): Tutorial," in 25th International Conference on World Wide Web (WWW 2016), 2016. BibTeX | PDF
    @INPROCEEDINGS{Judmayer2016Cryptographic,
      Author = {Aljosha Judmayer and {Edgar R.} Weippl},
      title = {Cryptographic Currencies Crash Course (C4): Tutorial},
      booktitle = {25th International Conference on World Wide Web (WWW 2016)},
      year = {2016},
      month = {4},
      pdf = {http://www2016.net/proceedings/companion/p1021.pdf},
      }
  • Aljosha Judmayer and Edgar R. Weippl, "Condensed Cryptographic Currencies Crash Course (C5)," in 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016. BibTeX | PDF
    @INPROCEEDINGS{Judmayer2016Condensed,
      Author = {Aljosha Judmayer and {Edgar R.} Weippl},
      title = {Condensed Cryptographic Currencies Crash Course (C5)},
      booktitle = {2016 {ACM} {SIGSAC} Conference on Computer and Communications Security},
      year = {2016},
      month = {10},
      pdf = {http://dl.acm.org/citation.cfm?id=2976754},
      }
  • Aljosha Judmayer and Lukas Krammer and Wolfgang Kastner, "On the security of security extensions for IP-based KNX networks," in 10th IEEE International Workshop on Factory Communication Systems, 2014. BibTeX | PDF
    @INPROCEEDINGS{Judmayer2014security,
      Author = {Aljosha Judmayer and Lukas Krammer and Wolfgang Kastner},
      sbahotlist = {true},
      title = {On the security of security extensions for IP-based KNX networks},
      booktitle = {10th IEEE International Workshop on Factory Communication Systems},
      year = {2014},
      month = {5},
      pdf = {judmayer_KNX_wfcs2014.pdf},
      }

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close