Peter Mayer M.Sc. & M.Sc. IT-Sec.

Doctoral Researcher

Technische Universität Darmstadt
Department of Computer Science
Building S4|14
Mornewegstr. 30
D-64293 Darmstadt
Germany

Room: 3.1.19
Tel: +49(0)6151/16-20810
Email: peter.mayer(a-t)secuso.org

PGP-Key: Key
Fingerprint: 50BF A9C0 4DAF 2A3A E4E4 9A1A 2AC5 5373 4687 FF06

Curriculum Vitae

Peter Mayer is a doctoral researcher in the SECUSO Research Group of Prof. Dr. Melanie Volkamer at CRISP (former CASED) /TU Darmstadt since December 2014. His research is supervised by Prof. Dr. Melanie Volkamer and focuses on usable authentication and security awareness. Having obtained his Bachelor's degree from Technische Universität Darmstadt in 2012, he graduated from Technische Universität Darmstadt with a Master's degree in IT-Security and a Master's degree in computer science in 2014. His thesis on the usability of graphical authentication schemes was supervised by Prof. Dr. Melanie Volkamer.

Currently, he is involved in the KMU AWARE project which aims to develop an it-security awareness and education platform for small and medium sized enterprises.

Research Interests

  • Usable Authentication
  • Password Managers
  • Applied Cryptography
  • Security Awareness

Research Projects

Publications

Additional Attributes

Type

Reliable Behavioural Factors in the Information Security Context

Peter Mayer, Alexandra Kunz, Melanie Volkamer
In: International Conference on Availability, Reliability and Security, August 2017
[Online-Edition: https://www.ares-conference.eu/]
[Inproceedings]

A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016

Peter Mayer, Jan Kirchner, Melanie Volkamer
In: Thirteenth Symposium on Usable Privacy and Security, July 2017
Usenix
[Online-Edition: https://www.usenix.org/conference/soups2017/technical-sessions/presentation/mayer]
[Inproceedings]

Poster: Secure Storage of Masked Passwords

Peter Mayer, Melanie Volkamer
In: IEEE European Symposium on Security and Privacy Posters, April 2017
[Online-Edition: www.ieee-security.org/TC/EuroSP2017/posters/poster3.pdf]
[Inproceedings]

Productivity vs. Security: Mitigating Conflicting Goals in Organizations [to appear]

Peter Mayer, Nina Gerber, Ronja McDermott, Melanie Volkamer, Joachim Vogt
In: Information and Computer Security, Vol. 25, 2017
[Online-Edition: www.emeraldinsight.com/doi/abs/10.1108/ICS-03-2017-0014]
[Article]

Enabling Automatic Password Change in Password Managers Through Crowdsourcing

Peter Mayer, Hermann Berket, Melanie Volkamer
In: International Conference on Passwords, December 2016
Springer LNCS
[Online-Edition: https://passwords2016.rub.de/]
[Inproceedings]

POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes

Peter Mayer, Stephan Neumann, Melanie Volkamer
In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, p. 1817--1819, October 2016
ACM
[Inproceedings]

Supporting Decision Makers in Choosing Suitable Authentication Schemes

Peter Mayer, Stephan Neumann, Daniel Storck, Melanie Volkamer
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), p. 67-77, July 2016
University of Plymouth
[Online-Edition: http://haisa.org/?page=cfp]
[Inproceedings]

Teaching Phishing-Security: Which Way is Best?

Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer, Peter Mayer, Alexandra Kunz, Philipp Rack, Daniel Lehmann
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), p. 135-149, June 2016
Springer
[Online-Edition: http://ifipsec.org/2016/]
[Inproceedings]

ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology

Andreas Gutmann, Karen Renaud, Joseph Maguire, Peter Mayer, Melanie Volkamer, Kanta Matsuura, Jörn Müller-Quade
In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), p. 357-371, March 2016
IEEE
[Online-Edition: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7467365]
[Inproceedings]

Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing

Peter Mayer, Melanie Volkamer
In: Proceedings of the 31st Annual Computer Security Applications Conference, p. 431-440, December 2015
ACM
[Online-Edition: https://dl.acm.org/citation.cfm?id=2818043]
[Inproceedings]

Talks

A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016
In: Thirteenth Symposium on Usable Privacy and Security
13th
July 2017

Phishing und andere betrügersiche Nachrichten
In: Safer Internet Day - VHS Fulda
7th
February 2017

Enabling Automatic Password Change in Password Managers Through Crowdsourcing
In: International Conference on Passwords
6th December 2016 (watch it online)

Supporting Decision Makers in Choosing Suitable Authentication Schemes
In: International Symposium on Human Aspects of Information Security & Assurance
21st
July 2016

Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing
In: Annual Computer Security Applications Conference 2015
11
th December 2015

Graphische Passwörter als Alternative zu Textpasswörtern?
In: Usable Security Day - Darmstadt, Germany
16th July 2015

Authentication Schemes - Comparison and Effective Password Spaces
In: International Conference on Information Systems Security - Hyderabad, India
19th December 2014

Are Graphical Authentication Mechanisms As Strong As Passwords?
In: Federated Conference on Computer Science and Information Systems - Krakow, Poland
9th September 2013

Research Visit

Scientific Services

Reviewing Activities

  • USEC (2017)
  • Journal of Information Security and Applications (2017)
  • IEEE Transactions on Information Forensics & Security (2017)

Program Commitee Memberships

  • Mensch und Computer 2015 / Workshop "Usable Security" (2015)

Teaching

  • WS 2017: Usable Security and Privacy (programming lab)
  • SS 2017: Human Factors in Security (lecture at Karlstad University, Sweden)
  • SS 2017: Usable Security and Privacy (programming lab)
  • WS 2016/2017: Usable Security and Privacy (programming lab)
  • SS 2016: Usable Security and Privacy (programming lab)
  • WS 2015/2016: Einführung in Trusted Systems / Computer Security
  • WS 2015/2016: Usable Security and Privacy (programming lab)
  • SS 2015: Einführung in Trusted Systems

Co-supervision

  • Dominik Gopp (supervised by Peter Mayer and Prof. Dr. Melanie Volkamer): Secure storage of passwords and effective re-covery/reset (February 2015).
  • Michael Seidel (supervised by Peter Mayer and Prof. Dr. Melanie Volkamer): Alternative authentication schemes to manage passwords in Firefox (April 2016)
  • Hermann Berket (supervised by Peter Mayer and Prof. Dr. Melanie Volkamer): Automatisierter Passwort-Reset in Firefox. (April 2016)
  • Mustafa Kargi (supervised by Peter Mayer and Prof. Dr. Melanie Volkamer): Conception and Implementation of a Password Recovery Tool for Laymen (September 2016)
  • Kristoffer Braun & Philipp Rack (supervised by Peter Mayer and Prof. Dr. Melanie Volkamer): Threats of authentication on gamepad-driven devices (March 2017)
  • Karola Marky (supervised by Peter Mayer and Prof. Dr. Melanie Volkamer): Privacy Friendly Password Generator for Android (April 2017)
  • Florian Platzer (supervised by Peter Mayer and Prof. Dr. Melanie Volkamer): Password Lists for Security Awareness Events (July 2017)
  • Philip Stumpf (supervised by Peter Mayer and Prof. Dr. Melanie Volkamer): Entwicklung einer Plattform zur Entscheidungshilfe für Authentifizierungsmechanismen (in progress)
  • Thomas Weber (supervised by Peter Mayer and Prof. Dr. Melanie Volkamer): Implementation of a collaborative authentication research platform (in progress)
  • Nils Muzzulini (supervised by Peter Mayer and Prof. Dr. Melanie Volkamer): Investigation of Two-Factor Authentication in the Context of Automatic Password Change (in progress)
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang