Markus Huber
Markus Huber
Bestätigte E-Mail-Adresse bei - Startseite
TitelZitiert vonJahr
Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.
M Mulazzani, S Schrittwieser, M Leithner, M Huber, E Weippl
USENIX Security Symposium, 65-76, 2011
Advanced social engineering attacks
K Krombholz, H Hobel, M Huber, E Weippl
Journal of Information Security and applications 22, 113-122, 2015
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ...
NDSS, 2012
Towards automating social engineering using social networking sites
M Huber, S Kowalski, M Nohlberg, S Tjoa
Computational Science and Engineering, 2009. CSE'09. International …, 2009
Fast and reliable browser identification with javascript engine fingerprinting
M Mulazzani, P Reschl, M Huber, M Leithner, S Schrittwieser, E Weippl, ...
Web 2.0 Workshop on Security and Privacy (W2SP) 5, 2013
Social snapshots: Digital forensics for online social networks
M Huber, M Mulazzani, M Leithner, S Schrittwieser, G Wondracek, ...
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
Friend-in-the-middle attacks: Exploiting social networking sites for spam
M Huber, M Mulazzani, E Weippl, G Kitzler, S Goluch
Internet Computing, IEEE 15 (3), 28 - 34, 2011
Friend-in-the-middle attacks
M Huber, M Mulazzani, E Weippl, G Kitzler, S Goluch
Published by the IEEE Computer Society, 1089-7801, 2010
Spoiled onions: Exposing malicious Tor exit relays
P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ...
International Symposium on Privacy Enhancing Technologies Symposium, 304-331, 2014
InnoDB Database Forensics
P Frühwirt, M Huber, M Mulazzani, ER Weippl
Advanced Information Networking and Applications (AINA), 2010 24th IEEE …, 2010
Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools
G Merzdovnik, M Huber, D Buhov, N Nikiforakis, S Neuner, ...
IEEE European Symposium on Security and Privacy 2017, 2017
Enter Sandbox: Android Sandbox Comparison
S Neuner, V van der Veen, M Lindorfer, M Huber, G Merzdovnik, ...
Proceedings of the IEEE, 0
SHPF: Enhancing HTTP (S) Session Security with Browser Fingerprinting
M Mulazzani, E Weippl, S Schrittwieser, T Unger, M Huber, P Frühwirt
Proceedings of the Eighth International Conference on Availability …, 2013
SHPF: Enhancing HTTP (S) Session Security with Browser Fingerprinting (extended preprint)
T Unger, FHC Wien, M Mulazzani, D Frühwirt, M Huber, S Schrittwieser, ...
QR code security: A survey of attacks and challenges for usable security
K Krombholz, P Frühwirt, P Kieseberg, I Kapsalis, M Huber, E Weippl
International Conference on Human Aspects of Information Security, Privacy …, 2014
InnoDB database forensics: reconstructing data manipulation queries from redo logs
P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl
Availability, Reliability and Security (ARES), 2012 Seventh International …, 2012
Social engineering attacks on the knowledge worker
K Krombholz, H Hobel, M Huber, E Weippl
Proceedings of the 6th International Conference on Security of Information …, 2013
Tor HTTP usage and information leakage
M Huber, M Mulazzani, E Weippl
Communications and Multimedia Security, 245-255, 2010
Social network forensics: Tapping the data pool of social networks
M Mulazzani, M Huber, E Weippl
Eighth Annual IFIP WG 11, 1-20, 2012
Who on earth is “Mr. Cypher”: automated friend injection attacks on social networking sites
M Huber, M Mulazzani, E Weippl
IFIP International Information Security Conference, 80-89, 2010
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20