Markus Donko-Huber
Markus Donko-Huber
Industry since 2017. unmarried name: Markus Huber
Verified email at nysos.net - Homepage
TitleCited byYear
Advanced social engineering attacks
K Krombholz, H Hobel, M Huber, E Weippl
Journal of Information Security and applications 22, 113-122, 2015
2522015
Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.
M Mulazzani, S Schrittwieser, M Leithner, M Huber, E Weippl
USENIX Security Symposium, 65-76, 2011
2162011
Towards automating social engineering using social networking sites
M Huber, S Kowalski, M Nohlberg, S Tjoa
2009 International Conference on Computational Science and Engineering 3 …, 2009
1192009
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ...
NDSS, 2012
1162012
Fast and reliable browser identification with javascript engine fingerprinting
M Mulazzani, P Reschl, M Huber, M Leithner, S Schrittwieser, E Weippl, ...
Web 2.0 Workshop on Security and Privacy (W2SP) 5, 2013
852013
Social snapshots: Digital forensics for online social networks
M Huber, M Mulazzani, M Leithner, S Schrittwieser, G Wondracek, ...
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
832011
Spoiled onions: Exposing malicious Tor exit relays
P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ...
International Symposium on Privacy Enhancing Technologies Symposium, 304-331, 2014
732014
Friend-in-the-middle attacks: Exploiting social networking sites for spam
M Huber, M Mulazzani, E Weippl, G Kitzler, S Goluch
Internet Computing, IEEE 15 (3), 28 - 34, 2011
712011
Friend-in-the-middle attacks
M Huber, M Mulazzani, E Weippl, G Kitzler, S Goluch
Published by the IEEE Computer Society, 1089-7801, 2010
71*2010
Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools
G Merzdovnik, M Huber, D Buhov, N Nikiforakis, S Neuner, ...
IEEE European Symposium on Security and Privacy 2017, 2017
602017
InnoDB Database Forensics
P Frühwirt, M Huber, M Mulazzani, ER Weippl
Advanced Information Networking and Applications (AINA), 2010 24th IEEE …, 2010
522010
Enter Sandbox: Android Sandbox Comparison
S Neuner, V van der Veen, M Lindorfer, M Huber, G Merzdovnik, ...
Proceedings of the IEEE, 0
47*
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs
P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl
Information Security Technical Report 17 (4), 227-238, 2013
462013
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs
P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl
Information Security Technical Report 17 (4), 227-238, 2013
462013
QR code security: A survey of attacks and challenges for usable security
K Krombholz, P Frühwirt, P Kieseberg, I Kapsalis, M Huber, E Weippl
International Conference on Human Aspects of Information Security, Privacy …, 2014
442014
Shpf: Enhancing http (s) session security with browser fingerprinting
T Unger, M Mulazzani, D Frühwirt, M Huber, S Schrittwieser, E Weippl
2013 International Conference on Availability, Reliability and Security, 255-261, 2013
392013
SHPF: Enhancing HTTP (S) Session Security with Browser Fingerprinting
M Mulazzani, E Weippl, S Schrittwieser, T Unger, M Huber, P Frühwirt
Proceedings of the Eighth International Conference on Availability …, 2013
39*2013
Social engineering attacks on the knowledge worker
K Krombholz, H Hobel, M Huber, E Weippl
Proceedings of the 6th International Conference on Security of Information …, 2013
382013
Tor HTTP usage and information leakage
M Huber, M Mulazzani, E Weippl
Communications and Multimedia Security, 245-255, 2010
312010
Social network forensics: Tapping the data pool of social networks
M Mulazzani, M Huber, E Weippl
Eighth Annual IFIP WG 11, 1-20, 2012
302012
The system can't perform the operation now. Try again later.
Articles 1–20