Martin Schmiedecker (Mulazzani)
Martin Schmiedecker (Mulazzani)
Bosch Engineering GmbH
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Dark clouds on the horizon: Using cloud storage as attack vector and online slack space
M Mulazzani, S Schrittwieser, M Leithner, M Huber, E Weippl
20th USENIX Security Symposium (USENIX Security 11), 2011
QR code security
P Kieseberg, M Leithner, M Mulazzani, L Munroe, S Schrittwieser, ...
Proceedings of the 8th International Conference on Advances in Mobile …, 2010
Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools
G Merzdovnik, M Huber, D Buhov, N Nikiforakis, S Neuner, ...
2nd IEEE European Symposium on Security and Privacy (Euro S&P), 2017
IMSI-catch me if you can: IMSI-catcher-catchers
A Dabrowski, N Pianta, T Klepp, M Mulazzani, E Weippl
Annual Computer Security Applications Conference (ACSAC), 246-255, 2014
Fast and reliable browser identification with javascript engine fingerprinting
M Mulazzani, P Reschl, M Huber, M Leithner, S Schrittwieser, E Weippl, ...
Web 2.0 Workshop on Security and Privacy (W2SP) 5, 4, 2013
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ...
Network & Distributed System Security Symposium (NDSS), 2012
"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS
K Krombholz, W Mayer, M Schmiedecker, E Weippl
26th USENIX Security Symposium, 2017
Spoiled onions: Exposing malicious Tor exit relays
P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ...
Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014
Social snapshots: Digital forensics for online social networks
M Huber, M Mulazzani, M Leithner, S Schrittwieser, G Wondracek, ...
Proceedings of the 27th annual computer security applications conference …, 2011
Friend-in-the-middle attacks: Exploiting social networking sites for spam
M Huber, M Mulazzani, E Weippl, G Kitzler, S Goluch
IEEE Internet Computing 15 (3), 28-34, 2011
Shpf: Enhancing http (s) session security with browser fingerprinting
T Unger, M Mulazzani, D Fruhwirt, M Huber, S Schrittwieser, E Weippl
Availability, Reliability and Security (ARES), 2013 Eighth International …, 2013
InnoDB database forensics
P Frühwirt, M Huber, M Mulazzani, ER Weippl
2010 24th IEEE International Conference on Advanced Information Networking …, 2010
Enter sandbox: Android sandbox comparison
S Neuner, V Van der Veen, M Lindorfer, M Huber, G Merzdovnik, ...
Proceedings of the IEEE Mobile Security Technologies workshop (MoST), 2014
Time is on my side: Steganography in filesystem metadata
Sebastian Neuner, Artemios G. Voyiatzisa, Martin Schmiedecker, Stefan ...
Digital Investigation 18 (7), 76-86, 2016
Social network forensics: Tapping the data pool of social networks
M Mulazzani, M Huber, E Weippl
Eighth Annual IFIP WG 11, 1Ű20, 2012
Appinspect: large-scale evaluation of social networking apps
M Huber, M Mulazzani, S Schrittwieser, E Weippl
Proceedings of the first ACM conference on Online social networks, 143-154, 2013
Tor HTTP usage and information leakage
M Huber, M Mulazzani, E Weippl
Communications and Multimedia Security: 11th IFIP TC 6/TC 11 International …, 2010
Who on earth is “Mr. Cypher”: automated friend injection attacks on social networking sites
M Huber, M Mulazzani, E Weippl
Security and Privacy–Silver Linings in the Cloud: 25th IFIP TC-11 …, 2010
NavigaTor: Finding Faster Paths to Anonymity
R Annessi, M Schmiedecker
IEEE European Symposium on Security and Privacy (Euro S&P), 2016
No need for black chambers: testing TLS in the e-mail ecosystem at large
W Mayer, A Zauner, M Schmiedecker, M Huber
International Conference on Availability, Reliability and Security (ARES), 10-20, 2016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20