Markus Huber

Orcid: 0000-0002-7331-0363

Affiliations:
  • SBA Research, Vienna, Austria
  • FH St. Pölten, Austria


According to our database1, Markus Huber authored at least 36 papers between 2009 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
Pin it! Improving Android network security at runtime.
Proceedings of the 2016 IFIP Networking Conference, 2016

No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Advanced social engineering attacks.
J. Inf. Secur. Appl., 2015

Privacy and data protection in smartphone messengers.
Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services, 2015

Towards a CERT-Communication Model as Basis to Software Assurance.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Network Security Challenges in Android Applications.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Enter Sandbox: Android Sandbox Comparison.
CoRR, 2014

Covert Computation - Hiding code in code through compile-time obfuscation.
Comput. Secur., 2014

Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Spoiled Onions: Exposing Malicious Tor Exit Relays.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Towards Fully Automated Digital Alibis with Social Interaction.
Proceedings of the Advances in Digital Forensics X, 2014

QR Code Security: A Survey of Attacks and Challenges for Usable Security.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

2013
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs.
Inf. Secur. Tech. Rep., 2013

Using the structure of B+-trees for enhancing logging mechanisms of databases.
Int. J. Web Inf. Syst., 2013

Social engineering attacks on the knowledge worker.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Quantifying Windows File Slack Size and Stability.
Proceedings of the Advances in Digital Forensics IX, 2013

Appinspect: large-scale evaluation of social networking apps.
Proceedings of the Conference on Online Social Networks, 2013

Covert computation: hiding code in code for obfuscation purposes.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Data Visualization for Social Network Forensics.
Proceedings of the Advances in Digital Forensics VIII, 2012

InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam.
IEEE Internet Comput., 2011

Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.
Proceedings of the 20th USENIX Security Symposium, 2011

Trees Cannot Lie: Using Data Structures for Forensics Purposes.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

Social snapshots: digital forensics for online social networks.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System.
IEEE Trans. Syst. Man Cybern. Part C, 2010

Social Networking Sites Security: Quo Vadis.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Tor HTTP Usage and Information Leakage.
Proceedings of the Communications and Multimedia Security, 2010

Exploiting social networking sites for spam.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Cheap and automated socio-technical attacks based on social networking sites.
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, 2010

InnoDB Database Forensics.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Towards Automating Social Engineering Using Social Networking Sites.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009


  Loading...