Martin Mulazzani

According to our database1, Martin Mulazzani authored at least 27 papers between 2010 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Gradually Improving the Forensic Process.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Trust me, I'm a Root CA! Analyzing SSL Root CAs in Modern Browsers and Operating Systems.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata.
Electron. Mark., 2014

Enter Sandbox: Android Sandbox Comparison.
CoRR, 2014

Covert Computation - Hiding code in code through compile-time obfuscation.
Comput. Secur., 2014

Spoiled Onions: Exposing Malicious Tor Exit Relays.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Towards Fully Automated Digital Alibis with Social Interaction.
Proceedings of the Advances in Digital Forensics X, 2014

IMSI-catch me if you can: IMSI-catcher-catchers.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

Using the structure of B+-trees for enhancing logging mechanisms of databases.
Int. J. Web Inf. Syst., 2013

Quantifying Windows File Slack Size and Stability.
Proceedings of the Advances in Digital Forensics IX, 2013

Appinspect: large-scale evaluation of social networking apps.
Proceedings of the Conference on Online Social Networks, 2013

Covert computation: hiding code in code for obfuscation purposes.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Data Visualization for Social Network Forensics.
Proceedings of the Advances in Digital Forensics VIII, 2012

Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam.
IEEE Internet Comput., 2011

Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.
Proceedings of the 20th USENIX Security Symposium, 2011

Trees Cannot Lie: Using Data Structures for Forensics Purposes.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

Social snapshots: digital forensics for online social networks.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System.
IEEE Trans. Syst. Man Cybern. Part C, 2010

Social Networking Sites Security: Quo Vadis.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Tor HTTP Usage and Information Leakage.
Proceedings of the Communications and Multimedia Security, 2010

Exploiting social networking sites for spam.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Cheap and automated socio-technical attacks based on social networking sites.
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, 2010

InnoDB Database Forensics.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010