Markus Huber

Markus Huberis senior researcher at SBA Research and Lecturer at the University of Applied Sciences St.Pölten.

Research Interests

His main research area is security & privacy in online social networks.

Bio

Markus Huber received a bachelor’s degree in Business Informatics from the University of Vienna and a master’s degree in Information and Communication Security Systems from the Royal Institute of Technology in Stockholm, Sweden. In 2013 he graduated with distinction from the Vienna Ph.D. school of informatics.

Throughout his studies he gained industry experience as an IT consultant. In the area of research he worked as a teaching assistant at the DSV SecLab in Stockholm, summer student at CERN, and as a research intern at Carnegie Mellon University. He works as a senior researcher at SBA Research.

Publications

  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl, "Covert Computation – Hiding Code in Code Through Compile-Time Obfuscation," Computers & Security, 2014. BibTeX
    @ARTICLE{Schrittwieser2014Covert,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation},
      journal = {Computers & Security},
      year = {2014},
      month = {5},
      publisher = {Elsevier Advanced Technology},
      }
  • Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and Edgar R. Weippl, "Appinspect: large-scale evaluation of social networking apps," in Proceedings of the first ACM conference on Online social networks, 2013, pp. 143-154. BibTeX | PDF | Slides
    @INPROCEEDINGS{huber2013appinspect,
      Author = {Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Appinspect: large-scale evaluation of social networking apps},
      booktitle = {Proceedings of the first ACM conference on Online social networks},
      year = {2013},
      month = {10},
      pdf = {AppInspect_peprint.pdf},
      pages = {143--154},
      publisher = {ACM},
      link_slides = {http://cosn.acm.org/2013/files/Session6/Session6Paper1.pdf},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Edgar R. Weippl, "Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications," in Network and Distributed System Security Symposium (NDSS 2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Guess_Who_s_Texting_You_Evalua_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
      title = {Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications},
      booktitle = {Network and Distributed System Security Symposium (NDSS 2012)},
      year = {2012},
      month = {2},
      pdf = {ndss2012_final.pdf},
      }
  • Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl, "Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space," in USENIX Security, 2011. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Dark_Clouds_on_the_Horizon_Usi_2011,
      Author = {Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
      title = {Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space},
      booktitle = {USENIX Security},
      year = {2011},
      month = {8},
      pdf = {dropboxUSENIX2011.pdf},
      }
  • Markus Huber and Martin Schmiedecker and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and Edgar R. Weippl, "Social Snapshots: Digital Forensics for Online Social Networks," in Annual Computer Security Applications Conference (ACSAC), 2011. BibTeX | PDF
    @INPROCEEDINGS{_Social_Snapshots_Digital_Foren_2011,
      Author = {Markus Huber and Martin Schmiedecker and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and {Edgar R.} Weippl},
      title = {Social Snapshots: Digital Forensics for Online Social Networks},
      booktitle = {Annual Computer Security Applications Conference (ACSAC)},
      year = {2011},
      month = {12},
      pdf = {social_snapshots_preprint.pdf},
      }

View all publications

  • Wilfried Mayer and Aaron Zauner and Martin Schmiedecker and Markus Huber, "No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large," arXiv preprint, 2015. BibTeX | PDF | Data
    @ARTICLE{Mayer2015Need,
      Author = {Wilfried Mayer and Aaron Zauner and Martin Schmiedecker and Markus Huber},
      sbahotlist = {true},
      title = {No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large},
      journal = {arXiv preprint},
      year = {2015},
      month = {10},
      pdf = {http://arxiv.org/abs/1510.08646},
      link_data = {https://scans.io/study/sba-email},
      }
  • Damjan Buhov and Markus Huber and Georg Merzdovnik and Edgar R. Weippl and Vesna Dimitrova, "Network Security Challenges in Android Applications," in 10th International Conference on Availability, Reliability and Security (ARES 2015), 2015. BibTeX
    @INPROCEEDINGS{Buhov2015Network,
      Author = {Damjan Buhov and Markus Huber and Georg Merzdovnik and {Edgar R.} Weippl and Vesna Dimitrova},
      title = {Network Security Challenges in Android Applications},
      booktitle = {10th International Conference on Availability, Reliability and Security (ARES 2015)},
      year = {2015},
      month = {8},
      }
  • Christoph Rottermanner and Peter Kieseberg and Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser, "Privacy and Data Protection in Smartphone Messengers," in Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services (iiWAS2015), 2015. BibTeX | PDF
    @INPROCEEDINGS{Rottermanner2015Privacy,
      Author = {Christoph Rottermanner and Peter Kieseberg and Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser},
      title = {Privacy and Data Protection in Smartphone Messengers},
      booktitle = {Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services (iiWAS2015)},
      year = {2015},
      month = {12},
      pdf = {paper_drafthp.pdf},
      }
  • Philipp Winter and Richard Koewer and Martin Schmiedecker and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and Edgar R. Weippl, "Spoiled Onions: Exposing Malicious Tor Exit Relays," in The 14th Privacy Enhancing Technologies Symposium (PETS), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Winter2014Spoiled,
      Author = {Philipp Winter and Richard Koewer and Martin Schmiedecker and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and {Edgar R.} Weippl},
      title = {Spoiled Onions: Exposing Malicious Tor Exit Relays},
      booktitle = {The 14th Privacy Enhancing Technologies Symposium (PETS)},
      year = {2014},
      month = {7},
      pdf = {http://www.sba-research.org/wp-content/uploads/publications/pets2014_preprint.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/spoiled-onions},
      }
  • Sebastian Neuner and Victor Van der Veen and Martina Lindorfer and Markus Huber and Georg Merzdovnik and Martin Schmiedecker and Edgar R. Weippl, "Enter Sandbox: Android Sandbox Comparison," in Proceedings of the IEEE Mobile Security Technologies Workshop (MoST), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Neuner2014Enter,
      Author = {Sebastian Neuner and Victor {Van der Veen} and Martina Lindorfer and Markus Huber and Georg Merzdovnik and Martin Schmiedecker and {Edgar R.} Weippl},
      title = {Enter Sandbox: Android Sandbox Comparison},
      booktitle = {Proceedings of the IEEE Mobile Security Technologies Workshop (MoST)},
      year = {2014},
      month = {5},
      pdf = {mostAndroid.pdf},
      publisher = {IEEE},
      link_slides = {http://www.slideshare.net/SBAResearch/enter-sandbox-android-sandbox-comparison},
      }
  • Stefanie Beyer and Martin Schmiedecker and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl, "Towards Fully Automated Digital Alibis with Social Interaction," in Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2014. BibTeX | PDF | Slides | Src
    @INPROCEEDINGS{ifip119_2014_alibi,
      Author = {Stefanie Beyer and Martin Schmiedecker and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
      title = {Towards Fully Automated Digital Alibis with Social Interaction},
      booktitle = {Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics},
      year = {2014},
      month = {1},
      pdf = {alibigenerator_preprint.pdf},
      link_source = {https://github.com/mmulazzani/alibiFramework},
      link_slides = {http://www.slideshare.net/SBAResearch/digitale-alibis-ifip},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl, "Covert Computation – Hiding Code in Code Through Compile-Time Obfuscation," Computers & Security, 2014. BibTeX
    @ARTICLE{Schrittwieser2014Covert,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation},
      journal = {Computers & Security},
      year = {2014},
      month = {5},
      publisher = {Elsevier Advanced Technology},
      }
  • Katharina Krombholz and Peter Fruehwirt and Peter Kieseberg and Ioannis Kapsalis and Markus Huber and Edgar R. Weippl, "QR Code Security: A Survey of Attacks and Challenges for Usable Security." Springer, 2014, pp. 79-90. BibTeX | PDF | Slides
    @INBOOK{Krombholz2014Code,
      Author = {Katharina Krombholz and Peter Fruehwirt and Peter Kieseberg and Ioannis Kapsalis and Markus Huber and {Edgar R.} Weippl},
      title = {QR Code Security: A Survey of Attacks and Challenges for Usable Security},
      booktitle = {Human Aspects of Information Security, Privacy, and Trust},
      year = {2014},
      month = {0},
      pdf = {llncs.pdf},
      pages = {79--90},
      publisher = {Springer},
      link_slides = {http://de.slideshare.net/SBAResearch/qr-code-security-a-survey-of-attacks-and-challenges-for-usable-security},
      }
  • Christoph Hochreiner and Markus Huber and Georg Merzdovnik and Edgar R. Weippl, "Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices," in SINCONF 2014 (Conference on Security of Information and Networks), 2014. BibTeX | PDF
    @INPROCEEDINGS{Hochreiner2014Towards,
      Author = {Christoph Hochreiner and Markus Huber and Georg Merzdovnik and {Edgar R.} Weippl},
      title = {Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices },
      booktitle = {SINCONF 2014 (Conference on Security of Information and Networks)},
      year = {2014},
      month = {9},
      pdf = {sinconf_preprint.pdf},
      }
  • Katharina Krombholz and Heidelinde Hobel and Markus Huber and Edgar R. Weippl, "Advanced social engineering attacks," Journal of Information Security and Applications, 2014. BibTeX | PDF
    @ARTICLE{Krombholz2014Advanced,
      Author = {Katharina Krombholz and Heidelinde Hobel and Markus Huber and {Edgar R.} Weippl},
      title = {Advanced social engineering attacks},
      journal = {Journal of Information Security and Applications},
      year = {2014},
      month = {0},
      pdf = {jisa_revised.pdf},
      }
  • Peter Aufner and Georg Merzdovnik and Markus Huber and Edgar R. Weippl, "Plugin in the Middle – Minimising Security Risks in Mobile Middleware Implementations," in SINCONF 2014 (Conference on Security of Information and Networks), 2014. BibTeX | PDF
    @INPROCEEDINGS{Aufner2014Plugin,
      Author = {Peter Aufner and Georg Merzdovnik and Markus Huber and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations},
      booktitle = {SINCONF 2014 (Conference on Security of Information and Networks)},
      year = {2014},
      month = {9},
      pdf = {secperv.pdf},
      }
  • Martin Schmiedecker and Philipp Reschl and Markus Huber and Manuel Leithner and Sebastian Schrittwieser and Edgar R. Weippl, "Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting," in Web 2.0 Workshop on Security and Privacy (W2SP), 2013. BibTeX | PDF | Slides
    @INPROCEEDINGS{_Fast_and_Reliable_Browser_Iden_2013,
      Author = {Martin Schmiedecker and Philipp Reschl and Markus Huber and Manuel Leithner and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting},
      booktitle = {Web 2.0 Workshop on Security and Privacy (W2SP)},
      year = {2013},
      month = {5},
      pdf = {jsfingerprinting.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/fast-and-efficient-browser-identification-with-javascript-engine-fingerprinting},
      }
  • Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl, "InnoDB Database Forensics: Enhanced Reconstruction of Data Manipulation Queries from Redo Logs," Information Security Technical Report (ISTR), Special Issue: ARES, 2013. BibTeX | PDF
    @ARTICLE{_InnoDB_Database_Forensics_Enha_2013,
      Author = {Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
      title = {InnoDB Database Forensics: Enhanced Reconstruction of Data Manipulation Queries from Redo Logs},
      journal = {Information Security Technical Report (ISTR), Special Issue: ARES},
      year = {2013},
      month = {4},
      pdf = {ARES2012_Journal.pdf},
      }
  • Martin Schmiedecker and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and Edgar R. Weippl, "Quantifying Windows File Slack in Size and Stability," in Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2013. BibTeX | PDF | Slides | Data
    @INPROCEEDINGS{Mulazzani_Slackspace_Quantifiation_2013,
      Author = {Martin Schmiedecker and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Quantifying Windows File Slack in Size and Stability},
      booktitle = {Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics},
      year = {2013},
      month = {1},
      pdf = {ifipSlack_2013_preprint.pdf},
      link_data = {http://128.130.204.91/slackspaceDataset.7z},
      link_slides = {http://www.slideshare.net/SBAResearch/quantifying-windows-file-slack-in-size-and-stability},
      }
  • Katharina Krombholz and Heidelinde Hobel and Markus Huber and Edgar R. Weippl, "Social engineering attacks on the knowledge worker," in Proceedings of the 6th International Conference on Security of Information and Networks, 2013, pp. 28-35. BibTeX
    @INPROCEEDINGS{Krombholz2013Social,
      Author = {Katharina Krombholz and Heidelinde Hobel and Markus Huber and {Edgar R.} Weippl},
      title = {Social engineering attacks on the knowledge worker},
      booktitle = {Proceedings of the 6th International Conference on Security of Information and Networks},
      year = {2013},
      month = {11},
      pages = {28--35},
      publisher = {ACM},
      }
  • Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and Edgar R. Weippl, "Appinspect: large-scale evaluation of social networking apps," in Proceedings of the first ACM conference on Online social networks, 2013, pp. 143-154. BibTeX | PDF | Slides
    @INPROCEEDINGS{huber2013appinspect,
      Author = {Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Appinspect: large-scale evaluation of social networking apps},
      booktitle = {Proceedings of the first ACM conference on Online social networks},
      year = {2013},
      month = {10},
      pdf = {AppInspect_peprint.pdf},
      pages = {143--154},
      publisher = {ACM},
      link_slides = {http://cosn.acm.org/2013/files/Session6/Session6Paper1.pdf},
      }
  • Thomas Unger and Martin Schmiedecker and Dominik Frühwirt and Markus Huber and Sebastian Schrittwieser and Edgar R. Weippl, "SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting," in Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES), 2013. BibTeX | PDF | Slides | Src
    @INPROCEEDINGS{ARES_SHPF_short_2013,
      Author = {Thomas Unger and Martin Schmiedecker and Dominik Frühwirt and Markus Huber and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting},
      booktitle = {Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES)},
      year = {2013},
      month = {9},
      pdf = {shpf_extendedPreprint.pdf},
      link_source = {https://github.com/mmulazzani/shpf},
      link_slides = {http://www.slideshare.net/SBAResearch/shpf-enhancing-https-session-security-with-browser-fingerprinting},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl, "Covert Computation – Hiding Code in Code for Obfuscation Purposes," in Proceedings of the 8th International Symposium on ACM Symposium on Information , Computer and Communications Security (ASIACCS 2013), 2013. BibTeX | PDF
    @INPROCEEDINGS{schrittwieser-covertcomputation-2013,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
      title = {Covert Computation - Hiding Code in Code for Obfuscation Purposes},
      booktitle = {Proceedings of the 8th International Symposium on ACM Symposium on Information , Computer and Communications Security (ASIACCS 2013)},
      year = {2013},
      month = {5},
      pdf = {p529-schrittwieser.pdf},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Gilbert Wondracek and Sylvi Rennert and Edgar R. Weippl, "Secure Software in der Cloud," in Tagungsband Cloud und Klein: IT im Spannungsfeld zwischen Servercluster und Sensornetz, 2012. BibTeX
    @INPROCEEDINGS{Schrittwieser_Secure_Software_in_der_Cloud_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Gilbert Wondracek and Sylvi Rennert and {Edgar R.} Weippl},
      title = {Secure Software in der Cloud},
      booktitle = {Tagungsband Cloud und Klein: IT im Spannungsfeld zwischen Servercluster und Sensornetz},
      year = {2012},
      month = {4},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Edgar R. Weippl, "Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications," in Network and Distributed System Security Symposium (NDSS 2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Guess_Who_s_Texting_You_Evalua_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
      title = {Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications},
      booktitle = {Network and Distributed System Security Symposium (NDSS 2012)},
      year = {2012},
      month = {2},
      pdf = {ndss2012_final.pdf},
      }
  • Martin Schmiedecker and Markus Huber and Edgar R. Weippl, "Social Network Forensics: Tapping the Data Pool of Social Networks," in Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2012. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Social_Network_Forensics_2012,
      Author = {Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
      title = {Social Network Forensics: Tapping the Data Pool of Social Networks},
      booktitle = {Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics},
      year = {2012},
      month = {1},
      pdf = {socialForensics_preprint.pdf},
      }
  • Martin Schmiedecker and Philipp Reschl and Markus Huber and Manuel Leithner and Edgar R. Weippl, "Fast and Efficient Browser Identification with JavaScript Engine Fingerprinting," 2012. BibTeX | PDF
    @TECHREPORT{_Fast_and_Efficient_Browser_Ide_2012,
      Author = {Martin Schmiedecker and Philipp Reschl and Markus Huber and Manuel Leithner and {Edgar R.} Weippl},
      title = {Fast and Efficient Browser Identification with JavaScript Engine Fingerprinting},
      booktitle = {Technical Report TR-SBA-Research-0512-01},
      year = {2012},
      month = {5},
      pdf = {jsfingerprinting_Tech_Report.pdf},
      }
  • Markus Huber, "Social Snapshot framework:Crime Investigation on Online Social Networks," ERCIM News, vol. 90, p. 28, 2012. BibTeX
    @ARTICLE{_Social_Snapshot_framework_Crim_2012,
      Author = {Markus Huber},
      title = {Social Snapshot framework:Crime Investigation on Online Social Networks },
      journal = {ERCIM News},
      year = {2012},
      month = {7},
      volume = {90},
      pages = {28},
      }
  • Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl, "InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs," in The Fifth International Workshop on Digital Forensics (WSDF), 2012. BibTeX | PDF
    @INPROCEEDINGS{_InnoDB_Database_Forensics_Reco_2012,
      Author = {Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
      title = {InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs},
      booktitle = {The Fifth International Workshop on Digital Forensics (WSDF)},
      year = {2012},
      month = {8},
      pdf = {WSDF2012_InnoDB.pdf},
      }
  • Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl, "Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space," in USENIX Security, 2011. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Dark_Clouds_on_the_Horizon_Usi_2011,
      Author = {Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
      title = {Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space},
      booktitle = {USENIX Security},
      year = {2011},
      month = {8},
      pdf = {dropboxUSENIX2011.pdf},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Markus Huber and Edgar R. Weippl, "Trees Cannot Lie: Using Data Structures for Forensics Purposes," in European Intelligence and Security Informatics Conference (EISIC 2011), 2011. BibTeX | PDF
    @INPROCEEDINGS{Kieseberg_Trees_Cannot_Lie_Using_Data_St_2011,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
      title = {Trees Cannot Lie: Using Data Structures for Forensics Purposes},
      booktitle = {European Intelligence and Security Informatics Conference (EISIC 2011)},
      year = {2011},
      month = {9},
      pdf = {btree_forensics_camera_ready.pdf},
      }
  • Markus Huber and Martin Schmiedecker and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and Edgar R. Weippl, "Social Snapshots: Digital Forensics for Online Social Networks," in Annual Computer Security Applications Conference (ACSAC), 2011. BibTeX | PDF
    @INPROCEEDINGS{_Social_Snapshots_Digital_Foren_2011,
      Author = {Markus Huber and Martin Schmiedecker and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and {Edgar R.} Weippl},
      title = {Social Snapshots: Digital Forensics for Online Social Networks},
      booktitle = {Annual Computer Security Applications Conference (ACSAC)},
      year = {2011},
      month = {12},
      pdf = {social_snapshots_preprint.pdf},
      }
  • Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl, "Cloud Speicherdienste als Angriffsvektoren," in 9th Information Security Konferenz in Krems, 2011. BibTeX | PDF
    @INPROCEEDINGS{DropboxKrems2011,
      Author = {Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
      title = {Cloud Speicherdienste als Angriffsvektoren},
      booktitle = {9th Information Security Konferenz in Krems},
      year = {2011},
      month = {10},
      pdf = {DunkleWolken.pdf},
      }
  • Markus Huber and Martin Schmiedecker and Gerhard Kitzler and Sigrun Goluch and Edgar R. Weippl, "Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam," IEEE Internet Computing: Special Issue on Security and Privacy in Social Networks, 2011. BibTeX | PDF
    @ARTICLE{Huber_Friend_in_the_middle_Attacks_E_2011,
      Author = {Markus Huber and Martin Schmiedecker and Gerhard Kitzler and Sigrun Goluch and {Edgar R.} Weippl},
      title = {Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam},
      journal = {IEEE Internet Computing: Special Issue on Security and Privacy in Social Networks},
      year = {2011},
      month = {5},
      pdf = {FITM_InternetComputing_preprint.pdf},
      note = {Pre Print},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Lorcan Morgan and Martin Schmiedecker and Markus Huber and Edgar R. Weippl, "Using the Structure of B plus Trees for Enhancing Logging Mechanisms of Databases," in International Conference on Information Integration and Web-based Applications & Services (iiWAS2011), 2011. BibTeX | PDF
    @INPROCEEDINGS{_Using_the_Structure_of_B_Trees_2011,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Lorcan Morgan and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
      title = {Using the Structure of B plus Trees for Enhancing Logging Mechanisms of Databases},
      booktitle = {International Conference on Information Integration and Web-based Applications & Services (iiWAS2011)},
      year = {2011},
      month = {12},
      pdf = {iiWAS2011_133_Short_Kieseberg.pdf},
      }
  • Martin Schmiedecker and Markus Huber and Edgar R. Weippl, "Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System," IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, pp. 539-546, 2010. BibTeX | PDF
    @ARTICLE{Mulazzani_Anonymity_and_Monitoring_How_t_2010,
      Author = {Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
      title = {Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System},
      journal = {IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews},
      year = {2010},
      month = {9},
      pdf = {IEEE_SMC_Tor_finalPreprint.pdf},
      pages = {539-546},
      }
  • Markus Huber and Martin Schmiedecker and Edgar R. Weippl, "Who On Earth Is Mr. Cypher? Automated Friend Injection Attacks on Social Networking Sites," in Proceedings of the IFIP International Information Security Conference 2010: Security and Privacy, 2010. BibTeX | PDF
    @INPROCEEDINGS{Huber_Who_On_Earth_Is_Mr_Cypher_Auto_2010,
      Author = {Markus Huber and Martin Schmiedecker and {Edgar R.} Weippl},
      title = {Who On Earth Is Mr. Cypher? Automated Friend Injection Attacks on Social Networking Sites},
      booktitle = {Proceedings of the IFIP International Information Security Conference 2010: Security and Privacy},
      year = {2010},
      month = {9},
      pdf = {sec2010-friendInjection_preprint.pdf},
      }
  • Peter Fruehwirt and Markus Huber and Martin Schmiedecker and Edgar R. Weippl, "Sicherheit in sozialen Netzwerken: Quo Vadis," in 8th Information Security Konferenz in Krems, 2010. BibTeX
    @INPROCEEDINGS{Fruewirt_Sicherheit_in_sozialen_Netzwer_2010,
      Author = {Peter Fruehwirt and Markus Huber and Martin Schmiedecker and {Edgar R.} Weippl},
      title = {Sicherheit in sozialen Netzwerken: Quo Vadis},
      booktitle = {8th Information Security Konferenz in Krems},
      year = {2010},
      month = {11},
      }
  • Markus Huber and Martin Schmiedecker and Edgar R. Weippl, "Social Networking Sites Security Quo Vadis," in Proceedings of the 1st International Workshop on Privacy Aspects of Social Web and Cloud Computing, 2010. BibTeX
    @INPROCEEDINGS{Huber_Social_Networking_Sites_Securi_2010,
      Author = {Markus Huber and Martin Schmiedecker and {Edgar R.} Weippl},
      title = {Social Networking Sites Security Quo Vadis},
      booktitle = {Proceedings of the 1st International Workshop on Privacy Aspects of Social Web and Cloud Computing},
      year = {2010},
      month = {8},
      }
  • Markus Huber and Martin Schmiedecker and Gerhard Kitzler and Sigrun Goluch and Edgar R. Weippl, "Friend-in-the-middle Attacks," 2010. BibTeX | PDF
    @TECHREPORT{Huber2010Friendin-the-middle,
      Author = {Markus Huber and Martin Schmiedecker and Gerhard Kitzler and Sigrun Goluch and {Edgar R.} Weippl},
      title = {Friend-in-the-middle Attacks},
      booktitle = {Technical Report},
      year = {2010},
      month = {1},
      pdf = {FITM_TR-SBA-Research-0710-01.pdf},
      }
  • Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and Edgar R. Weippl, "Cheap and Automated Socio-Technical Attacks based on Social Networking Sites," in 3rd Workshop on Artificial Intelligence and Security AISec 10, 2010. BibTeX | PDF
    @INPROCEEDINGS{Huber_Cheap_and_Automated_Socio_Tech_2010,
      Author = {Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Cheap and Automated Socio-Technical Attacks based on Social Networking Sites},
      booktitle = {3rd Workshop on Artificial Intelligence and Security AISec 10},
      year = {2010},
      month = {10},
      pdf = {p61huber.pdf},
      }
  • Markus Huber and Martin Schmiedecker and Edgar R. Weippl, "Tor HTTP usage and information leakage," in Proceedings of IFIP CMS 2010, 2010, pp. 245-255. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Tor_HTTP_usage_and_information_2010,
      Author = {Markus Huber and Martin Schmiedecker and {Edgar R.} Weippl},
      title = {Tor HTTP usage and information leakage},
      booktitle = {Proceedings of IFIP CMS 2010},
      year = {2010},
      month = {5},
      pdf = {2010 - Huber - Tor HTTP Usage.pdf},
      pages = {245-255},
      }
  • Peter Fruehwirt and Markus Huber and Martin Schmiedecker and Edgar R. Weippl, "InnoDB Database Forensics," in Proceedings of the 24th International Conference on Advanced Information Networking and Applications, 2010. BibTeX | PDF
    @INPROCEEDINGS{Huber_InnoDB_Database_Forensics_2010,
      Author = {Peter Fruehwirt and Markus Huber and Martin Schmiedecker and {Edgar R.} Weippl},
      title = {InnoDB Database Forensics},
      booktitle = {Proceedings of the 24th International Conference on Advanced Information Networking and Applications},
      year = {2010},
      month = {4},
      pdf = {AINA2010-InnoDBforensics_preprint.pdf},
      }
  • Markus Huber, "Automated Social Engineering, Proof of Concept," , 2009. BibTeX
    @THESIS{MHuber_ASEthesis09,
      Author = {Markus Huber},
      title = {Automated Social Engineering, Proof of Concept},
      booktitle = {Master Thesis},
      year = {2009},
      month = {3},
      }
  • Markus Huber and Stewart Kowalski and Marcus Nohlberg and Simon Tjoa, "Towards Automating Social Engineering Using Social Networking Sites," in Computational Science and Engineering, IEEE International Conference on, 2009, pp. 117-124. BibTeX | PDF
    @INPROCEEDINGS{Huber_TowardsAutomatingSocial_2009,
      Author = {Markus Huber and Stewart Kowalski and Marcus Nohlberg and Simon Tjoa},
      title = {Towards Automating Social Engineering Using Social Networking Sites},
      booktitle = {Computational Science and Engineering, IEEE International Conference on},
      year = {2009},
      month = {1},
      pdf = {2009 - Huber - Towards Automating Social Engineering Using Social Networking Sites.pdf},
      volume = {3},
      pages = {117--124},
      publisher = {IEEE Computer Society},
      }
  • Markus Huber and Stewart Kowalski and Marcus Nohlberg, "Measuring Readiness for Automated Social Engineering," in In CD ROM Proceedings of the 7th Security Conference, 2008. BibTeX
    @INPROCEEDINGS{nohlberghuber2008,
      Author = {Markus Huber and Stewart Kowalski and Marcus Nohlberg},
      title = {Measuring Readiness for Automated Social Engineering},
      booktitle = {In CD ROM Proceedings of the 7th Security Conference},
      year = {2008},
      month = {6},
      }