Markus Huber

Markus Huberis senior researcher at SBA Research and Lecturer at the University of Applied Sciences St.Pölten.

Research Interests

His main research area is security & privacy in online social networks.

Bio

Markus Huber received a bachelor’s degree in Business Informatics from the University of Vienna and a master’s degree in Information and Communication Security Systems from the Royal Institute of Technology in Stockholm, Sweden. In 2013 he graduated with distinction from the Vienna Ph.D. school of informatics.

Throughout his studies he gained industry experience as an IT consultant. In the area of research he worked as a teaching assistant at the DSV SecLab in Stockholm, summer student at CERN, and as a research intern at Carnegie Mellon University. He works as a senior researcher at SBA Research.

Publications

  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and Edgar R. Weippl, "Covert Computation – Hiding Code in Code Through Compile-Time Obfuscation," Computers & Security, 2014. BibTeX
    @ARTICLE{Schrittwieser2014Covert,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation},
      journal = {Computers & Security},
      year = {2014},
      month = {5},
      publisher = {Elsevier Advanced Technology},
      }
  • Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and Edgar R. Weippl, "Appinspect: large-scale evaluation of social networking apps," in Proceedings of the first ACM conference on Online social networks, 2013, pp. 143-154. BibTeX | PDF | Slides
    @INPROCEEDINGS{huber2013appinspect,
      Author = {Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Appinspect: large-scale evaluation of social networking apps},
      booktitle = {Proceedings of the first ACM conference on Online social networks},
      year = {2013},
      month = {10},
      pdf = {AppInspect_peprint.pdf},
      pages = {143--154},
      publisher = {ACM},
      link_slides = {http://cosn.acm.org/2013/files/Session6/Session6Paper1.pdf},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Markus Huber and Edgar R. Weippl, "Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications," in Network and Distributed System Security Symposium (NDSS 2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Guess_Who_s_Texting_You_Evalua_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Markus Huber and {Edgar R.} Weippl},
      title = {Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications},
      booktitle = {Network and Distributed System Security Symposium (NDSS 2012)},
      year = {2012},
      month = {2},
      pdf = {ndss2012_final.pdf},
      }
  • Martin Mulazzani and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl, "Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space," in USENIX Security, 2011. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Dark_Clouds_on_the_Horizon_Usi_2011,
      Author = {Martin Mulazzani and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
      title = {Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space},
      booktitle = {USENIX Security},
      year = {2011},
      month = {8},
      pdf = {dropboxUSENIX2011.pdf},
      }
  • Markus Huber and Martin Mulazzani and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and Edgar R. Weippl, "Social Snapshots: Digital Forensics for Online Social Networks," in Annual Computer Security Applications Conference (ACSAC), 2011. BibTeX | PDF
    @INPROCEEDINGS{_Social_Snapshots_Digital_Foren_2011,
      Author = {Markus Huber and Martin Mulazzani and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and {Edgar R.} Weippl},
      title = {Social Snapshots: Digital Forensics for Online Social Networks},
      booktitle = {Annual Computer Security Applications Conference (ACSAC)},
      year = {2011},
      month = {12},
      pdf = {social_snapshots_preprint.pdf},
      }

View all publications

  • Damjan Buhov and Markus Huber and Georg Merzdovnik and Edgar R. Weippl and Vesna Dimitrova, "Network Security Challenges in Android Applications," in 10th International Conference on Availability, Reliability and Security (ARES 2015), 2015. BibTeX
    @INPROCEEDINGS{Buhov2015Network,
      Author = {Damjan Buhov and Markus Huber and Georg Merzdovnik and {Edgar R.} Weippl and Vesna Dimitrova},
      title = {Network Security Challenges in Android Applications},
      booktitle = {10th International Conference on Availability, Reliability and Security (ARES 2015)},
      year = {2015},
      month = {8},
      }
  • Stefanie Beyer and Martin Mulazzani and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl, "Towards Fully Automated Digital Alibis with Social Interaction," in Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2014. BibTeX | PDF | Slides | Src
    @INPROCEEDINGS{ifip119_2014_alibi,
      Author = {Stefanie Beyer and Martin Mulazzani and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
      title = {Towards Fully Automated Digital Alibis with Social Interaction},
      booktitle = {Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics},
      year = {2014},
      month = {1},
      pdf = {alibigenerator_preprint.pdf},
      link_source = {https://github.com/mmulazzani/alibiFramework},
      link_slides = {http://www.slideshare.net/SBAResearch/digitale-alibis-ifip},
      }
  • Sebastian Neuner and Victor Van der Veen and Martina Lindorfer and Markus Huber and Georg Merzdovnik and Martin Mulazzani and Edgar R. Weippl, "Enter Sandbox: Android Sandbox Comparison," in Proceedings of the IEEE Mobile Security Technologies Workshop (MoST), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Neuner2014Enter,
      Author = {Sebastian Neuner and Victor {Van der Veen} and Martina Lindorfer and Markus Huber and Georg Merzdovnik and Martin Mulazzani and {Edgar R.} Weippl},
      title = {Enter Sandbox: Android Sandbox Comparison},
      booktitle = {Proceedings of the IEEE Mobile Security Technologies Workshop (MoST)},
      year = {2014},
      month = {5},
      pdf = {mostAndroid.pdf},
      publisher = {IEEE},
      link_slides = {http://www.slideshare.net/SBAResearch/enter-sandbox-android-sandbox-comparison},
      }
  • Katharina Krombholz and Peter Fruehwirt and Peter Kieseberg and Ioannis Kapsalis and Markus Huber and Edgar R. Weippl, "QR Code Security: A Survey of Attacks and Challenges for Usable Security." Springer, 2014, pp. 79-90. BibTeX | PDF | Slides
    @INBOOK{Krombholz2014Code,
      Author = {Katharina Krombholz and Peter Fruehwirt and Peter Kieseberg and Ioannis Kapsalis and Markus Huber and {Edgar R.} Weippl},
      title = {QR Code Security: A Survey of Attacks and Challenges for Usable Security},
      booktitle = {Human Aspects of Information Security, Privacy, and Trust},
      year = {2014},
      month = {0},
      pdf = {llncs.pdf},
      pages = {79--90},
      publisher = {Springer},
      link_slides = {http://de.slideshare.net/SBAResearch/qr-code-security-a-survey-of-attacks-and-challenges-for-usable-security},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and Edgar R. Weippl, "Covert Computation – Hiding Code in Code Through Compile-Time Obfuscation," Computers & Security, 2014. BibTeX
    @ARTICLE{Schrittwieser2014Covert,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation},
      journal = {Computers & Security},
      year = {2014},
      month = {5},
      publisher = {Elsevier Advanced Technology},
      }
  • Philipp Winter and Richard Koewer and Martin Mulazzani and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and Edgar R. Weippl, "Spoiled Onions: Exposing Malicious Tor Exit Relays," in The 14th Privacy Enhancing Technologies Symposium (PETS), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Winter2014Spoiled,
      Author = {Philipp Winter and Richard Koewer and Martin Mulazzani and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and {Edgar R.} Weippl},
      title = {Spoiled Onions: Exposing Malicious Tor Exit Relays},
      booktitle = {The 14th Privacy Enhancing Technologies Symposium (PETS)},
      year = {2014},
      month = {7},
      pdf = {http://www.sba-research.org/wp-content/uploads/publications/pets2014_preprint.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/spoiled-onions},
      }
  • Christoph Hochreiner and Markus Huber and Georg Merzdovnik and Edgar R. Weippl, "Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices," in SINCONF 2014 (Conference on Security of Information and Networks), 2014. BibTeX | PDF
    @INPROCEEDINGS{Hochreiner2014Towards,
      Author = {Christoph Hochreiner and Markus Huber and Georg Merzdovnik and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices },
      booktitle = {SINCONF 2014 (Conference on Security of Information and Networks)},
      year = {2014},
      month = {9},
      pdf = {sinconf_preprint.pdf},
      }
  • Katharina Krombholz and Heidelinde Hobel and Markus Huber and Edgar R. Weippl, "Advanced social engineering attacks," Journal of Information Security and Applications, 2014. BibTeX | PDF
    @ARTICLE{Krombholz2014Advanced,
      Author = {Katharina Krombholz and Heidelinde Hobel and Markus Huber and {Edgar R.} Weippl},
      title = {Advanced social engineering attacks},
      journal = {Journal of Information Security and Applications},
      year = {2014},
      month = {0},
      pdf = {jisa_revised.pdf},
      }
  • Peter Aufner and Georg Merzdovnik and Markus Huber and Edgar R. Weippl, "Plugin in the Middle – Minimising Security Risks in Mobile Middleware Implementations," in SINCONF 2014 (Conference on Security of Information and Networks), 2014. BibTeX | PDF
    @INPROCEEDINGS{Aufner2014Plugin,
      Author = {Peter Aufner and Georg Merzdovnik and Markus Huber and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations},
      booktitle = {SINCONF 2014 (Conference on Security of Information and Networks)},
      year = {2014},
      month = {9},
      pdf = {secperv.pdf},
      }
  • Martin Mulazzani and Philipp Reschl and Markus Huber and Manuel Leithner and Sebastian Schrittwieser and Edgar R. Weippl, "Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting," in Web 2.0 Workshop on Security and Privacy (W2SP), 2013. BibTeX | PDF | Slides
    @INPROCEEDINGS{_Fast_and_Reliable_Browser_Iden_2013,
      Author = {Martin Mulazzani and Philipp Reschl and Markus Huber and Manuel Leithner and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting},
      booktitle = {Web 2.0 Workshop on Security and Privacy (W2SP)},
      year = {2013},
      month = {5},
      pdf = {jsfingerprinting.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/fast-and-efficient-browser-identification-with-javascript-engine-fingerprinting},
      }
  • Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl, "InnoDB Database Forensics: Enhanced Reconstruction of Data Manipulation Queries from Redo Logs," Information Security Technical Report (ISTR), Special Issue: ARES, 2013. BibTeX | PDF
    @ARTICLE{_InnoDB_Database_Forensics_Enha_2013,
      Author = {Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
      title = {InnoDB Database Forensics: Enhanced Reconstruction of Data Manipulation Queries from Redo Logs},
      journal = {Information Security Technical Report (ISTR), Special Issue: ARES},
      year = {2013},
      month = {4},
      pdf = {ARES2012_Journal.pdf},
      }
  • Martin Mulazzani and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and Edgar R. Weippl, "Quantifying Windows File Slack in Size and Stability," in Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2013. BibTeX | PDF | Slides | Data
    @INPROCEEDINGS{Mulazzani_Slackspace_Quantifiation_2013,
      Author = {Martin Mulazzani and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Quantifying Windows File Slack in Size and Stability},
      booktitle = {Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics},
      year = {2013},
      month = {1},
      pdf = {ifipSlack_2013_preprint.pdf},
      link_data = {http://128.130.204.91/slackspaceDataset.7z},
      link_slides = {http://www.slideshare.net/SBAResearch/quantifying-windows-file-slack-in-size-and-stability},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and Edgar R. Weippl, "Covert Computation – Hiding Code in Code for Obfuscation Purposes," in Proceedings of the 8th International Symposium on ACM Symposium on Information , Computer and Communications Security (ASIACCS 2013), 2013. BibTeX | PDF
    @INPROCEEDINGS{schrittwieser-covertcomputation-2013,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and {Edgar R.} Weippl},
      title = {Covert Computation - Hiding Code in Code for Obfuscation Purposes},
      booktitle = {Proceedings of the 8th International Symposium on ACM Symposium on Information , Computer and Communications Security (ASIACCS 2013)},
      year = {2013},
      month = {5},
      pdf = {p529-schrittwieser.pdf},
      }
  • Katharina Krombholz and Heidelinde Hobel and Markus Huber and Edgar R. Weippl, "Social engineering attacks on the knowledge worker," in Proceedings of the 6th International Conference on Security of Information and Networks, 2013, pp. 28-35. BibTeX
    @INPROCEEDINGS{Krombholz2013Social,
      Author = {Katharina Krombholz and Heidelinde Hobel and Markus Huber and {Edgar R.} Weippl},
      title = {Social engineering attacks on the knowledge worker},
      booktitle = {Proceedings of the 6th International Conference on Security of Information and Networks},
      year = {2013},
      month = {11},
      pages = {28--35},
      publisher = {ACM},
      }
  • Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and Edgar R. Weippl, "Appinspect: large-scale evaluation of social networking apps," in Proceedings of the first ACM conference on Online social networks, 2013, pp. 143-154. BibTeX | PDF | Slides
    @INPROCEEDINGS{huber2013appinspect,
      Author = {Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Appinspect: large-scale evaluation of social networking apps},
      booktitle = {Proceedings of the first ACM conference on Online social networks},
      year = {2013},
      month = {10},
      pdf = {AppInspect_peprint.pdf},
      pages = {143--154},
      publisher = {ACM},
      link_slides = {http://cosn.acm.org/2013/files/Session6/Session6Paper1.pdf},
      }
  • Thomas Unger and Martin Mulazzani and Dominik Frühwirt and Markus Huber and Sebastian Schrittwieser and Edgar R. Weippl, "SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting," in Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES), 2013. BibTeX | PDF | Slides | Src
    @INPROCEEDINGS{ARES_SHPF_short_2013,
      Author = {Thomas Unger and Martin Mulazzani and Dominik Frühwirt and Markus Huber and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting},
      booktitle = {Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES)},
      year = {2013},
      month = {9},
      pdf = {shpf_extendedPreprint.pdf},
      link_source = {https://github.com/mmulazzani/shpf},
      link_slides = {http://www.slideshare.net/SBAResearch/shpf-enhancing-https-session-security-with-browser-fingerprinting},
      }
  • Martin Mulazzani and Markus Huber and Edgar R. Weippl, "Social Network Forensics: Tapping the Data Pool of Social Networks," in Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2012. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Social_Network_Forensics_2012,
      Author = {Martin Mulazzani and Markus Huber and {Edgar R.} Weippl},
      title = {Social Network Forensics: Tapping the Data Pool of Social Networks},
      booktitle = {Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics},
      year = {2012},
      month = {1},
      pdf = {socialForensics_preprint.pdf},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Markus Huber and Gilbert Wondracek and Sylvi Rennert and Edgar R. Weippl, "Secure Software in der Cloud," in Tagungsband Cloud und Klein: IT im Spannungsfeld zwischen Servercluster und Sensornetz, 2012. BibTeX
    @INPROCEEDINGS{Schrittwieser_Secure_Software_in_der_Cloud_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Markus Huber and Gilbert Wondracek and Sylvi Rennert and {Edgar R.} Weippl},
      title = {Secure Software in der Cloud},
      booktitle = {Tagungsband Cloud und Klein: IT im Spannungsfeld zwischen Servercluster und Sensornetz},
      year = {2012},
      month = {4},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Markus Huber and Edgar R. Weippl, "Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications," in Network and Distributed System Security Symposium (NDSS 2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Guess_Who_s_Texting_You_Evalua_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Markus Huber and {Edgar R.} Weippl},
      title = {Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications},
      booktitle = {Network and Distributed System Security Symposium (NDSS 2012)},
      year = {2012},
      month = {2},
      pdf = {ndss2012_final.pdf},
      }
  • Martin Mulazzani and Philipp Reschl and Markus Huber and Manuel Leithner and Edgar R. Weippl, "Fast and Efficient Browser Identification with JavaScript Engine Fingerprinting," 2012. BibTeX | PDF
    @TECHREPORT{_Fast_and_Efficient_Browser_Ide_2012,
      Author = {Martin Mulazzani and Philipp Reschl and Markus Huber and Manuel Leithner and {Edgar R.} Weippl},
      title = {Fast and Efficient Browser Identification with JavaScript Engine Fingerprinting},
      booktitle = {Technical Report TR-SBA-Research-0512-01},
      year = {2012},
      month = {5},
      pdf = {jsfingerprinting_Tech_Report.pdf},
      }
  • Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl, "InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs," in The Fifth International Workshop on Digital Forensics (WSDF), 2012. BibTeX | PDF
    @INPROCEEDINGS{_InnoDB_Database_Forensics_Reco_2012,
      Author = {Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
      title = {InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs},
      booktitle = {The Fifth International Workshop on Digital Forensics (WSDF)},
      year = {2012},
      month = {8},
      pdf = {WSDF2012_InnoDB.pdf},
      }
  • Markus Huber, "Social Snapshot framework:Crime Investigation on Online Social Networks," ERCIM News, vol. 90, p. 28, 2012. BibTeX
    @ARTICLE{_Social_Snapshot_framework_Crim_2012,
      Author = {Markus Huber},
      title = {Social Snapshot framework:Crime Investigation on Online Social Networks },
      journal = {ERCIM News},
      year = {2012},
      month = {7},
      volume = {90},
      pages = {28},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Martin Mulazzani and Markus Huber and Edgar R. Weippl, "Trees Cannot Lie: Using Data Structures for Forensics Purposes," in European Intelligence and Security Informatics Conference (EISIC 2011), 2011. BibTeX | PDF
    @INPROCEEDINGS{Kieseberg_Trees_Cannot_Lie_Using_Data_St_2011,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Mulazzani and Markus Huber and {Edgar R.} Weippl},
      title = {Trees Cannot Lie: Using Data Structures for Forensics Purposes},
      booktitle = {European Intelligence and Security Informatics Conference (EISIC 2011)},
      year = {2011},
      month = {9},
      pdf = {btree_forensics_camera_ready.pdf},
      }
  • Markus Huber and Martin Mulazzani and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and Edgar R. Weippl, "Social Snapshots: Digital Forensics for Online Social Networks," in Annual Computer Security Applications Conference (ACSAC), 2011. BibTeX | PDF
    @INPROCEEDINGS{_Social_Snapshots_Digital_Foren_2011,
      Author = {Markus Huber and Martin Mulazzani and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and {Edgar R.} Weippl},
      title = {Social Snapshots: Digital Forensics for Online Social Networks},
      booktitle = {Annual Computer Security Applications Conference (ACSAC)},
      year = {2011},
      month = {12},
      pdf = {social_snapshots_preprint.pdf},
      }
  • Martin Mulazzani and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl, "Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space," in USENIX Security, 2011. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Dark_Clouds_on_the_Horizon_Usi_2011,
      Author = {Martin Mulazzani and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
      title = {Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space},
      booktitle = {USENIX Security},
      year = {2011},
      month = {8},
      pdf = {dropboxUSENIX2011.pdf},
      }
  • Martin Mulazzani and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl, "Cloud Speicherdienste als Angriffsvektoren," in 9th Information Security Konferenz in Krems, 2011. BibTeX | PDF
    @INPROCEEDINGS{DropboxKrems2011,
      Author = {Martin Mulazzani and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
      title = {Cloud Speicherdienste als Angriffsvektoren},
      booktitle = {9th Information Security Konferenz in Krems},
      year = {2011},
      month = {10},
      pdf = {DunkleWolken.pdf},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Lorcan Morgan and Martin Mulazzani and Markus Huber and Edgar R. Weippl, "Using the Structure of B plus Trees for Enhancing Logging Mechanisms of Databases," in International Conference on Information Integration and Web-based Applications & Services (iiWAS2011), 2011. BibTeX | PDF
    @INPROCEEDINGS{_Using_the_Structure_of_B_Trees_2011,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Lorcan Morgan and Martin Mulazzani and Markus Huber and {Edgar R.} Weippl},
      title = {Using the Structure of B plus Trees for Enhancing Logging Mechanisms of Databases},
      booktitle = {International Conference on Information Integration and Web-based Applications & Services (iiWAS2011)},
      year = {2011},
      month = {12},
      pdf = {iiWAS2011_133_Short_Kieseberg.pdf},
      }
  • Markus Huber and Martin Mulazzani and Gerhard Kitzler and Sigrun Goluch and Edgar R. Weippl, "Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam," IEEE Internet Computing: Special Issue on Security and Privacy in Social Networks, 2011. BibTeX | PDF
    @ARTICLE{Huber_Friend_in_the_middle_Attacks_E_2011,
      Author = {Markus Huber and Martin Mulazzani and Gerhard Kitzler and Sigrun Goluch and {Edgar R.} Weippl},
      title = {Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam},
      journal = {IEEE Internet Computing: Special Issue on Security and Privacy in Social Networks},
      year = {2011},
      month = {5},
      pdf = {FITM_InternetComputing_preprint.pdf},
      note = {Pre Print},
      }
  • Martin Mulazzani and Markus Huber and Edgar R. Weippl, "Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System," IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, pp. 539-546, 2010. BibTeX | PDF
    @ARTICLE{Mulazzani_Anonymity_and_Monitoring_How_t_2010,
      Author = {Martin Mulazzani and Markus Huber and {Edgar R.} Weippl},
      title = {Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System},
      journal = {IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews},
      year = {2010},
      month = {9},
      pdf = {IEEE_SMC_Tor_finalPreprint.pdf},
      pages = {539-546},
      }
  • Peter Fruehwirt and Markus Huber and Martin Mulazzani and Edgar R. Weippl, "Sicherheit in sozialen Netzwerken: Quo Vadis," in 8th Information Security Konferenz in Krems, 2010. BibTeX
    @INPROCEEDINGS{Fruewirt_Sicherheit_in_sozialen_Netzwer_2010,
      Author = {Peter Fruehwirt and Markus Huber and Martin Mulazzani and {Edgar R.} Weippl},
      title = {Sicherheit in sozialen Netzwerken: Quo Vadis},
      booktitle = {8th Information Security Konferenz in Krems},
      year = {2010},
      month = {11},
      }
  • Markus Huber and Martin Mulazzani and Edgar R. Weippl, "Who On Earth Is Mr. Cypher? Automated Friend Injection Attacks on Social Networking Sites," in Proceedings of the IFIP International Information Security Conference 2010: Security and Privacy, 2010. BibTeX | PDF
    @INPROCEEDINGS{Huber_Who_On_Earth_Is_Mr_Cypher_Auto_2010,
      Author = {Markus Huber and Martin Mulazzani and {Edgar R.} Weippl},
      title = {Who On Earth Is Mr. Cypher? Automated Friend Injection Attacks on Social Networking Sites},
      booktitle = {Proceedings of the IFIP International Information Security Conference 2010: Security and Privacy},
      year = {2010},
      month = {9},
      pdf = {sec2010-friendInjection_preprint.pdf},
      }
  • Markus Huber and Martin Mulazzani and Edgar R. Weippl, "Social Networking Sites Security Quo Vadis," in Proceedings of the 1st International Workshop on Privacy Aspects of Social Web and Cloud Computing, 2010. BibTeX
    @INPROCEEDINGS{Huber_Social_Networking_Sites_Securi_2010,
      Author = {Markus Huber and Martin Mulazzani and {Edgar R.} Weippl},
      title = {Social Networking Sites Security Quo Vadis},
      booktitle = {Proceedings of the 1st International Workshop on Privacy Aspects of Social Web and Cloud Computing},
      year = {2010},
      month = {8},
      }
  • Markus Huber and Martin Mulazzani and Gerhard Kitzler and Sigrun Goluch and Edgar R. Weippl, "Friend-in-the-middle Attacks," 2010. BibTeX | PDF
    @TECHREPORT{Huber2010Friendin-the-middle,
      Author = {Markus Huber and Martin Mulazzani and Gerhard Kitzler and Sigrun Goluch and {Edgar R.} Weippl},
      title = {Friend-in-the-middle Attacks},
      booktitle = {Technical Report},
      year = {2010},
      month = {1},
      pdf = {FITM_TR-SBA-Research-0710-01.pdf},
      }
  • Markus Huber and Martin Mulazzani and Edgar R. Weippl, "Tor HTTP usage and information leakage," in Proceedings of IFIP CMS 2010, 2010, pp. 245-255. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Tor_HTTP_usage_and_information_2010,
      Author = {Markus Huber and Martin Mulazzani and {Edgar R.} Weippl},
      title = {Tor HTTP usage and information leakage},
      booktitle = {Proceedings of IFIP CMS 2010},
      year = {2010},
      month = {5},
      pdf = {2010 - Huber - Tor HTTP Usage.pdf},
      pages = {245-255},
      }
  • Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and Edgar R. Weippl, "Cheap and Automated Socio-Technical Attacks based on Social Networking Sites," in 3rd Workshop on Artificial Intelligence and Security AISec 10, 2010. BibTeX | PDF
    @INPROCEEDINGS{Huber_Cheap_and_Automated_Socio_Tech_2010,
      Author = {Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Cheap and Automated Socio-Technical Attacks based on Social Networking Sites},
      booktitle = {3rd Workshop on Artificial Intelligence and Security AISec 10},
      year = {2010},
      month = {10},
      pdf = {p61huber.pdf},
      }
  • Peter Fruehwirt and Markus Huber and Martin Mulazzani and Edgar R. Weippl, "InnoDB Database Forensics," in Proceedings of the 24th International Conference on Advanced Information Networking and Applications, 2010. BibTeX | PDF
    @INPROCEEDINGS{Huber_InnoDB_Database_Forensics_2010,
      Author = {Peter Fruehwirt and Markus Huber and Martin Mulazzani and {Edgar R.} Weippl},
      title = {InnoDB Database Forensics},
      booktitle = {Proceedings of the 24th International Conference on Advanced Information Networking and Applications},
      year = {2010},
      month = {4},
      pdf = {AINA2010-InnoDBforensics_preprint.pdf},
      }
  • Markus Huber and Stewart Kowalski and Marcus Nohlberg and Simon Tjoa, "Towards Automating Social Engineering Using Social Networking Sites," in Computational Science and Engineering, IEEE International Conference on, 2009, pp. 117-124. BibTeX | PDF
    @INPROCEEDINGS{Huber_TowardsAutomatingSocial_2009,
      Author = {Markus Huber and Stewart Kowalski and Marcus Nohlberg and Simon Tjoa},
      title = {Towards Automating Social Engineering Using Social Networking Sites},
      booktitle = {Computational Science and Engineering, IEEE International Conference on},
      year = {2009},
      month = {1},
      pdf = {2009 - Huber - Towards Automating Social Engineering Using Social Networking Sites.pdf},
      volume = {3},
      pages = {117--124},
      publisher = {IEEE Computer Society},
      }
  • Markus Huber, "Automated Social Engineering, Proof of Concept," , 2009. BibTeX
    @THESIS{MHuber_ASEthesis09,
      Author = {Markus Huber},
      title = {Automated Social Engineering, Proof of Concept},
      booktitle = {Master Thesis},
      year = {2009},
      month = {3},
      }
  • Markus Huber and Stewart Kowalski and Marcus Nohlberg, "Measuring Readiness for Automated Social Engineering," in In CD ROM Proceedings of the 7th Security Conference, 2008. BibTeX
    @INPROCEEDINGS{nohlberghuber2008,
      Author = {Markus Huber and Stewart Kowalski and Marcus Nohlberg},
      title = {Measuring Readiness for Automated Social Engineering},
      booktitle = {In CD ROM Proceedings of the 7th Security Conference},
      year = {2008},
      month = {6},
      }