TU Wien Informatics

20 Years

Role

2023W

 

  • Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools / Merzdovnik, G., Huber, M., Buhov, D., Nikiforakis, N., Neuner, S., Schmiedecker, M., & Weippl, E. (2017). Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools. In Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P). 2nd IEEE European Symposium on Security and Privacy (EuroS&P), Paris, France, EU. http://hdl.handle.net/20.500.12708/56974
  • Network Security Challenges in Android Applications / Buhov, D., Huber, M., Merzdovnik, G., Weippl, E., & Dimitrova, V. (2015). Network Security Challenges in Android Applications. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 327–332). IEEE. http://hdl.handle.net/20.500.12708/56236
  • Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations / Aufner, P., Merzdovnik, G., Huber, M., & Weippl, E. (2014). Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations. In Proceedings of the 7th International Conference on Security of Information and Networks (pp. 434–440). ACM Digital Library. http://hdl.handle.net/20.500.12708/56238
  • Covert Computation - Hiding Code in Code for Obfuscation Purposes / Schrittwieser, S., Huber, M., Leithner, M., Mulazzani, M., Katzenbeisser, S., Weippl, E., & Kieseberg, P. (2013). Covert Computation - Hiding Code in Code for Obfuscation Purposes. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. ASIA CCS ’13 8th ACM Symposium on Information, Computer and Communications Security, Hangzhou, Non-EU. http://hdl.handle.net/20.500.12708/54990
  • SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting / Mulazzani, M., Weippl, E., Schrittwieser, S., Unger, T., Huber, M., & Frühwirt, D. (2013). SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting. In Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES). Eighth International Conference on Availability, Reliability and Security (ARES), Regensburg, EU. http://hdl.handle.net/20.500.12708/54985
  • Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting / Mulazzani, M., Schrittwieser, S., Reschl, P., Leithner, M., Weippl, E., & Huber, M. (2013). Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting. Web 2.0 Security & Privacy 2013, San Francisco, Non-EU. http://hdl.handle.net/20.500.12708/85714
  • Quantifying Windows File Slack in Size and Stability / Mulazzani, M., Neuner, S., Schrittwieser, S., Weippl, E., Kieseberg, P., & Huber, M. (2013). Quantifying Windows File Slack in Size and Stability. In Advances in Digital Forensics IX. Springer. http://hdl.handle.net/20.500.12708/54989
  • Appinspect: large-scale evaluation of social networking apps / Huber, M., Schrittwieser, S., Mulazzani, M., & Weippl, E. (2013). Appinspect: large-scale evaluation of social networking apps. In Proceedings of the first ACM conference on Online social networks (pp. 143–154). http://hdl.handle.net/20.500.12708/54987
  • Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam / Huber, M., Mulazzani, M., Weippl, E., Kitzler, G., & Goluch, S. (2011). Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam. IEEE Internet Computing, SPECIAL ISSUE ON SECURITY AND PRIVACY IN SOCIAL NETWORKS. http://hdl.handle.net/20.500.12708/162843
  • Poster Abstract: Efficient Browser Identification with JavaScript Engine Fingerprinting / Reschl, P., Mulazzani, M., Huber, M., & Weippl, E. (2011). Poster Abstract: Efficient Browser Identification with JavaScript Engine Fingerprinting. Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. http://hdl.handle.net/20.500.12708/85219
  • Trees Cannot Lie: Using Data Structures for Forensics Purposes / Kieseberg, P., Schrittwieser, S., Mulazzani, M., Huber, M., & Weippl, E. (2011). Trees Cannot Lie: Using Data Structures for Forensics Purposes. In Proceedings of the European Intelligence and Security Informatics Conference. European Intelligence and Security Informatics Conference 2011, Athens, EU. http://hdl.handle.net/20.500.12708/53934
  • Cloud Speicherdienste als Angriffsvektoren / Mulazzani, M., Schrittwieser, S., Leithner, M., Huber, M., & Weippl, E. (2011). Cloud Speicherdienste als Angriffsvektoren. In Proceedings of 9. Sicherheitskonferenz Krems. Sicherheitskonferenz Krems, Krems, Austria. http://hdl.handle.net/20.500.12708/53931
  • Using the Structure of B+ Trees for Enhancing Logging Mechanisms of Databases / Kieseberg, P., Schrittwieser, S., Morgan, L., Mulazzani, M., Huber, M., & Weippl, E. (2011). Using the Structure of B+ Trees for Enhancing Logging Mechanisms of Databases. In Proceedings of the 13th International Conference on Information Integration and Web-based Applications & Services. IIWAS International Conference on Information Integration, Web-Applications and Services, Yogyakarta Indonesien, Non-EU. http://hdl.handle.net/20.500.12708/53930
  • Social Snapshots: Digital Forensics for Online Social Networks / Huber, M., Mulazzani, M., Leithner, M., Schrittwieser, S., Wondracek, G., & Weippl, E. (2011). Social Snapshots: Digital Forensics for Online Social Networks. In Proceedings of 27th Annual Computer Security Applications Conference (ACSAC) (pp. 113–122). http://hdl.handle.net/20.500.12708/53929
  • Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space / Mulazzani, M., Schrittwieser, S., Huber, M., Leithner, M., & Weippl, E. (2011). Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space. In Proceedings of 20th USENIX Security Symposium. Usenix Security Symposium, Baltimore, USA, Austria. http://hdl.handle.net/20.500.12708/53926
  • A model for originator based internal cost allocation of IT services in small and medium sized businesses / Huber, M. (2010). A model for originator based internal cost allocation of IT services in small and medium sized businesses [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/159802