Markus Donko-Huber
Univ.Lektor Dr.techn. / MSc
Role
-
External Lecturer
Information Systems Engineering, E194
Courses
Publications
- Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools / G. Merzdovnik, M. Huber, D. Buhov, N. Nikiforakis, S. Neuner, M Schmiedecker, E. Weippl / Talk: 2nd IEEE European Symposium on Security and Privacy (EuroS&P), Paris, France; 2017-04-26 - 2017-04-28; in: "Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P)", (2017)
- Network Security Challenges in Android Applications / D. Buhov, M. Huber, G. Merzdovnik, E. Weippl, V. Dimitrova / Talk: 10th International Conference on Availability, Reliability and Security (ARES), 2015, Toulouse, France; 2015-08-24 - 2015-08-28; in: "Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES)", IEEE, (2015), 327 - 332
- Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations / P. Aufner, G. Merzdovnik, M. Huber, E. Weippl / Talk: 7th International Conference on Security of Information and Networks (SIN 2014), Glasgow, Scotland Uk; 2014-09-09 - 2014-09-11; in: "Proceedings of the 7th International Conference on Security of Information and Networks", ACM Digital Library, (2014), 434 - 440
- Appinspect: large-scale evaluation of social networking apps / M. Huber, S. Schrittwieser, M. Mulazzani, E. Weippl / Talk: Acm Conference On Online Social Networks (cosn'13), Boston; 2013-10-07 - 2013-10-08; in: "Proceedings of the first ACM conference on Online social networks", (2013), 143 - 154
- SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting / M. Mulazzani, E. Weippl, S. Schrittwieser, T. Unger, M. Huber, D. Frühwirt / Talk: Eighth International Conference on Availability, Reliability and Security (ARES), Regensburg; 2013-09-02 - 2013-09-06; in: "Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES)", 8 (2013), ISBN: 978-0-7695-5008-4
- Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting / M. Mulazzani, S. Schrittwieser, P. Reschl, M. Leithner, E. Weippl, M. Huber / Talk: Web 2.0 Security & Privacy 2013, San Francisco; 2013-05-24
- Covert Computation - Hiding Code in Code for Obfuscation Purposes / S. Schrittwieser, M. Huber, M. Leithner, M. Mulazzani, S. Katzenbeisser, E. Weippl, P. Kieseberg / Talk: ASIA CCS '13 8th ACM Symposium on Information, Computer and Communications Security, Hangzhou; 2013-05-08 - 2013-05-10; in: "Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security", 1 (2013), ISBN: 978-1-4503-1767-2
- Quantifying Windows File Slack in Size and Stability / M. Mulazzani, S. Neuner, S. Schrittwieser, E. Weippl, P. Kieseberg, M. Huber / in: "Advances in Digital Forensics IX", Springer, 1, 2013, ISBN: 978-3-642-41147-2
- Using the Structure of B+ Trees for Enhancing Logging Mechanisms of Databases / P. Kieseberg, S. Schrittwieser, L. Morgan, M. Mulazzani, M. Huber, E. Weippl / Talk: IIWAS International Conference on Information Integration, Web-Applications and Services, Ho Chi Minh City; 2011-12-05 - 2011-12-07; in: "Proceedings of the 13th International Conference on Information Integration and Web-based Applications & Services", (2011)
- Social Snapshots: Digital Forensics for Online Social Networks / M. Huber, M. Mulazzani, M. Leithner, S. Schrittwieser, G. Wondracek, E. Weippl / Talk: Annual Computer Security Applications Conference (ACSAC), Orlando, FL; 2011-12-05 - 2011-12-09; in: "Proceedings of 27th Annual Computer Security Applications Conference (ACSAC)", (2011), 113 - 122
- Poster Abstract: Efficient Browser Identification with JavaScript Engine Fingerprinting / P. Reschl, M. Mulazzani, M. Huber, E. Weippl / Poster: Annual Computer Security Applications Conference (ACSAC), Orlando, FL; 2011-12-05 - 2011-12-09
- Cloud Speicherdienste als Angriffsvektoren / M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, E. Weippl / Talk: Sicherheitskonferenz Krems, Krems; 2011-10-27; in: "Proceedings of 9. Sicherheitskonferenz Krems", (2011)
- Trees Cannot Lie: Using Data Structures for Forensics Purposes / P. Kieseberg, S. Schrittwieser, M. Mulazzani, M. Huber, E. Weippl / Talk: European Intelligence and Security Informatics Conference 2011, Athens; 2011-09-12 - 2011-09-14; in: "Proceedings of the European Intelligence and Security Informatics Conference", (2011), ISBN: 978-0-7695-4406-9
- Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space / M. Mulazzani, S. Schrittwieser, M. Huber, M. Leithner, E. Weippl / Talk: Usenix Security Symposium, San Francisco; 2011-08-08 - 2011-08-12; in: "Proceedings of 20th USENIX Security Symposium", (2011)
- Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam / M. Huber, M. Mulazzani, E. Weippl, G. Kitzler, S. Goluch / IEEE Internet Computing, Special Issue on Security and Privacy in Social Networks (2011)