Follow
Markus Donko-Huber
Markus Donko-Huber
Industry since 2017. unmarried name: Markus Huber
Verified email at nysos.net - Homepage
Title
Cited by
Year
Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools
G Merzdovnik, M Huber, D Buhov, N Nikiforakis, S Neuner, ...
IEEE European Symposium on Security and Privacy 2017, 2017
1962017
No need for black chambers: testing TLS in the e-mail ecosystem at large
W Mayer, A Zauner, M Schmiedecker, M Huber
2016 11th International Conference on Availability, Reliability and Security …, 2016
382016
Pin it! improving android network security at runtime
D Buhov, M Huber, G Merzdovnik, E Weippl
2016 IFIP Networking Conference (IFIP Networking) and Workshops, 297-305, 2016
242016
No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large
W Mayer, A Zauner, M Schmiedecker, M Huber
11th International Conference on Availability, Reliability and Security (ARES), 2016
382016
When SIGNAL hits the Fan: On the Usability and Security of State-of-the-Art Secure Mobile Messaging
S Schröder, M Huber, D Wind, C Rottermanner
European Workshop on Usable Security. IEEE, 2016
802016
Privacy and data protection in smartphone messengers
C Rottermanner, P Kieseberg, M Huber, M Schmiedecker, S Schrittwieser
Proceedings of the 17th International Conference on Information Integration …, 2015
182015
Network security challenges in Android applications
D Buhov, M Huber, G Merzdovnik, E Weippl, V Dimitrova
2015 10th International Conference on Availability, Reliability and Security …, 2015
202015
Towards a CERT-Communication Model as Basis to Software Assurance
O Hellwig, G Quirchmayr, E Huber, T Mischitz, M Huber
2015 10th International Conference on Availability, Reliability and Security …, 2015
22015
Advanced social engineering attacks
K Krombholz, H Hobel, M Huber, E Weippl
Journal of Information Security and applications 22, 113-122, 2015
8812015
Plugin in the Middle-Minimising Security Risks in Mobile Middleware Implementations
P Aufner, G Merzdovnik, M Huber, E Weippl
Proceedings of the 7th International Conference on Security of Information …, 2014
2014
Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices
C Hochreiner, M Huber, G Merzdovnik, E Weippl
Proceedings of the 7th International Conference on Security of Information …, 2014
62014
Spoiled onions: Exposing malicious Tor exit relays
P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ...
International Symposium on Privacy Enhancing Technologies Symposium, 304-331, 2014
1272014
QR code security: A survey of attacks and challenges for usable security
K Krombholz, P Frühwirt, P Kieseberg, I Kapsalis, M Huber, E Weippl
International Conference on Human Aspects of Information Security, Privacy …, 2014
1452014
Covert Computation—Hiding Code in Code Through Compile-Time Obfuscation
S Schrittwieser, S Katzenbeisser, P Kieseberg, M Huber, M Leithner, ...
Computers & Security, 2014
36*2014
Towards fully automated digital alibis with social interaction
S Beyer, M Mulazzani, S Schrittwieser, M Huber, E Weippl
IFIP International Conference on Digital Forensics, 297-307, 2014
12014
Social engineering attacks on the knowledge worker
K Krombholz, H Hobel, M Huber, E Weippl
Proceedings of the 6th International Conference on Security of Information …, 2013
812013
Appinspect: large-scale evaluation of social networking apps
M Huber, M Mulazzani, S Schrittwieser, E Weippl
Proceedings of the first ACM conference on Online social networks, 143-154, 2013
432013
Shpf: Enhancing http (s) session security with browser fingerprinting
T Unger, M Mulazzani, D Frühwirt, M Huber, S Schrittwieser, E Weippl
2013 International Conference on Availability, Reliability and Security, 255-261, 2013
792013
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs
P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl
Information Security Technical Report 17 (4), 227-238, 2013
402013
Covert computation: hiding code in code for obfuscation purposes
S Schrittwieser, S Katzenbeisser, P Kieseberg, M Huber, M Leithner, ...
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
192013
The system can't perform the operation now. Try again later.
Articles 1–20