Dark clouds on the horizon: Using cloud storage as attack vector and online slack space M Mulazzani, S Schrittwieser, M Leithner, M Huber, E Weippl 20th USENIX Security Symposium (USENIX Security 11), 2011 | 290 | 2011 |
QR code security P Kieseberg, M Leithner, M Mulazzani, L Munroe, S Schrittwieser, ... Proceedings of the 8th International Conference on Advances in Mobile …, 2010 | 268 | 2010 |
Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools G Merzdovnik, M Huber, D Buhov, N Nikiforakis, S Neuner, ... 2nd IEEE European Symposium on Security and Privacy (Euro S&P), 2017 | 198 | 2017 |
IMSI-catch me if you can: IMSI-catcher-catchers A Dabrowski, N Pianta, T Klepp, M Mulazzani, E Weippl Annual Computer Security Applications Conference (ACSAC), 246-255, 2014 | 169 | 2014 |
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications. S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ... Network & Distributed System Security Symposium (NDSS), 2012 | 158 | 2012 |
Fast and reliable browser identification with javascript engine fingerprinting M Mulazzani, P Reschl, M Huber, M Leithner, S Schrittwieser, E Weippl, ... Web 2.0 Workshop on Security and Privacy (W2SP) 5, 4, 2013 | 157 | 2013 |
"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS K Krombholz, W Mayer, M Schmiedecker, E Weippl 26th USENIX Security Symposium, 2017 | 140 | 2017 |
Spoiled onions: Exposing malicious Tor exit relays P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ... Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014 | 130 | 2014 |
Social snapshots: Digital forensics for online social networks M Huber, M Mulazzani, M Leithner, S Schrittwieser, G Wondracek, ... Proceedings of the 27th annual computer security applications conference …, 2011 | 121 | 2011 |
Friend-in-the-middle attacks: Exploiting social networking sites for spam M Huber, M Mulazzani, E Weippl, G Kitzler, S Goluch IEEE Internet Computing 15 (3), 28-34, 2011 | 100 | 2011 |
Shpf: Enhancing http (s) session security with browser fingerprinting T Unger, M Mulazzani, D Fruhwirt, M Huber, S Schrittwieser, E Weippl Availability, Reliability and Security (ARES), 2013 Eighth International …, 2013 | 81 | 2013 |
InnoDB database forensics P Frühwirt, M Huber, M Mulazzani, ER Weippl 2010 24th IEEE International Conference on Advanced Information Networking …, 2010 | 80 | 2010 |
Enter sandbox: Android sandbox comparison S Neuner, V Van der Veen, M Lindorfer, M Huber, G Merzdovnik, ... Proceedings of the IEEE Mobile Security Technologies workshop (MoST), 2014 | 76 | 2014 |
Time is on my side: Steganography in filesystem metadata Sebastian Neuner, Artemios G. Voyiatzisa, Martin Schmiedecker, Stefan ... Digital Investigation 18 (7), 76-86, 2016 | 56* | 2016 |
Social network forensics: Tapping the data pool of social networks M Mulazzani, M Huber, E Weippl Eighth Annual IFIP WG 11, 1Ű20, 2012 | 47 | 2012 |
Appinspect: large-scale evaluation of social networking apps M Huber, M Mulazzani, S Schrittwieser, E Weippl Proceedings of the first ACM conference on Online social networks, 143-154, 2013 | 43 | 2013 |
Tor HTTP usage and information leakage M Huber, M Mulazzani, E Weippl Communications and Multimedia Security: 11th IFIP TC 6/TC 11 International …, 2010 | 43 | 2010 |
NavigaTor: Finding Faster Paths to Anonymity R Annessi, M Schmiedecker IEEE European Symposium on Security and Privacy (Euro S&P), 2016 | 40 | 2016 |
Who on earth is “Mr. Cypher”: automated friend injection attacks on social networking sites M Huber, M Mulazzani, E Weippl Security and Privacy–Silver Linings in the Cloud: 25th IFIP TC-11 …, 2010 | 40 | 2010 |
No need for black chambers: testing TLS in the e-mail ecosystem at large W Mayer, A Zauner, M Schmiedecker, M Huber International Conference on Availability, Reliability and Security (ARES), 10-20, 2016 | 38 | 2016 |