Advanced social engineering attacks K Krombholz, H Hobel, M Huber, E Weippl Journal of Information Security and applications 22, 113-122, 2015 | 890 | 2015 |
Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space. M Mulazzani, S Schrittwieser, M Leithner, M Huber, E Weippl USENIX Security Symposium, 65-76, 2011 | 288 | 2011 |
Towards automating social engineering using social networking sites M Huber, S Kowalski, M Nohlberg, S Tjoa 2009 International Conference on Computational Science and Engineering 3 …, 2009 | 199 | 2009 |
Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools G Merzdovnik, M Huber, D Buhov, N Nikiforakis, S Neuner, ... IEEE European Symposium on Security and Privacy 2017, 2017 | 196 | 2017 |
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications. S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ... NDSS, 2012 | 154 | 2012 |
Fast and reliable browser identification with javascript engine fingerprinting M Mulazzani, P Reschl, M Huber, M Leithner, S Schrittwieser, E Weippl, ... Web 2.0 Workshop on Security and Privacy (W2SP) 5, 2013 | 152 | 2013 |
QR code security: A survey of attacks and challenges for usable security K Krombholz, P Frühwirt, P Kieseberg, I Kapsalis, M Huber, E Weippl International Conference on Human Aspects of Information Security, Privacy …, 2014 | 145 | 2014 |
Spoiled onions: Exposing malicious Tor exit relays P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ... International Symposium on Privacy Enhancing Technologies Symposium, 304-331, 2014 | 127 | 2014 |
Social snapshots: Digital forensics for online social networks M Huber, M Mulazzani, M Leithner, S Schrittwieser, G Wondracek, ... Proceedings of the 27th Annual Computer Security Applications Conference …, 2011 | 119 | 2011 |
Friend-in-the-middle attacks: Exploiting social networking sites for spam M Huber, M Mulazzani, E Weippl, G Kitzler, S Goluch Internet Computing, IEEE 15 (3), 28 - 34, 2011 | 100 | 2011 |
Friend-in-the-middle attacks M Huber, M Mulazzani, E Weippl, G Kitzler, S Goluch Published by the IEEE Computer Society, 1089-7801, 2010 | 100* | 2010 |
When SIGNAL hits the Fan: On the Usability and Security of State-of-the-Art Secure Mobile Messaging S Schröder, M Huber, D Wind, C Rottermanner European Workshop on Usable Security. IEEE, 2016 | 81 | 2016 |
Social engineering attacks on the knowledge worker K Krombholz, H Hobel, M Huber, E Weippl Proceedings of the 6th International Conference on Security of Information …, 2013 | 81 | 2013 |
Shpf: Enhancing http (s) session security with browser fingerprinting T Unger, M Mulazzani, D Frühwirt, M Huber, S Schrittwieser, E Weippl 2013 International Conference on Availability, Reliability and Security, 255-261, 2013 | 80 | 2013 |
SHPF: Enhancing HTTP (S) Session Security with Browser Fingerprinting M Mulazzani, E Weippl, S Schrittwieser, T Unger, M Huber, P Frühwirt Proceedings of the Eighth International Conference on Availability …, 2013 | 80* | 2013 |
InnoDB Database Forensics P Frühwirt, M Huber, M Mulazzani, ER Weippl Advanced Information Networking and Applications (AINA), 2010 24th IEEE …, 2010 | 80 | 2010 |
Enter Sandbox: Android Sandbox Comparison S Neuner, V van der Veen, M Lindorfer, M Huber, G Merzdovnik, ... Proceedings of the IEEE, 0 | 75* | |
Social network forensics: Tapping the data pool of social networks M Mulazzani, M Huber, E Weippl Eighth Annual IFIP WG 11, 1-20, 2012 | 47 | 2012 |
Appinspect: large-scale evaluation of social networking apps M Huber, M Mulazzani, S Schrittwieser, E Weippl Proceedings of the first ACM conference on Online social networks, 143-154, 2013 | 43 | 2013 |
Tor HTTP usage and information leakage M Huber, M Mulazzani, E Weippl Communications and Multimedia Security, 245-255, 2010 | 43 | 2010 |