Wissenschaftliche Artikel

Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2015). Advanced social engineering attacks. Journal of Information Security and Applications, 22, 113–122. https://doi.org/10.1016/j.jisa.2014.09.005 ( reposiTUm)
Mulazzani, M., Huber, M., & Weippl, E. (2010). Anonymity & Monitoring: How to Monitor the Infrastructure of an Anonymity System. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 40(5), 539–546. http://hdl.handle.net/20.500.12708/166270 ( reposiTUm)

Beiträge in Tagungsbänden

Winter, P., Köwer, R., Mulazzani, M., Huber, M., Schrittwieser, S., Lindskog, S., & Weippl, E. (2014). Spoiled Onions: Exposing Malicious Tor Exit Relays. In Privacy Enhancing Technologies Symposium. Privacy Enhancing Technologies Symposium (PETS), Amsterdam, Netherlands, EU. http://hdl.handle.net/20.500.12708/55959 ( reposiTUm)
Beyer, S., Mulazzani, M., Schrittwieser, S., Huber, M., & Weippl, E. (2014). Towards Fully Automated Digital Alibis with Social Interaction. In Research Advances in Digital Forensics. Annual IFIP WG 11.9 International Conference on Digital Forensics, Wien, Austria. http://hdl.handle.net/20.500.12708/55965 ( reposiTUm)
Krombholz, K., Frühwirt, P., Kieseberg, P., Kapsalis, I., Huber, M., & Weippl, E. (2014). QR Code Security: A Survey of Attacks and Challenges for Usable Security. In Human Aspects of Information Security, Privacy, and Trust (pp. 79–90). Springer. https://doi.org/10.1007/978-3-319-07620-1_8 ( reposiTUm)
Neuner, S., van der Veen, V., Lindorfer, M., Huber, M., Georg, M., Mulazzani, M., & Weippl, E. (2014). Enter Sandbox: Android Sandbox Comparison. In Proceedings of the IEEE Mobile Security Technologies Workshop (MoST). IEEE. http://hdl.handle.net/20.500.12708/55124 ( reposiTUm)
Schrittwieser, S., Frühwirt, P., Kieseberg, P., Leithner, M., Mulazzani, M., Huber, M., & Weippl, E. (2012). Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2012 (p. 9). The Internet Society. http://hdl.handle.net/20.500.12708/54519 ( reposiTUm)
Frühwirt, P., Kieseberg, P., Schrittwieser, S., Huber, M., & Weippl, E. (2012). InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs. In Proceedings of the Seventh International Conference on Availability, Reliability and Security (ARES) (pp. 625–633). IEEE. http://hdl.handle.net/20.500.12708/54520 ( reposiTUm)
Mauczka, A., Huber, M., Schanes, C., Schramm, W., Bernhart, M., & Grechenig, T. (2012). Tracing Your Maintenance Work – A Cross-Project Validation of an Automated Classification Dictionary for Commit Messages. In Fundamental Approaches to Software Engineering (pp. 301–315). Springer-Verlag. https://doi.org/10.1007/978-3-642-28872-2_21 ( reposiTUm)
Frühwirt, P., Huber, M., Mulazzani, M., & Weippl, E. (2010). InnoDB Database Forensics. In Proceedings of the 24th International Conference on Advanced Information Networking and Applications (AINA 2010). IEEE Press. http://hdl.handle.net/20.500.12708/52981 ( reposiTUm)
Mulazzani, M., Huber, M., & Weippl, E. (2010). Tor HTTP usage and information leakage. In Proceedings of IFIP CMS 2010. Proceedings of IFIP CMS 2010, Linz, Austria. http://hdl.handle.net/20.500.12708/53521 ( reposiTUm)
Huber, M., Mulazzani, M., & Weippl, E. (2010). Who On Earth Is Mr. Cypher? Automated Friend Injection Attacks on Social Networking Sites. In Proceedings of the IFIP International Information Security Conference 2010: Security \& Privacy --- Silver Linings in the Cloud. IFIP International Information Security Conference 2010: Security & Privacy --- Silver Linings in the Cloud, Brisbane, Australia, Non-EU. http://hdl.handle.net/20.500.12708/53518 ( reposiTUm)