Martin Schmiedecker (Mulazzani)
Martin Schmiedecker (Mulazzani)
Bosch Engineering GmbH
Verified email at schmiedecker.net - Homepage
TitleCited byYear
Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.
M Mulazzani, S Schrittwieser, M Leithner, M Huber, ER Weippl
USENIX security symposium, 65-76, 2011
2352011
QR code security
P Kieseberg, M Leithner, M Mulazzani, L Munroe, S Schrittwieser, ...
Proceedings of the 8th International Conference on Advances in Mobile …, 2010
1682010
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ...
Network & Distributed System Security Symposium (NDSS), 2012
1262012
Fast and reliable browser identification with javascript engine fingerprinting
M Mulazzani, P Reschl, M Huber, M Leithner, S Schrittwieser, E Weippl, ...
Web 2.0 Workshop on Security and Privacy (W2SP) 5, 2013
972013
Social snapshots: Digital forensics for online social networks
M Huber, M Mulazzani, M Leithner, S Schrittwieser, G Wondracek, ...
Proceedings of the 27th annual computer security applications conference …, 2011
862011
Spoiled onions: Exposing malicious Tor exit relays
P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ...
International Symposium on Privacy Enhancing Technologies Symposium, 304-331, 2014
792014
Friend-in-the-middle attacks: Exploiting social networking sites for spam
M Huber, M Mulazzani, E Weippl, G Kitzler, S Goluch
IEEE Internet Computing 15 (3), 28-34, 2011
782011
IMSI-catch me if you can: IMSI-catcher-catchers
A Dabrowski, N Pianta, T Klepp, M Mulazzani, E Weippl
Annual Computer Security Applications Conference (ACSAC), 246-255, 2014
742014
Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools
G Merzdovnik, M Huber, D Buhov, N Nikiforakis, S Neuner, ...
2nd IEEE European Symposium on Security and Privacy (Euro S&P), 2017
732017
InnoDB database forensics
P Frühwirt, M Huber, M Mulazzani, ER Weippl
2010 24th IEEE International Conference on Advanced Information Networking …, 2010
592010
Enter sandbox: Android sandbox comparison
S Neuner, V Van der Veen, M Lindorfer, M Huber, G Merzdovnik, ...
Proceedings of the IEEE Mobile Security Technologies workshop (MoST), 2014
492014
Shpf: Enhancing http (s) session security with browser fingerprinting
T Unger, M Mulazzani, D Fruhwirt, M Huber, S Schrittwieser, E Weippl
Availability, Reliability and Security (ARES), 2013 Eighth International …, 2013
432013
Social network forensics: Tapping the data pool of social networks
M Mulazzani, M Huber, E Weippl
Eighth Annual IFIP WG 11, 1-20, 2012
332012
Tor HTTP usage and information leakage
M Huber, M Mulazzani, E Weippl
IFIP International Conference on Communications and Multimedia Security, 245-255, 2010
332010
Appinspect: large-scale evaluation of social networking apps
M Huber, M Mulazzani, S Schrittwieser, E Weippl
Proceedings of the first ACM conference on Online social networks, 143-154, 2013
312013
"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS
K Krombholz, W Mayer, M Schmiedecker, E Weippl
26th USENIX Security Symposium, 2017
302017
Who on earth is “Mr. Cypher”: automated friend injection attacks on social networking sites
M Huber, M Mulazzani, E Weippl
IFIP International Information Security Conference, 80-89, 2010
302010
Social networking sites security: Quo Vadis
M Huber, M Mulazzani, E Weippl
2010 IEEE Second International Conference on Social Computing, 1117-1122, 2010
262010
Time is on my side: Steganography in filesystem metadata
Sebastian Neuner, Artemios G. Voyiatzisa, Martin Schmiedecker, Stefan ...
Digital Investigation 18 (7), 76-86, 2016
23*2016
Covert Computation—Hiding code in code through compile-time obfuscation
S Schrittwieser, S Katzenbeisser, P Kieseberg, M Huber, M Leithner, ...
Computers & security 42, 13-26, 2014
23*2014
The system can't perform the operation now. Try again later.
Articles 1–20