Markus Huber
Markus Huber

www.markushuber.org
mhuberatsba-research.org

  Affiliation history
Bibliometrics: publication history
Average citations per article4.18
Citation Count92
Publication count22
Publication years2010-2015
Available for download10
Average downloads per article465.80
Downloads (cumulative)4,658
Downloads (12 Months)446
Downloads (6 Weeks)58
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


22 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 22
Result page: 1 2

Sort by:

1 published by ACM
December 2015 iiWAS '15: Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 13,   Downloads (12 Months): 58,   Downloads (Overall): 155

Full text available: PDFPDF
Ever since the Snowden revelations regarding mass surveillance, the role of privacy protection in commodity communication software has gained increasing awareness in the general public. Still, during the last years many new messengers were developed for Android, where often privacy was not considered to be a key issue. Due to ...
Keywords: messengers, mobile security, APTs, privacy

2
August 2015 ARES '15: Proceedings of the 2015 10th International Conference on Availability, Reliability and Security
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

The digital world is in constant battle for improvement - especially in the security field. Taking into consideration the revelations from Edward Snowden about the mass surveillance programs conducted by governmental authorities, the number of users that raised awareness towards security is constantly increasing. More and more users agree that ...
Keywords: Android, Android security, SSL, smartphones, network security

3
June 2015 Journal of Information Security and Applications: Volume 22 Issue C, June 2015
Publisher: Elsevier Science Inc.
Bibliometrics:
Citation Count: 2

Social engineering has emerged as a serious threat in virtual communities and is an effective means to attack information systems. The services used by today's knowledge workers prepare the ground for sophisticated social engineering attacks. The growing trend towards BYOD (bring your own device) policies and the use of online ...
Keywords: Attack scenarios, Knowledge worker, Security, Bring your own device, Privacy, Social engineering

4 published by ACM
September 2014 SIN '14: Proceedings of the 7th International Conference on Security of Information and Networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 15,   Downloads (Overall): 57

Full text available: PDFPDF
Mobile computing platforms, like smartphones and tablet computers, are becoming a commodity nowadays. The diversity and fast changing nature of these systems often makes it hard for developers to adapt their applications to the user's context. To simplify development a number of approaches have been suggested, which offer a context-middleware ...
Keywords: plugin security, mobile middleware, Android

5 published by ACM
September 2014 SIN '14: Proceedings of the 7th International Conference on Security of Information and Networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 38,   Downloads (Overall): 121

Full text available: PDFPDF
Smartphones and tablet computers continue to replace traditional mobile phones and are used by over one billion people worldwide. A number of novel security and privacy challenges result from the possibility to extend the functionality of smartphones with third-party applications. These third-party applications require that users provide personal information to ...
Keywords: Android, location obfuscation, privacy protection, mobile computing

6
June 2014 Proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust - Volume 8533
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 2

QR (Quick Response) codes are two-dimensional barcodes with the ability to encode different types of information. Because of their high information density and robustness, QR codes have gained popularity in various fields of application. Even though they offer a broad range of advantages, QR codes pose significant security risks. Attackers ...
Keywords: hci, qr codes, security, usability

7 published by ACM
November 2013 SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 27,   Downloads (12 Months): 182,   Downloads (Overall): 946

Full text available: PDFPDF
Social engineering has become an emerging threat in virtual communities and is an effective means to attack information systems. Today's knowledge workers make use of a number of services that leverage sophisticated social engineering attacks. Moreover, there is a trend towards BYOD (bring your own device) policies and the usage ...
Keywords: privacy, security, attack scenarios, bring your own device, knowledge worker, social engineering

8 published by ACM
October 2013 COSN '13: Proceedings of the first ACM conference on Online social networks
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 12,   Downloads (12 Months): 45,   Downloads (Overall): 326

Full text available: PDFPDF
Third-party apps for social networking sites have emerged as a popular feature for online social networks, and are used by millions of users every day. In exchange for additional features, users grant third parties access to their personal data. However, these third parties do not necessarily protect the data to ...
Keywords: facebook apps, information leaks, online social networks

9
September 2013 ARES '13: Proceedings of the 2013 International Conference on Availability, Reliability and Security
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 4

Session hijacking has become a major problem in today's Web services, especially with the availability of free off-the-shelf tools. As major websites like Facebook, You tube and Yahoo still do not use HTTPS for all users by default, new methods are needed to protect the users' sessions if session tokens ...
Keywords: Session Hijacking, Browser Fingerprinting, Security

10 published by ACM
May 2013 ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 6,   Downloads (12 Months): 36,   Downloads (Overall): 267

Full text available: PDFPDF
As malicious software gets increasingly sophisticated and resilient to detection, new concepts for the identification of malicious behavior are developed by academia and industry alike. While today's malware detectors primarily focus on syntactical analysis (i.e., signatures of malware samples), the concept of semantic-aware malware detection has recently been proposed. Here, ...
Keywords: code obfuscation, malware detection, side effects

11
March 2012 FASE'12: Proceedings of the 15th international conference on Fundamental Approaches to Software Engineering
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 2

A commit message is a description of a change in a Version Control System (VCS). Besides the actual description of the change, it can also serve as an indicator for the purpose of the change, e.g. a change to refactor code might be accompanied by a commit message in the ...

12 published by ACM
December 2011 ACSAC '11: Proceedings of the 27th Annual Computer Security Applications Conference
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 11,   Downloads (12 Months): 100,   Downloads (Overall): 1,328

Full text available: PDFPDF
Recently, academia and law enforcement alike have shown a strong demand for data that is collected from online social networks. In this work, we present a novel method for harvesting such data from social networking websites. Our approach uses a hybrid system that is based on a custom add-on for ...
Keywords: forensics, online social networks, security

13 published by ACM
December 2011 iiWAS '11: Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 4,   Downloads (12 Months): 16,   Downloads (Overall): 104

Full text available: PDFPDF
Today's database management systems implement sophisticated access control mechanisms to prevent unauthorized access and modifications. This is, as an example, an important basic requirement for SOX (Sarbanes--Oxley Act) compliance, whereby every past transaction has to be traceable at any time. However, malicious database administrators may still be able to bypass ...
Keywords: B+ tree, database log, database forensics

14
September 2011 EISIC '11: Proceedings of the 2011 European Intelligence and Security Informatics Conference
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

Today's forensic techniques for databases are primarily focused on logging mechanisms and artifacts accessible in the database management systems (DBMSs). While log files, plan caches, cache clock hands, etc. can reveal past transactions, a malicious administrator's modifications might be much more difficult to detect, because he can cover his tracks ...
Keywords: database forensics, b+ tree, InnoDB

15
August 2011 SEC'11: Proceedings of the 20th USENIX conference on Security
Publisher: USENIX Association
Bibliometrics:
Citation Count: 29

During the past few years, a vast number of online file storage services have been introduced. While several of these services provide basic functionality such as uploading and retrieving files by a specific user, more advanced services offer features such as shared folders, real-time collaboration, minimization of data transfers or ...

16
May 2011 IEEE Internet Computing: Volume 15 Issue 3, May 2011
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 9

Friend-in-the-middle attacks on social networking sites can be used to harvest social data in an automated fashion. Attackers can then exploit this data for large-scale attacks using context-aware spam and social phishing. The authors prove the feasibility of such an attack and simulate the impact on Facebook. Alarmingly, all major ...
Keywords: Social networking sites, spam, phishing, Internet computing

17 published by ACM
October 2010 AISec '10: Proceedings of the 3rd ACM workshop on Artificial intelligence and security
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 6,   Downloads (12 Months): 26,   Downloads (Overall): 425

Full text available: PDFPDF
The vastly and steadily increasing data pool collected by social networking sites can have severe implications once this information becomes available to attackers. Whilst socio-technical attacks such as social engineering relied upon expensive background information collection techniques such as dumpster diving, social engineering attacks can nowadays be fully automated with ...
Keywords: security, theory

18 published by ACM
October 2010 CCS '10: Proceedings of the 17th ACM conference on Computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 6,   Downloads (12 Months): 33,   Downloads (Overall): 735

Full text available: PDFPDF
In the ongoing arms race between spammers and the multi-million dollar anti-spam industry, the number of unsolicited e-mail messages (better known as "spam") and phishing has increased heavily in the last decade. In this paper, we show that our novel friend-in-the-middle attack on social networking sites (SNSs) can be used ...
Keywords: social network security, phishing, spam

19
September 2010 IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews: Volume 40 Issue 5, September 2010
Publisher: IEEE Press
Bibliometrics:
Citation Count: 4

The Tor network is a widely deployed anonymity system on the Internet used by thousands of users every day. A basic monitoring system has been designed and implemented to allow long-term statistics, provide feedback to the interested user, and detect certain attacks on the network. The implementation has been added ...
Keywords: Anonymity, privacy, anonymity, privacy

20
August 2010 SOCIALCOM '10: Proceedings of the 2010 IEEE Second International Conference on Social Computing
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

Social networking sites have been studied extensively within the past five years, especially in the area of information security. Within this paper we discuss these emerging web services both regarding possible attack vectors as well as defense strategies. Our results suggest that a gap between attack and defense strategies exists. ...
Keywords: social networking sites, security, survey



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us