Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Martin Mulazzani is active.

Publication


Featured researches published by Martin Mulazzani.


advances in mobile multimedia | 2010

QR code security

Peter Kieseberg; Manuel Leithner; Martin Mulazzani; Lindsay Munroe; Sebastian Schrittwieser; Mayank Sinha; Edgar R. Weippl

This paper examines QR Codes and how they can be used to attack both human interaction and automated systems. As the encoded information is intended to be machine readable only, a human cannot distinguish between a valid and a maliciously manipulated QR code. While humans might fall for phishing attacks, automated readers are most likely vulnerable to SQL injections and command injections. Our contribution consists of an analysis of the QR Code as an attack vector, showing different attack strategies from the attackers point of view and exploring their possible consequences.


IEEE Internet Computing | 2011

Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam

Markus Huber; Martin Mulazzani; Edgar R. Weippl; Gerhard Kitzler; Sigrun Goluch

Friend-in-the-middle attacks on social networking sites can be used to harvest social data in an automated fashion. Attackers can then exploit this data for large-scale attacks using context-aware spam and social phishing. The authors prove the feasibility of such an attack and simulate the impact on Facebook. Alarmingly, all major social networking sites are vulnerable to this attack because they fail to appropriately secure the network layer.


annual computer security applications conference | 2011

Social snapshots: digital forensics for online social networks

Markus Huber; Martin Mulazzani; Manuel Leithner; Sebastian Schrittwieser; Gilbert Wondracek; Edgar R. Weippl

Recently, academia and law enforcement alike have shown a strong demand for data that is collected from online social networks. In this work, we present a novel method for harvesting such data from social networking websites. Our approach uses a hybrid system that is based on a custom add-on for social networks in combination with a web crawling component. The datasets that our tool collects contain profile information (user data, private messages, photos, etc.) and associated meta-data (internal timestamps and unique identifiers). These social snapshots are significant for security research and in the field of digital forensics. We implemented a prototype for Facebook and evaluated our system on a number of human volunteers. We show the feasibility and efficiency of our approach and its advantages in contrast to traditional techniques that rely on application-specific web crawling and parsing. Furthermore, we investigate different use-cases of our tool that include consensual application and the use of sniffed authentication cookies. Finally, we contribute to the research community by publishing our implementation as an open-source project.


advanced information networking and applications | 2010

InnoDB Database Forensics

Peter Frühwirt; Marcus Huber; Martin Mulazzani; Edgar R. Weippl

Whenever data is being processed, there are many places where parts of the data are temporarily stored; thus forensic analysis can reveal past activities, create a (partial) timeline and recover deleted data. While this fact is well known for computer forensics, multiple forensic tools exist to analyze data and the systematic analysis of database systems has only recently begun. This paper will describe the file format of the MySQL Database 5.1.32 with InnoDB Storage Engine. It will further explain with a practical example of how to reconstruct the data found in the file system of any SQL table. We will show how to reconstruct the table as it is, read data sets from the file and how to interpret the gained information.


annual computer security applications conference | 2014

IMSI-catch me if you can: IMSI-catcher-catchers

Adrian Dabrowski; Nicola Pianta; Thomas Klepp; Martin Mulazzani; Edgar R. Weippl

IMSI Catchers are used in mobile networks to identify and eavesdrop on phones. When, the number of vendors increased and prices dropped, the device became available to much larger audiences. Self-made devices based on open source software are available for about US


privacy enhancing technologies | 2014

Spoiled Onions: Exposing Malicious Tor Exit Relays

Philipp Winter; Richard Köwer; Martin Mulazzani; Markus Huber; Sebastian Schrittwieser; Stefan Lindskog; Edgar R. Weippl

1,500. In this paper, we identify and describe multiple methods of detecting artifacts in the mobile network produced by such devices. We present two independent novel implementations of an IMSI Catcher Catcher (ICC) to detect this threat against everyones privacy. The first one employs a network of stationary (sICC) measurement units installed in a geographical area and constantly scanning all frequency bands for cell announcements and fingerprinting the cell network parameters. These rooftop-mounted devices can cover large areas. The second implementation is an app for standard consumer grade mobile phones (mICC), without the need to root or jailbreak them. Its core principle is based upon geographical network topology correlation, facilitating the ubiquitous built-in GPS receiver in todays phones and a network cell capabilities fingerprinting technique. The latter works for the vicinity of the phone by first learning the cell landscape and than matching it against the learned data. We implemented and evaluated both solutions for digital self-defense and deployed several of the stationary units for a long term field-test. Finally, we describe how to detect recently published denial of service attacks.


international conference on communications | 2010

Tor HTTP usage and information leakage

Markus Huber; Martin Mulazzani; Edgar R. Weippl

Tor exit relays are operated by volunteers and together push more than 1 GiB/s of network traffic. By design, these volunteers are able to inspect and modify the anonymized network traffic. In this paper, we seek to expose such malicious exit relays and document their actions. First, we monitored the Tor network after developing two fast and modular exit relay scanners—one for credential sniffing and one for active MitM attacks. We implemented several scanning modules for detecting common attacks and used them to probe all exit relays over a period of several months. We discovered numerous malicious exit relays engaging in a multitude of different attacks. To reduce the attack surface users are exposed to, we patched Torbutton, an existing browser extension and part of the Tor Browser Bundle, to fetch and compare suspicious X.509 certificates over independent Tor circuits. Our work makes it possible to continuously and systematically monitor Tor exit relays. We are able to detect and thwart many man-in-the-middle attacks, thereby making the network safer for its users. All our source code is available under a free license.


information security conference | 2010

Who on Earth Is “Mr. Cypher”: Automated Friend Injection Attacks on Social Networking Sites

Markus Huber; Martin Mulazzani; Edgar R. Weippl

This paper analyzes the web browsing behaviour of Tor users. By collecting HTTP requests we show which websites are of interest to Tor users and we determined an upper bound on how vulnerable Tor users are to sophisticated de-anonymization attacks: up to 78 % of the Tor users do not use Tor as suggested by the Tor community, namely to browse the web with TorButton. They could thus fall victim to de-anonymization attacks by merely browsing the web. Around 1% of the requests could be used by an adversary for exploit piggybacking on vulnerable file formats. Another 7 % of all requests were generated by social networking sites which leak plenty of sensitive and identifying information. Due to the design of HTTP and Tor, we argue that HTTPS is currently the only effective countermeasure against de-anonymization and information leakage for HTTP over Tor.


conference on online social networks | 2013

Appinspect: large-scale evaluation of social networking apps

Markus Huber; Martin Mulazzani; Sebastian Schrittwieser; Edgar R. Weippl

Within this paper we present our novel friend injection attack which exploits the fact that the great majority of social networking sites fail to protect the communication between its users and their services. In a practical evaluation, on the basis of public wireless access points, we furthermore demonstrate the feasibility of our attack. The friend injection attack enables a stealth infiltration of social networks and thus outlines the devastating consequences of active eavesdropping attacks against social networking sites.


european intelligence and security informatics conference | 2011

Trees Cannot Lie: Using Data Structures for Forensics Purposes

Peter Kieseberg; Sebastian Schrittwieser; Martin Mulazzani; Markus Huber; Edgar R. Weippl

Third-party apps for social networking sites have emerged as a popular feature for online social networks, and are used by millions of users every day. In exchange for additional features, users grant third parties access to their personal data. However, these third parties do not necessarily protect the data to the same extent as social network providers. To automatically analyze the unique privacy and security issues of social networking applications on a large scale, we propose a novel framework, called AppInspect. Our framework enumerates available social networking apps and collects metrics such as the personal information transferred to third party developers. AppInspect furthermore identifies web trackers, as well as information leaks, and provides insights into the hosting infrastructures of apps. We implemented a prototype of our novel framework to evaluate Facebooks application ecosystem. Our evaluation shows that AppInspect is able to detect malpractices of social networking apps in an automated fashion. During our study we collaborated with Facebook to mitigate shortcomings of popular apps that affected the security and privacy of millions of social networking users.

Collaboration


Dive into the Martin Mulazzani's collaboration.

Top Co-Authors

Avatar

Edgar R. Weippl

Vienna University of Technology

View shared research outputs
Top Co-Authors

Avatar

Markus Huber

Vienna University of Technology

View shared research outputs
Top Co-Authors

Avatar

Sebastian Schrittwieser

St. Pölten University of Applied Sciences

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sebastian Neuner

Vienna University of Technology

View shared research outputs
Top Co-Authors

Avatar

Peter Frühwirt

Vienna University of Technology

View shared research outputs
Top Co-Authors

Avatar

Stefan Katzenbeisser

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Edgar Weippl

St. Pölten University of Applied Sciences

View shared research outputs
Top Co-Authors

Avatar

Georg Merzdovnik

Vienna University of Technology

View shared research outputs
Top Co-Authors

Avatar

Gilbert Wondracek

Vienna University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge