Veröffentlichungen

SoK: Exploiting Network Printers

2017 - Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk

38th IEEE Symposium on Security and Privacy (S&P 2017) [html] [html] [pdf]

SoK: Single Sign-On Security – An Evaluation of OpenID Connect

2017 - Christian Mainka, Vladislav Mladenov, Tobias Wich, Jörg Schwenk

IEEE Eu­ropean Sym­po­si­um on Se­cu­ri­ty and Pri­va­cy (EuroS&P 2017) [pdf]

0-RTT Key Exchange with Full Forward Secrecy

2017 - Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer

36th International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2017)

Towards secure and standard-compliant implementations of the PSD2 Directive

2017 - Detlef Hühnlein, Tobias Wich, Daniel Nemmert

Open Identity Summit, 2017 [PDF]

Breaking PPTP VPNs via RADIUS Encryption

2016 - Matthias Horst, Martin Grothe, Tibor Jager, Jörg Schwenk

15th International Conference on Cryptology and Network Security (CANS) [http] [pdf]

Evaluating Two Methods for WS-(Security) Policy Negotiation and Decision Making

2016 - Abeer El­sa­fie, Jörg Schwenk

Cloud and Trusted Computing (C&TC 2016), part of: The 15th OnTheMove to Meaningful Internet Systems: (OTM 2016) Conferences, 24-28 Oct 2016, Rhodes, Greece. [Paper]

DROWN: Breaking TLS using SSLv2

2016 - Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J. Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney, Susanne Engels, Chris­tof Paar, Yuval Shavitt

USENIX Security 2016 [Website and paper] [Pwnie Awards] [Facebook Prize]

Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS

2016 - Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic

WOOT 2016 [Blackhat stuff] [paper]

SoK: XML Parser Vulnerabilities

2016 - Christopher Späth, Christian Mainka, Vladislav Mladenov, Jörg Schwenk

10th USENIX Workshop on Offensive Technologies (WOOT '16) [Paper PDF]

How to Break Microsoft Rights Management Services

2016 - Martin Grothe, Christian Mainka, Paul Rösler, Jörg Schwenk

10th USENIX Workshop on Offensive Technologies (WOOT '16) [Paper PDF]

Your Cloud in my Company: Modern Rights Management Services Revisited

2016 - Martin Grothe, Paul Rösler, Johanna Jupke, Jan Kaiser, Christian Mainka, Jörg Schwenk

11th International Conference on Availability, Reliability and Security (ARES 2016) [pdf]

Do not trust me: Using malicious IdPs for analyzing and attacking Single Sign-On

2016 - Christian Mainka, Vladislav Mladenov, Jörg Schwenk

IEEE Eu­ropean Sym­po­si­um on Se­cu­ri­ty and Pri­va­cy (EuroS&P 2016) [Paper PDF]

How Secure is TextSecure?

2016 - Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Jörg Schwenk, Thorsten Holz

IEEE European Symposium on Security and Privacy (EuroS&P 2016) [PDF]

Attacks on OpenID Connect

2016 - Vladislav Mladenov, Christian Mainka

[pdf]

Architecture for Controlled Credential issuance Enhanced with Single Sign-On (ACCESSO)

2016 - Daniel Nemmert, Detlef Hühnlein, Tina Hühnlein, Tobias Wich

Open Identity Summit, 2016 [PDF]

Automatic Recognition, Processing and Attacking of Single Sign-On Protocols with Burp Suite

2015 - Christian Mainka, Vladislav Mladenov, Tim Guenther, Jörg Schwenk

Open Identity Summit 2015 [Paper PDF]

How Private is Your Private Cloud?: Security Analysis of Cloud Control Interfaces

2015 - Dennis Felsch, Mario Heiderich, Frederic Schulz, Jörg Schwenk

ACM CCSW 2015 in conjunction with the ACM Conference on Computer and Communications Security (CCS) October 16, 2015, The Denver Marriot City Center, Denver, Colorado, USA. [paper]

On Locational Privacy in the Absence of Anonymous Payments

2015 - Tilman Frosch, Sven Schäge, Martin Goll, Thorsten Holz

Gutwirth, S., Leenes R., P. De Hert and Y. Poullet, Data protection on the Move. Current Developments in ICT and Privacy/Data Protection. Springer (forthcoming, 2015), Dordrecht. [pdf]

Sicherheitsanalyse der Private Cloud Interfaces von openQRM

2015 - Frederic Schulz, Dennis Felsch, Jörg Schwenk

In Proceedings of the DACH Security 2015, Bonn, Germany [Paper]
Seite: