Veröffentlichungen

Automatic Recognition, Processing and Attacking of Single Sign-On Protocols with Burp Suite

2015 - Christian Mainka, Vladislav Mladenov, Tim Guenther, Jörg Schwenk

Open Identity Summit 2015 [Paper PDF]

How Private is Your Private Cloud?: Security Analysis of Cloud Control Interfaces

2015 - Dennis Felsch, Mario Heiderich, Frederic Schulz, Jörg Schwenk

ACM CCSW 2015 in conjunction with the ACM Conference on Computer and Communications Security (CCS) October 16, 2015, The Denver Marriot City Center, Denver, Colorado, USA. [paper]

On Locational Privacy in the Absence of Anonymous Payments

2015 - Tilman Frosch, Sven Schäge, Martin Goll, Thorsten Holz

Gutwirth, S., Leenes R., P. De Hert and Y. Poullet, Data protection on the Move. Current Developments in ICT and Privacy/Data Protection. Springer (forthcoming, 2015), Dordrecht. [pdf]

Sicherheitsanalyse der Private Cloud Interfaces von openQRM

2015 - Frederic Schulz, Dennis Felsch, Jörg Schwenk

In Proceedings of the DACH Security 2015, Bonn, Germany [Paper]

AdIDoS - Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services

2015 - Christian Altmeier, Christian Mainka, Juraj Somorovsky, Jörg Schwenk

International Workshop on Quantitative Aspects of Security Assurance (QASA), Vienna, Austria, 2015 [Paper PDF]

On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption

2015 - Tibor Jager, Jörg Schwenk, Juraj Somorovsky

ACM CCS 2015 [pdf]

Practical Invalid Curve Attacks on TLS-ECDH

2015 - Tibor Jager, Jörg Schwenk, Juraj Somorovsky

ESORICS 2015 [pdf]

Not so Smart: On Smart TV Apps

2015 - Marcus Niemietz, Juraj Somorovsky, Christian Mainka, Jörg Schwenk

International Workshop on Secure Internet of Things (SIoT 2015, Vienna, Austria) [pdf]

Waiting for CSP — Securing Legacy Web Applications with JSAgents

2015 - Mario Heiderich, Marcus Niemietz, Jörg Schwenk

Waiting for CSP — Securing Legacy Web Applications with JSAgents, ESORICS 2015, 20th European Symposium on Research in Computer Security [ESORICS 2015] [PDF file]

How to Break XML Encryption - Automatically

2015 - Dennis Kupser, Christian Mainka, Jörg Schwenk, Juraj Somorovsky

In Proceedings of the 9th USENIX Workshop on Offensive Technologies (WOOT), 2015 [pdf]

Semi-Automated Fuzzy MCDM and Lattice Solutions for WS-Policy Intersection

2015 - Abeer El­sa­fie, Jörg Schwenk

IEEE 5th International Workshop on Security and Privacy Engineering SPE2015, within IEEE SERVICES 2015 June 27 and July 2, 2015, New York, NY, USA

Owning Your Home Network: Router Security Revisited

2015 - Marcus Niemietz, Jörg Schwenk

W2SP 2015: Web 2.0 Security & Privacy 2015 (San Jose, California) [Workshop] [PDF]

Tightly Secure Authenticated Key Exchange

2015 - Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li

TCC 2015 [paper]

On the Selective Opening Security of Practical Public-Key Encryption Schemes

2015 - Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge

PKC 2015
Seite: