Ver­öf­fent­li­chun­gen

Au­to­ma­tic Re­co­gni­ti­on, Pro­ces­sing and At­ta­cking of Sin­gle Sign-On Pro­to­cols with Burp Suite

2015 - Chris­ti­an Main­ka, Vla­dis­lav Mla­de­nov, Tim Guen­t­her, Jörg Schwenk

Open Iden­ti­ty Sum­mit 2015 [Paper PDF]

How Pri­va­te is Your Pri­va­te Cloud?: Se­cu­ri­ty Ana­ly­sis of Cloud Con­trol In­ter­faces

2015 - Den­nis Felsch, Mario Hei­de­rich, Fre­de­ric Schulz, Jörg Schwenk

ACM CCSW 2015 in con­junc­tion with the ACM Con­fe­rence on Com­pu­ter and Com­mu­ni­ca­ti­ons Se­cu­ri­ty (CCS) Oc­to­ber 16, 2015, The Den­ver Mar­ri­ot City Cen­ter, Den­ver, Co­lo­ra­do, USA. [paper]

On Lo­ca­tio­nal Pri­va­cy in the Ab­sence of An­ony­mous Pay­ments

2015 - Til­man Frosch, Sven Schä­ge, Mar­tin Goll, Thors­ten Holz

Gut­wirth, S., Lee­nes R., P. De Hert and Y. Poul­let, Data pro­tec­tion on the Move. Cur­rent De­ve­lop­ments in ICT and Pri­va­cy/Data Pro­tec­tion. Sprin­ger (forth­co­ming, 2015), Dord­recht. [pdf]

Si­cher­heits­ana­ly­se der Pri­va­te Cloud In­ter­faces von open­QRM

2015 - Fre­de­ric Schulz, Den­nis Felsch, Jörg Schwenk

In Pro­cee­dings of the DACH Se­cu­ri­ty 2015, Bonn, Ger­ma­ny [Paper]

AdI­DoS - Ad­ap­ti­ve and In­tel­li­gent Ful­ly-Au­to­ma­tic De­tec­tion of De­ni­al-of-Ser­vice We­ak­nes­ses in Web Ser­vices

2015 - Chris­ti­an Alt­mei­er, Chris­ti­an Main­ka, Juraj So­mo­rovs­ky, Jörg Schwenk

In­ter­na­tio­nal Work­shop on Quan­ti­ta­ti­ve As­pects of Se­cu­ri­ty As­suran­ce (QASA), Vi­en­na, Aus­tria, 2015 [Paper PDF]

On the Se­cu­ri­ty of TLS 1.3 and QUIC Against We­ak­nes­ses in PKCS#1 v1.5 En­cryp­ti­on

2015 - Tibor Jager, Jörg Schwenk, Juraj So­mo­rovs­ky

ACM CCS 2015 [pdf]

Prac­tical In­va­lid Curve At­tacks on TLS-ECDH

2015 - Tibor Jager, Jörg Schwenk, Juraj So­mo­rovs­ky

ESO­RICS 2015 [pdf]

Not so Smart: On Smart TV Apps

2015 - Mar­cus Nie­mietz, Juraj So­mo­rovs­ky, Chris­ti­an Main­ka, Jörg Schwenk

In­ter­na­tio­nal Work­shop on Se­cu­re In­ter­net of Things (SIoT 2015, Vi­en­na, Aus­tria) [pdf]

Wait­ing for CSP — Se­cu­ring Le­ga­cy Web Ap­p­li­ca­ti­ons with JSA­gents

2015 - Mario Hei­de­rich, Mar­cus Nie­mietz, Jörg Schwenk

Wait­ing for CSP — Se­cu­ring Le­ga­cy Web Ap­p­li­ca­ti­ons with JSA­gents, ESO­RICS 2015, 20th Eu­ropean Sym­po­si­um on Re­se­arch in Com­pu­ter Se­cu­ri­ty [ESO­RICS 2015] [PDF file]

How to Break XML En­cryp­ti­on - Au­to­ma­ti­cal­ly

2015 - Den­nis Kup­ser, Chris­ti­an Main­ka, Jörg Schwenk, Juraj So­mo­rovs­ky

In Pro­cee­dings of the 9th USE­NIX Work­shop on Of­fen­si­ve Tech­no­lo­gies (WOOT), 2015 [pdf]
Seite: