---
_id: '64566'
abstract:
- lang: eng
  text: 'Censorship is employed by many governments and ISPs worldwide, with an increasing
    trend in recent years. One of the most censored protocols is DNS: censors target
    unencrypted and encrypted DNS to prevent clients from resolving the domain name
    of unwanted websites. Despite much research on DNS censorship, only a few tools
    can circumvent it.To support users affected by DNS censorship, we present DPYProxy-DNS,
    a DNS resolver that automatically detects and employs a working DNS censorship
    circumvention. We demonstrate the effectiveness of DPYProxy-DNS by automatically
    circumventing DNS censorship in China and Iran and analyzing DNS censorship mechanisms
    in these countries. Our analyses re veal that DNS censorship in Iran is ineffective
    against encrypted DNS. In China, DPYProxy-DNS revealed two consistently working
    circumvention techniques for unencrypted DNS: TCP segmentation for DNS over TCP
    and ignoring DNS responses injected by the Great Firewall of China (GFW). Our
    findings reveal varying levels of DNS censorship across different countries, underscoring
    the importance of the automated circumvention approach we provide with DPYProxy-DNS.'
author:
- first_name: Felix
  full_name: Lange, Felix
  id: '67893'
  last_name: Lange
- first_name: Niklas
  full_name: Niere, Niklas
  id: '63563'
  last_name: Niere
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
citation:
  ama: 'Lange F, Niere N, Somorovsky J. Towards Automated DNS Censorship Circumvention.
    In: ; 2026.'
  apa: Lange, F., Niere, N., &#38; Somorovsky, J. (2026). <i>Towards Automated DNS
    Censorship Circumvention</i>. Free and Open Communications on the Internet, Virtual.
  bibtex: '@inproceedings{Lange_Niere_Somorovsky_2026, title={Towards Automated DNS
    Censorship Circumvention}, author={Lange, Felix and Niere, Niklas and Somorovsky,
    Juraj}, year={2026} }'
  chicago: Lange, Felix, Niklas Niere, and Juraj Somorovsky. “Towards Automated DNS
    Censorship Circumvention,” 2026.
  ieee: F. Lange, N. Niere, and J. Somorovsky, “Towards Automated DNS Censorship Circumvention,”
    presented at the Free and Open Communications on the Internet, Virtual, 2026.
  mla: Lange, Felix, et al. <i>Towards Automated DNS Censorship Circumvention</i>.
    2026.
  short: 'F. Lange, N. Niere, J. Somorovsky, in: 2026.'
conference:
  end_date: 2026-02-19
  location: Virtual
  name: Free and Open Communications on the Internet
  start_date: 2026-02-19
date_created: 2026-02-20T14:35:34Z
date_updated: 2026-02-21T10:20:16Z
ddc:
- '006'
file:
- access_level: open_access
  content_type: application/pdf
  creator: nniklas
  date_created: 2026-02-20T14:34:05Z
  date_updated: 2026-02-21T10:20:16Z
  file_id: '64568'
  file_name: foci-2026-0001.pdf
  file_size: 775133
  relation: main_file
file_date_updated: 2026-02-21T10:20:16Z
has_accepted_license: '1'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://www.petsymposium.org/foci/2026/foci-2026-0001.pdf
oa: '1'
status: public
title: Towards Automated DNS Censorship Circumvention
type: conference
user_id: '63563'
year: '2026'
...
---
_id: '58801'
abstract:
- lang: eng
  text: Iran employs one of the most prominent Internet censors in the world. An important
    part of Iran’s censorship apparatus is its analysis of unencrypted protocols such
    as HTTP and DNS. During routine evaluations of Iran’s HTTP and DNS censorship,
    we noticed several properties we believe to be unknown today. For instance, we
    found injections of correct static IPs for some domains such as google.com on
    the DNS level, unclear HTTP version parsing, and correlations between DNS and
    HTTP censorship. In this paper, we present our findings to the community and discuss
    possible takeaways for affected people and the censorship circumvention community.
    As some of our findings left us bewildered, we hope to ignite a discussion about
    Iran’s censorship behavior. We aim to use the discussion of our work to execute
    a thorough analysis and explanation of Iran’s censorship behavior in the future.
author:
- first_name: Felix
  full_name: Lange, Felix
  id: '67893'
  last_name: Lange
- first_name: Niklas
  full_name: Niere, Niklas
  id: '63563'
  last_name: Niere
- first_name: Jonathan
  full_name: von Niessen, Jonathan
  last_name: von Niessen
- first_name: Dennis
  full_name: Suermann, Dennis
  last_name: Suermann
- first_name: Nico
  full_name: Heitmann, Nico
  id: '74619'
  last_name: Heitmann
  orcid: 0009-0003-7687-7044
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
citation:
  ama: 'Lange F, Niere N, von Niessen J, Suermann D, Heitmann N, Somorovsky J. I(ra)nconsistencies:
    Novel Insights into Iran’s Censorship. In: <i>Proceedings on Privacy Enhancing
    Technologies</i>. ; 2025.'
  apa: 'Lange, F., Niere, N., von Niessen, J., Suermann, D., Heitmann, N., &#38; Somorovsky,
    J. (2025). I(ra)nconsistencies: Novel Insights into Iran’s Censorship. <i>Proceedings
    on Privacy Enhancing Technologies</i>. Free and Open Communications on the Internet,
    Virtual.'
  bibtex: '@inproceedings{Lange_Niere_von Niessen_Suermann_Heitmann_Somorovsky_2025,
    title={I(ra)nconsistencies: Novel Insights into Iran’s Censorship}, booktitle={Proceedings
    on Privacy Enhancing Technologies}, author={Lange, Felix and Niere, Niklas and
    von Niessen, Jonathan and Suermann, Dennis and Heitmann, Nico and Somorovsky,
    Juraj}, year={2025} }'
  chicago: 'Lange, Felix, Niklas Niere, Jonathan von Niessen, Dennis Suermann, Nico
    Heitmann, and Juraj Somorovsky. “I(Ra)Nconsistencies: Novel Insights into Iran’s
    Censorship.” In <i>Proceedings on Privacy Enhancing Technologies</i>, 2025.'
  ieee: 'F. Lange, N. Niere, J. von Niessen, D. Suermann, N. Heitmann, and J. Somorovsky,
    “I(ra)nconsistencies: Novel Insights into Iran’s Censorship,” presented at the
    Free and Open Communications on the Internet, Virtual, 2025.'
  mla: 'Lange, Felix, et al. “I(Ra)Nconsistencies: Novel Insights into Iran’s Censorship.”
    <i>Proceedings on Privacy Enhancing Technologies</i>, 2025.'
  short: 'F. Lange, N. Niere, J. von Niessen, D. Suermann, N. Heitmann, J. Somorovsky,
    in: Proceedings on Privacy Enhancing Technologies, 2025.'
conference:
  end_date: 2025-02-20
  location: Virtual
  name: Free and Open Communications on the Internet
  start_date: 2025-02-20
date_created: 2025-02-24T08:09:56Z
date_updated: 2025-05-06T13:48:32Z
ddc:
- '006'
department:
- _id: '632'
file:
- access_level: closed
  content_type: application/pdf
  creator: flange
  date_created: 2025-02-24T08:07:59Z
  date_updated: 2025-02-24T08:07:59Z
  file_id: '58802'
  file_name: foci-2025-0002.pdf
  file_size: 535700
  relation: main_file
  success: 1
file_date_updated: 2025-02-24T08:07:59Z
has_accepted_license: '1'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://www.petsymposium.org/foci/2025/foci-2025-0002.pdf
oa: '1'
publication: Proceedings on Privacy Enhancing Technologies
quality_controlled: '1'
status: public
title: 'I(ra)nconsistencies: Novel Insights into Iran’s Censorship'
type: conference
user_id: '63563'
year: '2025'
...
---
_id: '59824'
abstract:
- lang: eng
  text: "HTTPS composes large parts of today’s Internet traffic and has long been
    subject to censorship efforts in different countries. While censors analyze the
    Transport Layer Security (TLS) protocol to block encrypted HTTP traffic, censorship
    circumvention efforts have primarily focused on other protocols such as TCP. In
    this paper, we hypothesize that the TLS protocol offers previously unseen opportunities
    for censorship circumvention techniques. We tested our hypothesis by proposing
    possible censorship circumvention techniques that act on the TLS protocol. To
    validate the effectiveness of these techniques, we evaluate their acceptance by
    popular TLS servers and successfully demonstrate that these techniques can circumvent
    censors in China and Iran. In our evaluations, we discovered 38—partially standard-compliant—distinct
    censorship circumvention techniques, which we could group into 11 unique categories.
    Additionally, we provide novel insights into how China censors TLS traffic by
    presenting evidence of at least three distinct censorship appliances. We suspect
    that other parts of China’s censorship apparatus and other censors exhibit similar
    structures and advocate future censorship research to anticipate them. With this
    work, we hope to aid people affected by censorship and stimulate further\r\nresearch
    into censorship circumvention using cryptographic protocols."
author:
- first_name: Niklas
  full_name: Niere, Niklas
  id: '63563'
  last_name: Niere
- first_name: Felix
  full_name: Lange, Felix
  id: '67893'
  last_name: Lange
- first_name: Robert
  full_name: Merget, Robert
  last_name: Merget
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
citation:
  ama: 'Niere N, Lange F, Merget R, Somorovsky J. Transport Layer Obscurity: Circumventing
    SNI Censorship on the TLS-Layer. In: <i>2025 IEEE Symposium on Security and Privacy
    (SP)</i>. ; 2025. doi:<a href="https://doi.org/10.1109/SP61157.2025.00151">10.1109/SP61157.2025.00151</a>'
  apa: 'Niere, N., Lange, F., Merget, R., &#38; Somorovsky, J. (2025). Transport Layer
    Obscurity: Circumventing SNI Censorship on the TLS-Layer. <i>2025 IEEE Symposium
    on Security and Privacy (SP)</i>. 46th IEEE Symposium on Security and Privacy,
    San Francisco. <a href="https://doi.org/10.1109/SP61157.2025.00151">https://doi.org/10.1109/SP61157.2025.00151</a>'
  bibtex: '@inproceedings{Niere_Lange_Merget_Somorovsky_2025, title={Transport Layer
    Obscurity: Circumventing SNI Censorship on the TLS-Layer}, DOI={<a href="https://doi.org/10.1109/SP61157.2025.00151">10.1109/SP61157.2025.00151</a>},
    booktitle={2025 IEEE Symposium on Security and Privacy (SP)}, author={Niere, Niklas
    and Lange, Felix and Merget, Robert and Somorovsky, Juraj}, year={2025} }'
  chicago: 'Niere, Niklas, Felix Lange, Robert Merget, and Juraj Somorovsky. “Transport
    Layer Obscurity: Circumventing SNI Censorship on the TLS-Layer.” In <i>2025 IEEE
    Symposium on Security and Privacy (SP)</i>, 2025. <a href="https://doi.org/10.1109/SP61157.2025.00151">https://doi.org/10.1109/SP61157.2025.00151</a>.'
  ieee: 'N. Niere, F. Lange, R. Merget, and J. Somorovsky, “Transport Layer Obscurity:
    Circumventing SNI Censorship on the TLS-Layer,” presented at the 46th IEEE Symposium
    on Security and Privacy, San Francisco, 2025, doi: <a href="https://doi.org/10.1109/SP61157.2025.00151">10.1109/SP61157.2025.00151</a>.'
  mla: 'Niere, Niklas, et al. “Transport Layer Obscurity: Circumventing SNI Censorship
    on the TLS-Layer.” <i>2025 IEEE Symposium on Security and Privacy (SP)</i>, 2025,
    doi:<a href="https://doi.org/10.1109/SP61157.2025.00151">10.1109/SP61157.2025.00151</a>.'
  short: 'N. Niere, F. Lange, R. Merget, J. Somorovsky, in: 2025 IEEE Symposium on
    Security and Privacy (SP), 2025.'
conference:
  end_date: 2025-05-14
  location: San Francisco
  name: 46th IEEE Symposium on Security and Privacy
  start_date: 2025-05-12
date_created: 2025-05-06T13:40:50Z
date_updated: 2025-06-02T12:03:51Z
ddc:
- '006'
department:
- _id: '632'
doi: 10.1109/SP61157.2025.00151
file:
- access_level: open_access
  content_type: application/pdf
  creator: nniklas
  date_created: 2025-05-06T13:49:35Z
  date_updated: 2025-05-06T13:51:45Z
  file_id: '59826'
  file_name: TLS_Obscurity.pdf
  file_size: 463431
  relation: main_file
file_date_updated: 2025-05-06T13:51:45Z
has_accepted_license: '1'
language:
- iso: eng
oa: '1'
publication: 2025 IEEE Symposium on Security and Privacy (SP)
status: public
title: 'Transport Layer Obscurity: Circumventing SNI Censorship on the TLS-Layer'
type: conference
user_id: '63563'
year: '2025'
...
---
_id: '58657'
abstract:
- lang: eng
  text: "The rapid growth of 3D printing technology has transformed a wide range of
    industries, enabling the on-demand production of complex objects, from aerospace
    components to medical devices. However, this technology also introduces significant
    security challenges. Previous research highlighted the security implications of
    G-Codes—commands used to control the printing process. These studies assumed powerful
    attackers and focused on manipulations of the printed models, leaving gaps in
    understanding the full attack potential.\r\n\r\nIn this study, we systematically
    analyze security threats associated with 3D printing, focusing specifically on
    vulnerabilities caused by G-Code commands. We introduce attacks and attacker models
    that assume a less powerful adversary than traditionally considered, broadening
    the scope of potential security threats. Our findings show that even minimal access
    to the 3D printer can result in significant security breaches, such as unauthorized
    access to subsequent print jobs or persistent misconfiguration of the printer.
    We identify 278 potentially malicious G-Codes across the attack categories Information
    Disclosure, Denial of Service, and Model Manipulation. Our evaluation demonstrates
    the applicability of these attacks across various 3D printers and their firmware.
    Our findings underscore the need for a better standardization process of G-Codes
    and corresponding security best practices.\r\n"
author:
- first_name: Jost
  full_name: Rossel, Jost
  id: '58331'
  last_name: Rossel
  orcid: 0000-0002-3182-4059
- first_name: Vladislav
  full_name: Mladenov, Vladislav
  last_name: Mladenov
- first_name: Nico
  full_name: Wördenweber, Nico
  last_name: Wördenweber
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
citation:
  ama: 'Rossel J, Mladenov V, Wördenweber N, Somorovsky J. Security Implications of
    Malicious G-Codes in 3D Printing. In: <i>Proceedings of the 34th USENIX Security
    Symposium</i>. ; 2025:1867-1885.'
  apa: Rossel, J., Mladenov, V., Wördenweber, N., &#38; Somorovsky, J. (2025). Security
    Implications of Malicious G-Codes in 3D Printing. <i>Proceedings of the 34th USENIX
    Security Symposium</i>, 1867–1885.
  bibtex: '@inproceedings{Rossel_Mladenov_Wördenweber_Somorovsky_2025, title={Security
    Implications of Malicious G-Codes in 3D Printing}, booktitle={Proceedings of the
    34th USENIX Security Symposium}, author={Rossel, Jost and Mladenov, Vladislav
    and Wördenweber, Nico and Somorovsky, Juraj}, year={2025}, pages={1867–1885} }'
  chicago: Rossel, Jost, Vladislav Mladenov, Nico Wördenweber, and Juraj Somorovsky.
    “Security Implications of Malicious G-Codes in 3D Printing.” In <i>Proceedings
    of the 34th USENIX Security Symposium</i>, 1867–85, 2025.
  ieee: J. Rossel, V. Mladenov, N. Wördenweber, and J. Somorovsky, “Security Implications
    of Malicious G-Codes in 3D Printing,” in <i>Proceedings of the 34th USENIX Security
    Symposium</i>, Seattle, WA, USA, 2025, pp. 1867–1885.
  mla: Rossel, Jost, et al. “Security Implications of Malicious G-Codes in 3D Printing.”
    <i>Proceedings of the 34th USENIX Security Symposium</i>, 2025, pp. 1867–85.
  short: 'J. Rossel, V. Mladenov, N. Wördenweber, J. Somorovsky, in: Proceedings of
    the 34th USENIX Security Symposium, 2025, pp. 1867–1885.'
conference:
  end_date: 2025-08-15
  location: Seattle, WA, USA
  name: 34th USENIX Security Symposium
  start_date: 2025-08-13
date_created: 2025-02-17T11:12:17Z
date_updated: 2025-08-22T10:34:24Z
ddc:
- '000'
department:
- _id: '632'
file:
- access_level: open_access
  content_type: application/pdf
  creator: jrossel
  date_created: 2025-02-17T11:10:31Z
  date_updated: 2025-02-17T11:13:10Z
  file_id: '58660'
  file_name: Security_Analysis_of_G_Codes.pdf
  file_size: 1562838
  relation: main_file
file_date_updated: 2025-02-17T11:13:10Z
has_accepted_license: '1'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://www.usenix.org/conference/usenixsecurity25/presentation/rossel
oa: '1'
page: 1867 - 1885
publication: Proceedings of the 34th USENIX Security Symposium
publication_status: published
quality_controlled: '1'
status: public
title: Security Implications of Malicious G-Codes in 3D Printing
type: conference
user_id: '58331'
year: '2025'
...
---
_id: '60970'
author:
- first_name: Sven Niclas
  full_name: Hebrok, Sven Niclas
  id: '55616'
  last_name: Hebrok
  orcid: 0009-0006-1172-1665
- first_name: Tim Leonhard
  full_name: Storm, Tim Leonhard
  id: '74914'
  last_name: Storm
  orcid: 0009-0001-2681-1624
- first_name: Felix Matthias
  full_name: Cramer, Felix Matthias
  last_name: Cramer
- first_name: Maximilian Manfred
  full_name: Radoy, Maximilian Manfred
  id: '68826'
  last_name: Radoy
  orcid: 0009-0005-3059-6823
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
citation:
  ama: 'Hebrok SN, Storm TL, Cramer FM, Radoy MM, Somorovsky J. STEK Sharing is Not
    Caring: Bypassing TLS Authentication in Web Servers using Session Tickets. In:
    <i>34th USENIX Security Symposium</i>. ; 2025.'
  apa: 'Hebrok, S. N., Storm, T. L., Cramer, F. M., Radoy, M. M., &#38; Somorovsky,
    J. (2025). STEK Sharing is Not Caring: Bypassing TLS Authentication in Web Servers
    using Session Tickets. <i>34th USENIX Security Symposium</i>.'
  bibtex: '@inproceedings{Hebrok_Storm_Cramer_Radoy_Somorovsky_2025, title={STEK Sharing
    is Not Caring: Bypassing TLS Authentication in Web Servers using Session Tickets},
    booktitle={34th USENIX Security Symposium}, author={Hebrok, Sven Niclas and Storm,
    Tim Leonhard and Cramer, Felix Matthias and Radoy, Maximilian Manfred and Somorovsky,
    Juraj}, year={2025} }'
  chicago: 'Hebrok, Sven Niclas, Tim Leonhard Storm, Felix Matthias Cramer, Maximilian
    Manfred Radoy, and Juraj Somorovsky. “STEK Sharing Is Not Caring: Bypassing TLS
    Authentication in Web Servers Using Session Tickets.” In <i>34th USENIX Security
    Symposium</i>, 2025.'
  ieee: 'S. N. Hebrok, T. L. Storm, F. M. Cramer, M. M. Radoy, and J. Somorovsky,
    “STEK Sharing is Not Caring: Bypassing TLS Authentication in Web Servers using
    Session Tickets,” 2025.'
  mla: 'Hebrok, Sven Niclas, et al. “STEK Sharing Is Not Caring: Bypassing TLS Authentication
    in Web Servers Using Session Tickets.” <i>34th USENIX Security Symposium</i>,
    2025.'
  short: 'S.N. Hebrok, T.L. Storm, F.M. Cramer, M.M. Radoy, J. Somorovsky, in: 34th
    USENIX Security Symposium, 2025.'
date_created: 2025-08-21T13:43:47Z
date_updated: 2025-09-29T13:46:49Z
ddc:
- '000'
department:
- _id: '632'
file:
- access_level: open_access
  content_type: application/pdf
  creator: snhebrok
  date_created: 2025-09-29T13:41:18Z
  date_updated: 2025-09-29T13:46:49Z
  file_id: '61465'
  file_name: paper.pdf
  file_size: 333869
  relation: main_file
- access_level: open_access
  content_type: application/pdf
  creator: snhebrok
  date_created: 2025-09-29T13:41:27Z
  date_updated: 2025-09-29T13:46:49Z
  file_id: '61466'
  file_name: ae.pdf
  file_size: 162464
  relation: supplementary_material
- access_level: open_access
  content_type: application/pdf
  creator: snhebrok
  date_created: 2025-09-29T13:41:41Z
  date_updated: 2025-09-29T13:46:49Z
  file_id: '61467'
  file_name: poster.pdf
  file_size: 535577
  relation: poster
- access_level: open_access
  content_type: application/pdf
  creator: snhebrok
  date_created: 2025-09-29T13:42:04Z
  date_updated: 2025-09-29T13:46:49Z
  file_id: '61468'
  file_name: slides.pdf
  file_size: 3057223
  relation: slides
file_date_updated: 2025-09-29T13:46:49Z
has_accepted_license: '1'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://www.usenix.org/conference/usenixsecurity25/presentation/hebrok
oa: '1'
publication: 34th USENIX Security Symposium
status: public
title: 'STEK Sharing is Not Caring: Bypassing TLS Authentication in Web Servers using
  Session Tickets'
type: conference
user_id: '55616'
year: '2025'
...
---
_id: '60503'
abstract:
- lang: eng
  text: 'Censors have long censored Transport Layer Security (TLS) traffic by inspecting
    the domain name in the unencrypted Server Name Indication (SNI) extension. By
    encrypting the SNI extension, the Encrypted ClientHello (ECH) prevents censors
    from blocking TLS traffic to certain domains. Despite this promising outlook,
    ECH’s current capability to contest TLS censorship is unclear; for instance, Russia
    has started censoring ECH connections successfully. This paper clarifies ECH’s
    current role for TLS censorship. To this end, we evaluate servers’ support for
    ECH and its analysis and subsequent blocking by censors. We determine Cloudflare
    as the only major provider supporting ECH. Additionally, we affirm previously
    known ECH censorship in Russia and uncover indirect censorship of ECH through
    encrypted DNS censorship in China and Iran. Our findings suggest that ECH’s contribution
    to censorship circumvention is currently limited: we consider ECH’s dependence
    on encrypted DNS especially challenging for ECH’s capability to circumvent censorship.
    We stress the importance of censorship-resistant ECH to solve the long-known problem
    of SNI-based TLS censorship.'
author:
- first_name: Niklas
  full_name: Niere, Niklas
  id: '63563'
  last_name: Niere
- first_name: Felix
  full_name: Lange, Felix
  id: '67893'
  last_name: Lange
- first_name: Nico
  full_name: Heitmann, Nico
  id: '74619'
  last_name: Heitmann
  orcid: 0009-0003-7687-7044
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
citation:
  ama: 'Niere N, Lange F, Heitmann N, Somorovsky J. Encrypted Client Hello (ECH) in
    Censorship Circumvention. In: ; 2025.'
  apa: Niere, N., Lange, F., Heitmann, N., &#38; Somorovsky, J. (2025). <i>Encrypted
    Client Hello (ECH) in Censorship Circumvention</i>. Free and Open Communications
    on the Internet, Washington, D.C.
  bibtex: '@inproceedings{Niere_Lange_Heitmann_Somorovsky_2025, title={Encrypted Client
    Hello (ECH) in Censorship Circumvention}, author={Niere, Niklas and Lange, Felix
    and Heitmann, Nico and Somorovsky, Juraj}, year={2025} }'
  chicago: Niere, Niklas, Felix Lange, Nico Heitmann, and Juraj Somorovsky. “Encrypted
    Client Hello (ECH) in Censorship Circumvention,” 2025.
  ieee: N. Niere, F. Lange, N. Heitmann, and J. Somorovsky, “Encrypted Client Hello
    (ECH) in Censorship Circumvention,” presented at the Free and Open Communications
    on the Internet, Washington, D.C., 2025.
  mla: Niere, Niklas, et al. <i>Encrypted Client Hello (ECH) in Censorship Circumvention</i>.
    2025.
  short: 'N. Niere, F. Lange, N. Heitmann, J. Somorovsky, in: 2025.'
conference:
  end_date: 2025-07-14
  location: Washington, D.C.
  name: Free and Open Communications on the Internet
  start_date: 2025-07-14
date_created: 2025-07-03T07:14:00Z
date_updated: 2025-10-23T14:26:38Z
ddc:
- '006'
file:
- access_level: open_access
  content_type: application/pdf
  creator: nniklas
  date_created: 2025-07-03T07:11:14Z
  date_updated: 2025-10-23T14:26:38Z
  file_id: '60505'
  file_name: foci-2025-0016.pdf
  file_size: 755171
  relation: main_file
file_date_updated: 2025-10-23T14:26:38Z
has_accepted_license: '1'
keyword:
- censorship
- circumvention
- ECH
- TLS
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://www.petsymposium.org/foci/2025/foci-2025-0016.pdf
oa: '1'
status: public
title: Encrypted Client Hello (ECH) in Censorship Circumvention
type: conference
user_id: '63563'
year: '2025'
...
---
_id: '62738'
abstract:
- lang: eng
  text: 'Vulnerability disclosures are necessary to improve the security of our digital
    ecosystem. However, they can also be challenging for researchers: it may be hard
    to find out who the affected parties even are, or how to contact them. Researchers
    may be ignored or face adversity when disclosing vulnerabilities. We investigate
    researchers'' experiences with vulnerability disclosures, extract best practices,
    and make recommendations for researchers, institutions that employ them, industry,
    and regulators to enable effective vulnerability disclosures.'
author:
- first_name: Harshini
  full_name: Sri Ramulu, Harshini
  id: '99000'
  last_name: Sri Ramulu
  orcid: 0000-0002-0000-5843
- first_name: Anna Lena
  full_name: Rotthaler, Anna Lena
  id: '97843'
  last_name: Rotthaler
- first_name: Jost
  full_name: Rossel, Jost
  id: '58331'
  last_name: Rossel
  orcid: 0000-0002-3182-4059
- first_name: Rachel
  full_name: Gonzalez Rodriguez, Rachel
  last_name: Gonzalez Rodriguez
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Tadayoshi
  full_name: Kohno, Tadayoshi
  last_name: Kohno
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: 'Sri Ramulu H, Rotthaler AL, Rossel J, et al. Poster: Computer Security Researchers’
    Experiences with Vulnerability Disclosures. In: <i>Proceedings of the 2025 ACM
    SIGSAC Conference on Computer and Communications Security</i>. ACM; 2025. doi:<a
    href="https://doi.org/10.1145/3719027.3760723">10.1145/3719027.3760723</a>'
  apa: 'Sri Ramulu, H., Rotthaler, A. L., Rossel, J., Gonzalez Rodriguez, R., Wermke,
    D., Fahl, S., Kohno, T., Somorovsky, J., &#38; Acar, Y. (2025). Poster: Computer
    Security Researchers’ Experiences with Vulnerability Disclosures. <i>Proceedings
    of the 2025 ACM SIGSAC Conference on Computer and Communications Security</i>.
    <a href="https://doi.org/10.1145/3719027.3760723">https://doi.org/10.1145/3719027.3760723</a>'
  bibtex: '@inproceedings{Sri Ramulu_Rotthaler_Rossel_Gonzalez Rodriguez_Wermke_Fahl_Kohno_Somorovsky_Acar_2025,
    title={Poster: Computer Security Researchers’ Experiences with Vulnerability Disclosures},
    DOI={<a href="https://doi.org/10.1145/3719027.3760723">10.1145/3719027.3760723</a>},
    booktitle={Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications
    Security}, publisher={ACM}, author={Sri Ramulu, Harshini and Rotthaler, Anna Lena
    and Rossel, Jost and Gonzalez Rodriguez, Rachel and Wermke, Dominik and Fahl,
    Sascha and Kohno, Tadayoshi and Somorovsky, Juraj and Acar, Yasemin}, year={2025}
    }'
  chicago: 'Sri Ramulu, Harshini, Anna Lena Rotthaler, Jost Rossel, Rachel Gonzalez
    Rodriguez, Dominik Wermke, Sascha Fahl, Tadayoshi Kohno, Juraj Somorovsky, and
    Yasemin Acar. “Poster: Computer Security Researchers’ Experiences with Vulnerability
    Disclosures.” In <i>Proceedings of the 2025 ACM SIGSAC Conference on Computer
    and Communications Security</i>. ACM, 2025. <a href="https://doi.org/10.1145/3719027.3760723">https://doi.org/10.1145/3719027.3760723</a>.'
  ieee: 'H. Sri Ramulu <i>et al.</i>, “Poster: Computer Security Researchers’ Experiences
    with Vulnerability Disclosures,” 2025, doi: <a href="https://doi.org/10.1145/3719027.3760723">10.1145/3719027.3760723</a>.'
  mla: 'Sri Ramulu, Harshini, et al. “Poster: Computer Security Researchers’ Experiences
    with Vulnerability Disclosures.” <i>Proceedings of the 2025 ACM SIGSAC Conference
    on Computer and Communications Security</i>, ACM, 2025, doi:<a href="https://doi.org/10.1145/3719027.3760723">10.1145/3719027.3760723</a>.'
  short: 'H. Sri Ramulu, A.L. Rotthaler, J. Rossel, R. Gonzalez Rodriguez, D. Wermke,
    S. Fahl, T. Kohno, J. Somorovsky, Y. Acar, in: Proceedings of the 2025 ACM SIGSAC
    Conference on Computer and Communications Security, ACM, 2025.'
conference:
  end_date: 2025-10-17
  start_date: 2025-10-13
date_created: 2025-12-02T08:48:00Z
date_updated: 2025-12-02T08:54:18Z
doi: 10.1145/3719027.3760723
keyword:
- software vulnerabilities
- vulnerability disclosure
- security research
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://dl.acm.org/doi/10.1145/3719027.3760723
oa: '1'
publication: Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications
  Security
publication_status: published
publisher: ACM
status: public
title: 'Poster: Computer Security Researchers'' Experiences with Vulnerability Disclosures'
type: conference
user_id: '58331'
year: '2025'
...
---
_id: '54437'
abstract:
- lang: eng
  text: "Video conferencing systems have become an indispensable part of our world.
    Using video conferencing systems implies the expectation that online meetings
    run as smoothly as in-person meetings. Thus, online meetings need to be just as
    secure and private as in-person meetings, which are secured against disruptive
    factors and unauthorized persons by physical access control mechanisms.\r\n\r\nTo
    show the security dangers of conferencing systems and raise general awareness
    when using these technologies, we analyze the security of two widely used research
    and education open-source video conferencing systems: BigBlueButton and eduMEET.
    Because both systems are very different, we analyzed their architectures, considering
    the respective components with their main tasks, features, and user roles. In
    the following systematic security analyses, we found 50 vulnerabilities. These
    include broken access control, NoSQL injection, and denial of service (DoS). The
    vulnerabilities have root causes of different natures. While BigBlueButton has
    a lot of complexity due to many components, eduMEET, which is relatively young,
    focuses more on features than security. The sheer amount of results and the lack
    of prior work indicate a research gap that needs to be closed since video conferencing
    systems continue to play a significant role in research, education, and everyday
    life."
author:
- first_name: Nico
  full_name: Heitmann, Nico
  id: '74619'
  last_name: Heitmann
- first_name: Hendrik
  full_name: Siewert, Hendrik
  last_name: Siewert
- first_name: Sven
  full_name: Moog, Sven
  last_name: Moog
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
citation:
  ama: 'Heitmann N, Siewert H, Moog S, Somorovsky J. Security Analysis of BigBlueButton
    and eduMEET. In: <i>Applied Cryptography and Network Security</i>. Springer Nature
    Switzerland; 2024. doi:<a href="https://doi.org/10.1007/978-3-031-54776-8_8">10.1007/978-3-031-54776-8_8</a>'
  apa: Heitmann, N., Siewert, H., Moog, S., &#38; Somorovsky, J. (2024). Security
    Analysis of BigBlueButton and eduMEET. <i>Applied Cryptography and Network Security</i>.
    <a href="https://doi.org/10.1007/978-3-031-54776-8_8">https://doi.org/10.1007/978-3-031-54776-8_8</a>
  bibtex: '@inproceedings{Heitmann_Siewert_Moog_Somorovsky_2024, place={Cham}, title={Security
    Analysis of BigBlueButton and eduMEET}, DOI={<a href="https://doi.org/10.1007/978-3-031-54776-8_8">10.1007/978-3-031-54776-8_8</a>},
    booktitle={Applied Cryptography and Network Security}, publisher={Springer Nature
    Switzerland}, author={Heitmann, Nico and Siewert, Hendrik and Moog, Sven and Somorovsky,
    Juraj}, year={2024} }'
  chicago: 'Heitmann, Nico, Hendrik Siewert, Sven Moog, and Juraj Somorovsky. “Security
    Analysis of BigBlueButton and EduMEET.” In <i>Applied Cryptography and Network
    Security</i>. Cham: Springer Nature Switzerland, 2024. <a href="https://doi.org/10.1007/978-3-031-54776-8_8">https://doi.org/10.1007/978-3-031-54776-8_8</a>.'
  ieee: 'N. Heitmann, H. Siewert, S. Moog, and J. Somorovsky, “Security Analysis of BigBlueButton
    and eduMEET,” Abu Dhabi, 2024, doi: <a href="https://doi.org/10.1007/978-3-031-54776-8_8">10.1007/978-3-031-54776-8_8</a>.'
  mla: Heitmann, Nico, et al. “Security Analysis of BigBlueButton and EduMEET.” <i>Applied
    Cryptography and Network Security</i>, Springer Nature Switzerland, 2024, doi:<a
    href="https://doi.org/10.1007/978-3-031-54776-8_8">10.1007/978-3-031-54776-8_8</a>.
  short: 'N. Heitmann, H. Siewert, S. Moog, J. Somorovsky, in: Applied Cryptography
    and Network Security, Springer Nature Switzerland, Cham, 2024.'
conference:
  end_date: 2024-03-08
  location: Abu Dhabi
  start_date: 2024-03-05
date_created: 2024-05-23T11:15:39Z
date_updated: 2024-05-23T11:20:29Z
department:
- _id: '632'
doi: 10.1007/978-3-031-54776-8_8
language:
- iso: eng
main_file_link:
- url: https://link.springer.com/content/pdf/10.1007/978-3-031-54776-8_8.pdf
place: Cham
publication: Applied Cryptography and Network Security
publication_status: published
publisher: Springer Nature Switzerland
status: public
title: Security Analysis of BigBlueButton and eduMEET
type: conference
user_id: '74619'
year: '2024'
...
---
_id: '55137'
abstract:
- lang: eng
  text: Many countries limit their residents' access to various websites. As a substantial
    number of these websites do not support TLS encryption, censorship of unencrypted
    HTTP requests remains prevalent. Accordingly, circumvention techniques can and
    have been found for the HTTP protocol. In this paper, we infer novel circumvention
    techniques on the HTTP layer from a web security vulnerability by utilizing HTTP
    request smuggling (HRS). To demonstrate the viability of our techniques, we collected
    various test vectors from previous work about HRS and evaluated them on popular
    web servers and censors in China, Russia, and Iran. Our findings show that HRS
    can be successfully employed as a censorship circumvention technique against multiple
    censors and web servers. We also discover a standard-compliant circumvention technique
    in Russia, unusually inconsistent censorship in China, and an implementation bug
    in Iran. The results of this work imply that censorship circumvention techniques
    can successfully be constructed from existing vulnerabilities. We conjecture that
    this implication provides insights to the censorship circumvention community beyond
    the viability of specific techniques presented in this work.
author:
- first_name: Philipp
  full_name: Müller, Philipp
  last_name: Müller
- first_name: Niklas
  full_name: Niere, Niklas
  id: '63563'
  last_name: Niere
- first_name: Felix
  full_name: Lange, Felix
  id: '67893'
  last_name: Lange
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
citation:
  ama: 'Müller P, Niere N, Lange F, Somorovsky J. Turning Attacks into Advantages:
    Evading HTTP Censorship with HTTP Request Smuggling. In: <i>Proceedings on Privacy
    Enhancing Technologies</i>. ; 2024.'
  apa: 'Müller, P., Niere, N., Lange, F., &#38; Somorovsky, J. (2024). Turning Attacks
    into Advantages: Evading HTTP Censorship with HTTP Request Smuggling. <i>Proceedings
    on Privacy Enhancing Technologies</i>. Free and Open Communications on the Internet
    2024 , Bristol.'
  bibtex: '@inproceedings{Müller_Niere_Lange_Somorovsky_2024, place={Bristol}, title={Turning
    Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling},
    booktitle={Proceedings on Privacy Enhancing Technologies}, author={Müller, Philipp
    and Niere, Niklas and Lange, Felix and Somorovsky, Juraj}, year={2024} }'
  chicago: 'Müller, Philipp, Niklas Niere, Felix Lange, and Juraj Somorovsky. “Turning
    Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling.”
    In <i>Proceedings on Privacy Enhancing Technologies</i>. Bristol, 2024.'
  ieee: 'P. Müller, N. Niere, F. Lange, and J. Somorovsky, “Turning Attacks into Advantages:
    Evading HTTP Censorship with HTTP Request Smuggling,” presented at the Free and
    Open Communications on the Internet 2024 , Bristol, 2024.'
  mla: 'Müller, Philipp, et al. “Turning Attacks into Advantages: Evading HTTP Censorship
    with HTTP Request Smuggling.” <i>Proceedings on Privacy Enhancing Technologies</i>,
    2024.'
  short: 'P. Müller, N. Niere, F. Lange, J. Somorovsky, in: Proceedings on Privacy
    Enhancing Technologies, Bristol, 2024.'
conference:
  end_date: 2024-07-15
  location: Bristol
  name: 'Free and Open Communications on the Internet 2024 '
  start_date: 2024-07-15
date_created: 2024-07-09T07:49:37Z
date_updated: 2024-07-09T07:49:59Z
ddc:
- '006'
department:
- _id: '632'
file:
- access_level: open_access
  content_type: application/pdf
  creator: flange
  date_created: 2024-07-09T07:42:54Z
  date_updated: 2024-07-09T07:42:54Z
  file_id: '55139'
  file_name: Turning Attacks into Advantages_ Evading HTTP Censorship with HTTP Request
    Smuggling - foci-2024-0012.pdf
  file_size: 189676
  relation: main_file
file_date_updated: 2024-07-09T07:42:54Z
has_accepted_license: '1'
keyword:
- censorship
- censorship circumvention
- http
- http request smuggling
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://www.petsymposium.org/foci/2024/foci-2024-0012.pdf
oa: '1'
place: Bristol
publication: Proceedings on Privacy Enhancing Technologies
publication_status: published
quality_controlled: '1'
status: public
title: 'Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request
  Smuggling'
type: conference
user_id: '67893'
year: '2024'
...
---
_id: '56079'
author:
- first_name: Maximilian Manfred
  full_name: Radoy, Maximilian Manfred
  id: '68826'
  last_name: Radoy
  orcid: 0009-0005-3059-6823
- first_name: Sven Niclas
  full_name: Hebrok, Sven Niclas
  id: '55616'
  last_name: Hebrok
  orcid: 0009-0006-1172-1665
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
citation:
  ama: 'Radoy MM, Hebrok SN, Somorovsky J. In Search of Partitioning Oracle Attacks
    Against TLS Session Tickets. In: <i>Lecture Notes in Computer Science</i>. Springer
    Nature Switzerland; 2024. doi:<a href="https://doi.org/10.1007/978-3-031-70896-1_16">10.1007/978-3-031-70896-1_16</a>'
  apa: Radoy, M. M., Hebrok, S. N., &#38; Somorovsky, J. (2024). In Search of Partitioning
    Oracle Attacks Against TLS Session Tickets. In <i>Lecture Notes in Computer Science</i>.
    Springer Nature Switzerland. <a href="https://doi.org/10.1007/978-3-031-70896-1_16">https://doi.org/10.1007/978-3-031-70896-1_16</a>
  bibtex: '@inbook{Radoy_Hebrok_Somorovsky_2024, place={Cham}, title={In Search of Partitioning
    Oracle Attacks Against TLS Session Tickets}, DOI={<a href="https://doi.org/10.1007/978-3-031-70896-1_16">10.1007/978-3-031-70896-1_16</a>},
    booktitle={Lecture Notes in Computer Science}, publisher={Springer Nature Switzerland},
    author={Radoy, Maximilian Manfred and Hebrok, Sven Niclas and Somorovsky, Juraj},
    year={2024} }'
  chicago: 'Radoy, Maximilian Manfred, Sven Niclas Hebrok, and Juraj Somorovsky. “In
    Search of Partitioning Oracle Attacks Against TLS Session Tickets.” In <i>Lecture
    Notes in Computer Science</i>. Cham: Springer Nature Switzerland, 2024. <a href="https://doi.org/10.1007/978-3-031-70896-1_16">https://doi.org/10.1007/978-3-031-70896-1_16</a>.'
  ieee: 'M. M. Radoy, S. N. Hebrok, and J. Somorovsky, “In Search of Partitioning
    Oracle Attacks Against TLS Session Tickets,” in <i>Lecture Notes in Computer Science</i>,
    Cham: Springer Nature Switzerland, 2024.'
  mla: Radoy, Maximilian Manfred, et al. “In Search of Partitioning Oracle Attacks
    Against TLS Session Tickets.” <i>Lecture Notes in Computer Science</i>, Springer
    Nature Switzerland, 2024, doi:<a href="https://doi.org/10.1007/978-3-031-70896-1_16">10.1007/978-3-031-70896-1_16</a>.
  short: 'M.M. Radoy, S.N. Hebrok, J. Somorovsky, in: Lecture Notes in Computer Science,
    Springer Nature Switzerland, Cham, 2024.'
date_created: 2024-09-06T07:06:14Z
date_updated: 2024-10-07T13:38:28Z
department:
- _id: '632'
doi: 10.1007/978-3-031-70896-1_16
language:
- iso: eng
place: Cham
publication: Lecture Notes in Computer Science
publication_identifier:
  isbn:
  - '9783031708954'
  - '9783031708961'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer Nature Switzerland
status: public
title: In Search of Partitioning Oracle Attacks Against TLS Session Tickets
type: book_chapter
user_id: '68826'
year: '2024'
...
---
_id: '57816'
abstract:
- lang: eng
  text: "TLS-Attacker is an open-source framework for analyzing Transport\r\nLayer
    Security (TLS) implementations. The framework allows users\r\nto specify custom
    protocol flows and provides modification hooks to\r\nmanipulate message contents.
    Since its initial publication in 2016 by\r\nJuraj Somorovsky, TLS-Attacker has
    been used in numerous studies\r\npublished at well-established conferences and
    helped to identify\r\nvulnerabilities in well-known open-source TLS libraries.
    To enable\r\nautomated analyses, TLS-Attacker has grown into a suite of projects,\r\neach
    designed as a building block that can be applied to facilitate\r\nvarious analysis
    methodologies. The framework still undergoes\r\ncontinuous improvements with feature
    extensions, such as DTLS\r\n1.3 or the addition of new dialects such as QUIC,
    to continue its\r\neffectiveness and relevancy as a security analysis framework."
author:
- first_name: Fabian
  full_name: Bäumer, Fabian
  last_name: Bäumer
- first_name: Marcus
  full_name: Brinkmann, Marcus
  last_name: Brinkmann
- first_name: Nurullah
  full_name: Erinola, Nurullah
  last_name: Erinola
- first_name: Sven Niclas
  full_name: Hebrok, Sven Niclas
  id: '55616'
  last_name: Hebrok
  orcid: 0009-0006-1172-1665
- first_name: Nico
  full_name: Heitmann, Nico
  id: '74619'
  last_name: Heitmann
  orcid: 0009-0003-7687-7044
- first_name: Felix
  full_name: Lange, Felix
  id: '67893'
  last_name: Lange
- first_name: Marcel
  full_name: Maehren, Marcel
  last_name: Maehren
- first_name: Robert
  full_name: Merget, Robert
  last_name: Merget
- first_name: Niklas
  full_name: Niere, Niklas
  id: '63563'
  last_name: Niere
- first_name: Maximilian Manfred
  full_name: Radoy, Maximilian Manfred
  id: '68826'
  last_name: Radoy
  orcid: 0009-0005-3059-6823
- first_name: Conrad
  full_name: Schmidt, Conrad
  last_name: Schmidt
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
citation:
  ama: 'Bäumer F, Brinkmann M, Erinola N, et al. TLS-Attacker: A Dynamic Framework
    for Analyzing TLS Implementations. In: <i>Proceedings of Cybersecurity Artifacts
    Competition and Impact Award (ACSAC ’24)</i>. ; 2024.'
  apa: 'Bäumer, F., Brinkmann, M., Erinola, N., Hebrok, S. N., Heitmann, N., Lange,
    F., Maehren, M., Merget, R., Niere, N., Radoy, M. M., Schmidt, C., Schwenk, J.,
    &#38; Somorovsky, J. (2024). TLS-Attacker: A Dynamic Framework for Analyzing TLS
    Implementations. <i>Proceedings of Cybersecurity Artifacts Competition and Impact
    Award (ACSAC ’24)</i>. Annual Computer Security Applications Conference, Hawaii.'
  bibtex: '@inproceedings{Bäumer_Brinkmann_Erinola_Hebrok_Heitmann_Lange_Maehren_Merget_Niere_Radoy_et
    al._2024, title={TLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations},
    booktitle={Proceedings of Cybersecurity Artifacts Competition and Impact Award
    (ACSAC ’24)}, author={Bäumer, Fabian and Brinkmann, Marcus and Erinola, Nurullah
    and Hebrok, Sven Niclas and Heitmann, Nico and Lange, Felix and Maehren, Marcel
    and Merget, Robert and Niere, Niklas and Radoy, Maximilian Manfred and et al.},
    year={2024} }'
  chicago: 'Bäumer, Fabian, Marcus Brinkmann, Nurullah Erinola, Sven Niclas Hebrok,
    Nico Heitmann, Felix Lange, Marcel Maehren, et al. “TLS-Attacker: A Dynamic Framework
    for Analyzing TLS Implementations.” In <i>Proceedings of Cybersecurity Artifacts
    Competition and Impact Award (ACSAC ’24)</i>, 2024.'
  ieee: 'F. Bäumer <i>et al.</i>, “TLS-Attacker: A Dynamic Framework for Analyzing
    TLS Implementations,” presented at the Annual Computer Security Applications Conference,
    Hawaii, 2024.'
  mla: 'Bäumer, Fabian, et al. “TLS-Attacker: A Dynamic Framework for Analyzing TLS
    Implementations.” <i>Proceedings of Cybersecurity Artifacts Competition and Impact
    Award (ACSAC ’24)</i>, 2024.'
  short: 'F. Bäumer, M. Brinkmann, N. Erinola, S.N. Hebrok, N. Heitmann, F. Lange,
    M. Maehren, R. Merget, N. Niere, M.M. Radoy, C. Schmidt, J. Schwenk, J. Somorovsky,
    in: Proceedings of Cybersecurity Artifacts Competition and Impact Award (ACSAC
    ’24), 2024.'
conference:
  end_date: 2024-12-13
  location: Hawaii
  name: Annual Computer Security Applications Conference
  start_date: 2024-12-09
date_created: 2024-12-17T11:25:14Z
date_updated: 2025-02-27T08:02:30Z
department:
- _id: '632'
keyword:
- SSL
- TLS
- DTLS
- Protocol State Fuzzing
- Planning Based
language:
- iso: eng
publication: Proceedings of Cybersecurity Artifacts Competition and Impact Award (ACSAC
  ’24)
quality_controlled: '1'
status: public
title: 'TLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations'
type: conference
user_id: '67893'
year: '2024'
...
---
_id: '49654'
abstract:
- lang: eng
  text: State actors around the world censor the HTTPS protocol to block access to
    certain websites. While many circumvention strategies utilize the TCP layer only
    little emphasis has been placed on the analysis of TLS-a complex protocol and
    integral building block of HTTPS. In contrast to the TCP layer, circumvention
    methods on the TLS layer do not require root privileges since TLS operates on
    the application layer. With this proposal, we want to motivate a deeper analysis
    of TLS in regard to censorship circumvention techniques. To prove the existence
    of such techniques, we present TLS record fragmentation as a novel circumvention
    technique and circumvent the Great Firewall of China (GFW) using this technique.
    We hope that our research fosters collaboration between censorship and TLS researchers.
author:
- first_name: Niklas
  full_name: Niere, Niklas
  id: '63563'
  last_name: Niere
- first_name: Sven Niclas
  full_name: Hebrok, Sven Niclas
  id: '55616'
  last_name: Hebrok
  orcid: 0009-0006-1172-1665
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
- first_name: Robert
  full_name: Merget, Robert
  last_name: Merget
citation:
  ama: 'Niere N, Hebrok SN, Somorovsky J, Merget R. Poster: Circumventing the GFW
    with TLS Record Fragmentation. In: <i>Proceedings of the 2023 ACM SIGSAC Conference
    on Computer and Communications Security</i>. ACM; 2023. doi:<a href="https://doi.org/10.1145/3576915.3624372">10.1145/3576915.3624372</a>'
  apa: 'Niere, N., Hebrok, S. N., Somorovsky, J., &#38; Merget, R. (2023). Poster:
    Circumventing the GFW with TLS Record Fragmentation. <i>Proceedings of the 2023
    ACM SIGSAC Conference on Computer and Communications Security</i>. <a href="https://doi.org/10.1145/3576915.3624372">https://doi.org/10.1145/3576915.3624372</a>'
  bibtex: '@inproceedings{Niere_Hebrok_Somorovsky_Merget_2023, title={Poster: Circumventing
    the GFW with TLS Record Fragmentation}, DOI={<a href="https://doi.org/10.1145/3576915.3624372">10.1145/3576915.3624372</a>},
    booktitle={Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications
    Security}, publisher={ACM}, author={Niere, Niklas and Hebrok, Sven Niclas and
    Somorovsky, Juraj and Merget, Robert}, year={2023} }'
  chicago: 'Niere, Niklas, Sven Niclas Hebrok, Juraj Somorovsky, and Robert Merget.
    “Poster: Circumventing the GFW with TLS Record Fragmentation.” In <i>Proceedings
    of the 2023 ACM SIGSAC Conference on Computer and Communications Security</i>.
    ACM, 2023. <a href="https://doi.org/10.1145/3576915.3624372">https://doi.org/10.1145/3576915.3624372</a>.'
  ieee: 'N. Niere, S. N. Hebrok, J. Somorovsky, and R. Merget, “Poster: Circumventing
    the GFW with TLS Record Fragmentation,” 2023, doi: <a href="https://doi.org/10.1145/3576915.3624372">10.1145/3576915.3624372</a>.'
  mla: 'Niere, Niklas, et al. “Poster: Circumventing the GFW with TLS Record Fragmentation.”
    <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications
    Security</i>, ACM, 2023, doi:<a href="https://doi.org/10.1145/3576915.3624372">10.1145/3576915.3624372</a>.'
  short: 'N. Niere, S.N. Hebrok, J. Somorovsky, R. Merget, in: Proceedings of the
    2023 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2023.'
date_created: 2023-12-15T07:34:24Z
date_updated: 2024-04-02T12:17:18Z
department:
- _id: '632'
doi: 10.1145/3576915.3624372
language:
- iso: eng
publication: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications
  Security
publication_status: published
publisher: ACM
status: public
title: 'Poster: Circumventing the GFW with TLS Record Fragmentation'
type: conference
user_id: '83504'
year: '2023'
...
---
_id: '43060'
author:
- first_name: Sven Niclas
  full_name: Hebrok, Sven Niclas
  id: '55616'
  last_name: Hebrok
- first_name: Simon
  full_name: Nachtigall, Simon
  last_name: Nachtigall
- first_name: Marcel
  full_name: Maehren, Marcel
  last_name: Maehren
- first_name: Nurullah
  full_name: Erinola, Nurullah
  last_name: Erinola
- first_name: Robert
  full_name: Merget, Robert
  last_name: Merget
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Hebrok SN, Nachtigall S, Maehren M, et al. We Really Need to Talk About Session
    Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets.
    In: <i>32nd USENIX Security Symposium</i>. ; 2023.'
  apa: 'Hebrok, S. N., Nachtigall, S., Maehren, M., Erinola, N., Merget, R., Somorovsky,
    J., &#38; Schwenk, J. (2023). We Really Need to Talk About Session Tickets: A
    Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets. <i>32nd
    USENIX Security Symposium</i>.'
  bibtex: '@inproceedings{Hebrok_Nachtigall_Maehren_Erinola_Merget_Somorovsky_Schwenk_2023,
    title={We Really Need to Talk About Session Tickets: A Large-Scale Analysis of
    Cryptographic Dangers with TLS Session Tickets}, booktitle={32nd USENIX Security
    Symposium}, author={Hebrok, Sven Niclas and Nachtigall, Simon and Maehren, Marcel
    and Erinola, Nurullah and Merget, Robert and Somorovsky, Juraj and Schwenk, Jörg},
    year={2023} }'
  chicago: 'Hebrok, Sven Niclas, Simon Nachtigall, Marcel Maehren, Nurullah Erinola,
    Robert Merget, Juraj Somorovsky, and Jörg Schwenk. “We Really Need to Talk About
    Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session
    Tickets.” In <i>32nd USENIX Security Symposium</i>, 2023.'
  ieee: 'S. N. Hebrok <i>et al.</i>, “We Really Need to Talk About Session Tickets:
    A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets,” 2023.'
  mla: 'Hebrok, Sven Niclas, et al. “We Really Need to Talk About Session Tickets:
    A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets.” <i>32nd
    USENIX Security Symposium</i>, 2023.'
  short: 'S.N. Hebrok, S. Nachtigall, M. Maehren, N. Erinola, R. Merget, J. Somorovsky,
    J. Schwenk, in: 32nd USENIX Security Symposium, 2023.'
date_created: 2023-03-22T08:15:42Z
date_updated: 2023-06-21T06:49:56Z
department:
- _id: '632'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://www.usenix.org/conference/usenixsecurity23/presentation/hebrok
oa: '1'
publication: 32nd USENIX Security Symposium
status: public
title: 'We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic
  Dangers with TLS Session Tickets'
type: conference
user_id: '83504'
year: '2023'
...
---
_id: '46500'
abstract:
- lang: eng
  text: The security of Industrial Control Systems is relevant both for reliable production
    system operations and for high-quality throughput in terms of manufactured products.
    Security measures are designed, operated and maintained by different roles along
    product and production system lifecycles. Defense-in-Depth as a paradigm builds
    upon the assumption that breaches are unavoidable. The paper at hand provides
    an analysis of roles, corresponding Human Factors and their relevance for data
    theft and sabotage attacks. The resulting taxonomy is reflected by an example
    related to Additive Manufacturing. The results assist in both designing and redesigning
    Industrial Control System as part of an entire production system so that Defense-in-Depth
    with regard to Human Factors is built in by design.
author:
- first_name: Jens
  full_name: Pottebaum, Jens
  id: '405'
  last_name: Pottebaum
  orcid: http://orcid.org/0000-0001-8778-2989
- first_name: Jost
  full_name: Rossel, Jost
  id: '58331'
  last_name: Rossel
  orcid: 0000-0002-3182-4059
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: René
  full_name: Fahr, René
  id: '111'
  last_name: Fahr
- first_name: Patricia
  full_name: Arias Cabarcos, Patricia
  id: '92804'
  last_name: Arias Cabarcos
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Iris
  full_name: Gräßler, Iris
  id: '47565'
  last_name: Gräßler
  orcid: 0000-0001-5765-971X
citation:
  ama: 'Pottebaum J, Rossel J, Somorovsky J, et al. Re-Envisioning Industrial Control
    Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth.
    In: <i>2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&#38;PW)</i>.
    IEEE; 2023:379-385. doi:<a href="https://doi.org/10.1109/eurospw59978.2023.00048">10.1109/eurospw59978.2023.00048</a>'
  apa: Pottebaum, J., Rossel, J., Somorovsky, J., Acar, Y., Fahr, R., Arias Cabarcos,
    P., Bodden, E., &#38; Gräßler, I. (2023). Re-Envisioning Industrial Control Systems
    Security by Considering Human Factors as a Core Element of Defense-in-Depth. <i>2023
    IEEE European Symposium on Security and Privacy Workshops (EuroS&#38;PW)</i>,
    379–385. <a href="https://doi.org/10.1109/eurospw59978.2023.00048">https://doi.org/10.1109/eurospw59978.2023.00048</a>
  bibtex: '@inproceedings{Pottebaum_Rossel_Somorovsky_Acar_Fahr_Arias Cabarcos_Bodden_Gräßler_2023,
    title={Re-Envisioning Industrial Control Systems Security by Considering Human
    Factors as a Core Element of Defense-in-Depth}, DOI={<a href="https://doi.org/10.1109/eurospw59978.2023.00048">10.1109/eurospw59978.2023.00048</a>},
    booktitle={2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&#38;PW)},
    publisher={IEEE}, author={Pottebaum, Jens and Rossel, Jost and Somorovsky, Juraj
    and Acar, Yasemin and Fahr, René and Arias Cabarcos, Patricia and Bodden, Eric
    and Gräßler, Iris}, year={2023}, pages={379–385} }'
  chicago: Pottebaum, Jens, Jost Rossel, Juraj Somorovsky, Yasemin Acar, René Fahr,
    Patricia Arias Cabarcos, Eric Bodden, and Iris Gräßler. “Re-Envisioning Industrial
    Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth.”
    In <i>2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&#38;PW)</i>,
    379–85. IEEE, 2023. <a href="https://doi.org/10.1109/eurospw59978.2023.00048">https://doi.org/10.1109/eurospw59978.2023.00048</a>.
  ieee: 'J. Pottebaum <i>et al.</i>, “Re-Envisioning Industrial Control Systems Security
    by Considering Human Factors as a Core Element of Defense-in-Depth,” in <i>2023
    IEEE European Symposium on Security and Privacy Workshops (EuroS&#38;PW)</i>,
    Delft, Netherlands, 2023, pp. 379–385, doi: <a href="https://doi.org/10.1109/eurospw59978.2023.00048">10.1109/eurospw59978.2023.00048</a>.'
  mla: Pottebaum, Jens, et al. “Re-Envisioning Industrial Control Systems Security
    by Considering Human Factors as a Core Element of Defense-in-Depth.” <i>2023 IEEE
    European Symposium on Security and Privacy Workshops (EuroS&#38;PW)</i>, IEEE,
    2023, pp. 379–85, doi:<a href="https://doi.org/10.1109/eurospw59978.2023.00048">10.1109/eurospw59978.2023.00048</a>.
  short: 'J. Pottebaum, J. Rossel, J. Somorovsky, Y. Acar, R. Fahr, P. Arias Cabarcos,
    E. Bodden, I. Gräßler, in: 2023 IEEE European Symposium on Security and Privacy
    Workshops (EuroS&#38;PW), IEEE, 2023, pp. 379–385.'
conference:
  end_date: 2023-07-07
  location: Delft, Netherlands
  name: 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
  start_date: 2023-07-03
date_created: 2023-08-15T12:21:05Z
date_updated: 2025-07-16T11:06:47Z
ddc:
- '000'
department:
- _id: '34'
- _id: '152'
- _id: '76'
- _id: '632'
- _id: '858'
doi: 10.1109/eurospw59978.2023.00048
file:
- access_level: closed
  content_type: application/pdf
  creator: jrossel
  date_created: 2024-09-05T13:00:09Z
  date_updated: 2024-09-05T13:00:09Z
  file_id: '56077'
  file_name: Re_envisioning_Industrial_Control_Systems_security.pdf
  file_size: 197727
  relation: main_file
file_date_updated: 2024-09-05T13:00:09Z
has_accepted_license: '1'
keyword:
- Defense-in-Depth
- Human Factors
- Production Engineering
- Product Design
- Systems Engineering
language:
- iso: eng
main_file_link:
- url: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10190647
page: 379-385
publication: 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
publication_status: published
publisher: IEEE
quality_controlled: '1'
status: public
title: Re-Envisioning Industrial Control Systems Security by Considering Human Factors
  as a Core Element of Defense-in-Depth
type: conference
user_id: '58331'
year: '2023'
...
---
_id: '48012'
abstract:
- lang: eng
  text: '3D printing is a well-established technology with rapidly increasing usage
    scenarios both in the industry and consumer context. The growing popularity of
    3D printing has also attracted security researchers, who have analyzed possibilities
    for weakening 3D models or stealing intellectual property from 3D models. We extend
    these important aspects and provide the first comprehensive security analysis
    of 3D printing data formats. We performed our systematic study on the example
    of the 3D Manufacturing Format (3MF), which offers a large variety of features
    that could lead to critical attacks. Based on 3MF’s features, we systematized
    three attack goals: Data Exfiltration (dex), Denial of Service, and UI Spoofing
    (uis). We achieve these goals by exploiting the complexity of 3MF, which is based
    on the Open Packaging Conventions (OPC) format and uses XML to define 3D models.
    In total, our analysis led to 352 tests. To create and run these tests automatically,
    we implemented an open-source tool named 3MF Analyzer (tool), which helped us
    evaluate 20 applications.'
author:
- first_name: Jost
  full_name: Rossel, Jost
  id: '58331'
  last_name: Rossel
  orcid: 0000-0002-3182-4059
- first_name: Vladislav
  full_name: Mladenov, Vladislav
  last_name: Mladenov
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
citation:
  ama: 'Rossel J, Mladenov V, Somorovsky J. Security Analysis of the 3MF Data Format.
    In: <i>Proceedings of the 26th International Symposium on Research in Attacks,
    Intrusions and Defenses</i>. ACM; 2023. doi:<a href="https://doi.org/10.1145/3607199.3607216">10.1145/3607199.3607216</a>'
  apa: Rossel, J., Mladenov, V., &#38; Somorovsky, J. (2023). Security Analysis of
    the 3MF Data Format. <i>Proceedings of the 26th International Symposium on Research
    in Attacks, Intrusions and Defenses</i>. 26th International Symposium on Research
    in Attacks, Intrusions and Defenses, Hongkong. <a href="https://doi.org/10.1145/3607199.3607216">https://doi.org/10.1145/3607199.3607216</a>
  bibtex: '@inproceedings{Rossel_Mladenov_Somorovsky_2023, title={Security Analysis
    of the 3MF Data Format}, DOI={<a href="https://doi.org/10.1145/3607199.3607216">10.1145/3607199.3607216</a>},
    booktitle={Proceedings of the 26th International Symposium on Research in Attacks,
    Intrusions and Defenses}, publisher={ACM}, author={Rossel, Jost and Mladenov,
    Vladislav and Somorovsky, Juraj}, year={2023} }'
  chicago: Rossel, Jost, Vladislav Mladenov, and Juraj Somorovsky. “Security Analysis
    of the 3MF Data Format.” In <i>Proceedings of the 26th International Symposium
    on Research in Attacks, Intrusions and Defenses</i>. ACM, 2023. <a href="https://doi.org/10.1145/3607199.3607216">https://doi.org/10.1145/3607199.3607216</a>.
  ieee: 'J. Rossel, V. Mladenov, and J. Somorovsky, “Security Analysis of the 3MF
    Data Format,” presented at the 26th International Symposium on Research in Attacks,
    Intrusions and Defenses, Hongkong, 2023, doi: <a href="https://doi.org/10.1145/3607199.3607216">10.1145/3607199.3607216</a>.'
  mla: Rossel, Jost, et al. “Security Analysis of the 3MF Data Format.” <i>Proceedings
    of the 26th International Symposium on Research in Attacks, Intrusions and Defenses</i>,
    ACM, 2023, doi:<a href="https://doi.org/10.1145/3607199.3607216">10.1145/3607199.3607216</a>.
  short: 'J. Rossel, V. Mladenov, J. Somorovsky, in: Proceedings of the 26th International
    Symposium on Research in Attacks, Intrusions and Defenses, ACM, 2023.'
conference:
  end_date: 2023-10-18
  location: Hongkong
  name: 26th International Symposium on Research in Attacks, Intrusions and Defenses
  start_date: 2023-10-16
date_created: 2023-10-11T13:42:09Z
date_updated: 2025-07-16T11:06:49Z
ddc:
- '000'
department:
- _id: '632'
doi: 10.1145/3607199.3607216
file:
- access_level: open_access
  content_type: application/pdf
  creator: jrossel
  date_created: 2023-10-16T03:48:08Z
  date_updated: 2024-09-05T11:14:40Z
  file_id: '48065'
  file_name: Security_Analysis_of_the_3mf_Data_Format.pdf
  file_size: 1054999
  relation: main_file
file_date_updated: 2024-09-05T11:14:40Z
has_accepted_license: '1'
keyword:
- Data Format Security
- 3D Manufacturing Format
- 3D Printing
- Additive Manufacturing
language:
- iso: eng
main_file_link:
- url: https://dl.acm.org/doi/abs/10.1145/3607199.3607216
oa: '1'
publication: Proceedings of the 26th International Symposium on Research in Attacks,
  Intrusions and Defenses
publication_status: published
publisher: ACM
quality_controlled: '1'
status: public
title: Security Analysis of the 3MF Data Format
type: conference
user_id: '58331'
year: '2023'
...
---
_id: '32572'
author:
- first_name: Peter
  full_name: Mayer, Peter
  last_name: Mayer
- first_name: Damian
  full_name: Poddebniak, Damian
  last_name: Poddebniak
- first_name: Konstantin
  full_name: Fischer, Konstantin
  last_name: Fischer
- first_name: Marcus
  full_name: Brinkmann, Marcus
  last_name: Brinkmann
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
- first_name: Angela
  full_name: Sasse, Angela
  last_name: Sasse
- first_name: Sebastian
  full_name: Schinzel, Sebastian
  last_name: Schinzel
- first_name: Melanie
  full_name: Volkamer, Melanie
  last_name: Volkamer
citation:
  ama: 'Mayer P, Poddebniak D, Fischer K, et al. “I don’ know why I check this...”
    - Investigating Expert Users’ Strategies to Detect Email Signature Spoofing Attacks.
    In: <i>Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)</i>. USENIX
    Association; 2022:77–96.'
  apa: Mayer, P., Poddebniak, D., Fischer, K., Brinkmann, M., Somorovsky, J., Sasse,
    A., Schinzel, S., &#38; Volkamer, M. (2022). “I don’ know why I check this...”
    - Investigating Expert Users’ Strategies to Detect Email Signature Spoofing Attacks.
    <i>Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)</i>, 77–96.
  bibtex: '@inproceedings{Mayer_Poddebniak_Fischer_Brinkmann_Somorovsky_Sasse_Schinzel_Volkamer_2022,
    place={Boston, MA}, title={“I don’ know why I check this...” - Investigating Expert
    Users’ Strategies to Detect Email Signature Spoofing Attacks}, booktitle={Eighteenth
    Symposium on Usable Privacy and Security (SOUPS 2022)}, publisher={USENIX Association},
    author={Mayer, Peter and Poddebniak, Damian and Fischer, Konstantin and Brinkmann,
    Marcus and Somorovsky, Juraj and Sasse, Angela and Schinzel, Sebastian and Volkamer,
    Melanie}, year={2022}, pages={77–96} }'
  chicago: 'Mayer, Peter, Damian Poddebniak, Konstantin Fischer, Marcus Brinkmann,
    Juraj Somorovsky, Angela Sasse, Sebastian Schinzel, and Melanie Volkamer. “‘I
    Don’ Know Why I Check This...’ - Investigating Expert Users’ Strategies to Detect
    Email Signature Spoofing Attacks.” In <i>Eighteenth Symposium on Usable Privacy
    and Security (SOUPS 2022)</i>, 77–96. Boston, MA: USENIX Association, 2022.'
  ieee: P. Mayer <i>et al.</i>, “‘I don’ know why I check this...’ - Investigating
    Expert Users’ Strategies to Detect Email Signature Spoofing Attacks,” in <i>Eighteenth
    Symposium on Usable Privacy and Security (SOUPS 2022)</i>, 2022, pp. 77–96.
  mla: Mayer, Peter, et al. “‘I Don’ Know Why I Check This...’ - Investigating Expert
    Users’ Strategies to Detect Email Signature Spoofing Attacks.” <i>Eighteenth Symposium
    on Usable Privacy and Security (SOUPS 2022)</i>, USENIX Association, 2022, pp.
    77–96.
  short: 'P. Mayer, D. Poddebniak, K. Fischer, M. Brinkmann, J. Somorovsky, A. Sasse,
    S. Schinzel, M. Volkamer, in: Eighteenth Symposium on Usable Privacy and Security
    (SOUPS 2022), USENIX Association, Boston, MA, 2022, pp. 77–96.'
date_created: 2022-08-03T11:02:10Z
date_updated: 2024-04-02T12:19:28Z
department:
- _id: '632'
language:
- iso: eng
page: 77–96
place: Boston, MA
publication: Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)
publication_identifier:
  isbn:
  - 978-1-939133-30-4
publisher: USENIX Association
status: public
title: '"I don'' know why I check this..." - Investigating Expert Users'' Strategies
  to Detect Email Signature Spoofing Attacks'
type: conference
user_id: '83504'
year: '2022'
...
---
_id: '32573'
author:
- first_name: Marcel
  full_name: Maehren, Marcel
  last_name: Maehren
- first_name: Philipp
  full_name: Nieting, Philipp
  last_name: Nieting
- first_name: Sven Niclas
  full_name: Hebrok, Sven Niclas
  id: '55616'
  last_name: Hebrok
  orcid: 0009-0006-1172-1665
- first_name: Robert
  full_name: Merget, Robert
  last_name: Merget
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Maehren M, Nieting P, Hebrok SN, Merget R, Somorovsky J, Schwenk J. TLS-Anvil:
    Adapting Combinatorial Testing for TLS Libraries. In: <i>31st USENIX Security
    Symposium (USENIX Security 22)</i>. USENIX Association; 2022.'
  apa: 'Maehren, M., Nieting, P., Hebrok, S. N., Merget, R., Somorovsky, J., &#38;
    Schwenk, J. (2022). TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries.
    <i>31st USENIX Security Symposium (USENIX Security 22)</i>.'
  bibtex: '@inproceedings{Maehren_Nieting_Hebrok_Merget_Somorovsky_Schwenk_2022, place={Boston,
    MA}, title={TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries}, booktitle={31st
    USENIX Security Symposium (USENIX Security 22)}, publisher={USENIX Association},
    author={Maehren, Marcel and Nieting, Philipp and Hebrok, Sven Niclas and Merget,
    Robert and Somorovsky, Juraj and Schwenk, Jörg}, year={2022} }'
  chicago: 'Maehren, Marcel, Philipp Nieting, Sven Niclas Hebrok, Robert Merget, Juraj
    Somorovsky, and Jörg Schwenk. “TLS-Anvil: Adapting Combinatorial Testing for TLS
    Libraries.” In <i>31st USENIX Security Symposium (USENIX Security 22)</i>. Boston,
    MA: USENIX Association, 2022.'
  ieee: 'M. Maehren, P. Nieting, S. N. Hebrok, R. Merget, J. Somorovsky, and J. Schwenk,
    “TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries,” 2022.'
  mla: 'Maehren, Marcel, et al. “TLS-Anvil: Adapting Combinatorial Testing for TLS
    Libraries.” <i>31st USENIX Security Symposium (USENIX Security 22)</i>, USENIX
    Association, 2022.'
  short: 'M. Maehren, P. Nieting, S.N. Hebrok, R. Merget, J. Somorovsky, J. Schwenk,
    in: 31st USENIX Security Symposium (USENIX Security 22), USENIX Association, Boston,
    MA, 2022.'
date_created: 2022-08-03T11:03:30Z
date_updated: 2024-04-02T12:19:45Z
department:
- _id: '632'
language:
- iso: eng
place: Boston, MA
publication: 31st USENIX Security Symposium (USENIX Security 22)
publisher: USENIX Association
status: public
title: 'TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries'
type: conference
user_id: '83504'
year: '2022'
...
---
_id: '54435'
abstract:
- lang: eng
  text: Web browsers are among the most important but also complex software solutions
    to access the web. It is therefore not surprising that web browsers are an attractive
    target for attackers. Especially in the last decade, security researchers and
    browser vendors have developed sandboxing mechanisms like security-relevant HTTP
    headers to tackle the problem of getting a more secure browser. Although the security
    community is aware of the importance of security-relevant HTTP headers, legacy
    applications and individual requests from different parties have led to possible
    insecure configurations of these headers. Even if specific security headers are
    configured correctly, conflicts in their functionalities may lead to unforeseen
    browser behaviors and vulnerabilities. Recently, the first work which analyzed
    duplicated headers and conflicts in headers was published by Calzavara et al.
    at USENIX Security [1]. The authors focused on inconsistent protections by using
    both, the HTTP header X-Frame-Options and the framing protection of the Content-Security-Policy.
    We extend their work by analyzing browser behaviors when parsing duplicated headers,
    conflicting directives, and values that do not conform to the defined ABNF metalanguage
    specification. We created an open-source testbed running over 19,800 test cases,
    at which nearly 300 test cases are executed in the set of 66 different browsers.
    Our work shows that browsers conform to the specification and behave securely.
    However, all tested browsers behave differently when it comes, for example, to
    parsing the Strict-Transport-Security header. Moreover, Chrome, Safari, and Firefox
    behave differently if the header contains a character, which is not allowed by
    the defined ABNF. This results in the protection mechanism being fully enforced,
    partially enforced, or not enforced and thus completely bypassable.
author:
- first_name: Hendrik
  full_name: Siewert, Hendrik
  last_name: Siewert
- first_name: Martin
  full_name: Kretschmer, Martin
  last_name: Kretschmer
- first_name: Marcus
  full_name: Niemietz, Marcus
  last_name: Niemietz
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
citation:
  ama: 'Siewert H, Kretschmer M, Niemietz M, Somorovsky J. On the Security of Parsing
    Security-Relevant HTTP Headers in Modern Browsers. In: <i>2022 IEEE Security and
    Privacy Workshops (SPW)</i>. IEEE; 2022. doi:<a href="https://doi.org/10.1109/spw54247.2022.9833880">10.1109/spw54247.2022.9833880</a>'
  apa: Siewert, H., Kretschmer, M., Niemietz, M., &#38; Somorovsky, J. (2022). On
    the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers. <i>2022
    IEEE Security and Privacy Workshops (SPW)</i>. <a href="https://doi.org/10.1109/spw54247.2022.9833880">https://doi.org/10.1109/spw54247.2022.9833880</a>
  bibtex: '@inproceedings{Siewert_Kretschmer_Niemietz_Somorovsky_2022, title={On the
    Security of Parsing Security-Relevant HTTP Headers in Modern Browsers}, DOI={<a
    href="https://doi.org/10.1109/spw54247.2022.9833880">10.1109/spw54247.2022.9833880</a>},
    booktitle={2022 IEEE Security and Privacy Workshops (SPW)}, publisher={IEEE},
    author={Siewert, Hendrik and Kretschmer, Martin and Niemietz, Marcus and Somorovsky,
    Juraj}, year={2022} }'
  chicago: Siewert, Hendrik, Martin Kretschmer, Marcus Niemietz, and Juraj Somorovsky.
    “On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers.”
    In <i>2022 IEEE Security and Privacy Workshops (SPW)</i>. IEEE, 2022. <a href="https://doi.org/10.1109/spw54247.2022.9833880">https://doi.org/10.1109/spw54247.2022.9833880</a>.
  ieee: 'H. Siewert, M. Kretschmer, M. Niemietz, and J. Somorovsky, “On the Security
    of Parsing Security-Relevant HTTP Headers in Modern Browsers,” 2022, doi: <a href="https://doi.org/10.1109/spw54247.2022.9833880">10.1109/spw54247.2022.9833880</a>.'
  mla: Siewert, Hendrik, et al. “On the Security of Parsing Security-Relevant HTTP
    Headers in Modern Browsers.” <i>2022 IEEE Security and Privacy Workshops (SPW)</i>,
    IEEE, 2022, doi:<a href="https://doi.org/10.1109/spw54247.2022.9833880">10.1109/spw54247.2022.9833880</a>.
  short: 'H. Siewert, M. Kretschmer, M. Niemietz, J. Somorovsky, in: 2022 IEEE Security
    and Privacy Workshops (SPW), IEEE, 2022.'
date_created: 2024-05-23T10:49:19Z
date_updated: 2024-05-23T11:01:43Z
department:
- _id: '632'
doi: 10.1109/spw54247.2022.9833880
language:
- iso: eng
publication: 2022 IEEE Security and Privacy Workshops (SPW)
publication_status: published
publisher: IEEE
status: public
title: On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers
type: conference
user_id: '74619'
year: '2022'
...
---
_id: '25331'
author:
- first_name: Marcus
  full_name: Brinkmann, Marcus
  last_name: Brinkmann
- first_name: Christian
  full_name: Dresen, Christian
  last_name: Dresen
- first_name: Robert
  full_name: Merget, Robert
  last_name: Merget
- first_name: Damian
  full_name: Poddebniak, Damian
  last_name: Poddebniak
- first_name: Jens
  full_name: Müller, Jens
  last_name: Müller
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
- first_name: Sebastian
  full_name: Schinzel, Sebastian
  last_name: Schinzel
citation:
  ama: 'Brinkmann M, Dresen C, Merget R, et al. ALPACA: Application Layer Protocol
    Confusion - Analyzing and Mitigating Cracks in TLS Authentication. In: <i>30th
    {USENIX} Security Symposium ({USENIX} Security 21)</i>. {USENIX} Association;
    2021:4293-4310.'
  apa: 'Brinkmann, M., Dresen, C., Merget, R., Poddebniak, D., Müller, J., Somorovsky,
    J., Schwenk, J., &#38; Schinzel, S. (2021). ALPACA: Application Layer Protocol
    Confusion - Analyzing and Mitigating Cracks in TLS Authentication. <i>30th {USENIX}
    Security Symposium ({USENIX} Security 21)</i>, 4293–4310.'
  bibtex: '@inproceedings{Brinkmann_Dresen_Merget_Poddebniak_Müller_Somorovsky_Schwenk_Schinzel_2021,
    title={ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating
    Cracks in TLS Authentication}, booktitle={30th {USENIX} Security Symposium ({USENIX}
    Security 21)}, publisher={{USENIX} Association}, author={Brinkmann, Marcus and
    Dresen, Christian and Merget, Robert and Poddebniak, Damian and Müller, Jens and
    Somorovsky, Juraj and Schwenk, Jörg and Schinzel, Sebastian}, year={2021}, pages={4293–4310}
    }'
  chicago: 'Brinkmann, Marcus, Christian Dresen, Robert Merget, Damian Poddebniak,
    Jens Müller, Juraj Somorovsky, Jörg Schwenk, and Sebastian Schinzel. “ALPACA:
    Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS
    Authentication.” In <i>30th {USENIX} Security Symposium ({USENIX} Security 21)</i>,
    4293–4310. {USENIX} Association, 2021.'
  ieee: 'M. Brinkmann <i>et al.</i>, “ALPACA: Application Layer Protocol Confusion
    - Analyzing and Mitigating Cracks in TLS Authentication,” in <i>30th {USENIX}
    Security Symposium ({USENIX} Security 21)</i>, 2021, pp. 4293–4310.'
  mla: 'Brinkmann, Marcus, et al. “ALPACA: Application Layer Protocol Confusion -
    Analyzing and Mitigating Cracks in TLS Authentication.” <i>30th {USENIX} Security
    Symposium ({USENIX} Security 21)</i>, {USENIX} Association, 2021, pp. 4293–310.'
  short: 'M. Brinkmann, C. Dresen, R. Merget, D. Poddebniak, J. Müller, J. Somorovsky,
    J. Schwenk, S. Schinzel, in: 30th {USENIX} Security Symposium ({USENIX} Security
    21), {USENIX} Association, 2021, pp. 4293–4310.'
date_created: 2021-10-04T18:53:47Z
date_updated: 2022-01-06T06:57:01Z
department:
- _id: '632'
language:
- iso: eng
page: 4293-4310
publication: 30th {USENIX} Security Symposium ({USENIX} Security 21)
publication_identifier:
  isbn:
  - 978-1-939133-24-3
publisher: '{USENIX} Association'
status: public
title: 'ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks
  in TLS Authentication'
type: conference
user_id: '83504'
year: '2021'
...
---
_id: '25332'
author:
- first_name: Robert
  full_name: Merget, Robert
  last_name: Merget
- first_name: Marcus
  full_name: Brinkmann, Marcus
  last_name: Brinkmann
- first_name: Nimrod
  full_name: Aviram, Nimrod
  last_name: Aviram
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
- first_name: Johannes
  full_name: Mittmann, Johannes
  last_name: Mittmann
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Merget R, Brinkmann M, Aviram N, Somorovsky J, Mittmann J, Schwenk J. Raccoon
    Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E). In:
    <i>30th {USENIX} Security Symposium ({USENIX} Security 21)</i>. {USENIX} Association;
    2021:213-230.'
  apa: 'Merget, R., Brinkmann, M., Aviram, N., Somorovsky, J., Mittmann, J., &#38;
    Schwenk, J. (2021). Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles
    in TLS-DH(E). <i>30th {USENIX} Security Symposium ({USENIX} Security 21)</i>,
    213–230.'
  bibtex: '@inproceedings{Merget_Brinkmann_Aviram_Somorovsky_Mittmann_Schwenk_2021,
    title={Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in
    TLS-DH(E)}, booktitle={30th {USENIX} Security Symposium ({USENIX} Security 21)},
    publisher={{USENIX} Association}, author={Merget, Robert and Brinkmann, Marcus
    and Aviram, Nimrod and Somorovsky, Juraj and Mittmann, Johannes and Schwenk, Jörg},
    year={2021}, pages={213–230} }'
  chicago: 'Merget, Robert, Marcus Brinkmann, Nimrod Aviram, Juraj Somorovsky, Johannes
    Mittmann, and Jörg Schwenk. “Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles
    in TLS-DH(E).” In <i>30th {USENIX} Security Symposium ({USENIX} Security 21)</i>,
    213–30. {USENIX} Association, 2021.'
  ieee: 'R. Merget, M. Brinkmann, N. Aviram, J. Somorovsky, J. Mittmann, and J. Schwenk,
    “Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E),”
    in <i>30th {USENIX} Security Symposium ({USENIX} Security 21)</i>, 2021, pp. 213–230.'
  mla: 'Merget, Robert, et al. “Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles
    in TLS-DH(E).” <i>30th {USENIX} Security Symposium ({USENIX} Security 21)</i>,
    {USENIX} Association, 2021, pp. 213–30.'
  short: 'R. Merget, M. Brinkmann, N. Aviram, J. Somorovsky, J. Mittmann, J. Schwenk,
    in: 30th {USENIX} Security Symposium ({USENIX} Security 21), {USENIX} Association,
    2021, pp. 213–230.'
date_created: 2021-10-04T18:55:36Z
date_updated: 2022-01-06T06:57:01Z
department:
- _id: '632'
language:
- iso: eng
page: 213-230
publication: 30th {USENIX} Security Symposium ({USENIX} Security 21)
publication_identifier:
  isbn:
  - 978-1-939133-24-3
publisher: '{USENIX} Association'
status: public
title: 'Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)'
type: conference
user_id: '83504'
year: '2021'
...
