44 Publications

Mark all

[44]
2023 | Conference Paper | LibreCat-ID: 43060 | OA
Hebrok, S. N., Nachtigall, S., Maehren, M., Erinola, N., Merget, R., Somorovsky, J., & Schwenk, J. (2023). We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets. 32nd USENIX Security Symposium.
LibreCat | Download (ext.)
 
[43]
2023 | Conference Paper | LibreCat-ID: 48012
Rossel, J., Mladenov, V., & Somorovsky, J. (2023). Security Analysis of the 3MF Data Format. Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses. 26th International Symposium on Research in Attacks, Intrusions and Defenses, Hongkong. https://doi.org/10.1145/3607199.3607216
LibreCat | Files available | DOI | Download (ext.)
 
[42]
2023 | Conference Paper | LibreCat-ID: 46500
Pottebaum, J., Rossel, J., Somorovsky, J., Acar, Y., Fahr, R., Arias Cabarcos, P., Bodden, E., & Gräßler, I. (2023). Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth. 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 379–385. https://doi.org/10.1109/eurospw59978.2023.00048
LibreCat | DOI | Download (ext.)
 
[41]
2023 | Conference Paper | LibreCat-ID: 49654
Niere, N., Hebrok, S. N., Somorovsky, J., & Merget, R. (2023). Poster: Circumventing the GFW with TLS Record Fragmentation. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. https://doi.org/10.1145/3576915.3624372
LibreCat | DOI
 
[40]
2022 | Conference Paper | LibreCat-ID: 32572
Mayer, P., Poddebniak, D., Fischer, K., Brinkmann, M., Somorovsky, J., Sasse, A., Schinzel, S., & Volkamer, M. (2022). “I don’ know why I check this...” - Investigating Expert Users’ Strategies to Detect Email Signature Spoofing Attacks. Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 77–96.
LibreCat
 
[39]
2022 | Conference Paper | LibreCat-ID: 32573
Maehren, M., Nieting, P., Hebrok, S. N., Merget, R., Somorovsky, J., & Schwenk, J. (2022). TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries. 31st USENIX Security Symposium (USENIX Security 22).
LibreCat
 
[38]
2021 | Conference Paper | LibreCat-ID: 25331
Brinkmann, M., Dresen, C., Merget, R., Poddebniak, D., Müller, J., Somorovsky, J., Schwenk, J., & Schinzel, S. (2021). ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication. 30th {USENIX} Security Symposium ({USENIX} Security 21), 4293–4310.
LibreCat
 
[37]
2021 | Conference Paper | LibreCat-ID: 25332
Merget, R., Brinkmann, M., Aviram, N., Somorovsky, J., Mittmann, J., & Schwenk, J. (2021). Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E). 30th {USENIX} Security Symposium ({USENIX} Security 21), 213–230.
LibreCat
 
[36]
2021 | Journal Article | LibreCat-ID: 24143
Drees, J. P., Gupta, P., Hüllermeier, E., Jager, T., Konze, A., Priesterjahn, C., Ramaswamy, A., & Somorovsky, J. (2021). Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs! 14th ACM Workshop on Artificial Intelligence and Security.
LibreCat
 
[35]
2020 | Conference Paper | LibreCat-ID: 25334
Fiterau-Brostean, P., Jonsson, B., Merget, R., de Ruiter, J., Sagonas, K., & Somorovsky, J. (2020). Analysis of DTLS Implementations Using Protocol State Fuzzing. 29th {USENIX} Security Symposium ({USENIX} Security 20), 2523–2540.
LibreCat
 
[34]
2020 | Conference Paper | LibreCat-ID: 25336
Schwenk, J., Brinkmann, M., Poddebniak, D., Müller, J., Somorovsky, J., & Schinzel, S. (2020). Mitigation of Attacks on Email End-to-End Encryption. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 1647–1664. https://doi.org/10.1145/3372297.3417878
LibreCat | DOI
 
[33]
2019 | Conference Paper | LibreCat-ID: 15908 | OA
Müller, J., Brinkmann, M., Poddebniak, D., Böck, H., Schinzel, S., Somorovsky, J., & Schwenk, J. (2019). “Johnny, you are fired!” -- Spoofing OpenPGP and S/MIME Signatures in Emails. In 28th {USENIX} Security Symposium ({USENIX} Security 19) (pp. 1011–1028). Santa Clara, CA: {USENIX} Association.
LibreCat | Download (ext.)
 
[32]
2019 | Conference Paper | LibreCat-ID: 15909 | OA
Merget, R., Somorovsky, J., Aviram, N., Young, C., Fliegenschmidt, J., Schwenk, J., & Shavitt, Y. (2019). Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities. In 28th {USENIX} Security Symposium ({USENIX} Security 19) (pp. 1029–1046). Santa Clara, CA: {USENIX} Association.
LibreCat | Download (ext.)
 
[31]
2019 | Conference Paper | LibreCat-ID: 15910
Engelbertz, N., Mladenov, V., Somorovsky, J., Herring, D., Erinola, N., & Schwenk, J. (2019). Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS). In H. Roßnagel, S. Wagner, & D. Hühnlein (Eds.), Open Identity Summit 2019 (pp. 95–106). Gesellschaft für Informatik, Bonn.
LibreCat
 
[30]
2018 | Conference Paper | LibreCat-ID: 15892
Albrecht, M. R., Massimo, J., Paterson, K. G., & Somorovsky, J. (2018). Prime and Prejudice: Primality Testing Under Adversarial Conditions. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. https://doi.org/10.1145/3243734.3243787
LibreCat | DOI | Download (ext.)
 
[29]
2018 | Conference Paper | LibreCat-ID: 15893
Poddebniak, D., Somorovsky, J., Schinzel, S., Lochter, M., & Rosler, P. (2018). Attacking Deterministic Signature Schemes Using Fault Attacks. In 2018 IEEE European Symposium on Security and Privacy (EuroS&P). https://doi.org/10.1109/eurosp.2018.00031
LibreCat | DOI
 
[28]
2018 | Conference Paper | LibreCat-ID: 15894
Detering, D., Somorovsky, J., Mainka, C., Mladenov, V., & Schwenk, J. (2018). On The (In-)Security Of JavaScript Object Signing And Encryption. In Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium on - ROOTS. https://doi.org/10.1145/3150376.3150379
LibreCat | DOI
 
[27]
2018 | Conference Paper | LibreCat-ID: 15905 | OA
Poddebniak, D., Dresen, C., Müller, J., Ising, F., Schinzel, S., Friedberger, S., … Schwenk, J. (2018). Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels. In 27th {USENIX} Security Symposium ({USENIX} Security 18) (pp. 549–566). Baltimore, MD: {USENIX} Association.
LibreCat | Download (ext.)
 
[26]
2018 | Conference Paper | LibreCat-ID: 15906 | OA
Böck, H., Somorovsky, J., & Young, C. (2018). Return Of Bleichenbacher\textquoterights Oracle Threat (ROBOT). In 27th {USENIX} Security Symposium ({USENIX} Security 18) (pp. 817–849). Baltimore, MD: {USENIX} Association.
LibreCat | Download (ext.)
 
[25]
2018 | Conference Paper | LibreCat-ID: 15914 | OA
Engelbertz, N., Erinola, N., Herring, D., Somorovsky, J., Mladenov, V., & Schwenk, J. (2018). Security Analysis of eIDAS -- The Cross-Country Authentication Scheme in Europe. In 12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18). Baltimore, MD: {USENIX} Association.
LibreCat | Download (ext.)
 
[24]
2017 | Conference Paper | LibreCat-ID: 15895
Muller, J., Mladenov, V., Somorovsky, J., & Schwenk, J. (2017). SoK: Exploiting Network Printers. In 2017 IEEE Symposium on Security and Privacy (SP). https://doi.org/10.1109/sp.2017.47
LibreCat | DOI | Download (ext.)
 
[23]
2017 | Conference Paper | LibreCat-ID: 15912 | OA
Grothe, M., Niemann, T., Somorovsky, J., & Schwenk, J. (2017). Breaking and Fixing Gridcoin. In 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17). Vancouver, BC: {USENIX} Association.
LibreCat | Download (ext.)
 
[22]
2016 | Conference Paper | LibreCat-ID: 15896
Somorovsky, J. (2016). Systematic Fuzzing and Testing of TLS Libraries. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS’16. https://doi.org/10.1145/2976749.2978411
LibreCat | DOI | Download (ext.)
 
[21]
2016 | Conference Paper | LibreCat-ID: 15907 | OA
Aviram, N., Schinzel, S., Somorovsky, J., Heninger, N., Dankel, M., Steube, J., … Shavitt, Y. (2016). DROWN: Breaking TLS Using SSLv2. In 25th {USENIX} Security Symposium ({USENIX} Security 16) (pp. 689–706). Austin, TX: {USENIX} Association.
LibreCat | Download (ext.)
 
[20]
2016 | Conference Paper | LibreCat-ID: 15913 | OA
Böck, H., Zauner, A., Devlin, S., Somorovsky, J., & Jovanovic, P. (2016). Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. In 10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16). Austin, TX: {USENIX} Association.
LibreCat | Download (ext.)
 
[19]
2015 | Book Chapter | LibreCat-ID: 15897
Altmeier, C., Mainka, C., Somorovsky, J., & Schwenk, J. (2015). AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services. In Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015. Cham. https://doi.org/10.1007/978-3-319-29883-2_5
LibreCat | DOI
 
[18]
2015 | Conference Paper | LibreCat-ID: 15898
Jager, T., Schwenk, J., & Somorovsky, J. (2015). On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS ’15. https://doi.org/10.1145/2810103.2813657
LibreCat | DOI | Download (ext.)
 
[17]
2015 | Book Chapter | LibreCat-ID: 15899
Jager, T., Schwenk, J., & Somorovsky, J. (2015). Practical Invalid Curve Attacks on TLS-ECDH. In Computer Security -- ESORICS 2015. Cham. https://doi.org/10.1007/978-3-319-24174-6_21
LibreCat | DOI | Download (ext.)
 
[16]
2015 | Conference Paper | LibreCat-ID: 15900
Niemietz, M., Somorovsky, J., Mainka, C., & Schwenk, J. (2015). Not so Smart: On Smart TV Apps. In International Workshop on Secure Internet of Things (SIoT). https://doi.org/10.1109/siot.2015.13
LibreCat | DOI
 
[15]
2015 | Conference Paper | LibreCat-ID: 15911 | OA
Kupser, D., Mainka, C., Schwenk, J., & Somorovsky, J. (2015). How to Break XML Encryption -- Automatically. In 9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15). Washington, D.C.: {USENIX} Association.
LibreCat | Download (ext.)
 
[14]
2014 | Conference Paper | LibreCat-ID: 15904 | OA
Meyer, C., Somorovsky, J., Weiss, E., Schwenk, J., Schinzel, S., & Tews, E. (2014). Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks. In 23rd {USENIX} Security Symposium ({USENIX} Security 14) (pp. 733–748). San Diego, CA: {USENIX} Association.
LibreCat | Download (ext.)
 
[13]
2013 | Dissertation | LibreCat-ID: 15901
Somorovsky, J. (2013). On the insecurity of XML Security. https://doi.org/10.1515/itit-2014-1045
LibreCat | DOI
 
[12]
2013 | Conference Paper | LibreCat-ID: 15902
Falkenberg, A., Mainka, C., Somorovsky, J., & Schwenk, J. (2013). A New Approach towards DoS Penetration Testing on Web Services. In 2013 IEEE 20th International Conference on Web Services. https://doi.org/10.1109/icws.2013.72
LibreCat | DOI
 
[11]
2013 | Journal Article | LibreCat-ID: 15903
Mainka, C., Mladenov, V., Somorovsky, J., & Schwenk, J. (2013). Penetration test tool for XML-based web services. CEUR Workshop Proceedings, 965, 31–35.
LibreCat
 
[10]
2013 | Conference Paper | LibreCat-ID: 15918 | OA
Jager, T., Paterson, K. G., & Somorovsky, J. (2013). One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. In 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013.
LibreCat | Download (ext.)
 
[9]
2012 | Conference Paper | LibreCat-ID: 15888 | OA
Somorovsky, J., Mayer, A., Schwenk, J., Kampmann, M., & Jensen, M. (2012). On Breaking SAML: Be Whoever You Want to Be. In Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security 12) (pp. 397–412). Bellevue, WA: {USENIX}.
LibreCat | Download (ext.)
 
[8]
2012 | Conference Paper | LibreCat-ID: 15890
Somorovsky, J., & Schwenk, J. (2012). Technical Analysis of Countermeasures against Attack on XML Encryption -- or -- Just Another Motivation for Authenticated Encryption. In 2012 IEEE Eighth World Congress on Services. https://doi.org/10.1109/services.2012.6
LibreCat | DOI
 
[7]
2012 | Book Chapter | LibreCat-ID: 15891
Jager, T., Schinzel, S., & Somorovsky, J. (2012). Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. In Computer Security – ESORICS 2012. Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33167-1_43
LibreCat | DOI
 
[6]
2012 | Conference Paper | LibreCat-ID: 15917
Somorovsky, J., Meyer, C., Tran, T., Sbeiti, M., Schwenk, J., & Wietfeld, C. (2012). Sec2: Secure Mobile Solution for Distributed Public Cloud Storages.
LibreCat
 
[5]
2011 | Conference Paper | LibreCat-ID: 15885
Somorovsky, J., Heiderich, M., Jensen, M., Schwenk, J., Gruschka, N., & Lo Iacono, L. (2011). All your clouds are belong to us: security analysis of cloud management interfaces. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW ’11. https://doi.org/10.1145/2046660.2046664
LibreCat | DOI | Download (ext.)
 
[4]
2011 | Conference Paper | LibreCat-ID: 15887
Jensen, M., Meyer, C., Somorovsky, J., & Schwenk, J. (2011). On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks. In 2011 1st International Workshop on Securing Services on the Cloud (IWSSC). https://doi.org/10.1109/iwsscloud.2011.6049019
LibreCat | DOI
 
[3]
2011 | Conference Paper | LibreCat-ID: 15915
Jager, T., & Somorovsky, J. (2011). How to break XML encryption. In Proceedings of the 18th ACM conference on Computer and communications security - CCS ’11. https://doi.org/10.1145/2046707.2046756
LibreCat | DOI | Download (ext.)
 
[2]
2011 | Conference Paper | LibreCat-ID: 15916
Meyer, C., Somorovsky, J., Driessen, B., Schwenk, J., Tran, T., & Wietfeld, C. (2011). Sec2: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage.
LibreCat
 
[1]
2010 | Conference Paper | LibreCat-ID: 15889
Somorovsky, J., Jensen, M., & Schwenk, J. (2010). Streaming-Based Verification of XML Signatures in SOAP Messages. In 2010 6th World Congress on Services. https://doi.org/10.1109/services.2010.57
LibreCat | DOI
 

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed

44 Publications

Mark all

[44]
2023 | Conference Paper | LibreCat-ID: 43060 | OA
Hebrok, S. N., Nachtigall, S., Maehren, M., Erinola, N., Merget, R., Somorovsky, J., & Schwenk, J. (2023). We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets. 32nd USENIX Security Symposium.
LibreCat | Download (ext.)
 
[43]
2023 | Conference Paper | LibreCat-ID: 48012
Rossel, J., Mladenov, V., & Somorovsky, J. (2023). Security Analysis of the 3MF Data Format. Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses. 26th International Symposium on Research in Attacks, Intrusions and Defenses, Hongkong. https://doi.org/10.1145/3607199.3607216
LibreCat | Files available | DOI | Download (ext.)
 
[42]
2023 | Conference Paper | LibreCat-ID: 46500
Pottebaum, J., Rossel, J., Somorovsky, J., Acar, Y., Fahr, R., Arias Cabarcos, P., Bodden, E., & Gräßler, I. (2023). Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth. 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 379–385. https://doi.org/10.1109/eurospw59978.2023.00048
LibreCat | DOI | Download (ext.)
 
[41]
2023 | Conference Paper | LibreCat-ID: 49654
Niere, N., Hebrok, S. N., Somorovsky, J., & Merget, R. (2023). Poster: Circumventing the GFW with TLS Record Fragmentation. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. https://doi.org/10.1145/3576915.3624372
LibreCat | DOI
 
[40]
2022 | Conference Paper | LibreCat-ID: 32572
Mayer, P., Poddebniak, D., Fischer, K., Brinkmann, M., Somorovsky, J., Sasse, A., Schinzel, S., & Volkamer, M. (2022). “I don’ know why I check this...” - Investigating Expert Users’ Strategies to Detect Email Signature Spoofing Attacks. Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 77–96.
LibreCat
 
[39]
2022 | Conference Paper | LibreCat-ID: 32573
Maehren, M., Nieting, P., Hebrok, S. N., Merget, R., Somorovsky, J., & Schwenk, J. (2022). TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries. 31st USENIX Security Symposium (USENIX Security 22).
LibreCat
 
[38]
2021 | Conference Paper | LibreCat-ID: 25331
Brinkmann, M., Dresen, C., Merget, R., Poddebniak, D., Müller, J., Somorovsky, J., Schwenk, J., & Schinzel, S. (2021). ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication. 30th {USENIX} Security Symposium ({USENIX} Security 21), 4293–4310.
LibreCat
 
[37]
2021 | Conference Paper | LibreCat-ID: 25332
Merget, R., Brinkmann, M., Aviram, N., Somorovsky, J., Mittmann, J., & Schwenk, J. (2021). Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E). 30th {USENIX} Security Symposium ({USENIX} Security 21), 213–230.
LibreCat
 
[36]
2021 | Journal Article | LibreCat-ID: 24143
Drees, J. P., Gupta, P., Hüllermeier, E., Jager, T., Konze, A., Priesterjahn, C., Ramaswamy, A., & Somorovsky, J. (2021). Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs! 14th ACM Workshop on Artificial Intelligence and Security.
LibreCat
 
[35]
2020 | Conference Paper | LibreCat-ID: 25334
Fiterau-Brostean, P., Jonsson, B., Merget, R., de Ruiter, J., Sagonas, K., & Somorovsky, J. (2020). Analysis of DTLS Implementations Using Protocol State Fuzzing. 29th {USENIX} Security Symposium ({USENIX} Security 20), 2523–2540.
LibreCat
 
[34]
2020 | Conference Paper | LibreCat-ID: 25336
Schwenk, J., Brinkmann, M., Poddebniak, D., Müller, J., Somorovsky, J., & Schinzel, S. (2020). Mitigation of Attacks on Email End-to-End Encryption. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 1647–1664. https://doi.org/10.1145/3372297.3417878
LibreCat | DOI
 
[33]
2019 | Conference Paper | LibreCat-ID: 15908 | OA
Müller, J., Brinkmann, M., Poddebniak, D., Böck, H., Schinzel, S., Somorovsky, J., & Schwenk, J. (2019). “Johnny, you are fired!” -- Spoofing OpenPGP and S/MIME Signatures in Emails. In 28th {USENIX} Security Symposium ({USENIX} Security 19) (pp. 1011–1028). Santa Clara, CA: {USENIX} Association.
LibreCat | Download (ext.)
 
[32]
2019 | Conference Paper | LibreCat-ID: 15909 | OA
Merget, R., Somorovsky, J., Aviram, N., Young, C., Fliegenschmidt, J., Schwenk, J., & Shavitt, Y. (2019). Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities. In 28th {USENIX} Security Symposium ({USENIX} Security 19) (pp. 1029–1046). Santa Clara, CA: {USENIX} Association.
LibreCat | Download (ext.)
 
[31]
2019 | Conference Paper | LibreCat-ID: 15910
Engelbertz, N., Mladenov, V., Somorovsky, J., Herring, D., Erinola, N., & Schwenk, J. (2019). Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS). In H. Roßnagel, S. Wagner, & D. Hühnlein (Eds.), Open Identity Summit 2019 (pp. 95–106). Gesellschaft für Informatik, Bonn.
LibreCat
 
[30]
2018 | Conference Paper | LibreCat-ID: 15892
Albrecht, M. R., Massimo, J., Paterson, K. G., & Somorovsky, J. (2018). Prime and Prejudice: Primality Testing Under Adversarial Conditions. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. https://doi.org/10.1145/3243734.3243787
LibreCat | DOI | Download (ext.)
 
[29]
2018 | Conference Paper | LibreCat-ID: 15893
Poddebniak, D., Somorovsky, J., Schinzel, S., Lochter, M., & Rosler, P. (2018). Attacking Deterministic Signature Schemes Using Fault Attacks. In 2018 IEEE European Symposium on Security and Privacy (EuroS&P). https://doi.org/10.1109/eurosp.2018.00031
LibreCat | DOI
 
[28]
2018 | Conference Paper | LibreCat-ID: 15894
Detering, D., Somorovsky, J., Mainka, C., Mladenov, V., & Schwenk, J. (2018). On The (In-)Security Of JavaScript Object Signing And Encryption. In Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium on - ROOTS. https://doi.org/10.1145/3150376.3150379
LibreCat | DOI
 
[27]
2018 | Conference Paper | LibreCat-ID: 15905 | OA
Poddebniak, D., Dresen, C., Müller, J., Ising, F., Schinzel, S., Friedberger, S., … Schwenk, J. (2018). Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels. In 27th {USENIX} Security Symposium ({USENIX} Security 18) (pp. 549–566). Baltimore, MD: {USENIX} Association.
LibreCat | Download (ext.)
 
[26]
2018 | Conference Paper | LibreCat-ID: 15906 | OA
Böck, H., Somorovsky, J., & Young, C. (2018). Return Of Bleichenbacher\textquoterights Oracle Threat (ROBOT). In 27th {USENIX} Security Symposium ({USENIX} Security 18) (pp. 817–849). Baltimore, MD: {USENIX} Association.
LibreCat | Download (ext.)
 
[25]
2018 | Conference Paper | LibreCat-ID: 15914 | OA
Engelbertz, N., Erinola, N., Herring, D., Somorovsky, J., Mladenov, V., & Schwenk, J. (2018). Security Analysis of eIDAS -- The Cross-Country Authentication Scheme in Europe. In 12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18). Baltimore, MD: {USENIX} Association.
LibreCat | Download (ext.)
 
[24]
2017 | Conference Paper | LibreCat-ID: 15895
Muller, J., Mladenov, V., Somorovsky, J., & Schwenk, J. (2017). SoK: Exploiting Network Printers. In 2017 IEEE Symposium on Security and Privacy (SP). https://doi.org/10.1109/sp.2017.47
LibreCat | DOI | Download (ext.)
 
[23]
2017 | Conference Paper | LibreCat-ID: 15912 | OA
Grothe, M., Niemann, T., Somorovsky, J., & Schwenk, J. (2017). Breaking and Fixing Gridcoin. In 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17). Vancouver, BC: {USENIX} Association.
LibreCat | Download (ext.)
 
[22]
2016 | Conference Paper | LibreCat-ID: 15896
Somorovsky, J. (2016). Systematic Fuzzing and Testing of TLS Libraries. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS’16. https://doi.org/10.1145/2976749.2978411
LibreCat | DOI | Download (ext.)
 
[21]
2016 | Conference Paper | LibreCat-ID: 15907 | OA
Aviram, N., Schinzel, S., Somorovsky, J., Heninger, N., Dankel, M., Steube, J., … Shavitt, Y. (2016). DROWN: Breaking TLS Using SSLv2. In 25th {USENIX} Security Symposium ({USENIX} Security 16) (pp. 689–706). Austin, TX: {USENIX} Association.
LibreCat | Download (ext.)
 
[20]
2016 | Conference Paper | LibreCat-ID: 15913 | OA
Böck, H., Zauner, A., Devlin, S., Somorovsky, J., & Jovanovic, P. (2016). Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. In 10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16). Austin, TX: {USENIX} Association.
LibreCat | Download (ext.)
 
[19]
2015 | Book Chapter | LibreCat-ID: 15897
Altmeier, C., Mainka, C., Somorovsky, J., & Schwenk, J. (2015). AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services. In Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015. Cham. https://doi.org/10.1007/978-3-319-29883-2_5
LibreCat | DOI
 
[18]
2015 | Conference Paper | LibreCat-ID: 15898
Jager, T., Schwenk, J., & Somorovsky, J. (2015). On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS ’15. https://doi.org/10.1145/2810103.2813657
LibreCat | DOI | Download (ext.)
 
[17]
2015 | Book Chapter | LibreCat-ID: 15899
Jager, T., Schwenk, J., & Somorovsky, J. (2015). Practical Invalid Curve Attacks on TLS-ECDH. In Computer Security -- ESORICS 2015. Cham. https://doi.org/10.1007/978-3-319-24174-6_21
LibreCat | DOI | Download (ext.)
 
[16]
2015 | Conference Paper | LibreCat-ID: 15900
Niemietz, M., Somorovsky, J., Mainka, C., & Schwenk, J. (2015). Not so Smart: On Smart TV Apps. In International Workshop on Secure Internet of Things (SIoT). https://doi.org/10.1109/siot.2015.13
LibreCat | DOI
 
[15]
2015 | Conference Paper | LibreCat-ID: 15911 | OA
Kupser, D., Mainka, C., Schwenk, J., & Somorovsky, J. (2015). How to Break XML Encryption -- Automatically. In 9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15). Washington, D.C.: {USENIX} Association.
LibreCat | Download (ext.)
 
[14]
2014 | Conference Paper | LibreCat-ID: 15904 | OA
Meyer, C., Somorovsky, J., Weiss, E., Schwenk, J., Schinzel, S., & Tews, E. (2014). Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks. In 23rd {USENIX} Security Symposium ({USENIX} Security 14) (pp. 733–748). San Diego, CA: {USENIX} Association.
LibreCat | Download (ext.)
 
[13]
2013 | Dissertation | LibreCat-ID: 15901
Somorovsky, J. (2013). On the insecurity of XML Security. https://doi.org/10.1515/itit-2014-1045
LibreCat | DOI
 
[12]
2013 | Conference Paper | LibreCat-ID: 15902
Falkenberg, A., Mainka, C., Somorovsky, J., & Schwenk, J. (2013). A New Approach towards DoS Penetration Testing on Web Services. In 2013 IEEE 20th International Conference on Web Services. https://doi.org/10.1109/icws.2013.72
LibreCat | DOI
 
[11]
2013 | Journal Article | LibreCat-ID: 15903
Mainka, C., Mladenov, V., Somorovsky, J., & Schwenk, J. (2013). Penetration test tool for XML-based web services. CEUR Workshop Proceedings, 965, 31–35.
LibreCat
 
[10]
2013 | Conference Paper | LibreCat-ID: 15918 | OA
Jager, T., Paterson, K. G., & Somorovsky, J. (2013). One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. In 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013.
LibreCat | Download (ext.)
 
[9]
2012 | Conference Paper | LibreCat-ID: 15888 | OA
Somorovsky, J., Mayer, A., Schwenk, J., Kampmann, M., & Jensen, M. (2012). On Breaking SAML: Be Whoever You Want to Be. In Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security 12) (pp. 397–412). Bellevue, WA: {USENIX}.
LibreCat | Download (ext.)
 
[8]
2012 | Conference Paper | LibreCat-ID: 15890
Somorovsky, J., & Schwenk, J. (2012). Technical Analysis of Countermeasures against Attack on XML Encryption -- or -- Just Another Motivation for Authenticated Encryption. In 2012 IEEE Eighth World Congress on Services. https://doi.org/10.1109/services.2012.6
LibreCat | DOI
 
[7]
2012 | Book Chapter | LibreCat-ID: 15891
Jager, T., Schinzel, S., & Somorovsky, J. (2012). Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. In Computer Security – ESORICS 2012. Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33167-1_43
LibreCat | DOI
 
[6]
2012 | Conference Paper | LibreCat-ID: 15917
Somorovsky, J., Meyer, C., Tran, T., Sbeiti, M., Schwenk, J., & Wietfeld, C. (2012). Sec2: Secure Mobile Solution for Distributed Public Cloud Storages.
LibreCat
 
[5]
2011 | Conference Paper | LibreCat-ID: 15885
Somorovsky, J., Heiderich, M., Jensen, M., Schwenk, J., Gruschka, N., & Lo Iacono, L. (2011). All your clouds are belong to us: security analysis of cloud management interfaces. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW ’11. https://doi.org/10.1145/2046660.2046664
LibreCat | DOI | Download (ext.)
 
[4]
2011 | Conference Paper | LibreCat-ID: 15887
Jensen, M., Meyer, C., Somorovsky, J., & Schwenk, J. (2011). On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks. In 2011 1st International Workshop on Securing Services on the Cloud (IWSSC). https://doi.org/10.1109/iwsscloud.2011.6049019
LibreCat | DOI
 
[3]
2011 | Conference Paper | LibreCat-ID: 15915
Jager, T., & Somorovsky, J. (2011). How to break XML encryption. In Proceedings of the 18th ACM conference on Computer and communications security - CCS ’11. https://doi.org/10.1145/2046707.2046756
LibreCat | DOI | Download (ext.)
 
[2]
2011 | Conference Paper | LibreCat-ID: 15916
Meyer, C., Somorovsky, J., Driessen, B., Schwenk, J., Tran, T., & Wietfeld, C. (2011). Sec2: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage.
LibreCat
 
[1]
2010 | Conference Paper | LibreCat-ID: 15889
Somorovsky, J., Jensen, M., & Schwenk, J. (2010). Streaming-Based Verification of XML Signatures in SOAP Messages. In 2010 6th World Congress on Services. https://doi.org/10.1109/services.2010.57
LibreCat | DOI
 

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed