Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
38 Publications
2010 | Conference Paper | LibreCat-ID: 15889
Streaming-Based Verification of XML Signatures in SOAP Messages
J. Somorovsky, M. Jensen, J. Schwenk, in: 2010 6th World Congress on Services, 2010.
LibreCat
| DOI
J. Somorovsky, M. Jensen, J. Schwenk, in: 2010 6th World Congress on Services, 2010.
2011 | Conference Paper | LibreCat-ID: 15885
All your clouds are belong to us: security analysis of cloud management interfaces
J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, L. Lo Iacono, in: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW ’11, 2011.
LibreCat
| DOI
| Download (ext.)
J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, L. Lo Iacono, in: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW ’11, 2011.
2011 | Conference Paper | LibreCat-ID: 15887
On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks
M. Jensen, C. Meyer, J. Somorovsky, J. Schwenk, in: 2011 1st International Workshop on Securing Services on the Cloud (IWSSC), 2011.
LibreCat
| DOI
M. Jensen, C. Meyer, J. Somorovsky, J. Schwenk, in: 2011 1st International Workshop on Securing Services on the Cloud (IWSSC), 2011.
2011 | Conference Paper | LibreCat-ID: 15915
How to break XML encryption
T. Jager, J. Somorovsky, in: Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS ’11, 2011.
LibreCat
| DOI
| Download (ext.)
T. Jager, J. Somorovsky, in: Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS ’11, 2011.
2011 | Conference Paper | LibreCat-ID: 15916
Sec2: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage
C. Meyer, J. Somorovsky, B. Driessen, J. Schwenk, T. Tran, C. Wietfeld, in: 2011.
LibreCat
C. Meyer, J. Somorovsky, B. Driessen, J. Schwenk, T. Tran, C. Wietfeld, in: 2011.
2012 | Conference Paper | LibreCat-ID: 15888 |
On Breaking SAML: Be Whoever You Want to Be
J. Somorovsky, A. Mayer, J. Schwenk, M. Kampmann, M. Jensen, in: Presented as Part of the 21st {USENIX} Security Symposium ({USENIX} Security 12), {USENIX}, Bellevue, WA, 2012, pp. 397–412.
LibreCat
| Download (ext.)
J. Somorovsky, A. Mayer, J. Schwenk, M. Kampmann, M. Jensen, in: Presented as Part of the 21st {USENIX} Security Symposium ({USENIX} Security 12), {USENIX}, Bellevue, WA, 2012, pp. 397–412.
2012 | Conference Paper | LibreCat-ID: 15890
Technical Analysis of Countermeasures against Attack on XML Encryption -- or -- Just Another Motivation for Authenticated Encryption
J. Somorovsky, J. Schwenk, in: 2012 IEEE Eighth World Congress on Services, 2012.
LibreCat
| DOI
J. Somorovsky, J. Schwenk, in: 2012 IEEE Eighth World Congress on Services, 2012.
2012 | Conference Paper | LibreCat-ID: 15917
Sec2: Secure Mobile Solution for Distributed Public Cloud Storages
J. Somorovsky, C. Meyer, T. Tran, M. Sbeiti, J. Schwenk, C. Wietfeld, in: 2012.
LibreCat
J. Somorovsky, C. Meyer, T. Tran, M. Sbeiti, J. Schwenk, C. Wietfeld, in: 2012.
2013 | Conference Paper | LibreCat-ID: 15902
A New Approach towards DoS Penetration Testing on Web Services
A. Falkenberg, C. Mainka, J. Somorovsky, J. Schwenk, in: 2013 IEEE 20th International Conference on Web Services, 2013.
LibreCat
| DOI
A. Falkenberg, C. Mainka, J. Somorovsky, J. Schwenk, in: 2013 IEEE 20th International Conference on Web Services, 2013.
2013 | Conference Paper | LibreCat-ID: 15918 |
One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography
T. Jager, K.G. Paterson, J. Somorovsky, in: 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, 2013.
LibreCat
| Download (ext.)
T. Jager, K.G. Paterson, J. Somorovsky, in: 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, 2013.
2014 | Conference Paper | LibreCat-ID: 15904 |
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks
C. Meyer, J. Somorovsky, E. Weiss, J. Schwenk, S. Schinzel, E. Tews, in: 23rd {USENIX} Security Symposium ({USENIX} Security 14), {USENIX} Association, San Diego, CA, 2014, pp. 733–748.
LibreCat
| Download (ext.)
C. Meyer, J. Somorovsky, E. Weiss, J. Schwenk, S. Schinzel, E. Tews, in: 23rd {USENIX} Security Symposium ({USENIX} Security 14), {USENIX} Association, San Diego, CA, 2014, pp. 733–748.
2015 | Conference Paper | LibreCat-ID: 15898
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
T. Jager, J. Schwenk, J. Somorovsky, in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS ’15, 2015.
LibreCat
| DOI
| Download (ext.)
T. Jager, J. Schwenk, J. Somorovsky, in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS ’15, 2015.
2015 | Conference Paper | LibreCat-ID: 15900
Not so Smart: On Smart TV Apps
M. Niemietz, J. Somorovsky, C. Mainka, J. Schwenk, in: International Workshop on Secure Internet of Things (SIoT), 2015.
LibreCat
| DOI
M. Niemietz, J. Somorovsky, C. Mainka, J. Schwenk, in: International Workshop on Secure Internet of Things (SIoT), 2015.
2015 | Conference Paper | LibreCat-ID: 15911 |
How to Break XML Encryption -- Automatically
D. Kupser, C. Mainka, J. Schwenk, J. Somorovsky, in: 9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), {USENIX} Association, Washington, D.C., 2015.
LibreCat
| Download (ext.)
D. Kupser, C. Mainka, J. Schwenk, J. Somorovsky, in: 9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), {USENIX} Association, Washington, D.C., 2015.
2016 | Conference Paper | LibreCat-ID: 15896
Systematic Fuzzing and Testing of TLS Libraries
J. Somorovsky, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS’16, 2016.
LibreCat
| DOI
| Download (ext.)
J. Somorovsky, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS’16, 2016.
2016 | Conference Paper | LibreCat-ID: 15907 |
DROWN: Breaking TLS Using SSLv2
N. Aviram, S. Schinzel, J. Somorovsky, N. Heninger, M. Dankel, J. Steube, L. Valenta, D. Adrian, J.A. Halderman, V. Dukhovni, E. Käsper, S. Cohney, S. Engels, C. Paar, Y. Shavitt, in: 25th {USENIX} Security Symposium ({USENIX} Security 16), {USENIX} Association, Austin, TX, 2016, pp. 689–706.
LibreCat
| Download (ext.)
N. Aviram, S. Schinzel, J. Somorovsky, N. Heninger, M. Dankel, J. Steube, L. Valenta, D. Adrian, J.A. Halderman, V. Dukhovni, E. Käsper, S. Cohney, S. Engels, C. Paar, Y. Shavitt, in: 25th {USENIX} Security Symposium ({USENIX} Security 16), {USENIX} Association, Austin, TX, 2016, pp. 689–706.
2016 | Conference Paper | LibreCat-ID: 15913 |
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
H. Böck, A. Zauner, S. Devlin, J. Somorovsky, P. Jovanovic, in: 10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16), {USENIX} Association, Austin, TX, 2016.
LibreCat
| Download (ext.)
H. Böck, A. Zauner, S. Devlin, J. Somorovsky, P. Jovanovic, in: 10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16), {USENIX} Association, Austin, TX, 2016.
2017 | Conference Paper | LibreCat-ID: 15895
SoK: Exploiting Network Printers
J. Muller, V. Mladenov, J. Somorovsky, J. Schwenk, in: 2017 IEEE Symposium on Security and Privacy (SP), 2017.
LibreCat
| DOI
| Download (ext.)
J. Muller, V. Mladenov, J. Somorovsky, J. Schwenk, in: 2017 IEEE Symposium on Security and Privacy (SP), 2017.
2017 | Conference Paper | LibreCat-ID: 15912 |
Breaking and Fixing Gridcoin
M. Grothe, T. Niemann, J. Somorovsky, J. Schwenk, in: 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17), {USENIX} Association, Vancouver, BC, 2017.
LibreCat
| Download (ext.)
M. Grothe, T. Niemann, J. Somorovsky, J. Schwenk, in: 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17), {USENIX} Association, Vancouver, BC, 2017.
2018 | Conference Paper | LibreCat-ID: 15892
Prime and Prejudice: Primality Testing Under Adversarial Conditions
M.R. Albrecht, J. Massimo, K.G. Paterson, J. Somorovsky, in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018.
LibreCat
| DOI
| Download (ext.)
M.R. Albrecht, J. Massimo, K.G. Paterson, J. Somorovsky, in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018.