Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

46 Publications


2013 | Journal Article | LibreCat-ID: 15903
Mainka C, Mladenov V, Somorovsky J, Schwenk J. Penetration test tool for XML-based web services. CEUR Workshop Proceedings. 2013;965:31-35.
LibreCat
 

2013 | Conference Paper | LibreCat-ID: 15918 | OA
Jager T, Paterson KG, Somorovsky J. One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. In: 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013. ; 2013.
LibreCat | Download (ext.)
 

2012 | Conference Paper | LibreCat-ID: 15888 | OA
Somorovsky J, Mayer A, Schwenk J, Kampmann M, Jensen M. On Breaking SAML: Be Whoever You Want to Be. In: Presented as Part of the 21st {USENIX} Security Symposium ({USENIX} Security 12). Bellevue, WA: {USENIX}; 2012:397-412.
LibreCat | Download (ext.)
 

2012 | Conference Paper | LibreCat-ID: 15890
Somorovsky J, Schwenk J. Technical Analysis of Countermeasures against Attack on XML Encryption -- or -- Just Another Motivation for Authenticated Encryption. In: 2012 IEEE Eighth World Congress on Services. ; 2012. doi:10.1109/services.2012.6
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 15891
Jager T, Schinzel S, Somorovsky J. Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. In: Computer Security – ESORICS 2012. Berlin, Heidelberg; 2012. doi:10.1007/978-3-642-33167-1_43
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 15917
Somorovsky J, Meyer C, Tran T, Sbeiti M, Schwenk J, Wietfeld C. Sec2: Secure Mobile Solution for Distributed Public Cloud Storages. In: ; 2012.
LibreCat
 

2011 | Conference Paper | LibreCat-ID: 15885
Somorovsky J, Heiderich M, Jensen M, Schwenk J, Gruschka N, Lo Iacono L. All your clouds are belong to us: security analysis of cloud management interfaces. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW ’11. ; 2011. doi:10.1145/2046660.2046664
LibreCat | DOI | Download (ext.)
 

2011 | Conference Paper | LibreCat-ID: 15887
Jensen M, Meyer C, Somorovsky J, Schwenk J. On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks. In: 2011 1st International Workshop on Securing Services on the Cloud (IWSSC). ; 2011. doi:10.1109/iwsscloud.2011.6049019
LibreCat | DOI
 

2011 | Conference Paper | LibreCat-ID: 15915
Jager T, Somorovsky J. How to break XML encryption. In: Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS ’11. ; 2011. doi:10.1145/2046707.2046756
LibreCat | DOI | Download (ext.)
 

2011 | Conference Paper | LibreCat-ID: 15916
Meyer C, Somorovsky J, Driessen B, Schwenk J, Tran T, Wietfeld C. Sec2: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage. In: ; 2011.
LibreCat
 

2010 | Conference Paper | LibreCat-ID: 15889
Somorovsky J, Jensen M, Schwenk J. Streaming-Based Verification of XML Signatures in SOAP Messages. In: 2010 6th World Congress on Services. ; 2010. doi:10.1109/services.2010.57
LibreCat | DOI
 

Filters and Search Terms

(person=83504)

status=public

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed