Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

44 Publications


2017 | Conference Paper | LibreCat-ID: 15895
Muller, Jens, et al. “SoK: Exploiting Network Printers.” 2017 IEEE Symposium on Security and Privacy (SP), 2017, doi:10.1109/sp.2017.47.
LibreCat | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 15912 | OA
Grothe, Martin, et al. “Breaking and Fixing Gridcoin.” 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17), {USENIX} Association, 2017.
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 15896
Somorovsky, Juraj. “Systematic Fuzzing and Testing of TLS Libraries.” Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS’16, 2016, doi:10.1145/2976749.2978411.
LibreCat | DOI | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 15907 | OA
Aviram, Nimrod, et al. “DROWN: Breaking TLS Using SSLv2.” 25th {USENIX} Security Symposium ({USENIX} Security 16), {USENIX} Association, 2016, pp. 689–706.
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 15913 | OA
Böck, Hanno, et al. “Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS.” 10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16), {USENIX} Association, 2016.
LibreCat | Download (ext.)
 

2015 | Book Chapter | LibreCat-ID: 15897
Altmeier, Christian, et al. “AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services.” Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015, 2015, doi:10.1007/978-3-319-29883-2_5.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 15898
Jager, Tibor, et al. “On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption.” Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS ’15, 2015, doi:10.1145/2810103.2813657.
LibreCat | DOI | Download (ext.)
 

2015 | Book Chapter | LibreCat-ID: 15899
Jager, Tibor, et al. “Practical Invalid Curve Attacks on TLS-ECDH.” Computer Security -- ESORICS 2015, 2015, doi:10.1007/978-3-319-24174-6_21.
LibreCat | DOI | Download (ext.)
 

2015 | Conference Paper | LibreCat-ID: 15900
Niemietz, Marcus, et al. “Not so Smart: On Smart TV Apps.” International Workshop on Secure Internet of Things (SIoT), 2015, doi:10.1109/siot.2015.13.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 15911 | OA
Kupser, Dennis, et al. “How to Break XML Encryption -- Automatically.” 9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), {USENIX} Association, 2015.
LibreCat | Download (ext.)
 

2014 | Conference Paper | LibreCat-ID: 15904 | OA
Meyer, Christopher, et al. “Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.” 23rd {USENIX} Security Symposium ({USENIX} Security 14), {USENIX} Association, 2014, pp. 733–48.
LibreCat | Download (ext.)
 

2013 | Dissertation | LibreCat-ID: 15901
Somorovsky, Juraj. On the Insecurity of XML Security. 2013, doi:10.1515/itit-2014-1045.
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 15902
Falkenberg, Andreas, et al. “A New Approach towards DoS Penetration Testing on Web Services.” 2013 IEEE 20th International Conference on Web Services, 2013, doi:10.1109/icws.2013.72.
LibreCat | DOI
 

2013 | Journal Article | LibreCat-ID: 15903
Mainka, Christian, et al. “Penetration Test Tool for XML-Based Web Services.” CEUR Workshop Proceedings, vol. 965, 2013, pp. 31–35.
LibreCat
 

2013 | Conference Paper | LibreCat-ID: 15918 | OA
Jager, Tibor, et al. “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.” 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, 2013.
LibreCat | Download (ext.)
 

2012 | Conference Paper | LibreCat-ID: 15888 | OA
Somorovsky, Juraj, et al. “On Breaking SAML: Be Whoever You Want to Be.” Presented as Part of the 21st {USENIX} Security Symposium ({USENIX} Security 12), {USENIX}, 2012, pp. 397–412.
LibreCat | Download (ext.)
 

2012 | Conference Paper | LibreCat-ID: 15890
Somorovsky, Juraj, and Jörg Schwenk. “Technical Analysis of Countermeasures against Attack on XML Encryption -- or -- Just Another Motivation for Authenticated Encryption.” 2012 IEEE Eighth World Congress on Services, 2012, doi:10.1109/services.2012.6.
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 15891
Jager, Tibor, et al. “Bleichenbacher’s Attack Strikes Again: Breaking PKCS#1 v1.5 in XML Encryption.” Computer Security – ESORICS 2012, 2012, doi:10.1007/978-3-642-33167-1_43.
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 15917
Somorovsky, Juraj, et al. Sec2: Secure Mobile Solution for Distributed Public Cloud Storages. 2012.
LibreCat
 

2011 | Conference Paper | LibreCat-ID: 15885
Somorovsky, Juraj, et al. “All Your Clouds Are Belong to Us: Security Analysis of Cloud Management Interfaces.” Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW ’11, 2011, doi:10.1145/2046660.2046664.
LibreCat | DOI | Download (ext.)
 

Filters and Search Terms

(person=83504)

status=public

Search

Filter Publications

Display / Sort

Citation Style: MLA

Export / Embed