Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

38 Publications


2010 | Conference Paper | LibreCat-ID: 15889
Somorovsky, J., Jensen, M., & Schwenk, J. (2010). Streaming-Based Verification of XML Signatures in SOAP Messages. In 2010 6th World Congress on Services. https://doi.org/10.1109/services.2010.57
LibreCat | DOI
 

2011 | Conference Paper | LibreCat-ID: 15885
Somorovsky, J., Heiderich, M., Jensen, M., Schwenk, J., Gruschka, N., & Lo Iacono, L. (2011). All your clouds are belong to us: security analysis of cloud management interfaces. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW ’11. https://doi.org/10.1145/2046660.2046664
LibreCat | DOI | Download (ext.)
 

2011 | Conference Paper | LibreCat-ID: 15887
Jensen, M., Meyer, C., Somorovsky, J., & Schwenk, J. (2011). On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks. In 2011 1st International Workshop on Securing Services on the Cloud (IWSSC). https://doi.org/10.1109/iwsscloud.2011.6049019
LibreCat | DOI
 

2011 | Conference Paper | LibreCat-ID: 15915
Jager, T., & Somorovsky, J. (2011). How to break XML encryption. In Proceedings of the 18th ACM conference on Computer and communications security - CCS ’11. https://doi.org/10.1145/2046707.2046756
LibreCat | DOI | Download (ext.)
 

2011 | Conference Paper | LibreCat-ID: 15916
Meyer, C., Somorovsky, J., Driessen, B., Schwenk, J., Tran, T., & Wietfeld, C. (2011). Sec2: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 15888 | OA
Somorovsky, J., Mayer, A., Schwenk, J., Kampmann, M., & Jensen, M. (2012). On Breaking SAML: Be Whoever You Want to Be. In Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security 12) (pp. 397–412). Bellevue, WA: {USENIX}.
LibreCat | Download (ext.)
 

2012 | Conference Paper | LibreCat-ID: 15890
Somorovsky, J., & Schwenk, J. (2012). Technical Analysis of Countermeasures against Attack on XML Encryption -- or -- Just Another Motivation for Authenticated Encryption. In 2012 IEEE Eighth World Congress on Services. https://doi.org/10.1109/services.2012.6
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 15917
Somorovsky, J., Meyer, C., Tran, T., Sbeiti, M., Schwenk, J., & Wietfeld, C. (2012). Sec2: Secure Mobile Solution for Distributed Public Cloud Storages.
LibreCat
 

2013 | Conference Paper | LibreCat-ID: 15902
Falkenberg, A., Mainka, C., Somorovsky, J., & Schwenk, J. (2013). A New Approach towards DoS Penetration Testing on Web Services. In 2013 IEEE 20th International Conference on Web Services. https://doi.org/10.1109/icws.2013.72
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 15918 | OA
Jager, T., Paterson, K. G., & Somorovsky, J. (2013). One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. In 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013.
LibreCat | Download (ext.)
 

2014 | Conference Paper | LibreCat-ID: 15904 | OA
Meyer, C., Somorovsky, J., Weiss, E., Schwenk, J., Schinzel, S., & Tews, E. (2014). Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks. In 23rd {USENIX} Security Symposium ({USENIX} Security 14) (pp. 733–748). San Diego, CA: {USENIX} Association.
LibreCat | Download (ext.)
 

2015 | Conference Paper | LibreCat-ID: 15898
Jager, T., Schwenk, J., & Somorovsky, J. (2015). On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS ’15. https://doi.org/10.1145/2810103.2813657
LibreCat | DOI | Download (ext.)
 

2015 | Conference Paper | LibreCat-ID: 15900
Niemietz, M., Somorovsky, J., Mainka, C., & Schwenk, J. (2015). Not so Smart: On Smart TV Apps. In International Workshop on Secure Internet of Things (SIoT). https://doi.org/10.1109/siot.2015.13
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 15911 | OA
Kupser, D., Mainka, C., Schwenk, J., & Somorovsky, J. (2015). How to Break XML Encryption -- Automatically. In 9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15). Washington, D.C.: {USENIX} Association.
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 15896
Somorovsky, J. (2016). Systematic Fuzzing and Testing of TLS Libraries. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS’16. https://doi.org/10.1145/2976749.2978411
LibreCat | DOI | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 15907 | OA
Aviram, N., Schinzel, S., Somorovsky, J., Heninger, N., Dankel, M., Steube, J., … Shavitt, Y. (2016). DROWN: Breaking TLS Using SSLv2. In 25th {USENIX} Security Symposium ({USENIX} Security 16) (pp. 689–706). Austin, TX: {USENIX} Association.
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 15913 | OA
Böck, H., Zauner, A., Devlin, S., Somorovsky, J., & Jovanovic, P. (2016). Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. In 10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16). Austin, TX: {USENIX} Association.
LibreCat | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 15895
Muller, J., Mladenov, V., Somorovsky, J., & Schwenk, J. (2017). SoK: Exploiting Network Printers. In 2017 IEEE Symposium on Security and Privacy (SP). https://doi.org/10.1109/sp.2017.47
LibreCat | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 15912 | OA
Grothe, M., Niemann, T., Somorovsky, J., & Schwenk, J. (2017). Breaking and Fixing Gridcoin. In 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17). Vancouver, BC: {USENIX} Association.
LibreCat | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 15892
Albrecht, M. R., Massimo, J., Paterson, K. G., & Somorovsky, J. (2018). Prime and Prejudice: Primality Testing Under Adversarial Conditions. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. https://doi.org/10.1145/3243734.3243787
LibreCat | DOI | Download (ext.)
 

Filters and Search Terms

(person=83504) OR (department=632) AND (type=conference_abstract OR type=conference OR type=conference_editor)

status=public

Search

Filter Publications

Display / Sort

Sorted by: Publishing Year
Citation Style: APA

Export / Embed