Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
38 Publications
2011 | Conference Paper | LibreCat-ID: 15885
J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, “All your clouds are belong to us: security analysis of cloud management interfaces,” in Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW ’11, 2011.
LibreCat
| DOI
| Download (ext.)
2011 | Conference Paper | LibreCat-ID: 15915
T. Jager and J. Somorovsky, “How to break XML encryption,” in Proceedings of the 18th ACM conference on Computer and communications security - CCS ’11, 2011.
LibreCat
| DOI
| Download (ext.)
2011 | Conference Paper | LibreCat-ID: 15916
C. Meyer, J. Somorovsky, B. Driessen, J. Schwenk, T. Tran, and C. Wietfeld, “Sec2: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage,” 2011.
LibreCat
2012 | Conference Paper | LibreCat-ID: 15888 |
J. Somorovsky, A. Mayer, J. Schwenk, M. Kampmann, and M. Jensen, “On Breaking SAML: Be Whoever You Want to Be,” in Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security 12), 2012, pp. 397–412.
LibreCat
| Download (ext.)
2012 | Conference Paper | LibreCat-ID: 15917
J. Somorovsky, C. Meyer, T. Tran, M. Sbeiti, J. Schwenk, and C. Wietfeld, “Sec2: Secure Mobile Solution for Distributed Public Cloud Storages,” 2012.
LibreCat
2013 | Conference Paper | LibreCat-ID: 15918 |
T. Jager, K. G. Paterson, and J. Somorovsky, “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography,” in 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, 2013.
LibreCat
| Download (ext.)
2014 | Conference Paper | LibreCat-ID: 15904 |
C. Meyer, J. Somorovsky, E. Weiss, J. Schwenk, S. Schinzel, and E. Tews, “Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks,” in 23rd {USENIX} Security Symposium ({USENIX} Security 14), 2014, pp. 733–748.
LibreCat
| Download (ext.)
2015 | Conference Paper | LibreCat-ID: 15898
T. Jager, J. Schwenk, and J. Somorovsky, “On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption,” in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS ’15, 2015.
LibreCat
| DOI
| Download (ext.)
2015 | Conference Paper | LibreCat-ID: 15911 |
D. Kupser, C. Mainka, J. Schwenk, and J. Somorovsky, “How to Break XML Encryption -- Automatically,” in 9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), 2015.
LibreCat
| Download (ext.)
2016 | Conference Paper | LibreCat-ID: 15896
J. Somorovsky, “Systematic Fuzzing and Testing of TLS Libraries,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS’16, 2016.
LibreCat
| DOI
| Download (ext.)
2016 | Conference Paper | LibreCat-ID: 15907 |
N. Aviram et al., “DROWN: Breaking TLS Using SSLv2,” in 25th {USENIX} Security Symposium ({USENIX} Security 16), 2016, pp. 689–706.
LibreCat
| Download (ext.)
2016 | Conference Paper | LibreCat-ID: 15913 |
H. Böck, A. Zauner, S. Devlin, J. Somorovsky, and P. Jovanovic, “Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS,” in 10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16), 2016.
LibreCat
| Download (ext.)
2017 | Conference Paper | LibreCat-ID: 15895
J. Muller, V. Mladenov, J. Somorovsky, and J. Schwenk, “SoK: Exploiting Network Printers,” in 2017 IEEE Symposium on Security and Privacy (SP), 2017.
LibreCat
| DOI
| Download (ext.)
2017 | Conference Paper | LibreCat-ID: 15912 |
M. Grothe, T. Niemann, J. Somorovsky, and J. Schwenk, “Breaking and Fixing Gridcoin,” in 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17), 2017.
LibreCat
| Download (ext.)
2018 | Conference Paper | LibreCat-ID: 15892
M. R. Albrecht, J. Massimo, K. G. Paterson, and J. Somorovsky, “Prime and Prejudice: Primality Testing Under Adversarial Conditions,” in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018.
LibreCat
| DOI
| Download (ext.)