Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
49 Publications
2012 | Conference Paper | LibreCat-ID: 15888 |
On Breaking SAML: Be Whoever You Want to Be
J. Somorovsky, A. Mayer, J. Schwenk, M. Kampmann, M. Jensen, in: Presented as Part of the 21st {USENIX} Security Symposium ({USENIX} Security 12), {USENIX}, Bellevue, WA, 2012, pp. 397–412.
LibreCat
| Download (ext.)
J. Somorovsky, A. Mayer, J. Schwenk, M. Kampmann, M. Jensen, in: Presented as Part of the 21st {USENIX} Security Symposium ({USENIX} Security 12), {USENIX}, Bellevue, WA, 2012, pp. 397–412.
2012 | Conference Paper | LibreCat-ID: 15890
Technical Analysis of Countermeasures against Attack on XML Encryption -- or -- Just Another Motivation for Authenticated Encryption
J. Somorovsky, J. Schwenk, in: 2012 IEEE Eighth World Congress on Services, 2012.
LibreCat
| DOI
J. Somorovsky, J. Schwenk, in: 2012 IEEE Eighth World Congress on Services, 2012.
2012 | Book Chapter | LibreCat-ID: 15891
Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption
T. Jager, S. Schinzel, J. Somorovsky, in: Computer Security – ESORICS 2012, Berlin, Heidelberg, 2012.
LibreCat
| DOI
T. Jager, S. Schinzel, J. Somorovsky, in: Computer Security – ESORICS 2012, Berlin, Heidelberg, 2012.
2012 | Conference Paper | LibreCat-ID: 15917
Sec2: Secure Mobile Solution for Distributed Public Cloud Storages
J. Somorovsky, C. Meyer, T. Tran, M. Sbeiti, J. Schwenk, C. Wietfeld, in: 2012.
LibreCat
J. Somorovsky, C. Meyer, T. Tran, M. Sbeiti, J. Schwenk, C. Wietfeld, in: 2012.
2011 | Conference Paper | LibreCat-ID: 15885
All your clouds are belong to us: security analysis of cloud management interfaces
J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, L. Lo Iacono, in: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW ’11, 2011.
LibreCat
| DOI
| Download (ext.)
J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, L. Lo Iacono, in: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW ’11, 2011.
2011 | Conference Paper | LibreCat-ID: 15887
On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks
M. Jensen, C. Meyer, J. Somorovsky, J. Schwenk, in: 2011 1st International Workshop on Securing Services on the Cloud (IWSSC), 2011.
LibreCat
| DOI
M. Jensen, C. Meyer, J. Somorovsky, J. Schwenk, in: 2011 1st International Workshop on Securing Services on the Cloud (IWSSC), 2011.
2011 | Conference Paper | LibreCat-ID: 15915
How to break XML encryption
T. Jager, J. Somorovsky, in: Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS ’11, 2011.
LibreCat
| DOI
| Download (ext.)
T. Jager, J. Somorovsky, in: Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS ’11, 2011.
2011 | Conference Paper | LibreCat-ID: 15916
Sec2: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage
C. Meyer, J. Somorovsky, B. Driessen, J. Schwenk, T. Tran, C. Wietfeld, in: 2011.
LibreCat
C. Meyer, J. Somorovsky, B. Driessen, J. Schwenk, T. Tran, C. Wietfeld, in: 2011.
2010 | Conference Paper | LibreCat-ID: 15889
Streaming-Based Verification of XML Signatures in SOAP Messages
J. Somorovsky, M. Jensen, J. Schwenk, in: 2010 6th World Congress on Services, 2010.
LibreCat
| DOI
J. Somorovsky, M. Jensen, J. Schwenk, in: 2010 6th World Congress on Services, 2010.