default search action
Jörg Schwenk
Person information
- affiliation: Ruhr University Bochum, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c149]Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk:
Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation. USENIX Security Symposium 2024 - [c148]Martin Dunsche, Marcel Maehren, Nurullah Erinola, Robert Merget, Nicolai Bissantz, Juraj Somorovsky, Jörg Schwenk:
With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors. USENIX Security Symposium 2024 - 2023
- [c147]Dominik Trevor Noß, Lukas Knittel, Christian Mainka, Marcus Niemietz, Jörg Schwenk:
Finding All Cross-Site Needles in the DOM Stack: A Comprehensive Methodology for the Automatic XS-Leak Detection in Web Browsers. CCS 2023: 2456-2470 - [c146]Nurullah Erinola, Marcel Maehren, Robert Merget, Juraj Somorovsky, Jörg Schwenk:
Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet. USENIX Security Symposium 2023: 4859-4876 - [c145]Sven Hebrok, Simon Nachtigall, Marcel Maehren, Nurullah Erinola, Robert Merget, Juraj Somorovsky, Jörg Schwenk:
We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets. USENIX Security Symposium 2023: 4877-4894 - [c144]Matthias Gierlings, Marcus Brinkmann, Jörg Schwenk:
Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser. USENIX Security Symposium 2023: 7037-7054 - [c143]Simon Rohlmann, Vladislav Mladenov, Christian Mainka, Daniel Hirschberger, Jörg Schwenk:
Every Signature is Broken: On the Insecurity of Microsoft Office's OOXML Signatures. USENIX Security Symposium 2023: 7411-7428 - [i29]Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk:
Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation. CoRR abs/2312.12422 (2023) - 2022
- [b5]Jörg Schwenk:
Guide to Internet Cryptography - Security Protocols and Real-World Attack Implications. Information Security and Cryptography, Springer 2022, ISBN 978-3-031-19438-2, pp. 1-523 - [j14]Jörg Schwenk, Douglas Stebila:
A reduction-based proof for authentication and session key security in three-party Kerberos. Int. J. Appl. Cryptogr. 4(2): 61-84 (2022) - [c142]Louis Jannett, Vladislav Mladenov, Christian Mainka, Jörg Schwenk:
DISTINCT: Identity Theft using In-Browser Communications in Dual-Window Single Sign-On. CCS 2022: 1553-1567 - [c141]Marcel Maehren, Philipp Nieting, Sven Hebrok, Robert Merget, Juraj Somorovsky, Jörg Schwenk:
TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries. USENIX Security Symposium 2022: 215-232 - [c140]Simon Rohlmann, Christian Mainka, Vladislav Mladenov, Jörg Schwenk:
Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures. USENIX Security Symposium 2022: 3075-3092 - 2021
- [c139]Lukas Knittel, Christian Mainka, Marcus Niemietz, Dominik Trevor Noß, Jörg Schwenk:
XSinator.com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers. CCS 2021: 1771-1788 - [c138]Bertram Poettering, Paul Rösler, Jörg Schwenk, Douglas Stebila:
SoK: Game-Based Security Models for Group Key Exchange. CT-RSA 2021: 148-176 - [c137]Jens Müller, Dominik Noss, Christian Mainka, Vladislav Mladenov, Jörg Schwenk:
Processing Dangerous Paths - On Security and Privacy of the Portable Document Format. NDSS 2021 - [c136]Simon Rohlmann, Vladislav Mladenov, Christian Mainka, Jörg Schwenk:
Breaking the Specification: PDF Certification. SP 2021: 1485-1501 - [c135]Robert Merget, Marcus Brinkmann, Nimrod Aviram, Juraj Somorovsky, Johannes Mittmann, Jörg Schwenk:
Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E). USENIX Security Symposium 2021: 213-230 - [c134]Marcus Brinkmann, Christian Dresen, Robert Merget, Damian Poddebniak, Jens Müller, Juraj Somorovsky, Jörg Schwenk, Sebastian Schinzel:
ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication. USENIX Security Symposium 2021: 4293-4310 - [i28]Bertram Poettering, Paul Rösler, Jörg Schwenk, Douglas Stebila:
SoK: Game-based Security Models for Group Key Exchange. IACR Cryptol. ePrint Arch. 2021: 305 (2021) - 2020
- [j13]Sebastian Lauer, Kai Gellert, Robert Merget, Tobias Handirk, Jörg Schwenk:
T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction. Proc. Priv. Enhancing Technol. 2020(2): 336-357 (2020) - [c133]Stefan Hoffmann, Jens Müller, Jörg Schwenk, Gerd Bumiller:
Powerless Security. ACNS (2) 2020: 213-232 - [c132]Jörg Schwenk, Marcus Brinkmann, Damian Poddebniak, Jens Müller, Juraj Somorovsky, Sebastian Schinzel:
Mitigation of Attacks on Email End-to-End Encryption. CCS 2020: 1647-1664 - [c131]Jens Müller, Marcus Brinkmann, Damian Poddebniak, Sebastian Schinzel, Jörg Schwenk:
Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption. CNS 2020: 1-9 - [c130]Benjamin Dowling, Paul Rösler, Jörg Schwenk:
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework. Public Key Cryptography (1) 2020: 341-373 - [c129]Sven Schäge, Jörg Schwenk, Sebastian Lauer:
Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2. Public Key Cryptography (2) 2020: 567-596 - [c128]Jens Müller, Fabian Ising, Christian Mainka, Vladislav Mladenov, Sebastian Schinzel, Jörg Schwenk:
Office Document Security and Privacy. WOOT @ USENIX Security Symposium 2020 - [i27]Robert Merget, Marcus Brinkmann, Nimrod Aviram, Juraj Somorovsky, Johannes Mittmann, Jörg Schwenk:
Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E). IACR Cryptol. ePrint Arch. 2020: 1151 (2020) - [i26]Sven Schäge, Jörg Schwenk, Sebastian Lauer:
Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2. IACR Cryptol. ePrint Arch. 2020: 1519 (2020)
2010 – 2019
- 2019
- [j12]Jörg Schwenk, Tobias Wich, Detlef Hühnlein:
Moderne Vertrauensdienste für vertrauenswürdige Transaktionen. Datenschutz und Datensicherheit 43(4): 214-219 (2019) - [c127]Jens Müller, Marcus Brinkmann, Damian Poddebniak, Sebastian Schinzel, Jörg Schwenk:
Re: What's Up Johnny? - Covert Content Attacks on Email End-to-End Encryption. ACNS 2019: 24-42 - [c126]Vladislav Mladenov, Christian Mainka, Karsten Meyer zu Selhausen, Martin Grothe, Jörg Schwenk:
1 Trillion Dollar Refund: How To Spoof PDF Signatures. CCS 2019: 1-14 - [c125]Jens Müller, Fabian Ising, Vladislav Mladenov, Christian Mainka, Sebastian Schinzel, Jörg Schwenk:
Practical Decryption exFiltration: Breaking PDF Encryption. CCS 2019: 15-29 - [c124]Nils Engelbertz, Vladislav Mladenov, Juraj Somorovsky, David Herring, Nurullah Erinola, Jörg Schwenk:
Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS). Open Identity Summit 2019: 95-106 - [c123]Jens Müller, Marcus Brinkmann, Damian Poddebniak, Hanno Böck, Sebastian Schinzel, Juraj Somorovsky, Jörg Schwenk:
"Johnny, you are fired!" - Spoofing OpenPGP and S/MIME Signatures in Emails. USENIX Security Symposium 2019: 1011-1028 - [c122]Robert Merget, Juraj Somorovsky, Nimrod Aviram, Craig Young, Janis Fliegenschmidt, Jörg Schwenk, Yuval Shavitt:
Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities. USENIX Security Symposium 2019: 1029-1046 - [i25]Jens Müller, Marcus Brinkmann, Damian Poddebniak, Sebastian Schinzel, Jörg Schwenk:
Re: What's Up Johnny? - Covert Content Attacks on Email End-to-End Encryption. CoRR abs/1904.07550 (2019) - [i24]Benjamin Dowling, Paul Rösler, Jörg Schwenk:
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework. IACR Cryptol. ePrint Arch. 2019: 436 (2019) - [i23]Jörg Schwenk, Douglas Stebila:
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos. IACR Cryptol. ePrint Arch. 2019: 777 (2019) - [i22]Sebastian Lauer, Kai Gellert, Robert Merget, Tobias Handirk, Jörg Schwenk:
T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction. IACR Cryptol. ePrint Arch. 2019: 1433 (2019) - 2018
- [c121]Paul Rösler, Christian Mainka, Jörg Schwenk:
More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema. EuroS&P 2018: 415-429 - [c120]Jens Müller, Vladislav Mladenov, Dennis Felsch, Jörg Schwenk:
PostScript Undead: Pwning the Web with a 35 Years Old Language. RAID 2018: 603-622 - [c119]Damian Poddebniak, Christian Dresen, Jens Müller, Fabian Ising, Sebastian Schinzel, Simon Friedberger, Juraj Somorovsky, Jörg Schwenk:
Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels. USENIX Security Symposium 2018: 549-566 - [c118]Dennis Felsch, Martin Grothe, Jörg Schwenk, Adam Czubak, Marcin Szymanek:
The Dangers of Key Reuse: Practical Attacks on IPsec IKE. USENIX Security Symposium 2018: 567-583 - [c117]Nils Engelbertz, Nurullah Erinola, David Herring, Juraj Somorovsky, Vladislav Mladenov, Jörg Schwenk:
Security Analysis of eIDAS - The Cross-Country Authentication Scheme in Europe. WOOT @ USENIX Security Symposium 2018 - 2017
- [j11]Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk:
Authenticated Confidential Channel Establishment and the Security of TLS-DHE. J. Cryptol. 30(4): 1276-1324 (2017) - [c116]Britta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk:
Simple Security Definitions for and Constructions of 0-RTT Key Exchange. ACNS 2017: 20-38 - [c115]Marcus Niemietz, Jörg Schwenk:
Out of the Dark: UI Redressing and Trustworthy Events. CANS 2017: 229-249 - [c114]Dennis Felsch, Christian Mainka, Vladislav Mladenov, Jörg Schwenk:
SECRET: On the Feasibility of a Secure, Efficient, and Collaborative Real-Time Web Editor. AsiaCCS 2017: 835-848 - [c113]Mario Heiderich, Christopher Späth, Jörg Schwenk:
DOMPurify: Client-Side Protection Against XSS and Markup Injection. ESORICS (2) 2017: 116-134 - [c112]Christian Mainka, Vladislav Mladenov, Jörg Schwenk, Tobias Wich:
SoK: Single Sign-On Security - An Evaluation of OpenID Connect. EuroS&P 2017: 251-266 - [c111]Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk:
SoK: Exploiting Network Printers. IEEE Symposium on Security and Privacy 2017: 213-230 - [c110]Jörg Schwenk, Marcus Niemietz, Christian Mainka:
Same-Origin Policy: Evaluation in Modern Browsers. USENIX Security Symposium 2017: 713-727 - [c109]Martin Grothe, Tobias Niemann, Juraj Somorovsky, Jörg Schwenk:
Breaking and Fixing Gridcoin. WOOT 2017 - [i21]Paul Rösler, Christian Mainka, Jörg Schwenk:
More is Less: How Group Chats Weaken the Security of Instant Messengers Signal, WhatsApp, and Threema. IACR Cryptol. ePrint Arch. 2017: 713 (2017) - 2016
- [c108]Martin Grothe, Christian Mainka, Paul Rösler, Johanna Jupke, Jan Kaiser, Jörg Schwenk:
Your Cloud in My Company: Modern Rights Management Services Revisited. ARES 2016: 217-222 - [c107]Matthias Horst, Martin Grothe, Tibor Jager, Jörg Schwenk:
Breaking PPTP VPNs via RADIUS Encryption. CANS 2016: 159-175 - [c106]Christian Mainka, Vladislav Mladenov, Jörg Schwenk:
Do Not Trust Me: Using Malicious IdPs for Analyzing and Attacking Single Sign-on. EuroS&P 2016: 321-336 - [c105]Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Jörg Schwenk, Thorsten Holz:
How Secure is TextSecure? EuroS&P 2016: 457-472 - [c104]Detlef Hühnlein, Tilman Frosch, Jörg Schwenk, Carl-Markus Piswanger, Marc Sel, Tina Hühnlein, Tobias Wich, Daniel Nemmert, René Lottes, Juraj Somorovsky, Vladislav Mladenov, Cristina Condovici, Herbert Leitold, Sophie Stalla-Bourdillon, Niko Tsakalakis, Jan Eichholz, Frank-Michael Kamm, Andreas Kühne, Damian Wabisch, Roger Dean, Jon Shamah, Mikheil Kapanadze, Nuno Ponte, Jose Martins, Renato Portela, Cagatay Karabat, Snezana Stojicic, Slobodan Nedeljkovic, Vincent Bouckaert, Alexandre Defays, Bruce Anderson, Michael Jonas, Christina Hermanns, Thomas Schubert, Dirk Wegener, Alexander Sazonov:
FutureTrust - Future Trust Services for Trustworthy Global Transactions. Open Identity Summit 2016: 27-41 - [c103]Abeer Elsafie, Jörg Schwenk:
Evaluating Two Methods for WS-(Security) Policy Negotiation and Decision Making. OTM Conferences 2016: 890-909 - [c102]Martin Grothe, Christian Mainka, Paul Rösler, Jörg Schwenk:
How to Break Microsoft Rights Management Services. WOOT 2016 - [c101]Christopher Späth, Christian Mainka, Vladislav Mladenov, Jörg Schwenk:
SoK: XML Parser Vulnerabilities. WOOT 2016 - [i20]Jörg Schwenk:
Nonce-based Kerberos is a Secure Delegated AKE Protocol. IACR Cryptol. ePrint Arch. 2016: 219 (2016) - 2015
- [c100]Dennis Felsch, Mario Heiderich, Frederic Schulz, Jörg Schwenk:
How Private is Your Private Cloud?: Security Analysis of Cloud Control Interfaces. CCSW 2015: 5-16 - [c99]Tibor Jager, Jörg Schwenk, Juraj Somorovsky:
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption. CCS 2015: 1185-1196 - [c98]Mario Heiderich, Marcus Niemietz, Jörg Schwenk:
Waiting for CSP - Securing Legacy Web Applications with JSAgents. ESORICS (1) 2015: 23-42 - [c97]Christian Altmeier, Christian Mainka, Juraj Somorovsky, Jörg Schwenk:
AdIDoS - Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services. DPM/QASA@ESORICS 2015: 65-80 - [c96]Tibor Jager, Jörg Schwenk, Juraj Somorovsky:
Practical Invalid Curve Attacks on TLS-ECDH. ESORICS (1) 2015: 407-425 - [c95]Christian Mainka, Vladislav Mladenov, Tim Guenther, Jörg Schwenk:
Automatic recognition, processing and attacking of single sign-on protocols with burp suite. Open Identity Summit 2015: 119-131 - [c94]Florian Bergsma, Tibor Jager, Jörg Schwenk:
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. Public Key Cryptography 2015: 477-494 - [c93]Abeer Elsafie, Jörg Schwenk:
Semi-automated Fuzzy MCDM and Lattice Solutions for WS-Policy Intersection. SERVICES 2015: 167-174 - [c92]Marcus Niemietz, Juraj Somorovsky, Christian Mainka, Jörg Schwenk:
Not so Smart: On Smart TV Apps. SIoT 2015: 72-81 - [c91]Dennis Kupser, Christian Mainka, Jörg Schwenk, Juraj Somorovsky:
How to Break XML Encryption - Automatically. WOOT 2015 - [i19]Marcus Niemietz, Jörg Schwenk:
Owning Your Home Network: Router Security Revisited. CoRR abs/1506.04112 (2015) - [i18]Vladislav Mladenov, Christian Mainka, Julian Krautwald, Florian Feldmann, Jörg Schwenk:
On the security of modern Single Sign-On Protocols: OpenID Connect 1.0. CoRR abs/1508.04324 (2015) - [i17]Florian Bergsma, Tibor Jager, Jörg Schwenk:
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. IACR Cryptol. ePrint Arch. 2015: 15 (2015) - [i16]Britta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk:
Speeding: On Low-Latency Key Exchange. IACR Cryptol. ePrint Arch. 2015: 1214 (2015) - 2014
- [j10]Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk:
Scriptless attacks: Stealing more pie without touching the sill. J. Comput. Secur. 22(4): 567-599 (2014) - [c90]Yong Li, Sven Schäge, Zheng Yang, Christoph Bader, Jörg Schwenk:
New Modular Compilers for Authenticated Key Exchange. ACNS 2014: 1-18 - [c89]Christian Mainka, Vladislav Mladenov, Florian Feldmann, Julian Krautwald, Jörg Schwenk:
Your Software at my Service: Security Analysis of SaaS Single Sign-On Solutions in the Cloud. CCSW 2014: 93-104 - [c88]Andreas Mayer, Marcus Niemietz, Vladislav Mladenov, Jörg Schwenk:
Guardians of the Clouds: When Identity Providers Fail. CCSW 2014: 105-116 - [c87]Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, Douglas Stebila:
Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol. CCS 2014: 369-381 - [c86]Jörg Schwenk:
Modelling Time for Authenticated Key Exchange Protocols. ESORICS (2) 2014: 277-294 - [c85]Ashar Javed, David Bletgen, Florian Kohlar, Markus Dürmuth, Jörg Schwenk:
Secure Fallback Authentication and the Trusted Friend Attack. ICDCS Workshops 2014: 22-28 - [c84]Ashar Javed, Jens Riemer, Jörg Schwenk:
SIACHEN: A Fine-Grained Policy Language for the Mitigation of Cross-Site Scripting Attacks. ISC 2014: 515-528 - [c83]Andreas Mayer, Vladislav Mladenov, Jörg Schwenk, Florian Feldmann, Christopher Meyer:
Strengthening Web Authentication through TLS - Beyond TLS Client Certificates. Open Identity Summit 2014: 97-108 - [c82]Yong Li, Sven Schäge, Zheng Yang, Florian Kohlar, Jörg Schwenk:
On the Security of the Pre-shared Key Ciphersuites of TLS. Public Key Cryptography 2014: 669-684 - [c81]Andreas Mayer, Vladislav Mladenov, Jörg Schwenk:
On the Security of Holder-of-Key Single Sign-On. Sicherheit 2014: 65-77 - [c80]Ashar Javed, Christian Merz, Jörg Schwenk:
TTPCookie: Flexible Third-Party Cookie Management for Increasing Online Privacy. TrustCom 2014: 37-44 - [c79]Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jörg Schwenk, Sebastian Schinzel, Erik Tews:
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks. USENIX Security Symposium 2014: 733-748 - [c78]Ashar Javed, Jörg Schwenk:
Systematically Breaking Online WYSIWYG Editors. WISA 2014: 122-133 - [i15]Christian Mainka, Vladislav Mladenov, Jörg Schwenk:
Do not trust me: Using malicious IdPs for analyzing and attacking Single Sign-On. CoRR abs/1412.1623 (2014) - [i14]Yong Li, Sven Schäge, Zheng Yang, Florian Kohlar, Jörg Schwenk:
On the Security of the Pre-Shared Key Ciphersuites of TLS. IACR Cryptol. ePrint Arch. 2014: 37 (2014) - [i13]Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Jörg Schwenk, Thorsten Holz:
How Secure is TextSecure? IACR Cryptol. ePrint Arch. 2014: 904 (2014) - 2013
- [j9]Tibor Jager, Jörg Schwenk:
On the Analysis of Cryptographic Assumptions in the Generic Ring Model. J. Cryptol. 26(2): 225-245 (2013) - [c77]Mario Heiderich, Jörg Schwenk, Tilman Frosch, Jonas Magazinius, Edward Z. Yang:
mXSS attacks: attacking well-secured web-applications by using innerHTML mutations. CCS 2013: 777-788 - [c76]Kai Michaelis, Christopher Meyer, Jörg Schwenk:
Randomly Failed! The State of Randomness in Current Java Implementations. CT-RSA 2013: 129-144 - [c75]Detlef Hühnlein, Jörg Schwenk, Tobias Wich, Vladislav Mladenov, Florian Feldmann, Andreas Mayer, Johannes Schmölz, Bud P. Bruegger, Moritz Horsch:
Options for integrating eID and SAML. Digital Identity Management 2013: 85-96 - [c74]Andreas Falkenberg, Christian Mainka, Juraj Somorovsky, Jörg Schwenk:
A New Approach towards DoS Penetration Testing on Web Services. ICWS 2013: 491-498 - [c73]Florian Feldmann, Jörg Schwenk:
How to authenticate mobile devices in a web environment - the SIM-ID approach. Open Identity Summit 2013: 130-141 - [c72]Ashar Javed, Jörg Schwenk:
Towards Elimination of Cross-Site Scripting on Mobile Versions of Web Applications. WISA 2013: 103-123 - [c71]Christopher Meyer, Jörg Schwenk:
SoK: Lessons Learned from SSL/TLS Attacks. WISA 2013: 189-209 - [c70]Abeer Elsafie, Christian Mainka, Jörg Schwenk:
A new approach for WS-Policy Intersection using Partial Ordered Sets. ZEUS 2013: 45-48 - [i12]Christopher Meyer, Jörg Schwenk:
Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses. IACR Cryptol. ePrint Arch. 2013: 49 (2013) - [i11]Florian Kohlar, Sven Schäge, Jörg Schwenk:
On the Security of TLS-DH and TLS-RSA in the Standard Model. IACR Cryptol. ePrint Arch. 2013: 367 (2013) - [i10]Jörg Schwenk:
Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos. IACR Cryptol. ePrint Arch. 2013: 604 (2013) - [i9]Benjamin Dowling, Florian Giesen, Florian Kohlar, Jörg Schwenk, Douglas Stebila:
Multi-ciphersuite security and the SSH protocol. IACR Cryptol. ePrint Arch. 2013: 813 (2013) - 2012
- [j8]Meiko Jensen, Holger Junker, Luigi Lo Iacono, Christian Mainka, Jörg Schwenk:
XML Signature Wrapping Angriffe wirksam unterbinden. Datenschutz und Datensicherheit 36(4): 236-240 (2012) - [c69]Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk:
Scriptless attacks: stealing the pie without touching the sill. CCS 2012: 760-771 - [c68]Christian Mainka, Meiko Jensen, Luigi Lo Iacono, Jörg Schwenk:
Making XML Signatures Immune to XML Signature Wrapping Attacks. CLOSER (Selected Papers) 2012: 151-167 - [c67]Christian Mainka, Meiko Jensen, Luigi Lo Iacono, Jörg Schwenk:
XSpRES - Robust and Effective XML Signatures for Web Services. CLOSER 2012: 187-197 - [c66]Juraj Somorovsky, Christopher Meyer, Thang Tran, Mohamad Sbeiti, Jörg Schwenk, Christian Wietfeld:
SeC2: Secure Mobile Solution for Distributed Public Cloud Storages. CLOSER 2012: 555-561 - [c65]Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk:
On the Security of TLS-DHE in the Standard Model. CRYPTO 2012: 273-293 - [c64]Christopher Meyer, Florian Feldmann, Jörg Schwenk:
Sometimes It's Better to Be STUCK! SAML Transportation Unit for Cryptographic Keys. ICISC 2012: 110-125 - [c63]Zheng Yang, Jörg Schwenk:
Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles. ProvSec 2012: 264-275 - [c62]Christian Mainka, Juraj Somorovsky, Jörg Schwenk:
Penetration Testing Tool for Web Services Security. SERVICES 2012: 163-170 - [c61]Juraj Somorovsky, Jörg Schwenk:
Technical Analysis of Countermeasures against Attack on XML Encryption - or - Just Another Motivation for Authenticated Encryption. SERVICES 2012: 171-178 - [c60]Detlef Hühnlein, Dirk Petrautzki, Johannes Schmölz, Tobias Wich, Moritz Horsch, Thomas Wieland, Jan Eichholz, Alexander Wiesmaier, Johannes Braun, Florian Feldmann, Simon Potzernheim, Jörg Schwenk, Christian Kahlo, Andreas Kühne, Heiko Veit:
On the design and implementation of the Open eCard App. Sicherheit 2012: 95-110 - [c59]Juraj Somorovsky, Andreas Mayer, Jörg Schwenk, Marco Kampmann, Meiko Jensen:
On Breaking SAML: Be Whoever You Want to Be. USENIX Security Symposium 2012: 397-412 - 2011
- [j7]Florian Kohlar, Jörg Schwenk, Meiko Jensen, Sebastian Gajek:
On Cryptographically Strong Bindings of SAML Assertions to Transport Layer Security. Int. J. Mob. Comput. Multim. Commun. 3(4): 20-35 (2011) - [c58]