Publications
Tightly secure signatures and public-key encryption
2012 - Dennis Hofheinz, Tibor Jager
CRYPTO 2012 [Full Version]Waters signatures with optimal security reduction
2012 - Dennis Hofheinz, Tibor Jager, Edward Knapp
PKC 2012 [Full Version]Down to the Bare Metal: Using Processor Features for Binary Analysis
2012 - Carsten Willems, Ralf Hund, Amit Vasudevan, Andreas Fobian, Dennis Felsch, Thorsten Holz
Annual Computer Security Applications Conference (ACSAC), Orlando, FL, December 2012 [pdf]UI Redressing Attacks on Android Devices
2012 - Marcus Niemietz, Jörg Schwenk
Black Hat Abu Dhabi 2012Sometimes it's better to be STUCK! - SAML Transportation Unit for Cryptographic Keys
2012 - Christopher Meyer, Florian Feldmann, Jörg Schwenk
15th Annual International Conference on Information Security and Cryptology, ICISC 2012 [Slides] [Paper]SS-FP: Browser Fingerprinting using HTML Parser Quirks
2012 - Erwan Abgrall, Yves Le Traon, Martin Monperrus, Sylvain Gombault, Mario Heiderich, Alain Ribault
[Cornell University]Scriptless Attacks – Stealing the Pie Without Touching the Sill
2012 - Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk
19th ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, October 2012 [PDF]On the Security of TLS-DHE in the Standard Model
2012 - Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
In Advances in Cryptology – CRYPTO 2012, Lecture Notes in Computer Science, 2012, Volume 7417/2012, 273-293, DOI: 10.1007/978-3-642-32009-5_17 [Full_Version]On the Fragility and Limitations of Current Browser-provided Clickjacking Protection Schemes
2012 - Sebastian Lekies, Mario Heiderich, Dennis Appelt, Thorsten Holz, Martin Johns
6th USENIX Workshop on Offensive Technologies (WOOT), Bellevue, WA, August 2012 [PDF]Multimedia Content Identification Through Smart Meter Power Usage Profiles
2012 - Ulrich Greveler, Dennis Löhr, Benjamin Justus
[Paper]On Breaking SAML: Be Whoever You Want to Be
2012 - Juraj Somorovsky, Andreas Mayer, Jörg Schwenk, Marco Kampmann, Meiko Jensen
In Proceedings of the 21st USENIX Security Symposium, 2012 [pdf]Penetration Testing Tool for Web Services Security
2012 - Christian Mainka, Juraj Somorovsky, Jörg Schwenk
In Proceeding of the IEEE 2012 Services Workshop on Security and Privacy Engineering (SPE2012) [pdf]Technical Analysis of Countermeasures against Attack on XML Encryption - or - Just Another Motivation for Authenticated Encryption
2012 - Juraj Somorovsky, Jörg Schwenk
In Proceedings of the SERVICES Workshop on Security and Privacy Engineering, 2012 [pdf]Bleichenbacher’s Attack Strikes Again: Breaking PKCS#1 v1.5 in XML Encryption
2012 - Tibor Jager, Sebastian Schinzel, Juraj Somorovsky
In Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS), 2012, Full Version [pdf]Forensic Content Detection through Power Consumption
2012 - Ulrich Greveler, Dennis Löhr, Benjamin Justus
[Paper]Sec2: Secure Mobile Solution for Distributed Public Cloud Storages
2012 - Juraj Somorovsky, Christopher Meyer, Thang Tran, Mohamad Sbeiti, Jörg Schwenk, Christian Wietfeld
In Proceedings of the 2nd International Conference on Cloud Computing and Services Science (CLOSER), 2012 [Paper] [Slides]XSpRES: Robust and Effective XML Signatures for Web Services
2012 - Christian Mainka, Meiko Jensen, Lo Iacono, Luigi, Jörg Schwenk
In Proceedings of the 2nd International Conference on Cloud Computing and Services Science (CLOSER), 2012 [pdf]Clickjacking und UI-Redressing – Vom Klick-Betrug zum Datenklau
2012 - Marcus Niemietz
Ein Leitfaden für Sicherheitsexperten und Webentwickler [dpunkt.verlag]XSpRES: XML-Signaturen, aber sicher!
2012 - Christian Mainka, Junker, Holger, Lo Iacono, Luigi, Jörg Schwenk
DuD - Datenschutz und Datensicherheit Ausgabe 04/2012XML Signature Wrapping: Die Kunst SAML Assertions zu fälschen
2012 - Andreas Mayer, Jörg Schwenk
In 19. DFN~Workshop: Sicherheit in vernetzten Systemen, Seiten H1-H15, BoD - Books on DemandIdentifikation von Videoinhalten über granulare Stromverbrauchsdaten
2012 - Ulrich Greveler, Dennis Löhr, Benjamin Justus
[Paper]