Publications
Crouching Tiger - Hidden Payload: Security Risks of Scalable Vectors Graphics
2011 - Mario Heiderich, Tilman Frosch, Meiko Jensen, Thorsten Holz
18th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, October 2011 [PDF]The Bug that made me President: A Browser- and Web-Security Case Study on Helios Voting
2011 - Mario Heiderich, Tilman Frosch, Marcus Niemietz, Jörg Schwenk
International Conference on E-voting and Identity (VoteID), 2011, Tallinn, Estonia, September 2011 [Website]Direct Anonymous Attestation: Enhancing Cloud Service User Privacy
2011 - Ulrich Greveler, Dennis Löhr, Benjamin Justus
[Paper]IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM
2011 - Mario Heiderich, Tilman Frosch, Thorsten Holz
14th International Symposium on Recent Advances in Intrusion Detection (RAID), Menlo Park, CA, September 2011 [PDF]On the Effectiveness of XML Schema Validation for Countering XML Signature Wrapping Attacks
2011 - Meiko Jensen, Christopher Meyer, Juraj Somorovsky, Jörg Schwenk
In IWSSC 2011: First International Workshop on Securing Services on the Cloud, Sept. 2011 [Paper] [Slides]Short Signatures from Weaker Assumptions
2011 - Dennis Hofheinz, Tibor Jager, Eike Kiltz
Asiacrypt 2011 [Full Version]All Your Clouds are Belong to us – Security Analysis of Cloud Management Interfaces
2011 - Juraj Somorovsky, Mario Heiderich, Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo Iacono
In Proceedings of the ACM Cloud Computing Security Workshop (CCSW), 2011. [pdf]How To Break XML Encryption
2011 - Tibor Jager, Juraj Somorovsky
In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), 2011. [pdf]The Power of Recognition: Secure Single Sign-On using TLS Channel Bindings
2011 - Jörg Schwenk, Florian Kohlar, Marcus Amon
In Proceedings of the Seventh ACM Workshop on Digital Identity Management (DIM) (October 21, 2011, Chicago, IL, USA. Collocated with ACM CCS 2011) Copyright 2011 ACM 978-1-4503-1006-2/11/10…$10.00. [Paper]Cloud-Sicherheit ohne vertrauenswürdige Administration
2011 - Ulrich Greveler, Dennis Löhr, Benjamin Justus
[Paper]Sec2 – Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage
2011 - Christopher Meyer, Juraj Somorovsky, Jörg Schwenk, Benedikt Driessen, Thang Tran, Christian Wietfeld
In Proceedings of the DACH Security 2011, Oldenburg, Germany [Paper] [Slides]A Privacy Preserving System for Cloud Computing
2011 - Ulrich Greveler, Dennis Löhr, Benjamin Justus
[Paper]Mutual Remote Attestation: Enabling System Cloning for TPM based Platforms
2011 - Ulrich Greveler, Dennis Löhr, Benjamin Justus
[Paper]Expressiveness Considerations of XML Signatures
2011 - Meiko Jensen, Christopher Meyer
In Proceedings of the 3rd IEEE International Workshop on Security Aspects of Process and Services Engineering (SAPSE), Munich, Germany. [Paper] [Slides]MARV - Data Level Confidentiality Protection in BPEL-based Web Service Compositions
2011 - Majernik, Filip, Meiko Jensen, Jörg Schwenk
In Proceedings of the 6th International Conference on Network Architectures and Information Systems Security (SAR-SSI), La Rochelle, France.Security Prospects through Cloud Computing by Adopting Multiple Clouds
2011 - Bohli, Jens-Matthias, Meiko Jensen, Gruschka, Nils, Lo Iacono, Luigi, Jörg Schwenk
In Proceedings of the 4th IEEE International Conference on Cloud Computing (CLOUD), Washington, D.C., USA.Towards Privacy-Preserving XML Transformation
2011 - Meiko Jensen, Kerschbaum, Florian
In Proceedings of the 9th IEEE International Conference on Web Services (ICWS), Washington, D.C., USA.Sicheres Single Sign-On mit dem SAML Holder-of-Key Web Browser SSO Profile und SimpleSAMLphp
2011 - Andreas Mayer, Jörg Schwenk
In 12. Deutscher IT-Sicherheitskongress des BSI: Sicher in die digitale Welt von morgen, Seiten 33--46, SecuMedia VerlagEvaluating the Impact of Transmission Power on QoS in Wireless Mesh Networks
2011 - Andreas Noack, Patrick-Benjamin Bök, Sebastian Krück
IEEE ICCCN 2011 Workshop on Context-aware QoS Provisioning and Management for Emerging Networks, Applications and Services - ContextQoS 2011, Hawaii, Juli-August 2011 (to be published)Mining Network and the Security Question
2011 - Christoph Müller, Andreas Noack
35th APCOM Symposium - Application of Computers and Operations Research in the Mineral Industry, Australia, September 2011 (to be published)