Veröffentlichungen

Tightly secure signatures and public-key encryption

2012 - Dennis Hofheinz, Tibor Jager

CRYPTO 2012 [Full Version]

Waters signatures with optimal security reduction

2012 - Dennis Hofheinz, Tibor Jager, Edward Knapp

PKC 2012 [Full Version]

Down to the Bare Metal: Using Processor Features for Binary Analysis

2012 - Carsten Willems, Ralf Hund, Amit Vasudevan, Andreas Fobian, Dennis Felsch, Thorsten Holz

Annual Computer Security Applications Conference (ACSAC), Orlando, FL, December 2012 [pdf]

UI Redressing Attacks on Android Devices

2012 - Marcus Niemietz, Jörg Schwenk

Black Hat Abu Dhabi 2012

Sometimes it's better to be STUCK! - SAML Transportation Unit for Cryptographic Keys

2012 - Christopher Meyer, Florian Feldmann, Jörg Schwenk

15th Annual International Conference on Information Security and Cryptology, ICISC 2012 [Slides] [Paper]

SS-FP: Browser Fingerprinting using HTML Parser Quirks

2012 - Erwan Abgrall, Yves Le Traon, Martin Monperrus, Sylvain Gombault, Mario Heiderich, Alain Ribault

[Cornell University]

Scriptless Attacks – Stealing the Pie Without Touching the Sill

2012 - Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk

19th ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, October 2012 [PDF]

On the Security of TLS-DHE in the Standard Model

2012 - Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk

In Advances in Cryptology – CRYPTO 2012, Lecture Notes in Computer Science, 2012, Volume 7417/2012, 273-293, DOI: 10.1007/978-3-642-32009-5_17 [Full_Version]

On the Fragility and Limitations of Current Browser-provided Clickjacking Protection Schemes

2012 - Sebastian Lekies, Mario Heiderich, Dennis Appelt, Thorsten Holz, Martin Johns

6th USENIX Workshop on Offensive Technologies (WOOT), Bellevue, WA, August 2012 [PDF]

Multimedia Content Identification Through Smart Meter Power Usage Profiles

2012 - Ulrich Greveler, Dennis Löhr, Benjamin Justus

[Paper]
Seite: