Ver­öf­fent­li­chun­gen

Ran­dom­ly Fai­led! The State of Ran­dom­ness in Cur­rent Java Im­ple­men­ta­ti­ons

2013 - Kai Michae­lis, Chris­to­pher Meyer, Jörg Schwenk

Cryp­to­gra­phy track at RSA Con­fe­rence 2013 (CT-RSA 2013) [Paper] [Sli­des]

A new ap­proach for WS-Po­li­cy In­ter­sec­tion using Par­ti­al Or­de­red Sets

2013 - Chris­ti­an Main­ka, Jörg Schwenk

5th Cen­tral Eu­ropean Work­shop on Ser­vices and their Com­po­si­ti­on, ZEUS 2013 Fe­bru­ary 21-22, 2013, Ros­tock, Ger­ma­ny [PDF]

Wa­ters si­gna­tu­res with op­ti­mal se­cu­ri­ty re­duc­tion

2012 - Den­nis Hof­heinz, Tibor Jager, Ed­ward Knapp

PKC 2012 [Full Ver­si­on]

Down to the Bare Metal: Using Pro­ces­sor Fea­tures for Bi­na­ry Ana­ly­sis

2012 - Cars­ten Wil­lems, Ralf Hund, Amit Va­su­de­van, An­dre­as Fo­bi­an, Den­nis Felsch, Thors­ten Holz

An­nual Com­pu­ter Se­cu­ri­ty Ap­p­li­ca­ti­ons Con­fe­rence (ACSAC), Or­lan­do, FL, De­cem­ber 2012 [pdf]

UI Re­dres­sing At­tacks on An­dro­id De­vices

2012 - Mar­cus Nie­mietz, Jörg Schwenk

Black Hat Abu Dhabi 2012

So­me­ti­mes it's bet­ter to be STUCK! - SAML Trans­por­ta­ti­on Unit for Cryp­to­gra­phic Keys

2012 - Chris­to­pher Meyer, Flo­ri­an Feld­mann, Jörg Schwenk

15th An­nual In­ter­na­tio­nal Con­fe­rence on In­for­ma­ti­on Se­cu­ri­ty and Cryp­to­lo­gy, ICISC 2012 [Sli­des] [Paper]

SS-FP: Brow­ser Fin­ger­prin­ting using HTML Par­ser Quirks

2012 - Erwan Ab­grall, Yves Le Traon, Mar­tin Mon­per­rus, Syl­vain Gom­bault, Mario Hei­de­rich, Alain Ri­bault

[Cor­nell Uni­ver­si­ty]

Script­less At­tacks – Ste­aling the Pie Wi­thout Tou­ch­ing the Sill

2012 - Mario Hei­de­rich, Mar­cus Nie­mietz, Felix Schus­ter, Thors­ten Holz, Jörg Schwenk

19th ACM Con­fe­rence on Com­pu­ter and Com­mu­ni­ca­ti­ons Se­cu­ri­ty (CCS), Ral­eigh, NC, Oc­to­ber 2012 [PDF]
Seite: