Veröffentlichungen
Clickjacking und UI-Redressing – Vom Klick-Betrug zum Datenklau
2012 - Marcus Niemietz
Ein Leitfaden für Sicherheitsexperten und Webentwickler [dpunkt.verlag]XSpRES: XML-Signaturen, aber sicher!
2012 - Christian Mainka, Junker, Holger, Lo Iacono, Luigi, Jörg Schwenk
DuD - Datenschutz und Datensicherheit Ausgabe 04/2012XML Signature Wrapping: Die Kunst SAML Assertions zu fälschen
2012 - Andreas Mayer, Jörg Schwenk
In 19. DFN~Workshop: Sicherheit in vernetzten Systemen, Seiten H1-H15, BoD - Books on DemandIdentifikation von Videoinhalten über granulare Stromverbrauchsdaten
2012 - Ulrich Greveler, Dennis Löhr, Benjamin Justus
[Paper]Crouching Tiger - Hidden Payload: Security Risks of Scalable Vectors Graphics
2011 - Mario Heiderich, Tilman Frosch, Meiko Jensen, Thorsten Holz
18th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, October 2011 [PDF]STEED — Usable End-to-End Encryption
2011 - Werner Koch, Marcus Brinkmann
White Paper, g10code GmbH [PDF]The Bug that made me President: A Browser- and Web-Security Case Study on Helios Voting
2011 - Mario Heiderich, Tilman Frosch, Marcus Niemietz, Jörg Schwenk
International Conference on E-voting and Identity (VoteID), 2011, Tallinn, Estonia, September 2011 [Website]Direct Anonymous Attestation: Enhancing Cloud Service User Privacy
2011 - Ulrich Greveler, Dennis Löhr, Benjamin Justus
[Paper]IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM
2011 - Mario Heiderich, Tilman Frosch, Thorsten Holz
14th International Symposium on Recent Advances in Intrusion Detection (RAID), Menlo Park, CA, September 2011 [PDF]On the Effectiveness of XML Schema Validation for Countering XML Signature Wrapping Attacks
2011 - Meiko Jensen, Christopher Meyer, Juraj Somorovsky, Jörg Schwenk
In IWSSC 2011: First International Workshop on Securing Services on the Cloud, Sept. 2011 [Paper] [Slides]