Veröffentlichungen
Tightly secure signatures and public-key encryption
2012 - Dennis Hofheinz, Tibor Jager
CRYPTO 2012 [Full Version]Waters signatures with optimal security reduction
2012 - Dennis Hofheinz, Tibor Jager, Edward Knapp
PKC 2012 [Full Version]Down to the Bare Metal: Using Processor Features for Binary Analysis
2012 - Carsten Willems, Ralf Hund, Amit Vasudevan, Andreas Fobian, Dennis Felsch, Thorsten Holz
Annual Computer Security Applications Conference (ACSAC), Orlando, FL, December 2012 [pdf]UI Redressing Attacks on Android Devices
2012 - Marcus Niemietz, Jörg Schwenk
Black Hat Abu Dhabi 2012Sometimes it's better to be STUCK! - SAML Transportation Unit for Cryptographic Keys
2012 - Christopher Meyer, Florian Feldmann, Jörg Schwenk
15th Annual International Conference on Information Security and Cryptology, ICISC 2012 [Slides] [Paper]SS-FP: Browser Fingerprinting using HTML Parser Quirks
2012 - Erwan Abgrall, Yves Le Traon, Martin Monperrus, Sylvain Gombault, Mario Heiderich, Alain Ribault
[Cornell University]Scriptless Attacks – Stealing the Pie Without Touching the Sill
2012 - Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk
19th ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, October 2012 [PDF]On the Security of TLS-DHE in the Standard Model
2012 - Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
In Advances in Cryptology – CRYPTO 2012, Lecture Notes in Computer Science, 2012, Volume 7417/2012, 273-293, DOI: 10.1007/978-3-642-32009-5_17 [Full_Version]On the Fragility and Limitations of Current Browser-provided Clickjacking Protection Schemes
2012 - Sebastian Lekies, Mario Heiderich, Dennis Appelt, Thorsten Holz, Martin Johns
6th USENIX Workshop on Offensive Technologies (WOOT), Bellevue, WA, August 2012 [PDF]Multimedia Content Identification Through Smart Meter Power Usage Profiles
2012 - Ulrich Greveler, Dennis Löhr, Benjamin Justus
[Paper]