Ver­öf­fent­li­chun­gen

Crou­ch­ing Tiger - Hi­d­den Pay­load: Se­cu­ri­ty Risks of Scalable Vec­tors Gra­phics

2011 - Mario Hei­de­rich, Til­man Frosch, Meiko Jen­sen, Thors­ten Holz

18th ACM Con­fe­rence on Com­pu­ter and Com­mu­ni­ca­ti­ons Se­cu­ri­ty (CCS), Chi­ca­go, IL, Oc­to­ber 2011 [PDF]

STEED — Usa­ble End-to-End En­cryp­ti­on

2011 - Wer­ner Koch, Mar­cus Brink­mann

White Paper, g10­code GmbH [PDF]

The Bug that made me Pre­si­dent: A Brow­ser- and Web-Se­cu­ri­ty Case Study on He­li­os Vo­ting

2011 - Mario Hei­de­rich, Til­man Frosch, Mar­cus Nie­mietz, Jörg Schwenk

In­ter­na­tio­nal Con­fe­rence on E-vo­ting and Iden­ti­ty (Vo­teID), 2011, Tal­linn, Es­to­nia, Sep­tem­ber 2011 [Web­site]

Di­rect An­ony­mous At­te­sta­ti­on: En­han­cing Cloud Ser­vice User Pri­va­cy

2011 - Ul­rich Gre­ve­ler, Den­nis Löhr, Ben­ja­min Jus­tus

[Paper]

Ice­S­hield: De­tec­tion and Miti­ga­ti­on of Ma­li­cious Web­sites with a Fro­zen DOM

2011 - Mario Hei­de­rich, Til­man Frosch, Thors­ten Holz

14th In­ter­na­tio­nal Sym­po­si­um on Re­cent Ad­van­ces in In­tru­si­on De­tec­tion (RAID), Menlo Park, CA, Sep­tem­ber 2011 [PDF]

On the E ffec­tiven­ess of XML Sche­ma Va­li­da­ti­on for Coun­tering XML Si­gna­tu­re Wrap­ping At­tacks

2011 - Meiko Jen­sen, Chris­to­pher Meyer, Juraj So­mo­rovs­ky, Jörg Schwenk

In IWSSC 2011: First In­ter­na­tio­nal Work­shop on Se­cu­ring Ser­vices on the Cloud, Sept. 2011 [Paper] [Sli­des]

Short Si­gna­tu­res from Wea­ker As­sump­ti­ons

2011 - Den­nis Hof­heinz, Tibor Jager, Eike Kiltz

Asi­a­crypt 2011 [Full Ver­si­on]

All Your Clouds are Be­long to us – Se­cu­ri­ty Ana­ly­sis of Cloud Ma­nage­ment In­ter­faces

2011 - Juraj So­mo­rovs­ky, Mario Hei­de­rich, Meiko Jen­sen, Jörg Schwenk, Nils Grusch­ka, Luigi Lo Ia­co­no

In Pro­cee­dings of the ACM Cloud Com­pu­ting Se­cu­ri­ty Work­shop (CCSW), 2011. [pdf]

How To Break XML En­cryp­ti­on

2011 - Tibor Jager, Juraj So­mo­rovs­ky

In Pro­cee­dings of the 18th ACM Con­fe­rence on Com­pu­ter and Com­mu­ni­ca­ti­ons Se­cu­ri­ty (CCS), 2011. [pdf]

The Power of Re­co­gni­ti­on: Se­cu­re Sin­gle Sign-On using TLS Chan­nel Bin­dings

2011 - Jörg Schwenk, Flo­ri­an Kohlar, Mar­cus Amon

In Pro­cee­dings of the Seventh ACM Work­shop on Di­gi­tal Iden­ti­ty Ma­nage­ment (DIM) (Oc­to­ber 21, 2011, Chi­ca­go, IL, USA. Col­lo­ca­ted with ACM CCS 2011) Co­py­right 2011 ACM 978-1-4503-1006-2/11/10…$10.​00. [Paper]
Seite: