Ruhr-University Bochum

General Info

Rank: #13 Worldwide
#3 in Europe
Papers: 140
Number of Researchers: 141
APA
(average papers per authors):
1.0
Country: GERMANY

Activity Map

Contributors

  • Thorsten Holz (47 papers)
  • Jorg Schwenk (23 papers)
  • Juraj Somorovsky (13 papers)
  • Cornelius Aschermann (12 papers)
  • Christian Mainka (9 papers)
  • Markus Duermuth (8 papers)
  • Ali Abbasi (8 papers)
  • Vladislav Mladenov (8 papers)
  • Robert Gawlik (7 papers)
  • Jens Muller (7 papers)
  • Christof Paar (7 papers)
  • Maximilian Golla (6 papers)
  • Katharina Kohls (6 papers)
  • Sergej Schumilo (6 papers)
  • Tim Blazytko (6 papers)
  • Benjamin Kollenda (5 papers)
  • Moritz Contag (5 papers)
  • Felix Schuster (5 papers)
  • Robert Merget (5 papers)
  • Ralf Hund (4 papers)
  • Philipp Koppe (4 papers)
  • David Rupprecht (4 papers)
  • Simon Worner (4 papers)
  • Tobias Scharnowski (4 papers)
  • Eike Kiltz (4 papers)
  • Amir Moradi (4 papers)
  • Marcus Brinkmann (4 papers)
  • Tibor Jager (3 papers)
  • Johannes Dahse (3 papers)
  • Behrad Garmany (3 papers)
  • Andre Pawlowski (3 papers)
  • Martin Degeling (3 papers)
  • Kai Jansen (3 papers)
  • Simon Rohlmann (3 papers)
  • Mario Heiderich (3 papers)
  • Marcus Niemietz (3 papers)
  • Max Hoffmann (3 papers)
  • Daniel J. Bernstein (3 papers)
  • Moritz Schloegel (3 papers)
  • Joel Frank (3 papers)
  • Thomas Fischer (2 papers)
  • Christian Rossow (2 papers)
  • Lea Schonherr (2 papers)
  • Dorothea Kolossa (2 papers)
  • Christine Utz (2 papers)
  • Christopher Lentzsch (2 papers)
  • Sebastian Uellenbeck (2 papers)
  • Christopher Wolf (2 papers)
  • Carsten Willems (2 papers)
  • Jannik Pewny (2 papers)
  • Julian Loss (2 papers)
  • Philipp Markert (2 papers)
  • Markus Durmuth (2 papers)
  • Alexander May (2 papers)
  • Veelasha Moonsamy (2 papers)
  • Ahmad-Reza Sadeghi (2 papers)
  • Tilman Frosch (2 papers)
  • Meiko Jensen (2 papers)
  • Florian Kohlar (2 papers)
  • Sebastian Lekies (2 papers)
  • Sven Schage (2 papers)
  • Marc Fyrbiak (2 papers)
  • Christian Kison (2 papers)
  • Sascha Fahl (2 papers)
  • Martin Grothe (2 papers)
  • Tim Guneysu (2 papers)
  • Moritz Schlogel (2 papers)
  • Steffen Zeiler (1 papers)
  • Henry Hosseini (1 papers)
  • Daniel Teuchert (1 papers)
  • Teemu Rytilahti (1 papers)
  • Dominik Noss (1 papers)
  • Tobias Urban (1 papers)
  • Dennis Tatang (1 papers)
  • Johannes Hoffmann (1 papers)
  • Benedikt Driessen (1 papers)
  • Thomas Tendyck (1 papers)
  • Daniel Bailey (1 papers)
  • Marco Gutfleisch (1 papers)
  • M. Angela Sasse (1 papers)
  • Florian Schweins (1 papers)
  • Simon Mulzer (1 papers)
  • Stefan Roth (1 papers)
  • Aydin Sezgin (1 papers)
  • Onder Askin (1 papers)
  • Tim Kutta (1 papers)
  • Holger Dette (1 papers)
  • Wilko Henecka (1 papers)
  • Stefan Kogl (1 papers)
  • Thomas Schneider (1 papers)
  • Immo Wehrenberg (1 papers)
  • Lucas Davi (1 papers)
  • Alexandra Dmitrienko (1 papers)
  • Marcel Winandy (1 papers)
  • Timo Kasper (1 papers)
  • Florian Giesen (1 papers)
  • Florian Bergsma (1 papers)
  • Nikolai Krein (1 papers)
  • Manuel Fersch (1 papers)
  • Bertram Poettering (1 papers)
  • Benedict Beuscher (1 papers)
  • Sebastian Faust (1 papers)
  • Yong Li (1 papers)
  • Lukas Knittel (1 papers)
  • Dominik Trevor No (1 papers)
  • Kevin Borgolte (1 papers)
  • Julien Duman (1 papers)
  • Jakob Feldtkeller (1 papers)
  • Jan Richter-Brockmann (1 papers)
  • Pascal Sasdrich (1 papers)
  • Louis Jannett (1 papers)
  • Doreen Riepel (1 papers)
  • Lukas Bernhard (1 papers)
  • David Knichel (1 papers)
  • Georg Land (1 papers)
  • Aein Rezaei Shahmirzadi (1 papers)
  • Dominik Hartmann (1 papers)
  • Nils Fleischhacker (1 papers)
  • Apostolis Zarras (1 papers)
  • Marco Kampmann (1 papers)
  • Marc Kuehrer (1 papers)
  • Thomas Hupperich (1 papers)
  • Christopher Meyer (1 papers)
  • Eugen Weiss (1 papers)
  • Susanne Engels (1 papers)
  • Dennis Felsch (1 papers)
  • Janis Fliegenschmidt (1 papers)
  • Emre Guler (1 papers)
  • Maik Ender (1 papers)
  • Leona Lassak (1 papers)
  • Nils Albartus (1 papers)
  • Clemens Nasenberg (1 papers)
  • Florian Stolz (1 papers)
  • Florian M. Farke (1 papers)
  • Thorsten Eisenhofer (1 papers)
  • Ming-Shing Chen (1 papers)
  • Nils Bars (1 papers)
  • Johannes Willbold (1 papers)
  • Julius Basler (1 papers)
  • Marcel Maehren (1 papers)
  • Philipp Nieting (1 papers)

Papers

"TASTY: tool for automating secure two-party computations"

Wilko Henecka, Stefan Kogl, Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg, ... -- CCS 2010

"Return-oriented programming without returns"

Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy, ... -- CCS 2010

"Mobile Security Catching Up? - Revealing the nuts and bolts of the security of mobile devices"

Johannes Hoffmann, Thorsten Holz, Sebastian Uellenbeck, Christopher Wolf, ... -- Oakland 2011

"On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks - Extracting Keys from Xilinx Virtex-II FPGAs"

Amir Moradi, Timo Kasper, Christof Paar, ... -- CCS 2011

"How to Break XML Encryption"

Tibor Jager, Juraj Somorovsky, ... -- CCS 2011

"Crouching Tiger - Hidden Payload: Security Risks of Scalable Vectors Graphics"

Mario Heiderich, Tilman Frosch, Meiko Jensen, Thorsten Holz, ... -- CCS 2011

"BOTMAGNIFIER: Locating Spambots on the Internet"

Thorsten Holz, ... -- Usenix 2011

"JACKSTRAWS: Picking Command and Control Connections from Bot Traffic"

Ralf Hund, Thorsten Holz, ... -- Usenix 2011

"Adaptive Password-Strength Meters from Markov Models"

Markus Duermuth, ... -- NDSS 2012

"MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones"

Thomas Fischer, Thorsten Holz, Ralf Hund, ... -- NDSS 2012

"Towards Taming Privilege-Escalation Attacks on Android"

Thomas Fischer, ... -- NDSS 2012

"Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards"

Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz, ... -- Oakland 2012

"Scriptless Attacks"

Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jorg Schwenk, ... -- CCS 2012

"B@bel: Leveraging Email Delivery for Spam Mitigation"

Apostolis Zarras, Thorsten Holz, ... -- Usenix 2012

"On Breaking SAML: Be Whoever You Want to Be"

Juraj Somorovsky, Jorg Schwenk, Marco Kampmann, Meiko Jensen, ... -- Usenix 2012

"One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography"

Tibor Jager, Juraj Somorovsky, ... -- NDSS 2013

"Practical Timing Side Channel Attacks Against Kernel Space ASLR"

Ralf Hund, Carsten Willems, Thorsten Holz, ... -- Oakland 2013

"On the Security of TLS Renegotiation"

Florian Giesen, Florian Kohlar, ... -- CCS 2013

"Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns"

Sebastian Uellenbeck, Markus Duermuth, Christopher Wolf, Thorsten Holz, ... -- CCS 2013

"Towards Reducing the Attack Surface of Software Backdoors"

Felix Schuster, Thorsten Holz, ... -- CCS 2013

"mXSS Attacks: Attacking well-secured Web-Applications by using innerHTML Mutations"

Mario Heiderich, Jorg Schwenk, Tilman Frosch, ... -- CCS 2013

"Amplification Hell: Revisiting Network Protocols for DDoS Abuse"

Christian Rossow, ... -- NDSS 2014

"Simulation of Built-in PHP Features for Precise Static Code Analysis"

Johannes Dahse, Thorsten Holz, ... -- NDSS 2014

"Multi-ciphersuite security of the Secure Shell (SSH) protocol"

Florian Bergsma, Florian Kohlar, Jorg Schwenk, ... -- CCS 2014

"Code Reuse Attacks in PHP: Automated POP Chain Generation"

Johannes Dahse, Nikolai Krein, Thorsten Holz, ... -- CCS 2014

"You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code"

Thorsten Holz, Benjamin Kollenda, Philipp Koppe, Jannik Pewny, ... -- CCS 2014

"Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data"

Robert Gawlik, Behrad Garmany, Thorsten Holz, ... -- Usenix 2014

"Exit from Hell? Reducing the Impact of Amplification DDoS Attacks"

Marc Kuehrer, Thomas Hupperich, Christian Rossow, Thorsten Holz, ... -- Usenix 2014

"Static Detection of Second-Order Vulnerabilities in Web Applications"

Johannes Dahse, Thorsten Holz, ... -- Usenix 2014

"Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks"

Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, ... -- Usenix 2014

"Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications"

Felix Schuster, Thomas Tendyck, Thorsten Holz, ... -- Oakland 2015

"Cross-Architecture Bug Search in Binary Executables"

Jannik Pewny, Behrad Garmany, Robert Gawlik, Thorsten Holz, ... -- Oakland 2015

"Securing MapReduce with SGX: Data Analytics in the Untrusted Cloud using COTS Secure Processors"

Felix Schuster, ... -- Oakland 2015

"From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting"

Sebastian Lekies, ... -- CCS 2015

"On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption"

Tibor Jager, Jorg Schwenk, Juraj Somorovsky, ... -- CCS 2015

"It's a TRAP: Table Randomization and Protection against Function Reuse Attacks"

Felix Schuster, Thorsten Holz, ... -- CCS 2015

"TOPAS"

Sven Schage, ... -- CCS 2015

"The Unexpected Dangers of Dynamic JavaScript"

Sebastian Lekies, ... -- Usenix 2015

"Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding"

Robert Gawlik, Benjamin Kollenda, Philipp Koppe, Behrad Garmany, Thorsten Holz, ... -- NDSS 2016

"Who Are You? A Statistical Approach to Measuring User Authenticity"

Markus Duermuth, ... -- NDSS 2016

"A Tough call: Mitigating Advanced Code-Reuse Attacks At The Binary Level"

Moritz Contag, Andre Pawlowski, Thorsten Holz, ... -- Oakland 2016

"Systematic Fuzzing and Testing of TLS Libraries"

Juraj Somorovsky, ... -- CCS 2016

"On the provable security of (EC)DSA signatures"

Manuel Fersch, Eike Kiltz, Bertram Poettering, ... -- CCS 2016

"On the Security of Cracking-Resistant Password Vaults"

Maximilian Golla, Benedict Beuscher, Markus Duermuth, ... -- CCS 2016

"Hardware Trojan-Resilience via Testing Amplification"

Sebastian Faust, ... -- CCS 2016

"Undermining Entropy-based Information Hiding (And What to do About it)"

Robert Gawlik, Benjamin Kollenda, ... -- Usenix 2016

"DROWN: Breaking TLS using SSLv2"

Juraj Somorovsky, Susanne Engels, Christof Paar, ... -- Usenix 2016

"Towards Implicit Visual Memory-Based Authentication"

Markus Duermuth, Maximilian Golla, ... -- NDSS 2017

"MARX: Uncovering Class Hierarchies in C++ Programs"

Andre Pawlowski, Moritz Contag, Thorsten Holz, ... -- NDSS 2017

"How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles"

Moritz Contag, Andre Pawlowski, Thorsten Holz, ... -- Oakland 2017

"SoK: Exploiting Network Printers"

Jens Muller, Vladislav Mladenov, Juraj Somorovsky, Jorg Schwenk, ... -- Oakland 2017

"BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection"

Max Hoffmann, ... -- CCS 2017

"New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs"

Max Hoffmann, ... -- CCS 2017

"No-Match Attacks and Robust Partnering Definitions - Defining Trivial Attacks for Security Protocols is Not Trivial"

Yong Li, Sven Schage, ... -- CCS 2017

"kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels"

Sergej Schumilo, Cornelius Aschermann, Robert Gawlik, Thorsten Holz, ... -- Usenix 2017

"Syntia: Synthesizing the Semantics of Obfuscated Code"

Tim Blazytko, Moritz Contag, Cornelius Aschermann, Thorsten Holz, ... -- Usenix 2017

"Same-Origin Policy: Evaluation in Modern Browsers"

Jorg Schwenk, Marcus Niemietz, Christian Mainka, ... -- Usenix 2017

"Reverse Engineering x86 Processor Microcode"

Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz, ... -- Usenix 2017

"Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks"

Kai Jansen, ... -- Oakland 2018

"What was that site doing with my Facebook password?, Designing Password-Reuse Notifications"

Maximilian Golla, Markus Duermuth, ... -- CCS 2018

"On the Accuracy of Password Strength Meters"

Maximilian Golla, Markus Duermuth, ... -- CCS 2018

"Prime and Prejudice: Primality Testing Under Adversarial Conditions"

Juraj Somorovsky, ... -- CCS 2018

"On the Security of the PKCS#1 v1.5 Signature Scheme"

Alexander May, ... -- CCS 2018

"An Exploratory Analysis of Microcode as a Building Block for System Defenses"

Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz, ... -- CCS 2018

"Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse"

Sascha Fahl, ... -- Usenix 2018

"Rethinking Access Control and Authentication for the Home Internet of Things (IoT)"

Maximilian Golla, Markus Duermuth, ... -- Usenix 2018

"Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels"

Jens Muller, Juraj Somorovsky, Jorg Schwenk, ... -- Usenix 2018

"The Dangers of Key Reuse: Practical Attacks on IPsec IKE"

Dennis Felsch, Martin Grothe, Jorg Schwenk, ... -- Usenix 2018

"Return Of Bleichenbacher's Oracle Threat (ROBOT)"

Juraj Somorovsky, ... -- Usenix 2018

"Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding"

Lea Schonherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa, ... -- NDSS 2019

"REDQUEEN: Fuzzing with Input-to-State Correspondence"

Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, Thorsten Holz, ... -- NDSS 2019

"We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy"

Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Thorsten Holz, ... -- NDSS 2019

"On the Challenges of Geographical Avoidance for Tor"

Katharina Kohls, Kai Jansen, David Rupprecht, Thorsten Holz, ... -- NDSS 2019

"NAUTILUS: Fishing for Deep Bugs with Grammars"

Cornelius Aschermann, Thorsten Holz, Daniel Teuchert, ... -- NDSS 2019

"Breaking LTE on Layer Two"

David Rupprecht, Katharina Kohls, Thorsten Holz, ... -- Oakland 2019

"On the Security of Two-Round Multi-Signatures"

Eike Kiltz, Julian Loss, ... -- Oakland 2019

"Reasoning Analytically About Password-Cracking Software"

Maximilian Golla, ... -- Oakland 2019

"(Un)informed Consent: Studying GDPR Consent Notices in the Field"

Christine Utz, Martin Degeling, Sascha Fahl, Thorsten Holz, ... -- CCS 2019

"1 Trillion Dollar Refund - How To Spoof PDF Signatures"

Vladislav Mladenov, Christian Mainka, Martin Grothe, Jorg Schwenk, ... -- CCS 2019

"A Formal Treatment of Deterministic Wallets"

Julian Loss, ... -- CCS 2019

"Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited"

Max Hoffmann, ... -- CCS 2019

"Practical Decryption exFiltration: Breaking PDF Encryption"

Jens Muller, Vladislav Mladenov, Christian Mainka, Jorg Schwenk, ... -- CCS 2019

"The SPHINCS+ signature framework"

Daniel J. Bernstein, ... -- CCS 2019

"Johnny, you are fired! - Spoofing OpenPGP and S/MIME Signatures in Emails"

Jens Muller, Marcus Brinkmann, Juraj Somorovsky, Jorg Schwenk, ... -- Usenix 2019

"Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities"

Robert Merget, Juraj Somorovsky, Janis Fliegenschmidt, Jorg Schwenk, ... -- Usenix 2019

"AntiFuzz: Impeding Fuzzing Audits of Binary Executables"

Emre Guler, Cornelius Aschermann, Ali Abbasi, Thorsten Holz, ... -- Usenix 2019

"GRIMOIRE : Synthesizing Structure while Fuzzing"

Tim Blazytko, Cornelius Aschermann, Moritz Schlogel, Ali Abbasi, Sergej Schumilo, Simon Worner, Thorsten Holz, ... -- Usenix 2019

"HYPER-CUBE: High-Dimensional Hypervisor Fuzzing"

Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Worner, Thorsten Holz, ... -- NDSS 2020

"IMP4GT: IMPersonation Attacks in 4G NeTworks"

David Rupprecht, Katharina Kohls, Thorsten Holz, ... -- NDSS 2020

"On Using Application-Layer Middlebox Protocols for Peeking Behind NAT Gateways"

Teemu Rytilahti, Thorsten Holz, ... -- NDSS 2020

"IJON: Exploring Deep State Spaces via Fuzzing"

Cornelius Aschermann, Sergej Schumilo, Ali Abbasi, Thorsten Holz, ... -- Oakland 2020

"This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs"

Philipp Markert, Daniel Bailey, Markus Durmuth, ... -- Oakland 2020

"Mitigation of Attacks on Email End-to-End Encryption"

Jorg Schwenk, Marcus Brinkmann, Jens Muller, ... -- CCS 2020

"Censored Planet: An Internet-wide, Longitudinal Censorship Observatory"

Katharina Kohls, ... -- CCS 2020

"Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE"

David Rupprecht, Katharina Kohls, Thorsten Holz, ... -- Usenix 2020

"AURORA: Statistical Crash Analysis for Automated Root Cause Explanation"

Tim Blazytko, Moritz Schlogel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon Worner, Thorsten Holz, ... -- Usenix 2020

"HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation"

Tobias Scharnowski, ... -- Usenix 2020

"McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers"

Daniel J. Bernstein, ... -- Usenix 2020

"The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs"

Maik Ender, Amir Moradi, Christof Paar, ... -- Usenix 2020

"Analysis of DTLS Implementations Using Protocol State Fuzzing"

Robert Merget, ... -- Usenix 2020

"ETHBMC: A Bounded Model Checker for Smart Contracts"

Joel Frank, Cornelius Aschermann, Thorsten Holz, ... -- Usenix 2020

"Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem"

Christopher Lentzsch, Martin Degeling, ... -- NDSS 2021

"Processing Dangerous Paths – On Security and Privacy of the Portable Document Format"

Jens Muller, Dominik Noss, Christian Mainka, Vladislav Mladenov, Jorg Schwenk, ... -- NDSS 2021

"Reining in the Web’s Inconsistencies with Site Policy"

Tobias Urban, Dennis Tatang, ... -- NDSS 2021

"Shadow Attacks: Hiding and Replacing Content in Signed PDFs"

Christian Mainka, Vladislav Mladenov, Simon Rohlmann, ... -- NDSS 2021

"Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance"

Kai Jansen, ... -- NDSS 2021

"Breaking the Specification: PDF Certification"

Simon Rohlmann, Vladislav Mladenov, Christian Mainka, Jorg Schwenk, ... -- Oakland 2021

"Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model."

Amir Moradi, ... -- Oakland 2021

"XSinator.com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers"

Lukas Knittel, Christian Mainka, Marcus Niemietz, Dominik Trevor No, Jorg Schwenk, ... -- CCS 2021

"Out of Sight, Out of Mind: Detecting Orphaned Web Pages at Internet-Scale"

Kevin Borgolte, ... -- CCS 2021

"Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing"

Julien Duman, Eike Kiltz, ... -- CCS 2021

""It's Stored, Hopefully, on an Encrypted Server'': Mitigating Users' Misconceptions About FIDO2 Biometric WebAuthn"

Leona Lassak, ... -- Usenix 2021

"Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)"

Robert Merget, Marcus Brinkmann, Jorg Schwenk, ... -- Usenix 2021

"On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary Note"

Nils Albartus, Clemens Nasenberg, Florian Stolz, Christof Paar, ... -- Usenix 2021

"Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity"

Florian M. Farke, Markus Durmuth, ... -- Usenix 2021

"Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code"

Veelasha Moonsamy, ... -- Usenix 2021

"Dompteur: Taming Audio Adversarial Examples"

Thorsten Eisenhofer, Lea Schonherr, Joel Frank, Dorothea Kolossa, Thorsten Holz, ... -- Usenix 2021

"Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types"

Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Worner, Thorsten Holz, ... -- Usenix 2021

"ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication"

Marcus Brinkmann, Robert Merget, Jens Muller, Jorg Schwenk, ... -- Usenix 2021

"FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware"

Tobias Scharnowski, ... -- NDSS 2022

"How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study"

Marco Gutfleisch, M. Angela Sasse, ... -- Oakland 2022

"How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations"

Florian Schweins, Alexander May, ... -- Oakland 2022

"IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing"

Simon Mulzer, Stefan Roth, Veelasha Moonsamy, Aydin Sezgin, ... -- Oakland 2022

"Statistical Quantification of Differential Privacy: A Local Approach"

Onder Askin, Tim Kutta, Holger Dette, ... -- Oakland 2022

"CINI MINIS: Domain Isolation for Fault and Combined Security"

Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Guneysu, ... -- CCS 2022

"DISTINCT: Identity Theft using In-Browser Communications in Dual-Window Single Sign-On"

Louis Jannett, Vladislav Mladenov, Christian Mainka, Jorg Schwenk, ... -- CCS 2022

"FABEO: Fast Attribute-Based Encryption with Optimal Security"

Doreen Riepel, ... -- CCS 2022

"JIT-Picking: Differential Fuzzing of JavaScript Engines"

Lukas Bernhard, Tobias Scharnowski, Moritz Schloegel, Tim Blazytko, ... -- CCS 2022

"Low-Latency Hardware Private Circuits"

David Knichel, ... -- CCS 2022

"Proof-of-Possession for KEM Certificates using Verifiable Generation"

Tim Guneysu, Georg Land, ... -- CCS 2022

"Second-Order Low-Randomness d+1 Hardware Sharing of the AES"

Aein Rezaei Shahmirzadi, Amir Moradi, ... -- CCS 2022

"Server-Aided Continuous Group Key Agreement"

Dominik Hartmann, Eike Kiltz, ... -- CCS 2022

"Squirrel: Efficient Synchronized Multi-Signatures from Lattices"

Nils Fleischhacker, ... -- CCS 2022

"OpenSSLNTRU: Faster post-quantum TLS key exchange"

Daniel J. Bernstein, Ming-Shing Chen, ... -- Usenix 2022

"Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing"

Tobias Scharnowski, Nils Bars, Moritz Schloegel, Thorsten Holz, Ali Abbasi, ... -- Usenix 2022

""The Same PIN, Just Longer": On the (In)Security of Upgrading PINs from 4 to 6 Digits"

Philipp Markert, ... -- Usenix 2022

"Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures"

Simon Rohlmann, Christian Mainka, Vladislav Mladenov, Jorg Schwenk, ... -- Usenix 2022

"SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing"

Johannes Willbold, ... -- Usenix 2022

"Loki: Hardening Code Obfuscation Against Automated Attacks"

Moritz Schloegel, Tim Blazytko, Moritz Contag, Cornelius Aschermann, Julius Basler, Ali Abbasi, ... -- Usenix 2022

"TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries"

Marcel Maehren, Philipp Nieting, Robert Merget, Jorg Schwenk, ... -- Usenix 2022