"TASTY: tool for automating secure two-party computations"
Wilko Henecka, Stefan Kogl, Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg, ... -- CCS 2010
"Return-oriented programming without returns"
Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy, ... -- CCS 2010
"Mobile Security Catching Up? - Revealing the nuts and bolts of the security of mobile devices"
Johannes Hoffmann, Thorsten Holz, Sebastian Uellenbeck, Christopher Wolf, ... -- Oakland 2011
"On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks - Extracting Keys from Xilinx Virtex-II FPGAs"
Amir Moradi, Timo Kasper, Christof Paar, ... -- CCS 2011
"How to Break XML Encryption"
Tibor Jager, Juraj Somorovsky, ... -- CCS 2011
"Crouching Tiger - Hidden Payload: Security Risks of Scalable Vectors Graphics"
Mario Heiderich, Tilman Frosch, Meiko Jensen, Thorsten Holz, ... -- CCS 2011
"BOTMAGNIFIER: Locating Spambots on the Internet"
Thorsten Holz, ... -- Usenix 2011
"JACKSTRAWS: Picking Command and Control Connections from Bot Traffic"
Ralf Hund, Thorsten Holz, ... -- Usenix 2011
"Adaptive Password-Strength Meters from Markov Models"
Markus Duermuth, ... -- NDSS 2012
"MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones"
Thomas Fischer, Thorsten Holz, Ralf Hund, ... -- NDSS 2012
"Towards Taming Privilege-Escalation Attacks on Android"
Thomas Fischer, ... -- NDSS 2012
"Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards"
Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz, ... -- Oakland 2012
"Scriptless Attacks"
Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jorg Schwenk, ... -- CCS 2012
"B@bel: Leveraging Email Delivery for Spam Mitigation"
Apostolis Zarras, Thorsten Holz, ... -- Usenix 2012
"On Breaking SAML: Be Whoever You Want to Be"
Juraj Somorovsky, Jorg Schwenk, Marco Kampmann, Meiko Jensen, ... -- Usenix 2012
"One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography"
Tibor Jager, Juraj Somorovsky, ... -- NDSS 2013
"Practical Timing Side Channel Attacks Against Kernel Space ASLR"
Ralf Hund, Carsten Willems, Thorsten Holz, ... -- Oakland 2013
"On the Security of TLS Renegotiation"
Florian Giesen, Florian Kohlar, ... -- CCS 2013
"Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns"
Sebastian Uellenbeck, Markus Duermuth, Christopher Wolf, Thorsten Holz, ... -- CCS 2013
"Towards Reducing the Attack Surface of Software Backdoors"
Felix Schuster, Thorsten Holz, ... -- CCS 2013
"mXSS Attacks: Attacking well-secured Web-Applications by using innerHTML Mutations"
Mario Heiderich, Jorg Schwenk, Tilman Frosch, ... -- CCS 2013
"Amplification Hell: Revisiting Network Protocols for DDoS Abuse"
Christian Rossow, ... -- NDSS 2014
"Simulation of Built-in PHP Features for Precise Static Code Analysis"
Johannes Dahse, Thorsten Holz, ... -- NDSS 2014
"Multi-ciphersuite security of the Secure Shell (SSH) protocol"
Florian Bergsma, Florian Kohlar, Jorg Schwenk, ... -- CCS 2014
"Code Reuse Attacks in PHP: Automated POP Chain Generation"
Johannes Dahse, Nikolai Krein, Thorsten Holz, ... -- CCS 2014
"You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code"
Thorsten Holz, Benjamin Kollenda, Philipp Koppe, Jannik Pewny, ... -- CCS 2014
"Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data"
Robert Gawlik, Behrad Garmany, Thorsten Holz, ... -- Usenix 2014
"Exit from Hell? Reducing the Impact of Amplification DDoS Attacks"
Marc Kuehrer, Thomas Hupperich, Christian Rossow, Thorsten Holz, ... -- Usenix 2014
"Static Detection of Second-Order Vulnerabilities in Web Applications"
Johannes Dahse, Thorsten Holz, ... -- Usenix 2014
"Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks"
Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, ... -- Usenix 2014
"Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications"
Felix Schuster, Thomas Tendyck, Thorsten Holz, ... -- Oakland 2015
"Cross-Architecture Bug Search in Binary Executables"
Jannik Pewny, Behrad Garmany, Robert Gawlik, Thorsten Holz, ... -- Oakland 2015
"Securing MapReduce with SGX: Data Analytics in the Untrusted Cloud using COTS Secure Processors"
Felix Schuster, ... -- Oakland 2015
"From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting"
Sebastian Lekies, ... -- CCS 2015
"On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption"
Tibor Jager, Jorg Schwenk, Juraj Somorovsky, ... -- CCS 2015
"It's a TRAP: Table Randomization and Protection against Function Reuse Attacks"
Felix Schuster, Thorsten Holz, ... -- CCS 2015
"TOPAS"
Sven Schage, ... -- CCS 2015
"The Unexpected Dangers of Dynamic JavaScript"
Sebastian Lekies, ... -- Usenix 2015
"Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding"
Robert Gawlik, Benjamin Kollenda, Philipp Koppe, Behrad Garmany, Thorsten Holz, ... -- NDSS 2016
"Who Are You? A Statistical Approach to Measuring User Authenticity"
Markus Duermuth, ... -- NDSS 2016
"A Tough call: Mitigating Advanced Code-Reuse Attacks At The Binary Level"
Moritz Contag, Andre Pawlowski, Thorsten Holz, ... -- Oakland 2016
"Systematic Fuzzing and Testing of TLS Libraries"
Juraj Somorovsky, ... -- CCS 2016
"On the provable security of (EC)DSA signatures"
Manuel Fersch, Eike Kiltz, Bertram Poettering, ... -- CCS 2016
"On the Security of Cracking-Resistant Password Vaults"
Maximilian Golla, Benedict Beuscher, Markus Duermuth, ... -- CCS 2016
"Hardware Trojan-Resilience via Testing Amplification"
Sebastian Faust, ... -- CCS 2016
"Undermining Entropy-based Information Hiding (And What to do About it)"
Robert Gawlik, Benjamin Kollenda, ... -- Usenix 2016
"DROWN: Breaking TLS using SSLv2"
Juraj Somorovsky, Susanne Engels, Christof Paar, ... -- Usenix 2016
"Towards Implicit Visual Memory-Based Authentication"
Markus Duermuth, Maximilian Golla, ... -- NDSS 2017
"MARX: Uncovering Class Hierarchies in C++ Programs"
Andre Pawlowski, Moritz Contag, Thorsten Holz, ... -- NDSS 2017
"How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles"
Moritz Contag, Andre Pawlowski, Thorsten Holz, ... -- Oakland 2017
"SoK: Exploiting Network Printers"
Jens Muller, Vladislav Mladenov, Juraj Somorovsky, Jorg Schwenk, ... -- Oakland 2017
"BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection"
Max Hoffmann, ... -- CCS 2017
"New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs"
Max Hoffmann, ... -- CCS 2017
"No-Match Attacks and Robust Partnering Definitions - Defining Trivial Attacks for Security Protocols is Not Trivial"
Yong Li, Sven Schage, ... -- CCS 2017
"kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels"
Sergej Schumilo, Cornelius Aschermann, Robert Gawlik, Thorsten Holz, ... -- Usenix 2017
"Syntia: Synthesizing the Semantics of Obfuscated Code"
Tim Blazytko, Moritz Contag, Cornelius Aschermann, Thorsten Holz, ... -- Usenix 2017
"Same-Origin Policy: Evaluation in Modern Browsers"
Jorg Schwenk, Marcus Niemietz, Christian Mainka, ... -- Usenix 2017
"Reverse Engineering x86 Processor Microcode"
Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz, ... -- Usenix 2017
"Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks"
Kai Jansen, ... -- Oakland 2018
"What was that site doing with my Facebook password?, Designing Password-Reuse Notifications"
Maximilian Golla, Markus Duermuth, ... -- CCS 2018
"On the Accuracy of Password Strength Meters"
Maximilian Golla, Markus Duermuth, ... -- CCS 2018
"Prime and Prejudice: Primality Testing Under Adversarial Conditions"
Juraj Somorovsky, ... -- CCS 2018
"On the Security of the PKCS#1 v1.5 Signature Scheme"
Alexander May, ... -- CCS 2018
"An Exploratory Analysis of Microcode as a Building Block for System Defenses"
Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz, ... -- CCS 2018
"Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse"
Sascha Fahl, ... -- Usenix 2018
"Rethinking Access Control and Authentication for the Home Internet of Things (IoT)"
Maximilian Golla, Markus Duermuth, ... -- Usenix 2018
"Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels"
Jens Muller, Juraj Somorovsky, Jorg Schwenk, ... -- Usenix 2018
"The Dangers of Key Reuse: Practical Attacks on IPsec IKE"
Dennis Felsch, Martin Grothe, Jorg Schwenk, ... -- Usenix 2018
"Return Of Bleichenbacher's Oracle Threat (ROBOT)"
Juraj Somorovsky, ... -- Usenix 2018
"Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding"
Lea Schonherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa, ... -- NDSS 2019
"REDQUEEN: Fuzzing with Input-to-State Correspondence"
Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, Thorsten Holz, ... -- NDSS 2019
"We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy"
Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Thorsten Holz, ... -- NDSS 2019
"On the Challenges of Geographical Avoidance for Tor"
Katharina Kohls, Kai Jansen, David Rupprecht, Thorsten Holz, ... -- NDSS 2019
"NAUTILUS: Fishing for Deep Bugs with Grammars"
Cornelius Aschermann, Thorsten Holz, Daniel Teuchert, ... -- NDSS 2019
"Breaking LTE on Layer Two"
David Rupprecht, Katharina Kohls, Thorsten Holz, ... -- Oakland 2019
"On the Security of Two-Round Multi-Signatures"
Eike Kiltz, Julian Loss, ... -- Oakland 2019
"Reasoning Analytically About Password-Cracking Software"
Maximilian Golla, ... -- Oakland 2019
"(Un)informed Consent: Studying GDPR Consent Notices in the Field"
Christine Utz, Martin Degeling, Sascha Fahl, Thorsten Holz, ... -- CCS 2019
"1 Trillion Dollar Refund - How To Spoof PDF Signatures"
Vladislav Mladenov, Christian Mainka, Martin Grothe, Jorg Schwenk, ... -- CCS 2019
"A Formal Treatment of Deterministic Wallets"
Julian Loss, ... -- CCS 2019
"Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited"
Max Hoffmann, ... -- CCS 2019
"Practical Decryption exFiltration: Breaking PDF Encryption"
Jens Muller, Vladislav Mladenov, Christian Mainka, Jorg Schwenk, ... -- CCS 2019
"The SPHINCS+ signature framework"
Daniel J. Bernstein, ... -- CCS 2019
"Johnny, you are fired! - Spoofing OpenPGP and S/MIME Signatures in Emails"
Jens Muller, Marcus Brinkmann, Juraj Somorovsky, Jorg Schwenk, ... -- Usenix 2019
"Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities"
Robert Merget, Juraj Somorovsky, Janis Fliegenschmidt, Jorg Schwenk, ... -- Usenix 2019
"AntiFuzz: Impeding Fuzzing Audits of Binary Executables"
Emre Guler, Cornelius Aschermann, Ali Abbasi, Thorsten Holz, ... -- Usenix 2019
"GRIMOIRE : Synthesizing Structure while Fuzzing"
Tim Blazytko, Cornelius Aschermann, Moritz Schlogel, Ali Abbasi, Sergej Schumilo, Simon Worner, Thorsten Holz, ... -- Usenix 2019
"HYPER-CUBE: High-Dimensional Hypervisor Fuzzing"
Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Worner, Thorsten Holz, ... -- NDSS 2020
"IMP4GT: IMPersonation Attacks in 4G NeTworks"
David Rupprecht, Katharina Kohls, Thorsten Holz, ... -- NDSS 2020
"On Using Application-Layer Middlebox Protocols for Peeking Behind NAT Gateways"
Teemu Rytilahti, Thorsten Holz, ... -- NDSS 2020
"IJON: Exploring Deep State Spaces via Fuzzing"
Cornelius Aschermann, Sergej Schumilo, Ali Abbasi, Thorsten Holz, ... -- Oakland 2020
"This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs"
Philipp Markert, Daniel Bailey, Markus Durmuth, ... -- Oakland 2020
"Mitigation of Attacks on Email End-to-End Encryption"
Jorg Schwenk, Marcus Brinkmann, Jens Muller, ... -- CCS 2020
"Censored Planet: An Internet-wide, Longitudinal Censorship Observatory"
Katharina Kohls, ... -- CCS 2020
"Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE"
David Rupprecht, Katharina Kohls, Thorsten Holz, ... -- Usenix 2020
"AURORA: Statistical Crash Analysis for Automated Root Cause Explanation"
Tim Blazytko, Moritz Schlogel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon Worner, Thorsten Holz, ... -- Usenix 2020
"HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation"
Tobias Scharnowski, ... -- Usenix 2020
"McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers"
Daniel J. Bernstein, ... -- Usenix 2020
"The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs"
Maik Ender, Amir Moradi, Christof Paar, ... -- Usenix 2020
"Analysis of DTLS Implementations Using Protocol State Fuzzing"
Robert Merget, ... -- Usenix 2020
"ETHBMC: A Bounded Model Checker for Smart Contracts"
Joel Frank, Cornelius Aschermann, Thorsten Holz, ... -- Usenix 2020
"Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem"
Christopher Lentzsch, Martin Degeling, ... -- NDSS 2021
"Processing Dangerous Paths – On Security and Privacy of the Portable Document Format"
Jens Muller, Dominik Noss, Christian Mainka, Vladislav Mladenov, Jorg Schwenk, ... -- NDSS 2021
"Reining in the Web’s Inconsistencies with Site Policy"
Tobias Urban, Dennis Tatang, ... -- NDSS 2021
"Shadow Attacks: Hiding and Replacing Content in Signed PDFs"
Christian Mainka, Vladislav Mladenov, Simon Rohlmann, ... -- NDSS 2021
"Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance"
Kai Jansen, ... -- NDSS 2021
"Breaking the Specification: PDF Certification"
Simon Rohlmann, Vladislav Mladenov, Christian Mainka, Jorg Schwenk, ... -- Oakland 2021
"Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model."
Amir Moradi, ... -- Oakland 2021
"XSinator.com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers"
Lukas Knittel, Christian Mainka, Marcus Niemietz, Dominik Trevor No, Jorg Schwenk, ... -- CCS 2021
"Out of Sight, Out of Mind: Detecting Orphaned Web Pages at Internet-Scale"
Kevin Borgolte, ... -- CCS 2021
"Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing"
Julien Duman, Eike Kiltz, ... -- CCS 2021
""It's Stored, Hopefully, on an Encrypted Server'': Mitigating Users' Misconceptions About FIDO2 Biometric WebAuthn"
Leona Lassak, ... -- Usenix 2021
"Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)"
Robert Merget, Marcus Brinkmann, Jorg Schwenk, ... -- Usenix 2021
"On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary Note"
Nils Albartus, Clemens Nasenberg, Florian Stolz, Christof Paar, ... -- Usenix 2021
"Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity"
Florian M. Farke, Markus Durmuth, ... -- Usenix 2021
"Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code"
Veelasha Moonsamy, ... -- Usenix 2021
"Dompteur: Taming Audio Adversarial Examples"
Thorsten Eisenhofer, Lea Schonherr, Joel Frank, Dorothea Kolossa, Thorsten Holz, ... -- Usenix 2021
"Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types"
Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Worner, Thorsten Holz, ... -- Usenix 2021
"ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication"
Marcus Brinkmann, Robert Merget, Jens Muller, Jorg Schwenk, ... -- Usenix 2021
"FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware"
Tobias Scharnowski, ... -- NDSS 2022
"How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study"
Marco Gutfleisch, M. Angela Sasse, ... -- Oakland 2022
"How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations"
Florian Schweins, Alexander May, ... -- Oakland 2022
"IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing"
Simon Mulzer, Stefan Roth, Veelasha Moonsamy, Aydin Sezgin, ... -- Oakland 2022
"Statistical Quantification of Differential Privacy: A Local Approach"
Onder Askin, Tim Kutta, Holger Dette, ... -- Oakland 2022
"CINI MINIS: Domain Isolation for Fault and Combined Security"
Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Guneysu, ... -- CCS 2022
"DISTINCT: Identity Theft using In-Browser Communications in Dual-Window Single Sign-On"
Louis Jannett, Vladislav Mladenov, Christian Mainka, Jorg Schwenk, ... -- CCS 2022
"FABEO: Fast Attribute-Based Encryption with Optimal Security"
Doreen Riepel, ... -- CCS 2022
"JIT-Picking: Differential Fuzzing of JavaScript Engines"
Lukas Bernhard, Tobias Scharnowski, Moritz Schloegel, Tim Blazytko, ... -- CCS 2022
"Low-Latency Hardware Private Circuits"
David Knichel, ... -- CCS 2022
"Proof-of-Possession for KEM Certificates using Verifiable Generation"
Tim Guneysu, Georg Land, ... -- CCS 2022
"Second-Order Low-Randomness d+1 Hardware Sharing of the AES"
Aein Rezaei Shahmirzadi, Amir Moradi, ... -- CCS 2022
"Server-Aided Continuous Group Key Agreement"
Dominik Hartmann, Eike Kiltz, ... -- CCS 2022
"Squirrel: Efficient Synchronized Multi-Signatures from Lattices"
Nils Fleischhacker, ... -- CCS 2022
"OpenSSLNTRU: Faster post-quantum TLS key exchange"
Daniel J. Bernstein, Ming-Shing Chen, ... -- Usenix 2022
"Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing"
Tobias Scharnowski, Nils Bars, Moritz Schloegel, Thorsten Holz, Ali Abbasi, ... -- Usenix 2022
""The Same PIN, Just Longer": On the (In)Security of Upgrading PINs from 4 to 6 Digits"
Philipp Markert, ... -- Usenix 2022
"Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures"
Simon Rohlmann, Christian Mainka, Vladislav Mladenov, Jorg Schwenk, ... -- Usenix 2022
"SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing"
Johannes Willbold, ... -- Usenix 2022
"Loki: Hardening Code Obfuscation Against Automated Attacks"
Moritz Schloegel, Tim Blazytko, Moritz Contag, Cornelius Aschermann, Julius Basler, Ali Abbasi, ... -- Usenix 2022
"TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries"
Marcel Maehren, Philipp Nieting, Robert Merget, Jorg Schwenk, ... -- Usenix 2022