{DROWN}: Breaking {TLS} Using {SSLv2} N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ... 25th USENIX Security Symposium (USENIX Security 16), 689-706, 2016 | 321 | 2016 |
All your clouds are belong to us: security analysis of cloud management interfaces J Somorovsky, M Heiderich, M Jensen, J Schwenk, N Gruschka, ... Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 3-14, 2011 | 237 | 2011 |
Systematic fuzzing and testing of TLS libraries J Somorovsky Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 164 | 2016 |
On breaking {SAML}: Be whoever you want to be J Somorovsky, A Mayer, J Schwenk, M Kampmann, M Jensen 21st USENIX Security Symposium (USENIX Security 12), 397-412, 2012 | 150 | 2012 |
Revisiting {SSL/TLS} implementations: New bleichenbacher side channels and attacks C Meyer, J Somorovsky, E Weiss, J Schwenk, S Schinzel, E Tews 23rd USENIX Security Symposium (USENIX Security 14), 733-748, 2014 | 130 | 2014 |
On the security of TLS 1.3 and QUIC against weaknesses in PKCS# 1 v1. 5 encryption T Jager, J Schwenk, J Somorovsky Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 118 | 2015 |
Analysis of {DTLS} implementations using protocol state fuzzing P Fiterau-Brostean, B Jonsson, R Merget, J De Ruiter, K Sagonas, ... 29th USENIX Security Symposium (USENIX Security 20), 2523-2540, 2020 | 107 | 2020 |
{Nonce-Disrespecting} adversaries: practical forgery attacks on {GCM} in {TLS} H Böck, A Zauner, S Devlin, J Somorovsky, P Jovanovic 10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016 | 105 | 2016 |
Return Of {Bleichenbacher’s} Oracle Threat ({{{{{ROBOT}}}}}) H Böck, J Somorovsky, C Young 27th USENIX Security Symposium (USENIX Security 18), 817-849, 2018 | 103 | 2018 |
Penetration testing tool for web services security C Mainka, J Somorovsky, J Schwenk 2012 IEEE Eighth World Congress on Services, 163-170, 2012 | 87 | 2012 |
Efail: Breaking {S/MIME} and {OpenPGP} email encryption using exfiltration channels D Poddebniak, C Dresen, J Müller, F Ising, S Schinzel, S Friedberger, ... 27th USENIX Security Symposium (USENIX Security 18), 549-566, 2018 | 79 | 2018 |
Attacking deterministic signature schemes using fault attacks D Poddebniak, J Somorovsky, S Schinzel, M Lochter, P Rösler 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 338-352, 2018 | 77 | 2018 |
How to break xml encryption T Jager, J Somorovsky Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 77 | 2011 |
Practical invalid curve attacks on TLS-ECDH T Jager, J Schwenk, J Somorovsky European Symposium on research in computer security, 407-425, 2015 | 65 | 2015 |
Bleichenbacher’s attack strikes again: Breaking PKCS# 1 v1. 5 in XML encryption T Jager, S Schinzel, J Somorovsky Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 63 | 2012 |
One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. T Jager, KG Paterson, J Somorovsky NDSS, 2013 | 49 | 2013 |
On the effectiveness of xml schema validation for countering xml signature wrapping attacks M Jensen, C Meyer, J Somorovsky, J Schwenk 2011 1st International Workshop on Securing Services on the Cloud (IWSSC), 7-13, 2011 | 46 | 2011 |
Sok: Exploiting network printers J Müller, V Mladenov, J Somorovsky, J Schwenk 2017 IEEE Symposium on Security and Privacy (SP), 213-230, 2017 | 41 | 2017 |
Raccoon Attack: Finding and Exploiting {Most-Significant-Bit-Oracles} in {TLS-DH (E}) R Merget, M Brinkmann, N Aviram, J Somorovsky, J Mittmann, J Schwenk 30th USENIX Security Symposium (USENIX Security 21), 213-230, 2021 | 39 | 2021 |
A new approach towards DoS penetration testing on web services A Falkenberg, C Mainka, J Somorovsky, J Schwenk 2013 IEEE 20th International Conference on Web Services, 491-498, 2013 | 39 | 2013 |