关注
Sebastian Schinzel
Sebastian Schinzel
Münster University of Applied Sciences
在 fh-muenster.de 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Cache attacks on Intel SGX
J Götzfried, M Eckert, S Schinzel, T Müller
Proceedings of the 10th European Workshop on Systems Security, 1-6, 2017
4952017
{kAFL}:{Hardware-Assisted} feedback fuzzing for {OS} kernels
S Schumilo, C Aschermann, R Gawlik, S Schinzel, T Holz
26th USENIX security symposium (USENIX Security 17), 167-182, 2017
3502017
{DROWN}: Breaking {TLS} Using {SSLv2}
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
25th USENIX Security Symposium (USENIX Security 16), 689-706, 2016
3242016
Revisiting {SSL/TLS} implementations: New bleichenbacher side channels and attacks
C Meyer, J Somorovsky, E Weiss, J Schwenk, S Schinzel, E Tews
23rd USENIX Security Symposium (USENIX Security 14), 733-748, 2014
1322014
{GRIMOIRE}: Synthesizing structure while fuzzing
T Blazytko, M Bishop, C Aschermann, J Cappos, M Schlögel, N Korshun, ...
28th USENIX Security Symposium (USENIX Security 19), 1985-2002, 2019
1192019
Efail: Breaking {S/MIME} and {OpenPGP} email encryption using exfiltration channels
D Poddebniak, C Dresen, J Müller, F Ising, S Schinzel, S Friedberger, ...
27th USENIX Security Symposium (USENIX Security 18), 549-566, 2018
832018
Attacking deterministic signature schemes using fault attacks
D Poddebniak, J Somorovsky, S Schinzel, M Lochter, P Rösler
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 338-352, 2018
822018
Bleichenbacher’s attack strikes again: Breaking PKCS# 1 v1. 5 in XML encryption
T Jager, S Schinzel, J Somorovsky
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
642012
{“Johnny}, you are {fired!”}–Spoofing {OpenPGP} and {S/MIME} Signatures in Emails
J Müller, M Brinkmann, D Poddebniak, H Böck, S Schinzel, J Somorovsky, ...
28th USENIX Security Symposium (USENIX Security 19), 1011-1028, 2019
382019
An efficient mitigation method for timing side channels on the web
S Schinzel
2nd International Workshop on Constructive Side-Channel Analysis and Secure …, 2011
322011
{ALPACA}: Application layer protocol confusion-analyzing and mitigating cracks in {TLS} authentication
M Brinkmann, C Dresen, R Merget, D Poddebniak, J Müller, ...
30th USENIX Security Symposium (USENIX Security 21), 4293-4310, 2021
272021
Analyzing medical device connectivity and its effect on cyber security in german hospitals
M Willing, C Dresen, U Haverkamp, S Schinzel
BMC medical informatics and decision making 20, 1-15, 2020
222020
Grand theft app: Digital forensics of vehicle assistant apps
S Ebbers, F Ising, C Saatjohann, S Schinzel
Proceedings of the 16th International Conference on Availability …, 2021
202021
Web Application Vulnerability Scanners—a Benchmark
A Wiegenstein, F Weidemann, M Schumacher, S Schinzel
Virtual Forge GmbH, 2006
202006
Why {TLS} is better without {STARTTLS}: A Security Analysis of {STARTTLS} in the Email Context
D Poddebniak, F Ising, H Böck, S Schinzel
30th USENIX Security Symposium (USENIX Security 21), 4365-4382, 2021
192021
Re: What’s Up Johnny? Covert Content Attacks on Email End-to-End Encryption
J Müller, M Brinkmann, D Poddebniak, S Schinzel, J Schwenk
Applied Cryptography and Network Security: 17th International Conference …, 2019
192019
Mitigation of attacks on email end-to-end encryption
J Schwenk, M Brinkmann, D Poddebniak, J Müller, J Somorovsky, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
182020
Practical decryption exfiltration: Breaking pdf encryption
J Müller, F Ising, V Mladenov, C Mainka, S Schinzel, J Schwenk
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
162019
WAFFle: Fingerprinting Filter Rules of Web Application Firewalls.
I Schmitt, S Schinzel
WOOT, 34-40, 2012
162012
Detecting hidden storage side channel vulnerabilities in networked applications
FC Freiling, S Schinzel
IFIP International Information Security Conference, 41-55, 2011
162011
系统目前无法执行此操作,请稍后再试。
文章 1–20