Cache attacks on Intel SGX J Götzfried, M Eckert, S Schinzel, T Müller Proceedings of the 10th European Workshop on Systems Security, 1-6, 2017 | 495 | 2017 |
{kAFL}:{Hardware-Assisted} feedback fuzzing for {OS} kernels S Schumilo, C Aschermann, R Gawlik, S Schinzel, T Holz 26th USENIX security symposium (USENIX Security 17), 167-182, 2017 | 350 | 2017 |
{DROWN}: Breaking {TLS} Using {SSLv2} N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ... 25th USENIX Security Symposium (USENIX Security 16), 689-706, 2016 | 324 | 2016 |
Revisiting {SSL/TLS} implementations: New bleichenbacher side channels and attacks C Meyer, J Somorovsky, E Weiss, J Schwenk, S Schinzel, E Tews 23rd USENIX Security Symposium (USENIX Security 14), 733-748, 2014 | 132 | 2014 |
{GRIMOIRE}: Synthesizing structure while fuzzing T Blazytko, M Bishop, C Aschermann, J Cappos, M Schlögel, N Korshun, ... 28th USENIX Security Symposium (USENIX Security 19), 1985-2002, 2019 | 119 | 2019 |
Efail: Breaking {S/MIME} and {OpenPGP} email encryption using exfiltration channels D Poddebniak, C Dresen, J Müller, F Ising, S Schinzel, S Friedberger, ... 27th USENIX Security Symposium (USENIX Security 18), 549-566, 2018 | 83 | 2018 |
Attacking deterministic signature schemes using fault attacks D Poddebniak, J Somorovsky, S Schinzel, M Lochter, P Rösler 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 338-352, 2018 | 82 | 2018 |
Bleichenbacher’s attack strikes again: Breaking PKCS# 1 v1. 5 in XML encryption T Jager, S Schinzel, J Somorovsky Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 64 | 2012 |
{“Johnny}, you are {fired!”}–Spoofing {OpenPGP} and {S/MIME} Signatures in Emails J Müller, M Brinkmann, D Poddebniak, H Böck, S Schinzel, J Somorovsky, ... 28th USENIX Security Symposium (USENIX Security 19), 1011-1028, 2019 | 38 | 2019 |
An efficient mitigation method for timing side channels on the web S Schinzel 2nd International Workshop on Constructive Side-Channel Analysis and Secure …, 2011 | 32 | 2011 |
{ALPACA}: Application layer protocol confusion-analyzing and mitigating cracks in {TLS} authentication M Brinkmann, C Dresen, R Merget, D Poddebniak, J Müller, ... 30th USENIX Security Symposium (USENIX Security 21), 4293-4310, 2021 | 27 | 2021 |
Analyzing medical device connectivity and its effect on cyber security in german hospitals M Willing, C Dresen, U Haverkamp, S Schinzel BMC medical informatics and decision making 20, 1-15, 2020 | 22 | 2020 |
Grand theft app: Digital forensics of vehicle assistant apps S Ebbers, F Ising, C Saatjohann, S Schinzel Proceedings of the 16th International Conference on Availability …, 2021 | 20 | 2021 |
Web Application Vulnerability Scanners—a Benchmark A Wiegenstein, F Weidemann, M Schumacher, S Schinzel Virtual Forge GmbH, 2006 | 20 | 2006 |
Why {TLS} is better without {STARTTLS}: A Security Analysis of {STARTTLS} in the Email Context D Poddebniak, F Ising, H Böck, S Schinzel 30th USENIX Security Symposium (USENIX Security 21), 4365-4382, 2021 | 19 | 2021 |
Re: What’s Up Johnny? Covert Content Attacks on Email End-to-End Encryption J Müller, M Brinkmann, D Poddebniak, S Schinzel, J Schwenk Applied Cryptography and Network Security: 17th International Conference …, 2019 | 19 | 2019 |
Mitigation of attacks on email end-to-end encryption J Schwenk, M Brinkmann, D Poddebniak, J Müller, J Somorovsky, ... Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 18 | 2020 |
Practical decryption exfiltration: Breaking pdf encryption J Müller, F Ising, V Mladenov, C Mainka, S Schinzel, J Schwenk Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 16 | 2019 |
WAFFle: Fingerprinting Filter Rules of Web Application Firewalls. I Schmitt, S Schinzel WOOT, 34-40, 2012 | 16 | 2012 |
Detecting hidden storage side channel vulnerabilities in networked applications FC Freiling, S Schinzel IFIP International Information Security Conference, 41-55, 2011 | 16 | 2011 |