Sebastian Schinzel
Sebastian Schinzel
Münster University of Applied Sciences
Verified email at - Homepage
Cited by
Cited by
Cache attacks on Intel SGX
J Götzfried, M Eckert, S Schinzel, T Müller
Proceedings of the 10th European Workshop on Systems Security, 1-6, 2017
{DROWN}: Breaking {TLS} using sslv2
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 689-706, 2016
kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels.
S Schumilo, C Aschermann, R Gawlik, S Schinzel, T Holz
USENIX Security Symposium, 167-182, 2017
Revisiting SSL/TLS implementations: New bleichenbacher side channels and attacks
C Meyer, J Somorovsky, E Weiss, J Schwenk, S Schinzel, E Tews
23rd {USENIX} Security Symposium ({USENIX} Security 14), 733-748, 2014
GRIMOIRE: Synthesizing Structure while Fuzzing.
T Blazytko, C Aschermann, M Schlögel, A Abbasi, S Schumilo, S Wörner, ...
USENIX Security Symposium 19, 2019
Bleichenbacher’s attack strikes again: breaking PKCS# 1 v1. 5 in XML Encryption
T Jager, S Schinzel, J Somorovsky
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
Efail: Breaking S/MIME and OpenPGP email encryption using exfiltration channels
D Poddebniak, C Dresen, J Müller, F Ising, S Schinzel, S Friedberger, ...
27th {USENIX} Security Symposium ({USENIX} Security 18), 549-566, 2018
Attacking deterministic signature schemes using fault attacks
D Poddebniak, J Somorovsky, S Schinzel, M Lochter, P Rösler
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 338-352, 2018
An efficient mitigation method for timing side channels on the web
S Schinzel
2nd International Workshop on Constructive Side-Channel Analysis and Secure …, 2011
Web Application Vulnerability Scanners—a Benchmark
A Wiegenstein, F Weidemann, M Schumacher, S Schinzel
Virtual Forge GmbH, 2006
" Johnny, you are fired!"-Spoofing OpenPGP and S/MIME Signatures in Emails.
J Müller, M Brinkmann, D Poddebniak, H Böck, S Schinzel, J Somorovsky, ...
USENIX Security Symposium, 1011-1028, 2019
WAFFle: Fingerprinting Filter Rules of Web Application Firewalls.
I Schmitt, S Schinzel
WOOT, 34-40, 2012
Detecting hidden storage side channel vulnerabilities in networked applications
FC Freiling, S Schinzel
Future Challenges in Security and Privacy for Academia and Industry: 26th …, 2011
Re: What’s Up Johnny? Covert Content Attacks on Email End-to-End Encryption
J Müller, M Brinkmann, D Poddebniak, S Schinzel, J Schwenk
Applied Cryptography and Network Security: 17th International Conference …, 2019
Practical decryption exfiltration: Breaking pdf encryption
J Müller, F Ising, V Mladenov, C Mainka, S Schinzel, J Schwenk
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Analyzing medical device connectivity and its effect on cyber security in german hospitals
M Willing, C Dresen, U Haverkamp, S Schinzel
BMC medical informatics and decision making 20 (1), 1-15, 2020
ALPACA: Application Layer Protocol Confusion-Analyzing and Mitigating Cracks in TLS Authentication.
M Brinkmann, C Dresen, R Merget, D Poddebniak, J Müller, ...
USENIX Security Symposium, 4293-4310, 2021
Mitigation of attacks on email end-to-end encryption
J Schwenk, M Brinkmann, D Poddebniak, J Müller, J Somorovsky, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
Office Document Security and Privacy.
J Müller, F Ising, C Mainka, V Mladenov, S Schinzel, J Schwenk
WOOT@ USENIX Security Symposium, 2020
Behavioral responses to a cyber attack in a hospital environment
M Willing, C Dresen, E Gerlitz, M Haering, M Smith, C Binnewies, T Guess, ...
Scientific reports 11 (1), 19352, 2021
The system can't perform the operation now. Try again later.
Articles 1–20