Cache attacks on Intel SGX J Götzfried, M Eckert, S Schinzel, T Müller Proceedings of the 10th European Workshop on Systems Security, 1-6, 2017 | 401 | 2017 |
{DROWN}: Breaking {TLS} using sslv2 N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ... 25th {USENIX} Security Symposium ({USENIX} Security 16), 689-706, 2016 | 263 | 2016 |
kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels. S Schumilo, C Aschermann, R Gawlik, S Schinzel, T Holz USENIX Security Symposium, 167-182, 2017 | 246 | 2017 |
Revisiting SSL/TLS implementations: New bleichenbacher side channels and attacks C Meyer, J Somorovsky, E Weiss, J Schwenk, S Schinzel, E Tews 23rd {USENIX} Security Symposium ({USENIX} Security 14), 733-748, 2014 | 111 | 2014 |
GRIMOIRE: Synthesizing Structure while Fuzzing. T Blazytko, C Aschermann, M Schlögel, A Abbasi, S Schumilo, S Wörner, ... USENIX Security Symposium 19, 2019 | 75 | 2019 |
Bleichenbacher’s attack strikes again: breaking PKCS# 1 v1. 5 in XML Encryption T Jager, S Schinzel, J Somorovsky Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 56 | 2012 |
Efail: Breaking S/MIME and OpenPGP email encryption using exfiltration channels D Poddebniak, C Dresen, J Müller, F Ising, S Schinzel, S Friedberger, ... 27th {USENIX} Security Symposium ({USENIX} Security 18), 549-566, 2018 | 54 | 2018 |
Attacking deterministic signature schemes using fault attacks D Poddebniak, J Somorovsky, S Schinzel, M Lochter, P Rösler 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 338-352, 2018 | 48 | 2018 |
An efficient mitigation method for timing side channels on the web S Schinzel 2nd International Workshop on Constructive Side-Channel Analysis and Secure …, 2011 | 30 | 2011 |
Web Application Vulnerability Scanners—a Benchmark A Wiegenstein, F Weidemann, M Schumacher, S Schinzel Virtual Forge GmbH, 2006 | 21 | 2006 |
" Johnny, you are fired!"-Spoofing OpenPGP and S/MIME Signatures in Emails. J Müller, M Brinkmann, D Poddebniak, H Böck, S Schinzel, J Somorovsky, ... USENIX Security Symposium, 1011-1028, 2019 | 19 | 2019 |
WAFFle: Fingerprinting Filter Rules of Web Application Firewalls. I Schmitt, S Schinzel WOOT, 34-40, 2012 | 14 | 2012 |
Detecting hidden storage side channel vulnerabilities in networked applications FC Freiling, S Schinzel Future Challenges in Security and Privacy for Academia and Industry: 26th …, 2011 | 14 | 2011 |
Re: What’s Up Johnny? Covert Content Attacks on Email End-to-End Encryption J Müller, M Brinkmann, D Poddebniak, S Schinzel, J Schwenk Applied Cryptography and Network Security: 17th International Conference …, 2019 | 12 | 2019 |
Practical decryption exfiltration: Breaking pdf encryption J Müller, F Ising, V Mladenov, C Mainka, S Schinzel, J Schwenk Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 11 | 2019 |
Analyzing medical device connectivity and its effect on cyber security in german hospitals M Willing, C Dresen, U Haverkamp, S Schinzel BMC medical informatics and decision making 20 (1), 1-15, 2020 | 10 | 2020 |
ALPACA: Application Layer Protocol Confusion-Analyzing and Mitigating Cracks in TLS Authentication. M Brinkmann, C Dresen, R Merget, D Poddebniak, J Müller, ... USENIX Security Symposium, 4293-4310, 2021 | 9 | 2021 |
Mitigation of attacks on email end-to-end encryption J Schwenk, M Brinkmann, D Poddebniak, J Müller, J Somorovsky, ... Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 8 | 2020 |
Office Document Security and Privacy. J Müller, F Ising, C Mainka, V Mladenov, S Schinzel, J Schwenk WOOT@ USENIX Security Symposium, 2020 | 8 | 2020 |
Behavioral responses to a cyber attack in a hospital environment M Willing, C Dresen, E Gerlitz, M Haering, M Smith, C Binnewies, T Guess, ... Scientific reports 11 (1), 19352, 2021 | 7 | 2021 |