Books and Bookchapter

Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs!
J.P. Drees, P. Gupta, E. Hüllermeier, T. Jager, A. Konze, C. Priesterjahn, A. Ramaswamy, J. Somorovsky, 14th ACM Workshop on Artificial Intelligence and Security (2021).
AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services
C. Altmeier, C. Mainka, J. Somorovsky, J. Schwenk, in: Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015, Cham, 2015.
Practical Invalid Curve Attacks on TLS-ECDH
T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security -- ESORICS 2015, Cham, 2015.
Penetration test tool for XML-based web services
C. Mainka, V. Mladenov, J. Somorovsky, J. Schwenk, CEUR Workshop Proceedings 965 (2013) 31–35.
Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption
T. Jager, S. Schinzel, J. Somorovsky, in: Computer Security – ESORICS 2012, Berlin, Heidelberg, 2012.
Show all publications