Achtung:

Sie haben Javascript deaktiviert!
Sie haben versucht eine Funktion zu nutzen, die nur mit Javascript möglich ist. Um sämtliche Funktionalitäten unserer Internetseite zu nutzen, aktivieren Sie bitte Javascript in Ihrem Browser.

The members of the System Security Group from left to right: Jost Rossel, Juraj Somorovsky, Sven Hebrok, Hendrik Siewert, Niklas Niere. [Photo: 2023-03-02] Show image information

The members of the System Security Group from left to right: Jost Rossel, Juraj Somorovsky, Sven Hebrok, Hendrik Siewert, Niklas Niere. [Photo: 2023-03-02]

Books and Bookchapter


Open list in Research Information System

2021

Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs!

J.P. Drees, P. Gupta, E. Hüllermeier, T. Jager, A. Konze, C. Priesterjahn, A. Ramaswamy, J. Somorovsky, 14th ACM Workshop on Artificial Intelligence and Security (2021)


2015

AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services

C. Altmeier, C. Mainka, J. Somorovsky, J. Schwenk, in: Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015, 2015

DOI


Practical Invalid Curve Attacks on TLS-ECDH

T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security -- ESORICS 2015, 2015

DOI


2013

Penetration test tool for XML-based web services

C. Mainka, V. Mladenov, J. Somorovsky, J. Schwenk, CEUR Workshop Proceedings (2013), 965, pp. 31-35


2012

Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption

T. Jager, S. Schinzel, J. Somorovsky, in: Computer Security – ESORICS 2012, 2012

DOI


Open list in Research Information System

The University for the Information Society