Follow
Juraj Somorovsky
Title
Cited by
Cited by
Year
{DROWN}: Breaking {TLS} Using {SSLv2}
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
25th USENIX Security Symposium (USENIX Security 16), 689-706, 2016
2452016
All your clouds are belong to us: security analysis of cloud management interfaces
J Somorovsky, M Heiderich, M Jensen, J Schwenk, N Gruschka, ...
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 3-14, 2011
2262011
On breaking {SAML}: Be whoever you want to be
J Somorovsky, A Mayer, J Schwenk, M Kampmann, M Jensen
21st USENIX Security Symposium (USENIX Security 12), 397-412, 2012
1252012
Systematic fuzzing and testing of TLS libraries
J Somorovsky
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1142016
Revisiting {SSL/TLS} Implementations: New Bleichenbacher Side Channels and Attacks
C Meyer, J Somorovsky, E Weiss, J Schwenk, S Schinzel, E Tews
23rd USENIX Security Symposium (USENIX Security 14), 733-748, 2014
1042014
On the security of TLS 1.3 and QUIC against weaknesses in PKCS# 1 v1. 5 encryption
T Jager, J Schwenk, J Somorovsky
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
902015
{Nonce-Disrespecting} Adversaries: Practical Forgery Attacks on {GCM} in {TLS}
H Böck, A Zauner, S Devlin, J Somorovsky, P Jovanovic
10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016
792016
Penetration testing tool for web services security
C Mainka, J Somorovsky, J Schwenk
2012 IEEE Eighth World Congress on Services, 163-170, 2012
772012
How to break xml encryption
T Jager, J Somorovsky
Proceedings of the 18th ACM conference on Computer and communications …, 2011
732011
Return Of {Bleichenbacher’s} Oracle Threat ({{{{{ROBOT}}}}})
H Böck, J Somorovsky, C Young
27th USENIX Security Symposium (USENIX Security 18), 817-849, 2018
662018
Bleichenbacher’s attack strikes again: breaking PKCS# 1 v1. 5 in XML Encryption
T Jager, S Schinzel, J Somorovsky
European Symposium on Research in Computer Security, 752-769, 2012
532012
Efail: Breaking {S/MIME} and {OpenPGP} Email Encryption using Exfiltration Channels
D Poddebniak, C Dresen, J Müller, F Ising, S Schinzel, S Friedberger, ...
27th USENIX Security Symposium (USENIX Security 18), 549-566, 2018
512018
Analysis of {DTLS} implementations using protocol state fuzzing
P Fiterau-Brostean, B Jonsson, R Merget, J De Ruiter, K Sagonas, ...
29th USENIX Security Symposium (USENIX Security 20), 2523-2540, 2020
502020
Practical invalid curve attacks on TLS-ECDH
T Jager, J Schwenk, J Somorovsky
European Symposium on research in computer security, 407-425, 2015
462015
Attacking deterministic signature schemes using fault attacks
D Poddebniak, J Somorovsky, S Schinzel, M Lochter, P Rösler
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 338-352, 2018
412018
One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.
T Jager, KG Paterson, J Somorovsky
NDSS, 2013
392013
On the effectiveness of xml schema validation for countering xml signature wrapping attacks
M Jensen, C Meyer, J Somorovsky, J Schwenk
2011 1st International Workshop on Securing Services on the Cloud (IWSSC), 7-13, 2011
392011
Sok: Exploiting network printers
J Müller, V Mladenov, J Somorovsky, J Schwenk
2017 IEEE Symposium on Security and Privacy (SP), 213-230, 2017
342017
A new approach towards DoS penetration testing on web services
A Falkenberg, C Mainka, J Somorovsky, J Schwenk
2013 IEEE 20th International Conference on Web Services, 491-498, 2013
322013
Prime and prejudice: primality testing under adversarial conditions
MR Albrecht, J Massimo, KG Paterson, J Somorovsky
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
242018
The system can't perform the operation now. Try again later.
Articles 1–20