Jörg Schwenk
Orcid: 0000-0001-9315-7354Affiliations:
- Ruhr University Bochum, Germany
According to our database1,
Jörg Schwenk
authored at least 184 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
USENIX'24 Artifact Datasets: With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors.
Dataset, March, 2024
With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets.
Proceedings of the 32nd USENIX Security Symposium, 2023
Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser.
Proceedings of the 32nd USENIX Security Symposium, 2023
Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet.
Proceedings of the 32nd USENIX Security Symposium, 2023
Finding All Cross-Site Needles in the DOM Stack: A Comprehensive Methodology for the Automatic XS-Leak Detection in Web Browsers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
USENIX'23 Artifact: Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser.
Dataset, November, 2022
Guide to Internet Cryptography - Security Protocols and Real-World Attack Implications
Information Security and Cryptography, Springer, ISBN: 978-3-031-19438-2, 2022
A reduction-based proof for authentication and session key security in three-party Kerberos.
Int. J. Appl. Cryptogr., 2022
Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
DISTINCT: Identity Theft using In-Browser Communications in Dual-Window Single Sign-On.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IACR Cryptol. ePrint Arch., 2021
ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Processing Dangerous Paths - On Security and Privacy of the Portable Document Format.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
XSinator.com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Proc. Priv. Enhancing Technol., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos.
IACR Cryptol. ePrint Arch., 2019
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework.
IACR Cryptol. ePrint Arch., 2019
Datenschutz und Datensicherheit, 2019
Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the Open Identity Summit 2019, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
2018
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
2017
J. Cryptol., 2017
More is Less: How Group Chats Weaken the Security of Instant Messengers Signal, WhatsApp, and Threema.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
SECRET: On the Feasibility of a Secure, Efficient, and Collaborative Real-Time Web Editor.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 2016
Proceedings of the Open Identity Summit 2016, 13-14 October 2016, Rome, Italy, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015
Proceedings of the 2015 International Workshop on Secure Internet of Things, 2015
Proceedings of the 2015 IEEE World Congress on Services, 2015
Automatic recognition, processing and attacking of single sign-on protocols with burp suite.
Proceedings of the Open Identity Summit 2015, 10-11 November 2015, Berlin, Germany, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
AdIDoS - Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services.
Proceedings of the Data Privacy Management, and Security Assurance, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 2015
2014
J. Comput. Secur., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Proceedings of the Open Identity Summit 2014, November 4-6, 2014, Stuttgart, Germany, 2014
SIACHEN: A Fine-Grained Policy Language for the Mitigation of Cross-Site Scripting Attacks.
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014
Your Software at my Service: Security Analysis of SaaS Single Sign-On Solutions in the Cloud.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
J. Cryptol., 2013
Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos.
IACR Cryptol. ePrint Arch., 2013
Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 5<sup>th</sup> Central-European Workshop on Services and their Composition, 2013
Proceedings of the Information Security Applications - 14th International Workshop, 2013
Proceedings of the Information Security Applications - 14th International Workshop, 2013
Proceedings of the Open Identity Summit 2013, September 9th, 2013
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Datenschutz und Datensicherheit, 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the Sicherheit 2012: Sicherheit, 2012
Technical Analysis of Countermeasures against Attack on XML Encryption - or - Just Another Motivation for Authenticated Encryption.
Proceedings of the Eighth IEEE World Congress on Services, 2012
Proceedings of the Eighth IEEE World Congress on Services, 2012
Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles.
Proceedings of the Provable Security - 6th International Conference, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
SeC2: Secure Mobile Solution for Distributed Public Cloud Storages.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012
Proceedings of the Cloud Computing and Services Science - Second International Conference, 2012
XSpRES - Robust and Effective XML Signatures for Web Services.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Int. J. Mob. Comput. Multim. Commun., 2011
The Bug That Made Me President a Browser- and Web-Security Case Study on Helios Voting.
Proceedings of the E-Voting and Identity - Third International Conference, 2011
Proceedings of the DIM'11, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Chicago, IL, USA, 2011
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011
Proceedings of the IEEE International Conference on Cloud Computing, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 6th World Congress on Services, 2010
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
Proceedings of the IEEE International Conference on Cloud Computing, 2010
Proceedings of the ARES 2010, 2010
Sicherheit und Kryptographie im Internet - Von sicherer E-Mail bis zu IP-Verschlüsselung (3. Aufl.).
Vieweg, ISBN: 978-3-8348-0814-1, 2010
2009
ACM Trans. Sens. Networks, 2009
Int. J. Appl. Cryptogr., 2009
Datenschutz und Datensicherheit, 2009
Proceedings of the 6th ACM Workshop On Secure Web Services, 2009
Proceedings of the 6th ACM Workshop On Secure Web Services, 2009
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the IEEE International Conference on Web Services, 2009
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009
Proceedings of the IEEE International Conference on Cloud Computing, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Universally Composable Security Analysis of TLS - Secure Sessions with Handshake and Record Layer Protocols.
IACR Cryptol. ePrint Arch., 2008
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008
Proceedings of the Sicherheit 2008: Sicherheit, 2008
Proceedings of the Sicherheit 2008: Sicherheit, 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the 3rd International Conference, 2008
Proceedings of the Computer Security, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
TLS-Federation - a Secure and Relying-Party-Friendly Approach for Federated Identity Management.
Proceedings of the BIOSIG 2008, 2008
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Datenschutz und Datensicherheit, 2007
Signieren mit Chipkartensystemen in unsicheren Umgebungen - Homebanking mit Secure HBCI/FinTS.
Datenschutz und Datensicherheit, 2007
Proceedings of the E-Voting and Identity, First International Conference, 2007
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Proceedings of the Computational Science and Its Applications, 2007
Securing Email Communication with XML Technology.
Proceedings of the 2007 International Conference on Internet Computing, 2007
Proceedings of the Fifth IEEE European Conference on Web Services (ECOWS 2007), 2007
Proceedings of the 2nd ECOWS07 Workshop on Emerging Web Services Technology, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Sicherheit 2006: Sicherheit, 2006
Moderne Verfahren der Krypotgraphie - von RSA zu Zero-Knowledge (6. Aufl.).
Vieweg, ISBN: 978-3-8348-0083-1, 2006
2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the Communications and Multimedia Security, 2005
Proceedings of the Communications and Multimedia Security, 2005
2004
Proceedings of the 6th workshop on Multimedia & Security, 2004
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004
Moderne Verfahren der Kryptographie - von RSA zu Zero-Knowledge (5. Aufl.).
Vieweg, ISBN: 978-3-528-46590-2, 2004
2001
Proceedings of the Advances in Multimedia Information Processing, 2001
Proceedings of the 4th workshop on Multimedia & Security: New Challenges, 2001
Tree-based Key Agreement for Multicast.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001
2000
J. Electronic Imaging, 2000
1999
Proceedings of the Security and Watermarking of Multimedia Contents, 1999
How to Security Broadcast a Secret.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999
1996
Proceedings of the Advances in Cryptology, 1996
Establishing a Key Hierarchy for Conditional Access without Encryption.
Proceedings of the Communications and Multimedia Security II, 1996
1995
Moderne Verfahren der Kryptographie - von RSA zu Zero-Knowledge.
Vieweg, ISBN: 978-3-528-06590-4, 1995