Martin Johns
Orcid: 0000-0003-2574-5060Affiliations:
- TU Braunschweig, Institute for Application Security, Germany
According to our database1,
Martin Johns
authored at least 86 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
On csauthors.net:
Bibliography
2025
Proc. Priv. Enhancing Technol., 2025
2024
A Black-Box Privacy Analysis of Messaging Service Providers' Chat Message Processing.
Proc. Priv. Enhancing Technol., 2024
FP-tracer: Fine-grained Browser Fingerprinting Detection via Taint-tracking and Entropy-based Thresholds.
Proc. Priv. Enhancing Technol., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Don't Patch the Researcher, Patch the Game: A Systematic Approach for Responsible Research via Federated Ethics Boards.
Proceedings of the New Security Paradigms Workshop, 2024
Continuous Health Monitoring on Shared Mobility Devices: A Health-eScooter Prototype.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
2023
The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Poster: The Risk of Insufficient Isolation of Database Transactions in Web Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
General Data Protection Runtime: Enforcing Transparent GDPR Compliance for Existing Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
No keys to the kingdom required: a comprehensive investigation of missing authentication vulnerabilities in the wild.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022
Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Proc. Priv. Enhancing Technol., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Talking About My Generation: Targeted DOM-based XSS Exploit Generation using Dynamic Data Flow Analysis.
Proceedings of the EuroSec '21: Proceedings of the 14th European Workshop on Systems Security, 2021
2020
Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Proceedings of the CCSW'20, 2020
2019
Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Code-Reuse Attacks for the Web: Breaking Cross-Site Scripting Mitigations via Script Gadgets.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-12226-7, 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Datenschutz und Datensicherheit, 2012
Proceedings of the Trust, Privacy and Security in Digital Business, 2012
Proceedings of the Trust, Privacy and Security in Digital Business, 2012
Towards stateless, client-side driven Cross-Site Request Forgery protection for Web applications.
Proceedings of the Sicherheit 2012: Sicherheit, 2012
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Code Injection Vulnerabilities in Web Applications: Exemplified at Cross-site Scripting.
PhD thesis, 2011
Code-injection Vulnerabilities in Web Applications - Exemplified at Cross-site Scripting.
it Inf. Technol., 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011
Scanstud: A Methodology for Systematic, Fine-Grained Evaluation of Static Analysis Tools.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011
Proceedings of the Fourth European Workshop on System Security, 2011
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011
Biting the Hand That Serves You: A Closer Look at Client-Side Flash Proxies for Cross-Domain Requests.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the Sicherheit 2010: Sicherheit, 2010
Proceedings of the ISSE 2010, 2010
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010
2009
Code-injection Verwundbarkeit in Web Anwendungen am Beispiel von Cross-site Scripting.
Proceedings of the Ausgezeichnete Informatikdissertationen 2009, 2009
Proceedings of the Web Application Security, 29.03. - 03.04.2009, 2009
Proceedings of the Web Application Security, 29.03. - 03.04.2009, 2009
2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Automatisierter Code-Audit - Sicherheitsanalyse von Source Code in Theorie und Praxis.
Datenschutz und Datensicherheit, 2007
SMask: preventing injection attacks in web applications by approximating automatic data/code separation.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007
Proceedings of the Detection of Intrusions and Malware, 2007
2006
Proceedings of the Computer Security, 2006
2003
Proceedings of the BIOSIG 2003, 2003