Sebastian Schinzel

Affiliations:
  • FH Münster, Fachbereich Elektrotechnik und Informatik, Steinfurt, Germany


According to our database1, Sebastian Schinzel authored at least 32 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Grand theft API: A forensic analysis of vehicle cloud data.
Forensic Sci. Int. Digit. Investig., 2024

LanDscAPe: Exploring LDAP weaknesses and data leaks at Internet scale.
Proceedings of the 33rd USENIX Security Symposium, 2024

KIM: Kaos In der Medizin.
Proceedings of the Sicherheit, 2024

2023
Content-Type: multipart/oracle - Tapping into Format Oracles in Email End-to-End Encryption.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Sicherheit medizintechnischer Protokolle im Krankenhaus.
Datenschutz und Datensicherheit, 2022

"I don't know why I check this..." - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

2021
Listen to Your Heart: Evaluation of the Cardiologic Ecosystem.
IACR Cryptol. ePrint Arch., 2021

Why TLS is better without STARTTLS: A Security Analysis of STARTTLS in the Email Context.
Proceedings of the 30th USENIX Security Symposium, 2021

ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication.
Proceedings of the 30th USENIX Security Symposium, 2021

Grand Theft App: Digital Forensics of Vehicle Assistant Apps.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Analyzing medical device connectivity and its effect on cyber security in german hospitals.
BMC Medical Informatics Decis. Mak., 2020

Office Document Security and Privacy.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Mitigation of Attacks on Email End-to-End Encryption.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

CORSICA: Cross-Origin Web Service Identification.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

STALK: security analysis of smartwatches for kids.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
"Johnny, you are fired!" - Spoofing OpenPGP and S/MIME Signatures in Emails.
Proceedings of the 28th USENIX Security Symposium, 2019

Practical Decryption exFiltration: Breaking PDF Encryption.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Re: What's Up Johnny? - Covert Content Attacks on Email End-to-End Encryption.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels.
Proceedings of the 27th USENIX Security Symposium, 2018

2017
Attacking Deterministic Signature Schemes using Fault Attacks.
IACR Cryptol. ePrint Arch., 2017

kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels.
Proceedings of the 26th USENIX Security Symposium, 2017

Cache Attacks on Intel SGX.
Proceedings of the 10th European Workshop on Systems Security, 2017

2016

Information leakage behind the curtain: Abusing anti-EMI features for covert communication.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

2014
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2012
Unintentional and Hidden Information Leaks in Networked Software Applications.
PhD thesis, 2012

WAFFle: Fingerprinting Filter Rules of Web Application Firewalls.
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012

Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption.
Proceedings of the Computer Security - ESORICS 2012, 2012

Reducing the Incidence of Unintended, Human-Caused Information Flows in Enterprise Systems.
Proceedings of the 16th IEEE International Enterprise Distributed Object Computing Conference Workshops, 2012

2011
Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011



  Loading...