Personensuche
X
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
1
Finding All Cross-Site Needles in the DOM Stack: A Comprehe..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
3
DISTINCT : Identity Theft using In-Browser Communication..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
4
XSinator.com: From a Formal Model to the Automatic Evaluati..:
, In:
?
2021 IEEE Symposium on Security and Privacy (SP) ,
5
Breaking the Specification: PDF Certification:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
6
1 Trillion Dollar Refund : How To Spoof PDF Signatures:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
7
Practical Decryption exFiltration : Breaking PDF Encrypt..:
, In:
?
2018 IEEE European Symposium on Security and Privacy (EuroS&P) ,
8
More is Less: On the End-to-End Security of Group Chats in ..:
, In:
?
Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium ,
9
On The (In-)Security Of JavaScript Object Signing And Encry..:
, In:
?
2017 IEEE European Symposium on Security and Privacy (EuroS&P) ,
10
SoK: Single Sign-On Security — An Evaluation of OpenID Conn..:
, In:
?
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security ,
11
SECRET : On the Feasibility of a Secure, Efficient, and ..:
, In:
?
2015 International Workshop on Secure Internet of Things (SIoT) ,
12
Not so Smart: On Smart TV Apps:
, In:
?
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security ,
13