Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Every Signature is Broken: On the Insecurity of Microsoft Office's OOXML Signatures., , , , and . USENIX Security Symposium, page 7411-7428. USENIX Association, (2023)Over 100 Bugs in a Row: Security Analysis of the Top-Rated Joomla Extensions., , , and . CoRR, (2021)Office Document Security and Privacy., , , , , and . WOOT @ USENIX Security Symposium, USENIX Association, (2020)Practical Decryption exFiltration: Breaking PDF Encryption., , , , , and . CCS, page 15-29. ACM, (2019)Die Financial-grade API (FAPI)., and . Datenschutz und Datensicherheit (dud), 47 (3): 154-159 (March 2023)Shadow Attacks: Hiding and Replacing Content in Signed PDFs., , and . NDSS, The Internet Society, (2021)Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures., , , and . USENIX Security Symposium, page 3075-3092. USENIX Association, (2022)Breaking the Specification: PDF Certification., , , and . SP, page 1485-1501. IEEE, (2021)More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema., , and . EuroS&P, page 415-429. IEEE, (2018)DISTINCT: Identity Theft using In-Browser Communications in Dual-Window Single Sign-On., , , and . CCS, page 1553-1567. ACM, (2022)