Author of the publication

Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth.

, , , , , , , and . EuroS&P Workshops, page 379-385. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Return Of Bleichenbacher's Oracle Threat (ROBOT)., , and . USENIX Security Symposium, page 817-849. USENIX Association, (2018)We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets., , , , , , and . USENIX Security Symposium, page 4877-4894. USENIX Association, (2023)Breaking and Fixing Gridcoin., , , and . WOOT, USENIX Association, (2017)On the insecurity of XML Security.. it - Information Technology, 56 (6): 313-317 (2014)Security Analysis of the 3MF Data Format., , and . RAID, page 179-194. ACM, (2023)TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries., , , , , and . USENIX Security Symposium, page 215-232. USENIX Association, (2022)Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet., , , , and . USENIX Security Symposium, page 4859-4876. USENIX Association, (2023)On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers., , , and . SP (Workshops), page 342-352. IEEE, (2022)Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)., , , , , and . IACR Cryptol. ePrint Arch., (2020)Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs!, , , , , , , and . AISec@CCS, page 169-180. ACM, (2021)