Down to the bare metal: Using processor features for binary analysis C Willems, R Hund, A Fobian, D Felsch, T Holz, A Vasudevan Proceedings of the 28th Annual Computer Security Applications Conference …, 2012 | 64 | 2012 |
The Dangers of Key Reuse: Practical Attacks on {IPsec}{IKE} D Felsch, M Grothe, J Schwenk, A Czubak, M Szymanek 27th USENIX Security Symposium (USENIX Security 18), 567-583, 2018 | 47 | 2018 |
SECRET: On the feasibility of a secure, efficient, and collaborative real-time web editor D Felsch, C Mainka, V Mladenov, J Schwenk Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 10 | 2017 |
How private is your private cloud? Security analysis of cloud control interfaces D Felsch, M Heiderich, F Schulz, J Schwenk Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 5-16, 2015 | 6 | 2015 |
PostScript Undead: Pwning the Web with a 35 Years Old Language J Müller, V Mladenov, D Felsch, J Schwenk International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018 | 4 | 2018 |
Sicherheitsanalyse der Private Cloud Interfaces von openQRM F Schulz, D Felsch, J Schwenk DA-CH Security: Bestandsaufnahme–Konzepte–Anwendungen–Perspektiven, 0 | 1 | |
Sicherer Schlussel-und Informationsaustausch mit SAML D Felsch, T Schreiber, C Meyer, F Feldmann, J Schwenk DA-CH Security: Bestandsaufnahme–Konzepte–Anwendungen–Perspektiven, 0 | 1 | |
Security of access and usage of Cloud infrastructures D Felsch | | 2019 |
Sicheres Arbeiten im Web 2.0-Vollsynchrones Editieren verschlüsselter Dokumente (SyncEnc): Sachbericht zum Teilvorhaben: Sicherheitsanalyse und Demonstrator D Felsch, J Schwenk Ruhr-Universität Bochum, 2019 | | 2019 |