Folgen
Sebastian Roth
Sebastian Roth
PostDoc @ TU Wien
Bestätigte E-Mail-Adresse bei tuwien.ac.at - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies
S Roth, T Barron, S Calzavara, N Nikiforakis, B Stock
Proceedings of the 27th Network and Distributed System Security Symposium (NDSS), 2020
582020
A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web
S Calzavara, S Roth, A Rabitti, M Backes, B Stock
29th USENIX Security Symposium (USENIX Security 20), 683-697, 2020
342020
ScriptProtect: Mitigating Unsafe Third-Party JavaScript Practices
M Musch, M Steffens, S Roth, B Stock, M Johns
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
332019
12 Angry Developers - A Qualitative Study on Developers' Struggles with CSP
S Roth, L Gröber, M Backes, K Krombholz, B Stock
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
272021
The Security Lottery: Measuring {Client-Side} Web Security Inconsistencies
S Roth, S Calzavara, M Wilhelm, A Rabitti, B Stock
31st USENIX Security Symposium (USENIX Security 22), 2047-2064, 2022
252022
Assessing the Impact of Script Gadgets on CSP at Scale
S Roth, M Backes, B Stock
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
162020
Where are the red lines? towards ethical server-side scans in security and privacy research
F Hantke, S Roth, R Mrowczynski, C Utz, B Stock
2024 IEEE Symposium on Security and Privacy (SP), 4405-4423, 2024
32024
Trust me if you can–How usable is trusted types in practice?
S Roth, L Gröber, P Baus, K Krombholz, B Stock
33rd USENIX Security Symposium (USENIX Security 24), 6003-6020, 2024
22024
To hash or not to hash: A security assessment of CSP’s unsafe-hashes expression
P Stolz, S Roth, B Stock
2022 IEEE Security and Privacy Workshops (SPW), 1-12, 2022
22022
Honey, I Cached our Security Tokens Re-usage of Security Tokens in the Wild
L Trampert, B Stock, S Roth
Proceedings of the 26th International Symposium on Research in Attacks …, 2023
2023
How to deploy security mechanisms online (consistently)
S Roth
Saarländische Universitäts-und Landesbibliothek, 2023
2023
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–11