Martin Johns
Martin Johns
Professor of Computer Science, TU Braunschweig
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
25 million flows later: large-scale detection of DOM-based XSS
S Lekies, B Stock, M Johns
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Security testing: A survey
M Felderer, M Büchler, M Johns, AD Brucker, R Breu, A Pretschner
Advances in Computers 101, 1-51, 2016
RequestRodeo: Client side protection against session riding
M Johns, J Winter
Proceedings of the OWASP Europe 2006 Conference, 2006
Xssds: Server-side detection of cross-site scripting attacks
M Johns, B Engelmann, J Posegga
2008 Annual Computer Security Applications Conference (ACSAC), 335-344, 2008
Plug-in privacy for smart metering billing
M Jawurek, M Johns, F Kerschbaum
Privacy Enhancing Technologies: 11th International Symposium, PETS 2011 …, 2011
Precise client-side protection against DOM-based cross-site scripting
B Stock, S Lekies, T Mueller, P Spiegel, M Johns
23rd {USENIX} Security Symposium ({USENIX} Security 14), 655-670, 2014
Smart metering de-pseudonymization
M Jawurek, M Johns, K Rieck
Proceedings of the 27th annual computer security applications conference …, 2011
SessionShield: Lightweight protection against session hijacking
N Nikiforakis, W Meert, Y Younan, M Johns, W Joosen
Engineering Secure Software and Systems: Third International Symposium …, 2011
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
B Stock, G Pellegrino, C Rossow, M Johns, M Backes
USENIX Security Symposium 16, 2016
On JavaScript Malware and related threats: Web page based attacks revisited
M Johns
Journal in Computer Virology 4 (3), 161-178, 2008
How the web tangled itself: Uncovering the history of client-side web (in) security
B Stock, M Johns, M Steffens, M Backes
USENIX Association, 2017
Code-reuse attacks for the web: Breaking cross-site scripting mitigations via script gadgets
S Lekies, K Kotowicz, S Groß, EA Vela Nava, M Johns
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
SessionSafe: Implementing XSS immune session handling
M Johns
Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006
Thieves in the browser: Web-based cryptojacking in the wild
M Musch, C Wressnegger, M Johns, K Rieck
Proceedings of the 14th International Conference on Availability …, 2019
Don’t Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild.
M Steffens, C Rossow, M Johns, B Stock
Code-injection vulnerabilities in web applications—exemplified at cross-site scripting
M Johns
Oldenbourg Wissenschaftsverlag GmbH 53 (5), 256-260, 2011
Deemon: Detecting CSRF with dynamic analysis and property graphs
G Pellegrino, M Johns, S Koch, M Backes, C Rossow
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
The unexpected dangers of dynamic javascript
S Lekies, B Stock, M Wentzel, M Johns
24th {USENIX} Security Symposium ({USENIX} Security 15), 723-735, 2015
From facepalm to brain bender: Exploring client-side cross-site scripting
B Stock, S Pfistner, B Kaiser, S Lekies, M Johns
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
Adversarial preprocessing: Understanding and preventing image-scaling attacks in machine learning
E Quiring, D Klein, D Arp, M Johns, K Rieck
Proceedings of the 29th USENIX Conference on Security Symposium, 1363-1380, 2020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20