Martin Johns
Martin Johns
Professor of Computer Science, TU Braunschweig
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
25 million flows later: large-scale detection of DOM-based XSS
S Lekies, B Stock, M Johns
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Security testing: A survey
M Felderer, M Büchler, M Johns, AD Brucker, R Breu, A Pretschner
Advances in Computers 101, 1-51, 2016
RequestRodeo: Client side protection against session riding
M Johns, J Winter
Proceedings of the OWASP Europe 2006 Conference, 2006
Plug-in privacy for smart metering billing
M Jawurek, M Johns, F Kerschbaum
International Symposium on Privacy Enhancing Technologies Symposium, 192-210, 2011
Xssds: Server-side detection of cross-site scripting attacks
M Johns, B Engelmann, J Posegga
2008 Annual Computer Security Applications Conference (ACSAC), 335-344, 2008
Precise Client-side Protection against {DOM-based}{Cross-Site} Scripting
B Stock, S Lekies, T Mueller, P Spiegel, M Johns
23rd USENIX Security Symposium (USENIX Security 14), 655-670, 2014
Smart metering de-pseudonymization
M Jawurek, M Johns, K Rieck
Proceedings of the 27th annual computer security applications conference …, 2011
SessionShield: Lightweight protection against session hijacking
N Nikiforakis, W Meert, Y Younan, M Johns, W Joosen
International Symposium on Engineering Secure Software and Systems, 87-100, 2011
Hey, You Have a Problem: On the Feasibility of {Large-Scale} Web Vulnerability Notification
B Stock, G Pellegrino, C Rossow, M Johns, M Backes
25th USENIX Security Symposium (USENIX Security 16), 1015-1032, 2016
On JavaScript malware and related threats
M Johns
Journal in Computer Virology 4 (3), 161-178, 2008
SessionSafe: Implementing XSS immune session handling
M Johns
European Symposium on Research in Computer Security, 444-460, 2006
How the Web Tangled Itself: Uncovering the History of {Client-Side} Web ({In) Security}
B Stock, M Johns, M Steffens, M Backes
26th USENIX Security Symposium (USENIX Security 17), 971-987, 2017
Code-injection vulnerabilities in web applications—exemplified at cross-site scripting
M Johns
Oldenbourg Wissenschaftsverlag GmbH 53 (5), 256-260, 2011
Code-reuse attacks for the web: Breaking cross-site scripting mitigations via script gadgets
S Lekies, K Kotowicz, S Groß, EA Vela Nava, M Johns
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
From facepalm to brain bender: Exploring client-side cross-site scripting
B Stock, S Pfistner, B Kaiser, S Lekies, M Johns
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
The Unexpected Dangers of Dynamic {JavaScript}
S Lekies, B Stock, M Wentzel, M Johns
24th USENIX Security Symposium (USENIX Security 15), 723-735, 2015
Reliable protection against session fixation attacks
M Johns, B Braun, M Schrank, J Posegga
Proceedings of the 2011 ACM Symposium on Applied Computing, 1531-1537, 2011
Thieves in the Browser: Web-based Cryptojacking in the Wild
M Musch, C Wressnegger, M Johns, K Rieck
Proceedings of the 14th International Conference on Availability …, 2019
Don’t Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild.
M Steffens, C Rossow, M Johns, B Stock
Deemon: Detecting CSRF with dynamic analysis and property graphs
G Pellegrino, M Johns, S Koch, M Backes, C Rossow
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20