USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 10 results:
Filters: Author is Sebastian Schinzel [Clear All Filters]
Content-Type: multipart/oracle - Tapping into Format Oracles in Email End-to-End Encryption. 32nd USENIX Security Symposium (USENIX Security 23). :4175--4192.
.
2023. "I don’t know why I check this...'' - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks. Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). :77--96.
.
2022. ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication. 30th USENIX Security Symposium (USENIX Security 21). :4293--4310.
.
2021. Why TLS is better without STARTTLS: A Security Analysis of STARTTLS in the Email Context. 30th USENIX Security Symposium (USENIX Security 21). :4365--4382.
.
2021. Office Document Security and Privacy. 14th USENIX Workshop on Offensive Technologies (WOOT 20).
.
2020. “Johnny, you are fired!” – Spoofing OpenPGP and S/MIME Signatures in Emails. 28th USENIX Security Symposium (USENIX Security 19). :1011--1028.
.
2019. Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels. 27th USENIX Security Symposium (USENIX Security 18). :549--566.
.
2018. kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels. 26th USENIX Security Symposium (USENIX Security 17). :167--182.
.
2017. DROWN: Breaking TLS Using SSLv2. 25th USENIX Security Symposium (USENIX Security 16). :689--706.
.
2016. Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks. 23rd USENIX Security Symposium (USENIX Security 14). :733--748.
.
2014.