Follow
SAP Security Research
SAP Security Research
SAP Security Research, SAP SE (SAP privacy statement for followers : sap.com/sps)
Verified email at sap.com - Homepage
Title
Cited by
Cited by
Year
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
A Armando, R Carbone, L Compagna, J Cuellar, L Tobarra
Proceedings of the 6th ACM workshop on Formal methods in security …, 2008
3902008
Searchable encryption with secure and efficient updates
F Hahn, F Kerschbaum
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
2482014
25 million flows later: large-scale detection of DOM-based XSS
S Lekies, B Stock, M Johns
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2402013
Security testing: A survey
M Felderer, M Büchler, M Johns, AD Brucker, R Breu, A Pretschner
Advances in Computers 101, 1-51, 2016
2302016
Frequency-hiding order-preserving encryption
F Kerschbaum
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1972015
Outsourced private set intersection using homomorphic encryption
F Kerschbaum
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
1772012
Optimal average-complexity ideal-security order-preserving encryption
F Kerschbaum, A Schröpfer
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1702014
Backstabber’s knife collection: A review of open source software supply chain attacks
M Ohm, H Plate, A Sykosch, M Meier
Detection of Intrusions and Malware, and Vulnerability Assessment: 17th …, 2020
1692020
Plug-in privacy for smart metering billing
M Jawurek, M Johns, F Kerschbaum
International Symposium on Privacy Enhancing Technologies Symposium, 192-210, 2011
1672011
Xssds: Server-side detection of cross-site scripting attacks
M Johns, B Engelmann, J Posegga
2008 Annual Computer Security Applications Conference (ACSAC), 335-344, 2008
1642008
RequestRodeo: Client side protection against session riding
M Johns, J Winter
Proceedings of the OWASP Europe 2006 Conference, 2006
1622006
Monte carlo and reconstruction membership inference attacks against generative models
B Hilprecht, M Härterich, D Bernau
Proceedings on Privacy Enhancing Technologies 2019 (4), 232-249, 2019
1562019
SAT-based model-checking for security protocols analysis
A Armando, L Compagna
International Journal of Information Security 7, 3-32, 2008
1552008
Precise client-side protection against DOM-based cross-site scripting
B Stock, S Lekies, T Mueller, P Spiegel, M Johns
23rd {USENIX} Security Symposium ({USENIX} Security 14), 655-670, 2014
1432014
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
1372012
HardIDX: Practical and secure index with SGX
B Fuhry, R Bahmani, F Brasser, F Hahn, F Kerschbaum, AR Sadeghi
Data and Applications Security and Privacy XXXI: 31st Annual IFIP WG 11.3 …, 2017
1352017
A model-checking approach to analysing organisational controls in a loan origination process
A Schaad, V Lotz, K Sohr
Proceedings of the eleventh ACM symposium on Access control models and …, 2006
1332006
SessionShield: Lightweight protection against session hijacking
N Nikiforakis, W Meert, Y Younan, M Johns, W Joosen
International Symposium on Engineering Secure Software and Systems, 87-100, 2011
1292011
LTL model checking for security protocols
A Armando, R Carbone, L Compagna
Journal of Applied Non-Classical Logics 19 (4), 403-429, 2009
1292009
Smart metering de-pseudonymization
M Jawurek, M Johns, K Rieck
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
1282011
The system can't perform the operation now. Try again later.
Articles 1–20