What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Juraj Somorovsky
Google Scholar
37
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Transport Layer Obscurity: Circumventing SNI Censorship on the TLS-Layer.
Niklas Niere
Felix Lange
Robert Merget
Juraj Somorovsky
2025
conf/uss
STEK Sharing is Not Caring: Bypassing TLS Authentication in Web Servers using Session Tickets.
Sven Hebrok
Tim Leonhard Storm
Felix Matthias Cramer
Maximilian Radoy
Juraj Somorovsky
2025
conf/uss
Security Implications of Malicious G-Codes in 3D Printing.
Jost Rossel
Vladislav Mladenov
Nico Wördenweber
Juraj Somorovsky
2025
conf/uss
Towards Internet-Based State Learning of TLS State Machines.
Marcel Maehren
Nurullah Erinola
Robert Merget
Jörg Schwenk
Juraj Somorovsky
2024
conf/uss
With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors.
Martin Dunsche
Marcel Maehren
Nurullah Erinola
Robert Merget
Nicolai Bissantz
Juraj Somorovsky
Jörg Schwenk
2024
conf/acns
Security Analysis of BigBlueButton and eduMEET.
Nico Heitmann
Hendrik Siewert
Sven Moog
Juraj Somorovsky
2024
conf/esorics
In Search of Partitioning Oracle Attacks Against TLS Session Tickets.
Maximilian Radoy
Sven Hebrok
Juraj Somorovsky
2023
conf/ccs
Poster: Circumventing the GFW with TLS Record Fragmentation.
Niklas Niere
Sven Hebrok
Juraj Somorovsky
Robert Merget
2023
conf/uss
We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets.
Sven Hebrok
Simon Nachtigall
Marcel Maehren
Nurullah Erinola
Robert Merget
Juraj Somorovsky
Jörg Schwenk
2023
conf/uss
Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet.
Nurullah Erinola
Marcel Maehren
Robert Merget
Juraj Somorovsky
Jörg Schwenk
2023
conf/eurosp
Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth.
Jens Pottebaum
Jost Rossel
Juraj Somorovsky
Yasemin Acar
René Fahr
Patricia Arias Cabarcos
Eric Bodden
Iris Gräßler
2022
conf/uss
TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries.
Marcel Maehren
Philipp Nieting
Sven Hebrok
Robert Merget
Juraj Somorovsky
Jörg Schwenk
2022
conf/sp
On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers.
Hendrik Siewert
Martin Kretschmer
Marcus Niemietz
Juraj Somorovsky
2022
conf/soups
"I don't know why I check this..." - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks.
Peter Mayer
Damian Poddebniak
Konstantin Fischer
Marcus Brinkmann
Juraj Somorovsky
M. Angela Sasse
Sebastian Schinzel
Melanie Volkamer
2021
conf/ccs
Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs!
Jan Peter Drees
Pritha Gupta
Eyke Hüllermeier
Tibor Jager
Alexander Konze
Claudia Priesterjahn
Arunselvan Ramaswamy
Juraj Somorovsky
2021
conf/uss
Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E).
Robert Merget
Marcus Brinkmann
Nimrod Aviram
Juraj Somorovsky
Johannes Mittmann
Jörg Schwenk
2021
conf/uss
ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication.
Marcus Brinkmann
Christian Dresen
Robert Merget
Damian Poddebniak
Jens Müller
Juraj Somorovsky
Jörg Schwenk
Sebastian Schinzel
2020
conf/ccs
Mitigation of Attacks on Email End-to-End Encryption.
Jörg Schwenk
Marcus Brinkmann
Damian Poddebniak
Jens Müller
Juraj Somorovsky
Sebastian Schinzel
2020
conf/uss
Analysis of DTLS Implementations Using Protocol State Fuzzing.
Paul Fiterau-Brostean
Bengt Jonsson
Robert Merget
Joeri de Ruiter
Konstantinos Sagonas
Juraj Somorovsky
2019
conf/uss
Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities.
Robert Merget
Juraj Somorovsky
Nimrod Aviram
Craig Young
Janis Fliegenschmidt
Jörg Schwenk
Yuval Shavitt
2019
conf/uss
"Johnny, you are fired!" - Spoofing OpenPGP and S/MIME Signatures in Emails.
Jens Müller
Marcus Brinkmann
Damian Poddebniak
Hanno Böck
Sebastian Schinzel
Juraj Somorovsky
Jörg Schwenk
2018
conf/ccs
Prime and Prejudice: Primality Testing Under Adversarial Conditions.
Martin R. Albrecht
Jake Massimo
Kenneth G. Paterson
Juraj Somorovsky
2018
conf/uss
Return Of Bleichenbacher's Oracle Threat (ROBOT).
Hanno Böck
Juraj Somorovsky
Craig Young
2018
conf/uss
Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels.
Damian Poddebniak
Christian Dresen
Jens Müller
Fabian Ising
Sebastian Schinzel
Simon Friedberger
Juraj Somorovsky
Jörg Schwenk
2018
conf/eurosp
Attacking Deterministic Signature Schemes Using Fault Attacks.
Damian Poddebniak
Juraj Somorovsky
Sebastian Schinzel
Manfred Lochter
Paul Rösler
2017
conf/sp
SoK: Exploiting Network Printers.
Jens Müller
Vladislav Mladenov
Juraj Somorovsky
Jörg Schwenk
2016
conf/ccs
Systematic Fuzzing and Testing of TLS Libraries.
Juraj Somorovsky
2016
conf/uss
DROWN: Breaking TLS Using SSLv2.
Nimrod Aviram
Sebastian Schinzel
Juraj Somorovsky
Nadia Heninger
Maik Dankel
Jens Steube
Luke Valenta
David Adrian
J. Alex Halderman
Viktor Dukhovni
Emilia Käsper
Shaanan Cohney
Susanne Engels
Christof Paar
Yuval Shavitt
2015
conf/ccs
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption.
Tibor Jager
Jörg Schwenk
Juraj Somorovsky
2015
conf/esorics
AdIDoS - Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services.
Christian Altmeier
Christian Mainka
Juraj Somorovsky
Jörg Schwenk
2015
conf/esorics
Practical Invalid Curve Attacks on TLS-ECDH.
Tibor Jager
Jörg Schwenk
Juraj Somorovsky
2014
conf/uss
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.
Christopher Meyer
Juraj Somorovsky
Eugen Weiss
Jörg Schwenk
Sebastian Schinzel
Erik Tews
2013
conf/ndss
One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.
Tibor Jager
Kenneth G. Paterson
Juraj Somorovsky
2012
conf/uss
On Breaking SAML: Be Whoever You Want to Be.
Juraj Somorovsky
Andreas Mayer
Jörg Schwenk
Marco Kampmann
Meiko Jensen
2012
conf/esorics
Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption.
Tibor Jager
Sebastian Schinzel
Juraj Somorovsky
2011
conf/ccs
All your clouds are belong to us: security analysis of cloud management interfaces.
Juraj Somorovsky
Mario Heiderich
Meiko Jensen
Jörg Schwenk
Nils Gruschka
Luigi Lo Iacono
2011
conf/ccs
How to break XML encryption.
Tibor Jager
Juraj Somorovsky
Coauthors
Alexander Konze
(1)
Andreas Mayer
(1)
Arunselvan Ramaswamy
(1)
Bengt Jonsson
(1)
Christian Altmeier
(1)
Christian Dresen
(2)
Christian Mainka
(1)
Christof Paar
(1)
Christopher Meyer
(1)
Claudia Priesterjahn
(1)
Craig Young
(2)
Damian Poddebniak
(6)
David Adrian
(1)
Emilia Käsper
(1)
Eric Bodden
(1)
Erik Tews
(1)
Eugen Weiss
(1)
Eyke Hüllermeier
(1)
Fabian Ising
(1)
Felix Lange
(1)
Felix Matthias Cramer
(1)
Hanno Böck
(2)
Hendrik Siewert
(2)
Iris Gräßler
(1)
J. Alex Halderman
(1)
Jake Massimo
(1)
Jan Peter Drees
(1)
Janis Fliegenschmidt
(1)
Jens Müller
(5)
Jens Pottebaum
(1)
Jens Steube
(1)
Joeri de Ruiter
(1)
Johannes Mittmann
(1)
Jörg Schwenk
(18)
Jost Rossel
(2)
Juraj Somorovsky
(37)
Kenneth G. Paterson
(2)
Konstantin Fischer
(1)
Konstantinos Sagonas
(1)
Luigi Lo Iacono
(1)
Luke Valenta
(1)
M. Angela Sasse
(1)
Maik Dankel
(1)
Manfred Lochter
(1)
Marcel Maehren
(5)
Marco Kampmann
(1)
Marcus Brinkmann
(5)
Marcus Niemietz
(1)
Mario Heiderich
(1)
Martin Dunsche
(1)
Martin Kretschmer
(1)
Martin R. Albrecht
(1)
Maximilian Radoy
(2)
Meiko Jensen
(2)
Melanie Volkamer
(1)
Nadia Heninger
(1)
Nico Heitmann
(1)
Nico Wördenweber
(1)
Nicolai Bissantz
(1)
Niklas Niere
(2)
Nils Gruschka
(1)
Nimrod Aviram
(3)
Nurullah Erinola
(4)
Patricia Arias Cabarcos
(1)
Paul Fiterau-Brostean
(1)
Paul Rösler
(1)
Peter Mayer
(1)
Philipp Nieting
(1)
Pritha Gupta
(1)
René Fahr
(1)
Robert Merget
(11)
Sebastian Schinzel
(9)
Shaanan Cohney
(1)
Simon Friedberger
(1)
Simon Nachtigall
(1)
Susanne Engels
(1)
Sven Hebrok
(5)
Sven Moog
(1)
Tibor Jager
(6)
Tim Leonhard Storm
(1)
Viktor Dukhovni
(1)
Vladislav Mladenov
(2)
Yasemin Acar
(1)
Yuval Shavitt
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to