Deemon: Detecting CSRF with dynamic analysis and property graphs G Pellegrino, M Johns, S Koch, M Backes, C Rossow Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 63 | 2017 |
Keeping Privacy Labels Honest S Koch, M Wessels, B Altpeter, M Olvermann, M Johns Proceedings on Privacy Enhancing Technologies 4, 486-506, 2022 | 10 | 2022 |
Raccoon: automated verification of guarded race conditions in web applications S Koch, T Sauer, M Johns, G Pellegrino Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1678-1687, 2020 | 4 | 2020 |
The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications S Koch, B Altpeter, M Johns USENIX Security Symposium, 2023 | 3 | 2023 |
FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities S Groß, S Koch, L Bernhard, T Holz, M Johns Network and Distributed System Security (NDSS) Symposium, 2023 | 3 | 2023 |
POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor M Backes, S Koch, S Meiser, E Mohammadi, C Rossow Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 3 | 2015 |