Simon Koch
Simon Koch
Verified email at
Cited by
Cited by
Deemon: Detecting CSRF with dynamic analysis and property graphs
G Pellegrino, M Johns, S Koch, M Backes, C Rossow
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communicationsá…, 2017
Keeping Privacy Labels Honest
S Koch, M Wessels, B Altpeter, M Olvermann, M Johns
Proceedings on Privacy Enhancing Technologies 4, 486-506, 2022
Raccoon: automated verification of guarded race conditions in web applications
S Koch, T Sauer, M Johns, G Pellegrino
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1678-1687, 2020
The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications
S Koch, B Altpeter, M Johns
USENIX Security Symposium, 2023
FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities
S Gro▀, S Koch, L Bernhard, T Holz, M Johns
Network and Distributed System Security (NDSS) Symposium, 2023
POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor
M Backes, S Koch, S Meiser, E Mohammadi, C Rossow
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communicationsá…, 2015
The system can't perform the operation now. Try again later.
Articles 1–6