SoK: single sign-on security—an evaluation of openID connect C Mainka, V Mladenov, J Schwenk, T Wich 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 251-266, 2017 | 104 | 2017 |
Do not trust me: Using malicious IdPs for analyzing and attacking single sign-on C Mainka, V Mladenov, J Schwenk 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 321-336, 2016 | 55 | 2016 |
Sok: Exploiting network printers J Müller, V Mladenov, J Somorovsky, J Schwenk 2017 IEEE Symposium on Security and Privacy (SP), 213-230, 2017 | 43 | 2017 |
{SoK}:{XML} parser vulnerabilities C Späth, C Mainka, V Mladenov, J Schwenk 10th USENIX workshop on offensive technologies (WOOT 16), 2016 | 43 | 2016 |
Security analysis of {eIDAS}–The {Cross-Country} authentication scheme in Europe N Engelbertz, N Erinola, D Herring, J Somorovsky, V Mladenov, ... 12th USENIX Workshop on Offensive Technologies (WOOT 18), 2018 | 33 | 2018 |
Your software at my service: Security analysis of saas single sign-on solutions in the cloud C Mainka, V Mladenov, F Feldmann, J Krautwald, J Schwenk Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing …, 2014 | 30 | 2014 |
On the security of modern single sign-on protocols: Second-order vulnerabilities in openid connect V Mladenov, C Mainka, J Schwenk arXiv preprint arXiv:1508.04324, 2015 | 27 | 2015 |
1 trillion dollar refund: How to spoof pdf signatures V Mladenov, C Mainka, K Meyer zu Selhausen, M Grothe, J Schwenk Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 23 | 2019 |
Processing dangerous paths J Müller, D Noss, C Mainka, V Mladenov, J Schwenk Network and Distributed Systems Security Symposium, 2021 | 22 | 2021 |
Practical decryption exfiltration: Breaking pdf encryption J Müller, F Ising, V Mladenov, C Mainka, S Schinzel, J Schwenk Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 17 | 2019 |
On the security of modern single sign-on protocols: Openid connect 1.0 V Mladenov, C Mainka, J Krautwald, F Feldmann, J Schwenk CoRR abs/1508.04324, 2015 | 17 | 2015 |
Automatic recognition, processing and attacking of single sign-on protocols with burp suite C Mainka, V Mladenov, T Guenther, J Schwenk Gesellschaft für Informatik eV, 2015 | 17 | 2015 |
Breaking the specification: PDF certification S Rohlmann, V Mladenov, C Mainka, J Schwenk 2021 IEEE Symposium on Security and Privacy (SP), 1485-1501, 2021 | 15 | 2021 |
Office document security and privacy J Müller, F Ising, C Mainka, V Mladenov, S Schinzel, J Schwenk 14th USENIX Workshop on Offensive Technologies (WOOT 20), 2020 | 15 | 2020 |
On the (in-) security of javascript object signing and encryption D Detering, J Somorovsky, C Mainka, V Mladenov, J Schwenk Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium, 1-11, 2017 | 15 | 2017 |
Shadow Attacks: Hiding and Replacing Content in Signed PDFs. C Mainka, V Mladenov, S Rohlmann NDSS, 2021 | 14 | 2021 |
FutureTrust–Future Trust Services for Trustworthy Global Transactions D Hühnlein, T Frosch, J Schwenk, CM Piswanger, M Sel, T Hühnlein, ... Challenges in Cybersecurity and Privacy-the European Research Landscape, 285-301, 2022 | 13 | 2022 |
Guardians of the clouds: When identity providers fail A Mayer, M Niemietz, V Mladenov, J Schwenk Proceedings of the 6th edition of the ACM Workshop on Cloud Computing …, 2014 | 13 | 2014 |
DISTINCT: identity theft using in-browser communications in dual-window single sign-on L Jannett, V Mladenov, C Mainka, J Schwenk Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 11 | 2022 |
SECRET: On the feasibility of a secure, efficient, and collaborative real-time web editor D Felsch, C Mainka, V Mladenov, J Schwenk Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 10 | 2017 |