Deemon: Detecting CSRF with dynamic analysis and property graphs G Pellegrino, M Johns, S Koch, M Backes, C Rossow Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 73 | 2017 |
Keeping Privacy Labels Honest S Koch, M Wessels, B Altpeter, M Olvermann, M Johns Proceedings on Privacy Enhancing Technologies 4, 486-506, 2022 | 22 | 2022 |
FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities S Groß, S Koch, L Bernhard, T Holz, M Johns Network and Distributed System Security (NDSS) Symposium, 2023 | 9 | 2023 |
The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications S Koch, B Altpeter, M Johns USENIX Security Symposium, 2023 | 8 | 2023 |
Raccoon: automated verification of guarded race conditions in web applications S Koch, T Sauer, M Johns, G Pellegrino Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1678-1687, 2020 | 5 | 2020 |
POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor M Backes, S Koch, S Meiser, E Mohammadi, C Rossow Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 3 | 2015 |
Poster: The Risk of Insufficient Isolation of Database Transactions in Web Applications S Koch, M Wessels, D Klein, M Johns Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 1 | 2023 |
The Fault in Our Stars: An Analysis of GitHub Stars as an Importance Metric for Web Source Code S Koch, D Klein, M Johns | | |