Follow
Sebastian Schinzel
Sebastian Schinzel
Münster University of Applied Sciences
Verified email at fh-muenster.de - Homepage
Title
Cited by
Cited by
Year
Cache attacks on Intel SGX
J Götzfried, M Eckert, S Schinzel, T Müller
Proceedings of the 10th European Workshop on Systems Security, 1-6, 2017
4742017
{kAFL}:{Hardware-Assisted} feedback fuzzing for {OS} kernels
S Schumilo, C Aschermann, R Gawlik, S Schinzel, T Holz
26th USENIX security symposium (USENIX Security 17), 167-182, 2017
3112017
{DROWN}: Breaking {TLS} Using {SSLv2}
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
25th USENIX Security Symposium (USENIX Security 16), 689-706, 2016
3072016
Revisiting {SSL/TLS} implementations: New bleichenbacher side channels and attacks
C Meyer, J Somorovsky, E Weiss, J Schwenk, S Schinzel, E Tews
23rd USENIX Security Symposium (USENIX Security 14), 733-748, 2014
1292014
{GRIMOIRE}: Synthesizing structure while fuzzing
T Blazytko, M Bishop, C Aschermann, J Cappos, M Schlögel, N Korshun, ...
28th USENIX Security Symposium (USENIX Security 19), 1985-2002, 2019
1072019
Efail: Breaking {S/MIME} and {OpenPGP} Email Encryption using Exfiltration Channels
D Poddebniak, C Dresen, J Müller, F Ising, S Schinzel, S Friedberger, ...
27th USENIX Security Symposium (USENIX Security 18), 549-566, 2018
722018
Attacking deterministic signature schemes using fault attacks
D Poddebniak, J Somorovsky, S Schinzel, M Lochter, P Rösler
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 338-352, 2018
652018
Bleichenbacher’s attack strikes again: breaking PKCS# 1 v1. 5 in XML Encryption
T Jager, S Schinzel, J Somorovsky
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
612012
An efficient mitigation method for timing side channels on the web
S Schinzel
2nd International Workshop on Constructive Side-Channel Analysis and Secure …, 2011
332011
{“Johnny}, you are {fired!”}–Spoofing {OpenPGP} and {S/MIME} Signatures in Emails
J Müller, M Brinkmann, D Poddebniak, H Böck, S Schinzel, J Somorovsky, ...
28th USENIX Security Symposium (USENIX Security 19), 1011-1028, 2019
282019
Web Application Vulnerability Scanners—a Benchmark
A Wiegenstein, F Weidemann, M Schumacher, S Schinzel
Virtual Forge GmbH, 2006
222006
{ALPACA}: Application layer protocol confusion-analyzing and mitigating cracks in {TLS} authentication
M Brinkmann, C Dresen, R Merget, D Poddebniak, J Müller, ...
30th USENIX Security Symposium (USENIX Security 21), 4293-4310, 2021
212021
Analyzing medical device connectivity and its effect on cyber security in german hospitals
M Willing, C Dresen, U Haverkamp, S Schinzel
BMC medical informatics and decision making 20 (1), 1-15, 2020
162020
Detecting hidden storage side channel vulnerabilities in networked applications
FC Freiling, S Schinzel
IFIP International Information Security Conference, 41-55, 2011
162011
Grand theft app: Digital forensics of vehicle assistant apps
S Ebbers, F Ising, C Saatjohann, S Schinzel
Proceedings of the 16th International Conference on Availability …, 2021
152021
Re: What’s Up Johnny? Covert Content Attacks on Email End-to-End Encryption
J Müller, M Brinkmann, D Poddebniak, S Schinzel, J Schwenk
Applied Cryptography and Network Security: 17th International Conference …, 2019
152019
WAFFle: Fingerprinting Filter Rules of Web Application Firewalls.
I Schmitt, S Schinzel
WOOT, 34-40, 2012
152012
Practical decryption exfiltration: Breaking pdf encryption
J Müller, F Ising, V Mladenov, C Mainka, S Schinzel, J Schwenk
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
142019
Mitigation of attacks on email end-to-end encryption
J Schwenk, M Brinkmann, D Poddebniak, J Müller, J Somorovsky, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
132020
Behavioral responses to a cyber attack in a hospital environment
M Willing, C Dresen, E Gerlitz, M Haering, M Smith, C Binnewies, T Guess, ...
Scientific reports 11 (1), 19352, 2021
122021
The system can't perform the operation now. Try again later.
Articles 1–20