| Summary Metric | Count |
|---|---|
| Own publications | 35 |
| Rank A* & A papers | 17 |
| IEEE S&P papers | 4 |
| CCS papers | 3 |
| USENIX papers | 4 |
| NDSS papers | 2 |
- The State of Passkeys: Studying the Adoption and Security of Passkeys on the WebIn 35^th USENIX Security Symposium (USENIX’26), 2026
- Security Implications of Malicious G-Codes in 3D PrintingIn 34^th USENIX Security Symposium (USENIX’25), May 2025
- SSO-Monitor: Fully-Automatic Large-Scale Security and Privacy Analyses of Single Sign-On in the WildIn 2024 IEEE European Symposium on Security and Privacy (EuroS&P), Aug 2024
- Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML SignaturesIn 32^st USENIX Security Symposium (USENIX’23), Oct 2023
- Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument SignaturesIn 31^st USENIX Security Symposium (USENIX’22), Oct 2022Rank A*/A AWARD
-
- Vulnerability Report: Attacks bypassing the signature validation in PDF (Shadow Attacks)Nov 2020
- Office Document Security and PrivacyIn 14th USENIX Workshop on Offensive Technologies (WOOT 20), Nov 2020
- Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS)Open Identity Summit 2019, Nov 2019
- Vulnerability Report: Attacks bypassing confidetiality in encrypted PDFNov 2019
- Vulnerability Report: Attacks bypassing the signature validation in PDFNov 2019
- PostScript Undead: Pwning the Web with a 35 Years Old LanguageIn International Symposium on Research in Attacks, Intrusions, and Defenses (RAID ’18), Nov 2018
- Security Analysis of eIDAS–The Cross-Country Authentication Scheme in EuropeIn 12th {USENIX} Workshop on Offensive Technologies (WOOT 18), Nov 2018
- SECRET: On the Feasibility of a Secure, Efficient, and Collaborative Real-Time Web EditorIn ACM Asia Conference on Computer and Communications Security (ASIACCS), Nov 2017
- SoK: XML parser vulnerabilitiesIn 10th USENIX Workshop on Offensive Technologies (WOOT 16), Austin, TX, Nov 2016
- Automatic Recognition, Processing and Attacking of Single Sign-On Protocols with Burp SuiteOpen Identity Summit, Nov 2015
- OpenID Connect – Security ConsiderationsNov 2015
- On the Security of Holder-of-Key Single Sign-On.In Sicherheit, Nov 2014
- Strengthening Web Authentication through TLS – Beyond TLS Client CertificatesOpen Identity Summit, Nov 2014
- Guardians of the Clouds: When Identity Providers FailIn Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing Security, Scottsdale, Arizona, USA, Nov 2014
- Your Software at My Service: Security Analysis of SaaS Single Sign-On Solutions in the CloudIn Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing Security, Scottsdale, Arizona, USA, Nov 2014
- Options for integrating eID and SAMLIn Proceedings of the 2013 ACM workshop on Digital identity management, Nov 2013
- Penetration test tool for XML-based web servicesIn ESSoS Doctoral Symposium 2013, Nov 2013