Scriptless attacks: stealing the pie without touching the sill M Heiderich, M Niemietz, F Schuster, T Holz, J Schwenk Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 131 | 2012 |
UI Redressing Attacks on Android Devices M Niemietz, J Schwenk Black Hat Abu Dhabi 2012, 2012 | 70 | 2012 |
Same-Origin Policy: Evaluation in Modern Browsers J Schwenk, M Niemietz, C Mainka 26th USENIX Security Symposium (USENIX Security 17), 713-727, 2017 | 63 | 2017 |
UI redressing: Attacks and Countermeasures Revisited M Niemietz in CONFidence 2011, 2011 | 30 | 2011 |
Owning Your Home Network: Router Security Revisited M Niemietz, J Schwenk Web 2.0 Security & Privacy 2015, 2015 | 22 | 2015 |
The bug that made me president a browser-and web-security case study on helios voting M Heiderich, T Frosch, M Niemietz, J Schwenk E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn …, 2012 | 22 | 2012 |
Not so Smart: On Smart TV Apps M Niemietz, J Somorovsky, C Mainka, J Schwenk International Workshop on Secure Internet of Things, 2015 | 20 | 2015 |
Xsinator. com: From a formal model to the automatic evaluation of cross-site leaks in web browsers L Knittel, C Mainka, M Niemietz, DT Noß, J Schwenk Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 16 | 2021 |
Scriptless attacks: Stealing more pie without touching the sill M Heiderich, M Niemietz, F Schuster, T Holz, J Schwenk Journal of Computer Security 22 (4), 567-599, 2014 | 15 | 2014 |
Guardians of the Clouds: When Identity Providers Fail A Mayer, M Niemietz, V Mladenov, J Schwenk Proceedings of the 6th edition of the ACM Workshop on Cloud Computing …, 2014 | 13 | 2014 |
Waiting for CSP — Securing Legacy Web Applications with JSAgents M Heiderich, M Niemietz, J Schwenk European Symposium on Research in Computer Security, 2015 | 6 | 2015 |
On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers H Siewert, M Kretschmer, M Niemietz, J Somorovsky 16th IEEE Workshop on Offensive Technologies (WOOT), 2022 | 5 | 2022 |
Out of the Dark: UI Redressing and Trustworthy Events M Niemietz, J Schwenk 16th International Conference on Cryptology And Network Security (CANS), 2017 | 5 | 2017 |
Vulnerability Analysis and Exploitation of Authentication Web Pages with Selenium M Niemietz AVM, 2010 | 4 | 2010 |
Analysis of UI redressing attacks and countermeasures M Niemietz Ruhr University Bochum, Germany, 2019 | 3 | 2019 |
Javascript-based esapi: An in-depth overview M Niemietz, J Schwenk Ruhr-University of Bochum, OWASP Foundation, 2011 | 2 | 2011 |
Over 100 Bugs in a Row: Security Analysis of the Top-Rated Joomla Extensions M Niemietz, M Korth, C Mainka, J Somorovsky arXiv preprint arXiv:2102.03131, 2021 | 1 | 2021 |
Clickjacking und UI-Redressing-Vom Klick-Betrug zum Datenklau: Ein Leitfaden für Sicherheitsexperten und Webentwickler M Niemietz dpunkt. verlag, 2012 | 1 | 2012 |
Finding All Cross-Site Needles in the DOM Stack: A Comprehensive Methodology for the Automatic XS-Leak Detection in Web Browsers DT Noß, L Knittel, C Mainka, M Niemietz, J Schwenk Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | | 2023 |