• Deutsch
Internal Login

Open Access

  • Home
  • Search
  • Browse
  • Publish
  • FAQ

Refine

Author

  • Schinzel, Sebastian (42)
  • Ising, Fabian (11)
  • Poddebniak, Damian (10)
  • Saatjohann, Christoph (10)
  • Dresen, Christian (9)
  • Schwenk, Jörg (8)
  • Müller, Jens (7)
  • Somorovsky, Juraj (7)
  • Brinkmann, Marcus (5)
  • Willing, Markus (5)
+ more

Year of publication

  • 2025 (1)
  • 2024 (2)
  • 2023 (1)
  • 2022 (2)
  • 2021 (6)
  • 2020 (6)
  • 2019 (3)
  • 2018 (3)
  • 2017 (1)
  • 2016 (2)
+ more

Document Type

  • Article in Conference Proceedings (18)
  • Part of a Book (14)
  • Article (9)
  • Book (1)

Language

  • English (28)
  • German (9)
  • Multiple languages (5)

Has Fulltext

  • no (34)
  • yes (8)

Is part of the Bibliography

  • no (42)

Keywords

  • Cyber Security (4)
  • Cardiac Implantable Devices (1)
  • Open Document Format (1)
  • PGP (1)
  • Privacy (1)
  • S/MIME (1)
  • Security (1)
  • docx (1)
  • networked computer tomography scanner (1)

Institute

  • Elektrotechnik und Informatik (ETI) (42)

42 search hits

  • 1 to 20
  • BibTeX
  • CSV
  • RIS
  • 10
  • 20
  • 50
  • 100

Sort by

  • Year
  • Year
  • Title
  • Title
  • Author
  • Author
Information leakage behind the curtain: Abusing anti-EMI features for covert communication (2016)
Bauer, Johannes ; Schinzel, Sebastian ; Felix, C. ; Freiling, Andreas
DROWN: Breaking TLS Using SSLv2 (2016)
Aviram, Nimrod ; Schinzel, Sebastian ; Somorovsky, Juraj ; Heninger, Nadia ; Dankel, Maik ; Steube, Jens ; Valenta, Luke ; Adrian, David ; Halderman, J. Alex ; Dukhovni, Viktor ; Käsper, Emilia ; Cohney, Shaanan ; Engels, Susanne ; Paar, Christof ; Shavitt, Yuval
WAFFle: Fingerprinting Filter Rules of Web Application Firewalls (2012)
Schmitt, Isabell ; Schinzel, Sebastian
Bleichenbacher's Attack Strinkes Again: Breaking PKCS#1 v1.5 in XML Encryption (2012)
Jager, Tibor ; Schinzel, Sebastian ; Somorovsky, Juraj
Über Umwege - Seitenkanalangriffe auf Netzwerkanwendungen (2012)
Schinzel, Sebastian ; Schmitt, Isabell
SAP-Security - Sicherheitslöcher in eigenem ABAP-Code stopfen (2011)
Schinzel, Sebastian ; Weidemann, Frederik ; Wiegenstein, Andreas ; Schumacher, Markus
Security mechanisms of a legal peer-to-peer file sharing system (2008)
Ebinger, Peter ; Schinzel, Sebastian ; Schmuckler, Martin
Seitenkanäle mit Untiefen: Manche Webanwendungen spielen Angreifern unfreiwillig Informationen zu (2012)
Schinzel, Sebastian
Attacking Deterministic Signature Schemes using Fault Attacks (2018)
Poddebniak, Damian ; Somorovsky, Juraj ; Schinzel, Sebastian ; Lochter, Manfred ; Rösler, Paul
kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels (2017)
Schumilo, Sergej ; Aschermann, Cornelius ; Gawlik, Robert ; Schinzel, Sebastian ; Holz, Thorsten
Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels (2018)
Poddebniak, Damian ; Dresen, Christian ; Müller, Jens ; Ising, Fabian ; Schinzel, Sebastian ; Friedberg, Simon ; Somorovsky, Juraj ; Schwenk, Jörg
“Johnny, you are fired!” – Spoofing OpenPGP and S/MIME Signatures in Emails (2019)
Müller, Jens ; Brinkmann, Marcus ; Poddebniak, Damian ; Böck, Hanno ; Schinzel, Sebastian ; Smomrosvsky, Juraj ; Schwenk, Jörg
OpenPGP and S/MIME are the two major standards to en-crypt and digitally sign emails. Digital signatures are sup-posed to guarantee authenticity and integrity of messages. Inthis work we show practical forgery attacks against variousimplementations of OpenPGP and S/MIME email signatureverification in five attack classes: (1) We analyze edge casesin S/MIME’s container format. (2) We exploit in-band sig-naling in the GnuPG API, the most widely used OpenPGPimplementation. (3) We apply MIME wrapping attacks thatabuse the email clients’ handling of partially signed mes-sages. (4) We analyze weaknesses in the binding of signedmessages to the sender identity. (5) We systematically testemail clients for UI redressing attacks.Our attacks allow the spoofing of digital signatures for ar-bitrary messages in 14 out of 20 tested OpenPGP-capableemail clients and 15 out of 22 email clients supportingS/MIME signatures. While the attacks do not target the un-derlying cryptographic primitives of digital signatures, theyraise concerns about the actual security of OpenPGP andS/MIME email applications. Finally, we propose mitigationstrategies to counter these attacks.
What's up John­ny? – Co­vert Con­tent At­tacks on Email End-to-End En­cryp­ti­on (2019)
Müller, Jens ; Brinkmann, Marcus ; Poddebniak, Damian ; Schinzel, Sebastian ; Schwenk, Jörg
We show practical attacks against OpenPGP and S/MIMEencryption and digital signatures in the context of email. Instead of tar-geting the underlying cryptographic primitives, our attacks abuse legiti-mate features of the MIME standard and HTML, as supported by emailclients, to deceive the user regarding the actual message content. Wedemonstrate how the attacker can unknowingly abuse the user as a de-cryption oracle by replying to an unsuspicious looking email. Using thistechnique, the plaintext of hundreds of encrypted emails can be leakedat once. Furthermore, we show how users could be tricked into signingarbitrary text by replying to emails containing CSS conditional rules.An evaluation shows that "out of" OpenPGP-capable email clients,as well as "out of" clients supporting S/MIME, are vulnerable to atleast one attack. We provide different countermeasures and discuss theiradvantages and disadvantages.
Practical Decryption exFiltration: Breaking PDF Encryption (2019)
Müller, Jens ; Ising, Fabian ; Mldadenov, Vladislav ; Mainka, Christian ; Schinzel, Sebastian ; Schwenk, Jörg
The Portable Document Format, better known as PDF, is one of themost widely used document formats worldwide, and in order to en-sure information confidentiality, this file format supports documentencryption. In this paper, we analyze PDF encryption and showtwo novel techniques for breaking the confidentiality of encrypteddocuments. First, we abuse the PDF feature ofpartially encrypteddocuments to wrap the encrypted part of the document withinattacker-controlled content and therefore, exfiltrate the plaintextonce the document is opened by a legitimate user. Second, we abusea flaw in the PDF encryption specification to arbitrarily manipulateencrypted content. The only requirement is that a single block ofknown plaintext is needed, and we show that this is fulfilled bydesign. Our attacks allow the recovery of the entire plaintext of en-crypted documents by using exfiltration channels which are basedon standard compliant PDF properties.We evaluated our attacks on 27 widely used PDF viewers andfound all of them to be vulnerable. We responsibly disclosed thevulnerabilities and supported the vendors in fixing the issue
Analysis and consequences of an imaging process concerning the cyber security of a networked computer tomography scanner (2018)
Gierling, Markus ; Dresen, Christian ; Eich, Hans ; Mittman, Karin ; Schinzel, Sebastian ; Haverkamp, Uwe
Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption (2020)
Müller, Jens ; Brinkmann, Marcus ; Poddebniak, Damian ; Schinzel, Sebastian ; Schwenk, Jörg
OpenPGP and S/MIME are the two major standards for email end-to-end encryption. We show practical attacks against both encryption schemes in the context of email. First, we present a design flaw in the key update mechanism, allowing a third party to deploy a new key to the communication partners. Second, we show how email clients can be tricked into acting as an oracle for decryption or signing by exploiting their functionality to auto-save drafts. Third, we demonstrate how to exfiltrate the private key, based on proprietary mailto parameters implemented by various email clients. An evaluation shows that 8 out of 20 tested email clients are vulnerable to at least one attack. While our attacks do not target the underlying cryptographic primitives, they raise concerns about the practical security of OpenPGP and S/MIME email applications. Finally, we propose countermeasures and discuss their advantages and disadvantages.
"I don’t know why I check this...'' - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks (2022)
Mayer, Peter ; Poddebniak, Damian ; Fischer, Konstantin ; Brinkmann, Marcus ; Somorovsky, Juraj ; Schinzel, Sebastian ; Volkamer, Melanie
OpenPGP is one of the two major standards for end-to-end email security. Several studies showed that serious usability issues exist with tools implementing this standard. However, a widespread assumption is that expert users can handle these tools and detect signature spoofing attacks. We present a user study investigating expert users' strategies to detect signature spoofing attacks in Thunderbird. We observed 25 expert users while they classified eight emails as either having a legitimate signature or not. Studying expert users explicitly gives us an upper bound of attack detection rates of all users dealing with PGP signatures. 52% of participants fell for at least one out of four signature spoofing attacks. Overall, participants did not have an established strategy for evaluating email signature legitimacy. We observed our participants apply 23 different types of checks when inspecting signed emails, but only 8 of these checks tended to be useful in identifying the spoofed or invalid signatures. In performing their checks, participants were frequently startled, confused, or annoyed with the user interface, which they found supported them little. All these results paint a clear picture: Even expert users struggle to verify email signatures, usability issues in email security are not limited to novice users, and developers may need proper guidance on implementing email signature GUIs correctly.
Behavioral responses to a cyber attack in a hospital environment (2021)
Willing, Markus ; Dresen, Christian ; Gerlitz, Eva ; Haering, Maximilian ; Smith, Matthew ; Binnewies, Carmen ; Guess, Tim ; Haverkamp, Uwe ; Schinzel, Sebastian
Technical and organizational steps are necessary to mitigate cyber threats and reduce risks. Human behavior is the last line of defense for many hospitals and is considered as equally important as technical security. Medical staff must be properly trained to perform such procedures. This paper presents the first qualitative, interdisciplinary research on how members of an intermediate care unit react to a cyberattack against their patient monitoring equipment. We conducted a simulation in a hospital training environment with 20 intensive care nurses. By the end of the experiment, 12 of the 20 participants realized the monitors’ incorrect behavior. We present a qualitative behavior analysis of high performing participants (HPP) and low performing participants (LPP). The HPP showed fewer signs of stress, were easier on their colleagues, and used analog systems more often than the LPP. With 40% of our participants not recognizing the attack, we see room for improvements through the use of proper tools and provision of adequate training to prepare staff for potential attacks in the future.
LanDscAPe: Exploring LDAP Weaknesses and Data Leaks at Internet Scale (2024)
Kaspereit, Jonas ; Öndarö, Gurur ; Luvizotto Cesar, Gustavo ; Ebbers, Simon ; Ising, Fabian ; Saatjohann, Christoph ; Jonker, Mattijs ; Holz, Ralph ; Schinzel, Sebastian
The Lightweight Directory Access Protocol (LDAP) is the standard technology to query information stored in directories. These directories can contain sensitive personal data such as usernames, email addresses, and passwords. LDAP is also used as a central, organization-wide storage of configuration data for other services. Hence, it is important to the security posture of many organizations, not least because it is also at the core of Microsoft’s Active Directory, and other identity management and authentication services. We report on a large-scale security analysis of deployed LDAP servers on the Internet. We developed LanDscAPe, a scanning tool that analyzes security-relevant misconfigurations of LDAP servers and the security of their TLS configurations. Our Internet-wide analysis revealed more than 10k servers that appear susceptible to a range of threats, including insecure configurations, deprecated software with known vulnerabilities, and insecure TLS setups. 4.9k LDAP servers host personal data, and 1.8k even leak passwords. We document, classify, and discuss these and briefly describe our notification campaign to address these concerning issues.
Of­fice Do­cu­ment Se­cu­ri­ty and Pri­va­cy (2020)
Müller, Jens ; Ising, Fabian ; Mla­de­nov, Vla­dis­lav ; Mainka, Chris­ti­an ; Schinzel, Sebastian ; Schwenk, Jörg
OOXML and ODF are the de facto standard data formats for word processing, spreadsheets, and presentations. Both are XML-based, feature-rich container formats dating back to the early 2000s. In this work, we present a systematic analysis of the capabilities of malicious office documents. Instead of focusing on implementation bugs, we abuse legitimate features of the OOXML and ODF specifications. We categorize our attacks into five classes: (1) Denial-of-Service attacks affecting the host on which the document is processed. (2) Invasion of privacy attacks that track the usage of the document. (3) Information disclosure attacks exfiltrating personal data out of the victim's computer. (4) Data manipulation on the victim's system. (5) Code execution on the victim's machine. We evaluated the reference implementations – Microsoft Office and LibreOffice – and found both of them to be vulnerable to each tested class of attacks. Finally, we propose mitigation strategies to counter these attacks.
  • 1 to 20

OPUS4 Logo

  • Contact
  • Imprint
  • Sitelinks