Christian Mainka

Orcid: 0000-0002-4273-645X

According to our database1, Christian Mainka authored at least 37 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Die Financial-grade API (FAPI).
Datenschutz und Datensicherheit (dud), March, 2023

SSO-Monitor: Fully-Automatic Large-Scale Landscape, Security, and Privacy Analyses of Single Sign-On in the Wild.
CoRR, 2023

Every Signature is Broken: On the Insecurity of Microsoft Office's OOXML Signatures.
Proceedings of the 32nd USENIX Security Symposium, 2023

Finding All Cross-Site Needles in the DOM Stack: A Comprehensive Methodology for the Automatic XS-Leak Detection in Web Browsers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures.
Proceedings of the 31st USENIX Security Symposium, 2022

DISTINCT: Identity Theft using In-Browser Communications in Dual-Window Single Sign-On.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Over 100 Bugs in a Row: Security Analysis of the Top-Rated Joomla Extensions.
CoRR, 2021

Breaking the Specification: PDF Certification.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Shadow Attacks: Hiding and Replacing Content in Signed PDFs.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Processing Dangerous Paths - On Security and Privacy of the Portable Document Format.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

XSinator.com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Office Document Security and Privacy.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

2019
1 Trillion Dollar Refund: How To Spoof PDF Signatures.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Practical Decryption exFiltration: Breaking PDF Encryption.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
On message-level security.
PhD thesis, 2017

More is Less: How Group Chats Weaken the Security of Instant Messengers Signal, WhatsApp, and Threema.
IACR Cryptol. ePrint Arch., 2017

Same-Origin Policy: Evaluation in Modern Browsers.
Proceedings of the 26th USENIX Security Symposium, 2017

SoK: Single Sign-On Security - An Evaluation of OpenID Connect.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

SECRET: On the Feasibility of a Secure, Efficient, and Collaborative Real-Time Web Editor.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
SoK: XML Parser Vulnerabilities.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

How to Break Microsoft Rights Management Services.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

Do Not Trust Me: Using Malicious IdPs for Analyzing and Attacking Single Sign-on.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Your Cloud in My Company: Modern Rights Management Services Revisited.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
On the security of modern Single Sign-On Protocols: OpenID Connect 1.0.
CoRR, 2015

How to Break XML Encryption - Automatically.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

Not so Smart: On Smart TV Apps.
Proceedings of the 2015 International Workshop on Secure Internet of Things, 2015

Automatic recognition, processing and attacking of single sign-on protocols with burp suite.
Proceedings of the Open Identity Summit 2015, 10.-11. November 2015, Berlin, Germany, 2015

AdIDoS - Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

2014
How Secure is TextSecure?
IACR Cryptol. ePrint Arch., 2014

Your Software at my Service: Security Analysis of SaaS Single Sign-On Solutions in the Cloud.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014

2013
A new approach for WS-Policy Intersection using Partial Ordered Sets.
Proceedings of the 5<sup>th</sup> Central-European Workshop on Services and their Composition, 2013

A New Approach towards DoS Penetration Testing on Web Services.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

2012
XML Signature Wrapping Angriffe wirksam unterbinden.
Datenschutz und Datensicherheit, 2012

Penetration Testing Tool for Web Services Security.
Proceedings of the Eighth IEEE World Congress on Services, 2012

Making XML Signatures Immune to XML Signature Wrapping Attacks.
Proceedings of the Cloud Computing and Services Science - Second International Conference, 2012

XSpRES - Robust and Effective XML Signatures for Web Services.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012


  Loading...