Marcus Brinkmann

Orcid: 0000-0001-5649-6357

According to our database1, Marcus Brinkmann authored at least 25 papers between 2007 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Artifacts: Finding SSH Strict Key Exchange Violations by State Learning (v3).
Dataset, September, 2025

Artifacts: Finding SSH Strict Key Exchange Violations by State Learning (v2).
Dataset, September, 2025

Artifacts: Finding SSH Strict Key Exchange Violations by State Learning (v1).
Dataset, September, 2025

Artifacts: On the Security of SSH Client Signatures (v3).
Dataset, September, 2025

Artifacts: On the Security of SSH Client Signatures (v2).
Dataset, September, 2025

Artifacts: On the Security of SSH Client Signatures (v1).
Dataset, August, 2025

Taken out of context.
PhD thesis, 2025

Opossum Attack: Application Layer Desynchronization using Opportunistic TLS.
IACR Cryptol. ePrint Arch., 2025

On the Security of SSH Client Signatures.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

Finding SSH Strict Key Exchange Violations by State Learning.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation.
Proceedings of the 33rd USENIX Security Symposium, 2024

2023
Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information.
IACR Cryptol. ePrint Arch., 2023

Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
USENIX'23 Artifact: Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser.
Dataset, November, 2022

"I don't know why I check this..." - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

2021
Linearly Self-Equivalent APN Permutations in Small Dimension.
IEEE Trans. Inf. Theory, 2021

Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E).
Proceedings of the 30th USENIX Security Symposium, 2021

ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Mitigation of Attacks on Email End-to-End Encryption.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Extended Affine and CCZ Equivalence up to Dimension 4.
IACR Cryptol. ePrint Arch., 2019

"Johnny, you are fired!" - Spoofing OpenPGP and S/MIME Signatures in Emails.
Proceedings of the 28th USENIX Security Symposium, 2019

Re: What's Up Johnny? - Covert Content Attacks on Email End-to-End Encryption.
Proceedings of the Applied Cryptography and Network Security, 2019

2008
On the classification of APN functions up to dimension five.
Des. Codes Cryptogr., 2008

2007
A critique of the GNU hurd multi-server operating system.
ACM SIGOPS Oper. Syst. Rev., 2007


  Loading...