Mario Heiderich

According to our database1, Mario Heiderich authored at least 14 papers between 2011 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
DOMPurify: Client-Side Protection Against XSS and Markup Injection.
Proceedings of the Computer Security - ESORICS 2017, 2017

2015
Waiting for CSP - Securing Legacy Web Applications with JSAgents.
Proceedings of the Computer Security - ESORICS 2015, 2015

How Private is Your Private Cloud?: Security Analysis of Cloud Control Interfaces.
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 2015

2014
Scriptless attacks: Stealing more pie without touching the sill.
J. Comput. Secur., 2014

Scriptless Timing Attacks on Web Browser Privacy.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2013
mXSS attacks: attacking well-secured web-applications by using innerHTML mutations.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Towards elimination of XSS attacks with a trusted and capability controlled DOM
PhD thesis, 2012

XSS-FP: Browser Fingerprinting using HTML Parser Quirks
CoRR, 2012

On the Fragility and Limitations of Current Browser-Provided Clickjacking Protection Schemes.
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012

Scriptless attacks: stealing the pie without touching the sill.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
The Bug That Made Me President a Browser- and Web-Security Case Study on Helios Voting.
Proceedings of the E-Voting and Identity - Third International Conference, 2011

IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

All your clouds are belong to us: security analysis of cloud management interfaces.
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011

Crouching tiger - hidden payload: security risks of scalable vectors graphics.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011


  Loading...