Sebastian Schinzel

  • FH Münster, Fachbereich Elektrotechnik und Informatik, Steinfurt, Germany

According to our database1, Sebastian Schinzel authored at least 30 papers between 2011 and 2024.

Collaborative distances:



In proceedings 
PhD thesis 


Online presence:



KIM: Kaos In der Medizin.
Proceedings of the Sicherheit, 2024

Content-Type: multipart/oracle - Tapping into Format Oracles in Email End-to-End Encryption.
Proceedings of the 32nd USENIX Security Symposium, 2023

Sicherheit medizintechnischer Protokolle im Krankenhaus.
Datenschutz und Datensicherheit, 2022

"I don't know why I check this..." - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Listen to Your Heart: Evaluation of the Cardiologic Ecosystem.
IACR Cryptol. ePrint Arch., 2021

Why TLS is better without STARTTLS: A Security Analysis of STARTTLS in the Email Context.
Proceedings of the 30th USENIX Security Symposium, 2021

ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication.
Proceedings of the 30th USENIX Security Symposium, 2021

Grand Theft App: Digital Forensics of Vehicle Assistant Apps.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Analyzing medical device connectivity and its effect on cyber security in german hospitals.
BMC Medical Informatics Decis. Mak., 2020

Office Document Security and Privacy.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Mitigation of Attacks on Email End-to-End Encryption.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

CORSICA: Cross-Origin Web Service Identification.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

STALK: security analysis of smartwatches for kids.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

"Johnny, you are fired!" - Spoofing OpenPGP and S/MIME Signatures in Emails.
Proceedings of the 28th USENIX Security Symposium, 2019

Practical Decryption exFiltration: Breaking PDF Encryption.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Re: What's Up Johnny? - Covert Content Attacks on Email End-to-End Encryption.
Proceedings of the Applied Cryptography and Network Security, 2019

Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels.
Proceedings of the 27th USENIX Security Symposium, 2018

Attacking Deterministic Signature Schemes using Fault Attacks.
IACR Cryptol. ePrint Arch., 2017

kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels.
Proceedings of the 26th USENIX Security Symposium, 2017

Cache Attacks on Intel SGX.
Proceedings of the 10th European Workshop on Systems Security, 2017


Information leakage behind the curtain: Abusing anti-EMI features for covert communication.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Unintentional and Hidden Information Leaks in Networked Software Applications.
PhD thesis, 2012

WAFFle: Fingerprinting Filter Rules of Web Application Firewalls.
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012

Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption.
Proceedings of the Computer Security - ESORICS 2012, 2012

Reducing the Incidence of Unintended, Human-Caused Information Flows in Enterprise Systems.
Proceedings of the 16th IEEE International Enterprise Distributed Object Computing Conference Workshops, 2012

Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011