| Scriptless attacks: stealing the pie without touching the sill M Heiderich, M Niemietz, F Schuster, T Holz, J Schwenk Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 140 | 2012 |
| Same-Origin Policy: Evaluation in Modern Browsers J Schwenk, M Niemietz, C Mainka 26th USENIX Security Symposium (USENIX Security 17), 713-727, 2017 | 73 | 2017 |
| UI Redressing Attacks on Android Devices M Niemietz, J Schwenk Black Hat Abu Dhabi 2012, 2012 | 73 | 2012 |
| UI redressing: Attacks and Countermeasures Revisited M Niemietz in CONFidence 2011, 2011 | 29 | 2011 |
| Owning Your Home Network: Router Security Revisited M Niemietz, J Schwenk Web 2.0 Security & Privacy 2015, 2015 | 26 | 2015 |
| The bug that made me president a browser-and web-security case study on helios voting M Heiderich, T Frosch, M Niemietz, J Schwenk International Conference on E-Voting and Identity, 89-103, 2011 | 24 | 2011 |
| Not so Smart: On Smart TV Apps M Niemietz, J Somorovsky, C Mainka, J Schwenk International Workshop on Secure Internet of Things, 2015 | 22 | 2015 |
| Xsinator. com: From a formal model to the automatic evaluation of cross-site leaks in web browsers L Knittel, C Mainka, M Niemietz, DT Noß, J Schwenk Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 20 | 2021 |
| Scriptless attacks: Stealing more pie without touching the sill M Heiderich, M Niemietz, F Schuster, T Holz, J Schwenk Journal of Computer Security 22 (4), 567-599, 2014 | 18 | 2014 |
| Guardians of the Clouds: When Identity Providers Fail A Mayer, M Niemietz, V Mladenov, J Schwenk Proceedings of the 6th edition of the ACM Workshop on Cloud Computing …, 2014 | 14 | 2014 |
| On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers H Siewert, M Kretschmer, M Niemietz, J Somorovsky 16th IEEE Workshop on Offensive Technologies (WOOT), 2022 | 10 | 2022 |
| Waiting for CSP — Securing Legacy Web Applications with JSAgents M Heiderich, M Niemietz, J Schwenk European Symposium on Research in Computer Security, 2015 | 7 | 2015 |
| Over 100 Bugs in a Row: Security Analysis of the Top-Rated Joomla Extensions M Niemietz, M Korth, C Mainka, J Somorovsky arXiv preprint arXiv:2102.03131, 2021 | 5 | 2021 |
| Out of the Dark: UI Redressing and Trustworthy Events M Niemietz, J Schwenk 16th International Conference on Cryptology And Network Security (CANS), 2017 | 5 | 2017 |
| Vulnerability Analysis and Exploitation of Authentication Web Pages with Selenium M Niemietz AVM, 2010 | 4 | 2010 |
| Analysis of UI redressing attacks and countermeasures M Niemietz Ruhr University Bochum, Germany, 2019 | 3 | 2019 |
| Javascript-based esapi: An in-depth overview M Niemietz, J Schwenk Ruhr-University of Bochum, OWASP Foundation, 2011 | 2 | 2011 |
| Finding all cross-site needles in the DOM stack: A comprehensive methodology for the automatic XS-leak detection in web browsers DT Noß, L Knittel, C Mainka, M Niemietz, J Schwenk Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 1 | 2023 |
| Clickjacking und UI-Redressing-Vom Klick-Betrug zum Datenklau: Ein Leitfaden für Sicherheitsexperten und Webentwickler M Niemietz dpunkt. verlag, 2012 | 1 | 2012 |
| From Sign-Up to Multi-Million Revenues: A Deep Dive into Vendors on Darknet Marketplaces J Kramer, A Streicher, M Niemietz Availability, Reliability and Security (ARES IWCC), 221-238, 2025 | | 2025 |