Sebastian Roth Profile
Sebastian Roth

@s3br0th

Followers
220
Following
145
Media
2
Statuses
47

PostDoctoral Researcher @ TU Wien Playing CTF @ saarsec (saarsec|steg1).

Joined October 2017
Don't wanna be here? Send us removal request.
@s3br0th
Sebastian Roth
1 year
So if you are interested in the deployment roadblocks and strategies for Trusted Types don't forget to drop by at the User Studies VII Session on Friday!
0
0
0
@s3br0th
Sebastian Roth
1 year
Just arrived in Philadelphia to attend @SOUPSConference, present our work at @USENIXSecurity, and see some new and familiar faces! #soups24 #usesec24
1
0
1
@predict_addict
Valeriy M., PhD, MBA, CQF
2 years
Conformal Prediction for predicting and prioritizing anti-cancer drug responses. 'Reliable anti-cancer drug sensitivity prediction and prioritization' Nature paper . #conformalprediction
2
3
14
@s3br0th
Sebastian Roth
2 years
With the identified roadblocks and possible improvement suggestions for the mechanism, we hope to ease the deployment of Trusted Types for Web developers such that we might gain a mechanism that is both easy to use and secure! (follow-up work in progress)
0
0
1
@s3br0th
Sebastian Roth
2 years
The biggest roadblock seems to be the sanitization of JavaScript as there is (currently) no proper way of doing so. Many ideas from the participants are bypassable. The only secure but hard-to-maintain solution would be hashes, but WebCrypto is not available in sync. contexts.
1
0
1
@s3br0th
Sebastian Roth
2 years
For script URLs, developers tend to use RegEx or allow-lists, which are often bypassable through JSONP or Open Redirects. Those attacks were, however, the original attack scenario for this sanitizer.
1
0
1
@s3br0th
Sebastian Roth
2 years
Together with 13 participants, we have seen that HTML sanitization should be done with existing sanitizers. However, this is not always working as those remove all existing JS in the HTML, which can interfere with third-party functionality.
1
0
1
@s3br0th
Sebastian Roth
2 years
Will Trusted Types end up like CSP? In our new @USENIXSecurity paper, we conducted a study to uncover roadblocks and deployment strategies of Trusted Types. Read our preprint here: https://t.co/D255YvoZgU CC: @_lgroeber @cathykxx @kcotsneb @CISPA @SecPrivTUWien
1
3
17
@s3br0th
Sebastian Roth
2 years
It was one of the most informative and entertaining projects I ever had the opportunity to be part of. If you want to learn more about ethical and legal implications of server-side scans, read this. And if you ever get the chance to work with @fh4ntke, seize it!
@fh4ntke
Florian
2 years
Can server-side scanning research be legal and ethical? For our upcoming @IEEESSP paper "Where are the red lines?" we talked to experts on law and ethics, and web operators. We discussed challenges, solutions and various fictional research scenarios. https://t.co/cTjFfiVRRl
0
0
7
@fh4ntke
Florian
2 years
Can server-side scanning research be legal and ethical? For our upcoming @IEEESSP paper "Where are the red lines?" we talked to experts on law and ethics, and web operators. We discussed challenges, solutions and various fictional research scenarios. https://t.co/cTjFfiVRRl
4
14
46
@ruhrsec
RuhrSec – IT Security Conference
3 years
The next highlight at #RuhrSec 2023 ✨ "You Can't Always Get What You Want – How Web Sites (Often) Lack Consistent Protection" by @s3br0th and @kcotsneb. Conference program, more information and details on our website: 🌐  https://t.co/sUEG9mxozf #itsecurity #itsicherheit
0
3
17
@fh4ntke
Florian
3 years
Hey 👋 Are you responsible for a website as an operator, CISO, ..? What do you think about researchers hacking your website - OK or a no-go? Help us make security research more beneficial for operators! Learn more and sign up for an interview at https://t.co/UwUH9E8AMf. Retweet🙏
3
11
23
@ruhrsec
RuhrSec – IT Security Conference
3 years
Is your web site protection consistent? Join @s3br0th and @kcotsneb on their latest research journey. RuhrSec Ticketshop 👉 https://t.co/LiC7f1AIeq 🌐 https://t.co/sUEG9mxozf #itsecurity #itsicherheit #conference #cybersecurity #securityconference #ITtalk #IT #ITCompanies
0
5
13
@s3br0th
Sebastian Roth
3 years
Just arrived in Boston. Looking forward to my first ever @SOUPSConference, my talk at @USENIXSecurity, and to see some new and some familiar faces! #soups2022 #usenix2022
0
0
40
@s3br0th
Sebastian Roth
3 years
You are a Web developer, want to learn something new, and get 50€? We are conducting a study to understand the challenges of deploying a mechanism to defend against client-side XSS. So, if you are interested, please visit https://t.co/8KphJfFqAd and/or share this invitation.
1
10
12
@s3br0th
Sebastian Roth
4 years
This security lottery does not only affect the security of end-users because attackers might choose only to attack the vulnerable population, or they succeed by pure chance due to randomness; it also sheds light on measurement inaccuracies that this randomness can cause.
0
0
0
@s3br0th
Sebastian Roth
4 years
With our analysis, we not only found Web applications that responded with seemingly random levels of protection, but we also have seen cases where we could deterministically get less protection based on our geolocation, language setting, or the browser that we used.
2
0
2
@s3br0th
Sebastian Roth
4 years
Ever wondered if all clients get the same level of security? In our newest @USENIXSecurity paper, we discovered that sometimes the configuration of security headers depends on client characteristics. Read it here: https://t.co/tDIFqJP5O7 CC: @stecalzavara @kcotsneb @CISPA
2
8
33