Juraj Somorovsky

1.4k total citations
40 papers, 735 citations indexed

About

Juraj Somorovsky is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Juraj Somorovsky has authored 40 papers receiving a total of 735 indexed citations (citations by other indexed papers that have themselves been cited), including 28 papers in Artificial Intelligence, 18 papers in Information Systems and 17 papers in Computer Networks and Communications. Recurrent topics in Juraj Somorovsky's work include Advanced Malware Detection Techniques (13 papers), Cryptographic Implementations and Security (12 papers) and Security and Verification in Computing (11 papers). Juraj Somorovsky is often cited by papers focused on Advanced Malware Detection Techniques (13 papers), Cryptographic Implementations and Security (12 papers) and Security and Verification in Computing (11 papers). Juraj Somorovsky collaborates with scholars based in Germany, United Kingdom and United States. Juraj Somorovsky's co-authors include Jörg Schwenk, Tibor Jager, Meiko Jensen, Sebastian Schinzel, Christian Mainka, Mario Heiderich, Nils Gruschka, Luigi Lo Iacono, Andreas Mayer and Paul Rösler and has published in prestigious journals such as Network and Distributed System Security Symposium, it - Information Technology and USENIX Security Symposium.

In The Last Decade

Juraj Somorovsky

39 papers receiving 682 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Juraj Somorovsky Germany 16 432 382 297 244 119 40 735
Yonghwi Kwon United States 16 299 0.7× 271 0.7× 273 0.9× 324 1.3× 110 0.9× 50 591
Johanna Amann United States 11 458 1.1× 334 0.9× 403 1.4× 337 1.4× 54 0.5× 18 778
Purui Su China 11 319 0.7× 217 0.6× 228 0.8× 286 1.2× 160 1.3× 54 577
Tilo Müller Germany 17 733 1.7× 471 1.2× 285 1.0× 574 2.4× 93 0.8× 57 1.0k
Philip Homburg Netherlands 10 267 0.6× 274 0.7× 677 2.3× 249 1.0× 83 0.7× 22 834
Matthias Neugschwandtner Austria 12 292 0.7× 313 0.8× 377 1.3× 632 2.6× 345 2.9× 21 807
Jethro G. Beekman United States 6 355 0.8× 289 0.8× 234 0.8× 221 0.9× 43 0.4× 8 561
Alok Tongaonkar United States 14 312 0.7× 96 0.3× 383 1.3× 244 1.0× 38 0.3× 24 496
Brendan Saltaformaggio United States 14 241 0.6× 317 0.8× 272 0.9× 373 1.5× 70 0.6× 38 548
Eu-Jin Goh United States 6 746 1.7× 365 1.0× 431 1.5× 418 1.7× 28 0.2× 7 908

Countries citing papers authored by Juraj Somorovsky

Since Specialization
Citations

This map shows the geographic impact of Juraj Somorovsky's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Juraj Somorovsky with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Juraj Somorovsky more than expected).

Fields of papers citing papers by Juraj Somorovsky

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Juraj Somorovsky. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Juraj Somorovsky. The network helps show where Juraj Somorovsky may publish in the future.

Co-authorship network of co-authors of Juraj Somorovsky

This figure shows the co-authorship network connecting the top 25 collaborators of Juraj Somorovsky. A scholar is included among the top collaborators of Juraj Somorovsky based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Juraj Somorovsky. Juraj Somorovsky is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Kretschmer, Martin, et al.. (2022). On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers. 342–352. 4 indexed citations
2.
Müller, Jens, et al.. (2021). ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication. USENIX Security Symposium. 4293–4310. 2 indexed citations
3.
Drees, J., et al.. (2021). Automated Detection of Side Channels in Cryptographic Protocols. 169–180. 1 indexed citations
4.
Fiterău-Broştean, Paul, et al.. (2020). Analysis of DTLS Implementations Using Protocol State Fuzzing.. KTH Publication Database DiVA (KTH Royal Institute of Technology). 2523–2540. 23 indexed citations
5.
Schwenk, Jörg, et al.. (2020). Mitigation of Attacks on Email End-to-End Encryption. 1647–1664. 4 indexed citations
6.
Aschermann, Cornelius, Ali Abbasi, Thorsten Holz, et al.. (2019). AntiFuzz: Impeding Fuzzing Audits of Binary Executables. USENIX Security Symposium. 1931–1947. 14 indexed citations
7.
Blazytko, Tim, Matt Bishop, Cornelius Aschermann, et al.. (2019). {GRIMOIRE}: Synthesizing Structure while Fuzzing. 1985–2002. 34 indexed citations
8.
Somorovsky, Juraj, et al.. (2019). Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities. Zenodo (CERN European Organization for Nuclear Research). 1029–1046. 8 indexed citations
9.
Somorovsky, Juraj, et al.. (2019). Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS). 95–106. 1 indexed citations
10.
Müller, Jens, et al.. (2019). "Johnny, you are fired!" – Spoofing OpenPGP and S/MIME Signatures in Emails. Zenodo (CERN European Organization for Nuclear Research). 1011–1028. 9 indexed citations
11.
Albrecht, M., et al.. (2018). Prime and Prejudice. 281–298. 6 indexed citations
12.
Somorovsky, Juraj, et al.. (2018). Attacking Deterministic Signature Schemes Using Fault Attacks. 338–352. 33 indexed citations
13.
Somorovsky, Juraj, et al.. (2017). On The (In-)Security Of JavaScript Object Signing And Encryption. Zenodo (CERN European Organization for Nuclear Research). 1–11. 5 indexed citations
14.
Somorovsky, Juraj, et al.. (2017). Breaking and Fixing Gridcoin. Zenodo (CERN European Organization for Nuclear Research). 1 indexed citations
15.
Somorovsky, Juraj, et al.. (2017). Nonce-Disrespecting Adversaries:Practical Forgery Attacks on GCM in TLS. IACR Cryptology ePrint Archive. 2016. 15–25. 30 indexed citations
16.
Mainka, Christian, et al.. (2015). How to break XML encryption – automatically. 11–11. 6 indexed citations
17.
Somorovsky, Juraj, et al.. (2014). Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks. TUbilio (Technical University of Darmstadt). 41 indexed citations
18.
Jager, Tibor, Kenneth G. Paterson, & Juraj Somorovsky. (2013). One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. Network and Distributed System Security Symposium. 17 indexed citations
20.
Somorovsky, Juraj, Mario Heiderich, Meiko Jensen, et al.. (2011). All your clouds are belong to us. Publication Server of Bonn-Rhein-Sieg University of Applied Sciences (Bonn-Rhein-Sieg University of Applied Sciences). 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026