TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 38.

Brandt, Markus and Dai, Tianxiang and Klein, Amit and Shulman, Haya and Waidner, Michael (2018):
Domain Validation ++ for MitM-Resilient PKI.
In: ACM CCS 2018, Toronto, Canada, 15.-19.10. 2018, [Online-Edition: https://www.sigsac.org/ccs/CCS2018/],
[Conference or Workshop Item]

Hlavacek, Tomas and Herzberg, Amir and Shulman, Haya and Waidner, Michael (2018):
Practical Experience: Methodologies for Measuring Route Origin Validation.
In: DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, Denver,CO,USA, 26.-29.06.2018, [Online-Edition: http://dsn2017.github.io/],
[Conference or Workshop Item]

Göhring, Matthias and Shulman, Haya and Waidner, Michael (2018):
Path MTU Discovery Considered Harmful.
In: ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, 2.-5.7.2018, [Online-Edition: http://icdcs2018.ocg.at],
[Conference or Workshop Item]

Klein, Amit and Shulman, Haya and Waidner, Michael (2017):
Counting in the Dark: Caches Discovery and Enumeration in the Internet.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, CO, USA, [Conference or Workshop Item]

Klein, Amit and Shulman, Haya and Waidner, Michael (2017):
Internet-Wide Study of DNS Cache Injections.
In: IEEE International Conference on Computer Communications (INFOCOM), Atlanta, GA, USA, [Conference or Workshop Item]

Shulman, Haya and Waidner, Michael (2017):
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in Signed Domains.
In: The 14th USENIX Symposium on Networked SystemsDesign and Implementation (NSDI), Boston, MA, USA, [Conference or Workshop Item]

Cohen, Avichai and Gilad, Yossi and Herzberg, Amir and Schapira, Michael and Shulman, Haya (2017):
Are We There Yet? On RPKIs Deployment and Security.
In: Network and Distributed Systems Security (NDSS), San Diego, CA, USA, [Conference or Workshop Item]

Ulmer, Alex and Kohlhammer, Jörn and Shulman, Haya (2017):
Towards Enhancing the Visual Analysis of Interdomain Routing.
In: VISIGRAPP 2017 : 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, Porto, Portugal, [Conference or Workshop Item]

Shulman, Haya and Waidner, Michael (2017):
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet.
In: Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation, USENIX Association, In: 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), Boston, MA, USA, 27.-29.03. 2017, [Conference or Workshop Item]

Dai, Tianxiang and Shulman, Haya and Waidner, Michael (2016):
DNSSEC Misconfigurations in Popular Domains.
In: Cryptology and Network Security. CANS 2016, Springer, Cham, Milano, Italy, In: vol 10052, [Conference or Workshop Item]

Herzberg, Amir and Shulman, Haya and Waidner, Michael (2016):
Stratum Filtering: Cloud-Based Detection of Attack Sources.
In: ACM Cloud Computing Security Workshop (CCSW), Vienna, Austria, [Conference or Workshop Item]

Fischlin, Marc and Herzberg, Amir and Noon, Hon Bin and Shulman, Haya (2016):
Obfuscation Combiners.
In: International Cryptology Conference (CRYPTO), Santa Barbara, CA, USA, [Conference or Workshop Item]

Feldmann, Anja and Heyder, Philipp and Kreutzer, Michael and Schmid, Stefan and Seifert, Jean-Pierre and Shulman, Haya and Thimmaraju, Kashyap and Waidner, Michael and Sieberg, Jens (2016):
NetCo: Reliable Routing with Unreliable Routers.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops, Toulouse, France, [Conference or Workshop Item]

Herzberg, Amir and Shulman, Haya and Waidner, Michael (2016):
Survey of Software Protection with Minimal Hardware.
In: International Conference on Software Science, Technology and Engineering (SWSTE), Beer Sheva, Israel, [Conference or Workshop Item]

Borgwart, Andreas and Shulman, Haya and Waidner, Michael (2016):
Towards Automated Measurements of Internets Naming Infrastructure.
In: International Conference on Software Science, Technology and Engineering (SWSTE), Beer Sheva, Israel, [Conference or Workshop Item]

Shulman, Haya and Waidner, Michael (2016):
Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure.
In: In Traffic Monitoring and Analysis (TMA), Louvain La Neuve, Belgium, [Conference or Workshop Item]

Borgwart, Andreas and Boukoros, Spyros and Shulman, Haya and Waidner, Michael and van Royeen, Carel (2015):
Detection and Forensics of Domains Hijacking.
In: IEEE Global Communications Conference, IEEE, San Diego, CA, USA, [Conference or Workshop Item]

Shulman, Haya and Waidner, Michael (2015):
DNSSEC for Cyber Forensics.
In: EURASIP J. Information Security, p. 14, (16), [Article]

Shulman, Haya and Waidner, Michael
Pernul, Günther and Ryan, Michael Y. A. and Weippl, Edgar (eds.) (2015):
DNS-Scopy: Towards Security of Internet Naming Infrastructure.
In: 20th European Symposium on Research in Computer Security Vienna, Austria, September 21 – 25, 2015 Proceedings, Springer-Verlag New York, Inc., Vienna, Austria, In: Lecture Notes in Computer Science 9326, 1, ISBN 978-3-319-24173-9,
DOI: 10.1007/978-3-319-24174-6_1,
[Conference or Workshop Item]

Shulman, Haya and Waidner, Michael (2015):
Towards Security of Internet's Naming Infrastructure.
In: Computer Security ESORICS, Vienna, Austria, [Conference or Workshop Item]

Herzberg, Amir and Shulman, Haya (2015):
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
In: Internet Computing, IEEE, pp. 80-84, (19), [Article]

Herzberg, Amir and Shulman, Haya (2014):
DNS Authentication as a Service: Preventing Amplifikation Attacks.
In: 30th Annual Computer Security Applications Conference, New Orleans, LA, USA, In: ACSAC, [Conference or Workshop Item]

Herzberg, Amir and Shulman, Haya and Crispo, Bruno (2014):
Less is More: Cipher-Suite Negotiation for DNSSEC.
In: Computer Security Applications Conference (ACM ACSAC), ACSAC, IEEE, New Orleans, Louisiana, U.S., [Conference or Workshop Item]

Shulman, Haya and Ezra, Shiran (2014):
Poster: On the Resilience of DNS Infrastructure.
In: ACM Conference on Computer and Communications Security (ACM CCS), ACM, Scottsdale, Arizona, USA, [Conference or Workshop Item]

Herzberg, Amir and Shulman, Haya (2014):
DNS Security: Past, Present and Future.
In: Future Security Conference 2014, Berlin, Germany, [Conference or Workshop Item]

Shulman, Haya and Waidner, Michael (2014):
Fragmentation Considered Leaking: Port Inference for DNS Poisoning.
In: International Conference on Applied Cryptography and Network Security (ACNS 2014), [Conference or Workshop Item]

Shulman, Haya (2014):
Pretty Bad Privacy: Pitfalls of DNS Encryption.
In: Proceedings of the 13th annual ACM workshop on Privacy in the electronic society, Scottsdale, Arizona, USA, [Conference or Workshop Item]

Herzberg, Amir and Shulman, Haya (2013):
Socket Overloading for Fun and Cache Poisoning.
In: ACM Annual Computer Security Applications Conference (ACM ACSAC) 2013, New Orleans, Louisiana, U.S., December 2013., [Article]

Herzberg, Amir and Shulman, Haya and Ullrich, Johanna and Weippl, Edgar (2013):
Cloud Scouting: Services Discovery and Topology Mapping.
In: ACM Cloud Computing Security Workshop (ACM CCSW) 2013, Berlin, Germany, November 2013., [Article]

Herzberg, Amir and Shulman, Haya (2013):
DNSSEC: Security and Availability Challenges.
In: IEEE Conference on Communications and Network Security (IEEE CNS) 2013 [poster session], Washington, D.C., U.S., October 2013., [Article]

Collberg, Christian and Gibson, Aaron and Herzberg, Amir and Martin, Sam and Shinde, Nitin and Shulman, Haya (2013):
Exposing the Exposers: Identifying Sources of Leaked Documents.
In: IEEE Conference on Communications and Network Security (IEEE CNS) 2013 [poster session], Washington, D.C., U.S., October 2013., [Article]

Herzberg, Amir and Shulman, Haya (2013):
Fragmentation Considered Poisonous: or one-domain-to-rule-them-all.org.
In: IEEE Conference on Communications and Network Security (IEEE CNS) 2013, Washington, D.C., U.S., October 2013., [Article]

Herzberg, Amir and Shulman, Haya (2013):
DNSSEC: Interoperability Challenges and Transition Mechanisms.
In: IEEE International Conference on Availability, Reliability and Security (IEEE ARES) 2013, Regensburg, Germany, September 2013., [Article]

Herzberg, Amir and Shulman, Haya (2013):
Limiting MitM to MitE Covert-Channels.
In: IEEE International Conference on Availability, Reliability and Security (IEEE ARES) 2013, Regensburg, September 2013, [Conference or Workshop Item]

Herzberg, Amir and Shulman, Haya (2013):
Limiting MitM to MitE Covert-Channels.
In: 2013 International Conference on Availability, Reliability and Security, IEEE Computer Society, Regensburg, Germany, In: ARES 2013, DOI: 10.1109/ARES.2013.138,
[Conference or Workshop Item]

Herzberg, Amir and Shulman, Haya (2013):
Vulnerable Delegation of DNS Resolution.
In: European Symposium on Research in Computer Security (ESORICS) 2013, London, U.K., September 2013., [Article]

Gilad, Yossi and Herzberg, Amir and Shulman, Haya (2013):
Off-Path Hacking: The Illusion of Challenge-Response Authentication.
In: IEEE Security & Privacy, [Article]

Elovici, Yuval and Fire, Michael and Herzberg, Amir and Shulman, Haya (2013):
Ethical Considerations When Employing Fake Identities for Research in OSN.
[Article]

This list was generated on Tue Oct 15 02:17:30 2019 CEST.