Publications

Conference Papers

AuthorsTitlePlace of publicationVenueDateRanking
Philipp Jeitner and Haya ShulmanInjection Attacks Reloaded: Tunnelling Malicious Payloads over DNS 30th USENIX Security Symposium (USENIX sec)Virtual conferenceAugust 2021CORE-A*
Tianxiang Dai, Philipp Jeitner, Haya Shulman and Michael WaidnerThe Hijackers Guide to the Galaxy: Off-Path Taking Over Internet Resources30th USENIX Security Symposium (USENIX sec)Virtual conferenceAugust 2021CORE-A*
Tianxiang Dai and Philipp Jeitner, Haya Shulman and Michael WaidnerFrom IP to Transport and Beyond: Cross Layer Attacks Against ApplicationsACM SIGCOMMVirtual conferenceAugust 2021CORE-A*
Krish Shrishak and Haya ShulmanPrivacy Preserving and Resilient RPKI IEEE International Conference on Computer Communications (INFOCOM)Virtual conferenceMay 2021CORE-A*
Lukas Baumann, Elias Heftrig, Haya Shulman and Michael WaidnerThe Master and Parasite AttackIEEE/IFIP International Conference on Dependable Systems and Networks (IEEE DSN)Virtual conferenceJune 2021CORE-A
Maxim Anikeev and Haya Shulman and Hervais SimoPrivacy Policies of Mobile Apps - a Usability StudyIEEE International Conference on Computer Communications (INFOCOM) - poster sessionVirtual conferenceMay 2021CORE-A*
Jörn Kohlhammer and Steven Lamarr Reynolds and Marija Schurin and Haya Shulman and Hervais SimoPrivInferVis: Towards Enhancing Transparency over Attribute Inference in Online Social NetworksIEEE International Conference on Computer Communications (INFOCOM) - poster sessionVirtual conferenceMay 2021CORE-A*
Markus Brandt and Haya ShulmanOptimized BGP Simulator for Evaluation of Internet HijacksIEEE International Conference on Computer Communications (INFOCOM) - poster sessionVirtual conferenceMay 2021CORE-A*
Haya Shulman and Michael WaidnerSSLCheckerIEEE International Conference on Computer Communications (INFOCOM) - poster sessionVirtual conferenceMay 2021CORE-A*
Haya Shulman and Tomas Hlavacek and Michael WaidnerNot all Conflicts are Created Equal: Automated Error Resolution in RPKI DeploymentsIEEE International Conference on Computer Communications (INFOCOM) - poster sessionVirtual conferenceMay 2021CORE-A*
Markus Schneider and Haya Shulman and Michael WaidnerBlocking Email Bombs with Email Glass.IEEE Global Communications Conference (Globecom)Taipei, TaiwanDecember 2020CORE-B
Amit Klein and Haya Shulman and Michael WaidnerCryptanalysis of FNV-Based DNS CookiesIEEE Global Communications Conference (Globecom)Taipei, TaiwanDecember 2020CORE-B
Anders Dalskov, Marcel Keller, Claudio Orlandi, Kris Shrishak and Haya ShulmanSecuring DNSSEC Keys via Threshold ECDSA from Generic MPCEuropean Symposium on Research in Computer Security (ESORICS) Guildford, United KingdomSeptember 2020CORE-A
Markus Schneider, Haya Shulman, Adi Sidis, Ravid Sidis and Michael WaidnerDiving into Email Bomb Attack IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE DSN)UPV - Valencia, SpainJuly 2020CORE-A
Philipp Jeitner, Haya Shulman and Michael WaidnerThe Impact of DNS Insecurity on Time IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE DSN)UPV - Valencia, SpainJuly 2020CORE-A
Krish Shrishak and Haya ShulmanMPC for Securing Internet InfrastructureFast Abstracts at IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE DSN)UPV - Valencia, SpainJuly 2020CORE-A
Philipp Jeitner, Haya Shulman and Michael WaidnerSecure Consensus Generation with Distributed DoHFast Abstracts at IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE DSN)UPV - Valencia, SpainJuly 2020CORE-A
Philipp Jeitner, Haya Shulman and Michael WaidnerPitfalls of Provably Secure Systems in Internet - The Case of Chronos-NTPFast Abstracts at IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE DSN)UPV - Valencia, SpainJuly 2020CORE-A
Markus Brandt, Claudio Orlandi, Kris Shrishak and Haya ShulmanOptimal Transport Layer for Secure ComputationThe 17th International Conference on Security and CryptographyVirtual EventJuly 2020CORE-B
Kris Shrishak and Haya ShulmanLimiting the Power of RPKI AuthoritiesProceedings of the Applied Networking Research Workshop (ANRW)SpainJuly 2020not in CORE
Tomas Hlavacek, Italo Cunha, Yossi Gilad, Amir Herzberg, Ethan Katz-Bassett, Michael Schapira, Haya ShulmanDISCO: Sidestepping RPKI's Deployment BarriersNetwork and Distributed Systems Security (NDSS)San Diego, CA, USAFebruary 2020CORE-A*
M. Brandt, H. Shulman, M. WaidnerDistributed Domain Validation (DDV). In: Selhorst, M., Loebenberger, D. & Nüsken, M. (Hrsg.), crypto day matters 31.DOI: 10.18420/cdm-2019-31-21Bonn: Gesellschaft für Informatik e.V. / FG KRYPTO2019 
M Brandt, C Orlandi, K Shrishak, H ShulmanTransputation: Transport Framework for Secure Computation. In: Kiefer, F. & Loebenberger, D. (Hrsg.), crypto day matters 30.DOI: 10.18420/cdm-2019-30-22Bonn: Gesellschaft für Informatik e.V. / FG KRYPTO2019 
Alex Ulmer, David Sessler, Jörn KohlhammerNetCapVis - Web-based Progressive Visual Analytics for Network Packet CapturesIEEE Symposium on Visualization for Cyber Security, 10, 2019.Vancouver, Canada2019CORE-B
Leon Böck, Shankar Karuppayah, Kory Fong, Max Mühlhäuser, Emmanouil VasilomanolakisChallenges of Accurately Measuring Churn in P2P BotnetsACM Conference on Computer and Communications Security 2019: 2661-2663London, UK2019CORE-A*
Leon Böck, Nikolaos Alexopoulos, Emine Saracoglu, Max Mühlhäuser, Emmanouil VasilomanolakisAssessing the Threat of Blockchain-based BotnetseCrime 2019: 1-11Pittsburgh, USA2019 

Miscellaneous

AuthorsTitlePlace of PublicationDateRanking
M Brandt, C Orlandi, K Shrishak, H ShulmanOptimizing Transport Layer for Secure ComputationIACR Cryptol ePrint Arch. 2019, 8362019not in CORE
APK. Dalskov, M Keller, C Orlandi, K Shrishak, H ShulmanSecuring DNSSEC Keys via Threshold ECDSA From Generic MPCIACR Cryptol ePrint Arch. 2019, 8892019not in CORE