Veröffentlichungen

Konferenzbeiträge

AutorInnenTitelErscheinungsortVeranstaltungsortDatumRanking
Nethanel Gelernter, Haya Schulmann, and Michael WaidnerExternal Attack-Surface of Modern Organizations19th ACM Asia Conference on Computer and Communications SecuritySingaporeJuly 2024CORE-A
Haya Schulmann, and Shujie ZhaoInsights into SAV Implementations in the InternetInternational Conference on Passive and Active Network MeasurementVirtual conferenceMarch 2024CORE-B
Jens Friess, Haya Schulmann, and Michael WaidnerRevocation Speedrun: How the WebPKI Copes with Fraudulent CertificatesACM CoNEXT 2023Paris, FranceDecember 2023CORE-A
Fabian Kaiser, Haya Shulman, and Michael WaidnerPoster: Longitudinal Analysis of DoS Attacks2023 ACM SIGSAC Conference on Computer and Communications SecurityCopenhagen, DenmarkNovember 2023CORE-A*
Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Shulman, and Michael WaidnerBeyond Limits: How to Disable Validators in Secure NetworksACM SIGCOMM 2023 ConferenceNew York, NY, USASeptember 2023CORE-A*
Haya Shulman and Shujie ZhaoPoster: LeMon: Global Route Leak Monitoring ServiceACM SIGCOMM 2023 ConferenceNew York, NY, USASeptember 2023CORE-A*
Elias Heftrig, Haya Shulman, and Michael WaidnerPoster: Off-Path DNSSEC Downgrade AttacksACM SIGCOMM 2023 ConferenceNew York, NY, USASeptember 2023CORE-A*
Elias Heftrig, Haya Shulman, and Michael WaidnerDowngrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones32nd USENIX Security SymposiumAnaheim, CA, USAAugust 2023CORE-A*
Tomas Hlavacek, Haya Shulman, Niklas Vogel, and Michael WaidnerKeep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet32nd USENIX Security SymposiumAnaheim, CA, USAAugust 2023CORE-A*
Philipp Jeitner, Haya Shulman, Lucas Teichmann, and Michael WaidnerXDRI Attacks - and - How to Enhance Resilience of Residential Routers32nd USENIX Security SymposiumAnaheim, CA, USAAugust 2023CORE-A*
Haya Shulman, Niklas Vogel, and Michael WaidnerPoster: Insights into Global Deployment of RPKI Validation2022 ACM SIGSAC Conference on Computer and Communications SecurityLos Angeles, CA, USANovember 2022CORE-A*
Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Shulman, and Michael WaidnerBehind the scenes of RPKI2022 ACM SIGSAC Conference on Computer and Communications SecurityLos Angeles, CA, USANovember 2022CORE-A*
Elias Heftrig, Haya Shulman, and Michael WaidnerPoster: The Unintended Consequences of Algorithm Agility in DNSSEC2022 ACM SIGSAC Conference on Computer and Communications SecurityLos Angeles, CA, USANovember 2022CORE-A*
Donika Mirdita, Haya Shulman, and Michael WaidnerPoster: RPKI Kill Switch2022 ACM SIGSAC Conference on Computer and Communications SecurityLos Angeles, CA, USANovember 2022CORE-A*
Haya Shulman, and Michael WaidnerPoster: DNS in Routers Considered Harmful2022 ACM SIGSAC Conference on Computer and Communications SecurityLos Angeles, CA, USANovember 2022CORE-A*
Tomas Hlavacek, Haya Shulman, and Michael WaidnerSmart RPKI Validation: Avoiding Errors and Preventing HijacksComputer Security–ESORICS 2022: 27th European Symposium on Research in Computer SecurityCopenhagen, DenmarkSeptember 2022CORE-A
Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Shulman, and Michael WaidnerStalloris:RPKI Downgrade Attack31st USENIX Security Symposium (USENIX Security 22)Boston, MA, USAAugust 2022CORE-A*
Philipp Jeitner, Haya Shulman, Lucas Teichmann, and Michael WaidnerXDRI Attacks-and-How to Enhance Resilience of Residential Routers31st USENIX Security Symposium (USENIX Security 22)Boston, MA, USAAugust 2022CORE-A*
Haya Shulman[Keynote Talk] How (Not) to Deploy Cryptography on the InternetCODASPY'22: Twelveth ACM Conference on Data and Application Security and PrivacyBaltimore, MD, USAApril 2022 
Tianxiang Dai and Haya Shulman and Michael WaidnerLet's Downgrade Let's EncryptCCS'21: ACM SIGSAG Conference on Computer and Communications Security (ACM CCS)Virtual conferenceNovember 2021CORE-A*
Elias Heftrig, Jean-Pierre Seifert, Haya Shulman, Michael Waidner, Nils WisiolPredictive Cipher-Suite Negotiation for Boosting Deployment of New CiphersCCS'21: ACM SIGSAG Conference on Computer and Communications Security (ACM CCS)Virtual conferenceNovember 2021CORE-A*
Markus Brandt, Haya Shulman, and Michael WaidnerEvaluating Resilience of Domains in PKICCS'21: ACM SIGSAG Conference on Computer and Communications Security (ACM CCS)Virtual conferenceNovember 2021CORE-A*
Philipp Jeitner and Haya ShulmanInjection Attacks Reloaded: Tunnelling Malicious Payloads over DNS 30th USENIX Security Symposium (USENIX sec)Virtual conferenceAugust 2021CORE-A*
Tianxiang Dai, Philipp Jeitner, Haya Shulman and Michael WaidnerThe Hijackers Guide to the Galaxy: Off-Path Taking Over Internet Resources30th USENIX Security Symposium (USENIX sec)Virtual conferenceAugust 2021CORE-A*
Tianxiang Dai, Philipp Jeitner, Haya Shulman and Michael WaidnerFrom IP to Transport and Beyond: Cross Layer Attacks Against Applications ACM SIGCOMMVirtual conferenceAugust 2021CORE-A*
Haya Shulman and Hervais SimoPoster: WallGuard-A Deep Learning Approach for Avoiding Regrettable Posts in Social MediaIEEE International Conference on Distributed Computing Systems (ICDCS)Virtual conferenceJuly 2021CORE-A
Tianxiang Dai, Haya Shulman and Michael WaidnerPoster: Off-path VoIP Interception AttacksIEEE International Conference on Distributed Computing Systems (ICDCS)Virtual conferenceJuly 2021CORE-A
Tianxiang Dai, Haya Shulman and Michael WaidnerPoster: Fragmentation Attacks on DNS over TCPIEEE International Conference on Distributed Computing Systems (ICDCS)Virtual conferenceJuly 2021CORE-A
Haya Shulman and Shujie ZhaoMachine Learning Analysis of IP ID ApplicationsIEEE/IFIP International Conference on Dependable Systems and Networks (IEEE DSN)Taipei, TaiwanJune 2021CORE-A
Kris Shrishak and Haya ShulmanNegotiating PQC for DNSSECIEEE/IFIP International Conference on Dependable Systems and Networks (IEEE DSN)Taipei, TaiwanJune 2021CORE-A
Lukas Baumann, Elias Heftrig, Haya Shulman and Michael WaidnerThe Master and Parasite AttackIEEE/IFIP International Conference on Dependable Systems and Networks (IEEE DSN)Taipei, TaiwanJune 2021CORE-A
Krish Shrishak and Haya ShulmanPrivacy Preserving and Resilient RPKI IEEE International Conference on Computer Communications (INFOCOM)Virtual conferenceMay 2021CORE-A*
Maxim Anikeev and Haya Shulman and Hervais SimoPrivacy Policies of Mobile Apps - a Usability StudyIEEE International Conference on Computer Communications (INFOCOM) - poster sessionVirtual conferenceMay 2021CORE-A*
Jörn Kohlhammer and Steven Lamarr Reynolds and Marija Schurin and Haya Shulman and Hervais SimoPrivInferVis: Towards Enhancing Transparency over Attribute Inference in Online Social NetworksIEEE International Conference on Computer Communications (INFOCOM) - poster sessionVirtual conferenceMay 2021CORE-A*
Markus Brandt and Haya ShulmanOptimized BGP Simulator for Evaluation of Internet HijacksIEEE International Conference on Computer Communications (INFOCOM) - poster sessionVirtual conferenceMay 2021CORE-A*
Haya Shulman and Michael WaidnerSSLCheckerIEEE International Conference on Computer Communications (INFOCOM) - poster sessionVirtual conferenceMay 2021CORE-A*
Haya Shulman and Tomas Hlavacek and Michael WaidnerNot all Conflicts are Created Equal: Automated Error Resolution in RPKI DeploymentsIEEE International Conference on Computer Communications (INFOCOM) - poster sessionVirtual conferenceMay 2021CORE-A*
Markus Schneider and Haya Shulman and Michael WaidnerBlocking Email Bombs with Email Glass.IEEE Global Communications Conference (Globecom)Taipei, TaiwanDecember 2020CORE-B
Amit Klein and Haya Shulman and Michael WaidnerCryptanalysis of FNV-Based DNS CookiesIEEE Global Communications Conference (Globecom)Taipei, TaiwanDecember 2020CORE-B
Anders Dalskov, Marcel Keller, Claudio Orlandi, Kris Shrishak and Haya ShulmanSecuring DNSSEC Keys via Threshold ECDSA from Generic MPCEuropean Symposium on Research in Computer Security (ESORICS) Guildford, United KingdomSeptember 2020CORE-A
Markus Schneider, Haya Shulman, Adi Sidis, Ravid Sidis and Michael WaidnerDiving into Email Bomb AttackIEEE/IFIP International Conference on Dependable Systems and Networks (IEEE DSN)UPV - Valencia, SpainJuly 2020CORE-A
Philipp Jeitner, Haya Shulman and Michael WaidnerThe Impact of DNS Insecurity on TimeIEEE/IFIP International Conference on Dependable Systems and Networks (IEEE DSN)UPV - Valencia, SpainJuly 2020CORE-A
Krish Shrishak and Haya ShulmanMPC for Securing Internet InfrastructureFast Abstracts at IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE DSN)UPV - Valencia, SpainJuly 2020CORE-A
Philipp Jeitner, Haya Shulman and Michael WaidnerSecure Consensus Generation with Distributed DoHFast Abstracts at IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE DSN)UPV - Valencia, SpainJuly 2020CORE-A
Philipp Jeitner, Haya Shulman and Michael WaidnerPitfalls of Provably Secure Systems in Internet - The Case of Chronos-NTPFast Abstracts at IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE DSN)UPV - Valencia, SpainJuly 2020CORE-A
Markus Brandt, Claudio Orlandi, Kris Shrishak and Haya ShulmanOptimal Transport Layer for Secure ComputationThe 17th International Conference on Security and CryptographyVirtual EventJuly 2020CORE-B
Kris Shrishak and Haya ShulmanLimiting the Power of RPKI AuthoritiesProceedings of the Applied Networking Research Workshop (ANRW)SpainJuly 2020not in CORE
Tomas Hlavacek, Italo Cunha, Yossi Gilad, Amir Herzberg, Ethan Katz-Bassett, Michael Schapira, Haya ShulmanDISCO: Sidestepping RPKI's Deployment BarriersNetwork and Distributed Systems Security (NDSS)San Diego, CA, USAFebruary 2020CORE-A*
M. Brandt, H. Shulman, M. WaidnerDistributed Domain Validation (DDV). In: Selhorst, M., Loebenberger, D. & Nüsken, M. (Hrsg.), crypto day matters 31.DOI: 10.18420/cdm-2019-31-21Bonn: Gesellschaft für Informatik e.V. / FG KRYPTO2019 
M Brandt, C Orlandi, K Shrishak, H ShulmanTransputation: Transport Framework for Secure Computation. In: Kiefer, F. & Loebenberger, D. (Hrsg.), crypto day matters 30.DOI: 10.18420/cdm-2019-30-22Bonn: Gesellschaft für Informatik e.V. / FG KRYPTO2019 
Alex Ulmer, David Sessler, Jörn KohlhammerNetCapVis - Web-based Progressive Visual Analytics for Network Packet CapturesIEEE Symposium on Visualization for Cyber Security, 10, 2019.Vancouver, Canada2019CORE-B
Leon Böck, Shankar Karuppayah, Kory Fong, Max Mühlhäuser, Emmanouil VasilomanolakisChallenges of Accurately Measuring Churn in P2P BotnetsACM Conference on Computer and Communications Security 2019: 2661-2663London, UK2019CORE-A*
Leon Böck, Nikolaos Alexopoulos, Emine Saracoglu, Max Mühlhäuser, Emmanouil VasilomanolakisAssessing the Threat of Blockchain-based BotnetseCrime 2019: 1-11Pittsburgh, USA2019 

Verschiedenes

AutorTitelErscheinungsortDatumRanking
H Schulmann, M WaidnerWie Deutschland zur Cybernation wirdDatenschutz Datensicherheit - DuD: 48(1), pp. 11–152024not in CORE
H Shulman, M WaidnerAktive CyberabwehrDatenschutz und Datensicherheit - DuD: 47(8), pp. 497-5022023not in CORE
P Jeitner, H Shulman, L Teichmann, M WaidnerXDRI Attacks-and-How to Enhance Resilience of Residential RoutersarXiv preprint:2208.120032022not in CORE
K Shrishak, H ShulmanPhased Deployment of Distributed RPKIGesellschaft für Informatik eV/FG KRYPTO2021not in CORE
S Zhao, H ShulmanA Novel Approach to IP ID ClassificationGesellschaft für Informatik eV/FG KRYPTO2021not in CORE
M Brandt, C Orlandi, K Shrishak, H ShulmanOptimizing Transport Layer for Secure Computation (Optimierung der Transportebene für sichere Berechnung)IACR Cryptol ePrint Arch. 2019, 8362019not in CORE
APK. Dalskov, M Keller, C Orlandi, K Shrishak, H ShulmanAbsicherung von DNSSEC-Schlüsseln über Threshold ECDSA von Generic MPCIACR Cryptol ePrint Arch. 2019, 8892019not in CORE