Security in Information Technology
  • Login
  • Team
  • Research
  • Teaching
  • Contact
Security in Information Technology

Research

Overview

The following sections summarize some of the current research challenges in security and privacy, within the area of interest of the SIT Research Group.

  • Internet Security
  • Routing Security
  • Defences against Denial of Service (DoS) Attacks
  • Detection of Malware and Advance Persistent Threats (APTs)
  • Design and adoption of Cryptographic Schemes
  • Privacy, Anonymity and Identity Management
  • Security and Privacy in Smart Home
  • Secure Engineering

Publications

Markus Brandt, Michael Waidner: (2022) Utilizing Distributed systems to Facilitate Secure Communication, PhD, Apr 2022

Tomas Hlavacek, Michael Waidner: (2022) Towards a Secure and Efficient Routing in the Internet, PhD, Mar 2022

Michael Friedewald, Michael Kreutzer, Marit Hansen: (2022) Einleitung: Selbstbestimmung und Privatheit - Gestaltungsoptionen für einen europäischen Weg, Buchkapitel, May 2021

Michael Kreutzer, Johanna Mittermeier: (2022) Maschinelles Lernen und das Recht auf Nichtwissen , Buchkapitel, May 2021

Sunny Dass, Michael Kreutzer, Linda Schreiber, Hervais Simo Fhom: (2022) Datenschutz- und Sicherheitsanalyse von Mobilen Learning Apps, Buchkapitel, May 2021

Chen Griner, Johannes Zerwas, Andreas Blenk, Stefan Schmid, Manya Ghobadi, Chen Avin: (2022) Cerberus: The Power of Choices in Datacenter Topology Design (A Throughput Perspective) , Zeitschriftenaufsatz, Nov 2021

Hervais Simo, Michael Kreutzer: (2022) REGRETS: A New Corpus of Regrettable (Self-)Disclosures on Social Media, Konferenzbeitrag, Jan 2022

Bernd Conrad, Michael Kreutzer, Johanna Mittermeier, Linda Schreiber, Hervais Simo Fhom: (2022) Digitaler Fußabdruck, Buchkapitel, May 2022

Tianxiang Dai, Haya Shulman, Michael Waidner: (2021) Let's Downgrade Let's Encrypt, Conference Paper, Nov 2021, DOI: 10.1145/3460120.3484815

Tianxiang Dai, Haya Shulman: (2021) SMap: Internet-wide Scanning for Spoofing, Conference Paper, Dec 2021, DOI: 10.1145/3485832.3485917

Kris Shrishak; Haya Shulman: (2021) Privacy Preserving and Resilient RPKI. IEEE International Conference on Computer Communications (INFOCOM), Virtual conference, 2021. [Conference Paper]

Philipp Jeitner; Haya Shulman: (2021) Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS. 30th USENIX Security Symposium (USENIX sec) , Virtual conference, August 2021. [Conference Paper]

Tianxiang Dai, Philipp Jeitner, Haya Shulman and Michael Waidner: (2021) The Hijackers Guide to the Galaxy: Off-Path Taking Over Internet Resources. 30th USENIX Security Symposium (USENIX Security), Virtual conference, August 2021.

Tianxiang Dai and Philipp Jeitner, Haya Shulman and Michael Waidner: (2021) From IP to Transport and Beyond: Cross Layer Attacks Against Applications, ACM SIGCOMM, Virtual conference, August 2021.

Lukas Baumann, Elias Heftrig, Haya Shulman and Michael Waidner: (2021) The Master and Parasite Attack, IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE DSN), June 2021.

Kris Shrishak and Haya Shulman: (2021) Privacy Preserving and Resilient RPKI. In IEEE International Conference on Computer Communications (INFOCOM), 2021.

Haya Shulman and Hervais Simo: (2021) WallGuard - A Deep Learning Approach for Avoiding Regrettable Posts in Social Media. In The 41th IEEE International Conference on Distributed Computing Systems (ICDCS). Poster Session, 2021.

Tianxing Dai, Haya Shulman, and Michael Waidner: (2021) Off-path VoIP Interception Attacks. In The 41th IEEE International Conference on Distributed Computing Systems (ICDCS). Poster Session, 2021.

Tianxing Dai, Haya Shulman, and Michael Waidner: (2021) Fragmentation Attacks on DNS over TCP. In The 41th IEEE International Conference on Distributed Computing Systems (ICDCS). Poster Session, 2021.

Haya Shulman and Shujie Zhao: (2021) Machine Learning Analysis of IP ID Applications. In The 51th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Poster Session, 2021.

Kris Shrishak and Haya Shulman: (2021) Negotiating PQC for DNSSEC. In The 51th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Poster Session, 2021.

Maxim Anikeev, Hervais Simo, and Haya Shulman: (2021) Privacy Policies of Mobile Apps - A Usability Study. In IEEE International Conference on Computer Communications (INFOCOM). Poster Session, 2021.

Hervais Simo, Haya Shulman, Joern Kohlhammer, Marija Schufrin, and Steven Reynolds: (2021) PrivInfer-Vis: Towards Enhancing Transparency over Attribute Inference in Online Social Networks. In IEEE International Conference on Computer Communications (INFOCOM). Poster Session, 2021.

Haya Shulman and Michael Waidner: (2021) SSL Checker. In IEEE International Conference on Computer Communications (INFOCOM). Poster Session, 2021.

Tomas Hlavacek, Haya Shulman, and Michael Waidner: (2021) Not all Conflicts are Created Equal: Automated Error Resolution in RPKI Deployments. In IEEE International Conference on Computer Communica-tions (INFOCOM). Poster Session, 2021.

Markus Brandt and Haya Shulman: (2021) Optimized BGP Simulator for Evaluation of Internet Hijacks. In IEEE International Conference on Computer Communications (INFOCOM). Poster Session, 2021.

Tianxiang Dai, Haya Shulman, Michael Waidner: Let's Downgrade Let's Encrypt. CCS 2021: 1421-1440

Elias Heftrig, Jean-Pierre Seifert, Haya Shulman, Michael Waidner, Nils Wisiol: Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers. CCS 2021: 2423-2425

Markus Brandt, Haya Shulman, Michael Waidner: Evaluating Resilience of Domains in PKI. CCS 2021: 2444-2446

Haya Shulman, Michael Waidner: SSLChecker. INFOCOM Workshops 2021: 1-2

Hervais Simo, Haya Shulman, Marija Schufrin, Steven Lamarr Reynolds, Jörn Kohlhammer: PrivInferVis: Towards Enhancing Transparency over Attribute Inference in Online Social Networks. INFOCOM Workshops 2021: 1-2

Elisa Bertino, Haya Shulman, Michael Waidner: Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12972, Springer 2021, ISBN 978-3-030-88417-8 [contents]

Elisa Bertino, Haya Shulman, Michael Waidner: Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12973, Springer 2021, ISBN 978-3-030-88427-7 [contents]

 

Schneider, M.; Shulman, H.; Waidner, M.: (2020) Blocking Email Bombs with EmailGlass. In: 2020 IEEE Global Communications Conference, GLOBECOM 2020 - Proceedings, art. no. 9322348, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781728182988, DOI: 10.1109/GLOBECOM42002.2020.9322348. [Conference Paper]

Senf, D.; Shulman, H.; Waidner, M.: (2020) Performance penalties of resilient SDN infrastructures. In: CoNEXT 2020 - Proceedings of the 16th International Conference on Emerging Networking EXperiments and Technologies, pp. 528-529, Association for Computing Machinery, Inc, ISBN: 9781450379489, DOI: 10.1145/3386367.3432351. [Conference Paper]

Klein, A.; Heftrig, E.; Shulman, H.; Waidner, M.: (2020) Black-box caches fingerprinting. In: CoNEXT 2020 - Proceedings of the 16th International Conference on Emerging Networking EXperiments and Technologies, pp. 564-565, Association for Computing Machinery, Inc, ISBN: 9781450379489, DOI: 10.1145/3386367.3432148. [Conference Paper]

Jeitner, P.; Shulman, H.; Waidner, M.: (2020) Pitfalls of provably secure systems in internet the case of chronos-NTP. In: Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks: Supplemental Volume, DSN-S 2020, art. no. 9159158, pp. 49-50, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781728172606, DOI: 10.1109/DSN-S50200.2020.00027. [Conference Paper]

Jeitner, P.; Shulman, H.; Waidner, M.: (2020) Secure consensus generation with distributed DoH. In: Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks: Supplemental Volume, DSN-S 2020, art. no. 9159155, pp. 41-42, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781728172606, DOI: 10.1109/DSN-S50200.2020.00023. [Conference Paper]

Jeitner, P.; Shulman, H.; Waidner, M.: (2020) The Impact of DNS Insecurity on Time. In: Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2020, art. no. 9153432, pp. 266-277, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781728158099, DOI: 10.1109/DSN48063.2020.00043 [Conference Paper]

Schneider, M.; Shulman, H.; Sidis, A.; Sidis, R.; Waidner, M.: (2020) Diving into Email Bomb Attack. In: Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2020, art. no. 9153420, pp. 286-293, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781728158099 DOI: 10.1109/DSN48063.2020.00045 [Conference Paper]

Shrishak, K.; Shulman, H.: (2020) Limiting the Power of RPKI Authorities. In: ANRW 2020 - Proceedings of the 2020 Applied Networking Research Workshop, pp. 12-18, Association for Computing Machinery, ISBN: 9781450380393 DOI: 10.1145/3404868.3406674 [Conference Paper]

Shrishak, K.; Shulman, H.: (2020) MPC for securing internet infrastructure. In: Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks: Supplemental Volume, DSN-S 2020, art. no. 9159160, pp. 47-48, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781728172606 DOI: 10.1109/DSN-S50200.2020.00026 [Conference Paper]

Krenn, S.; Shulman, H.; Vaudenay, S.: (2020) Preface - Cryptology and Network Security. In: Proceedings - 19th International Conference, CANS 2020, Vienna, Austria, December 14-16, 2020, Proceedings. Lecture Notes in Computer Science 12579, Springer 2020, ISBN 978-3-030-65410-8 [Proceedings]

Dalskov, A.; Orlandi, C.; Keller, M.; Shrishak, K.; Shulman, H.: (2020) Securing dnssec keys via threshold ecdsa from generic mpc. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12309 LNCS, pp. 654-673, Springer Science and Business Media Deutschland GmbH, ISSN: 03029743, ISBN: 9783030590123 DOI: 10.1007/978-3-030-59013-0_32 [Conference Paper]

Brandt, Markus ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya: (2020) Optimal Transport Layer for Secure Computation. In: SECRYPT 2020-The 17th International Conference on Security and Cryptography, virtual Conference, 08.-10.07., [Konferenzveröffentlichung]

Hlavacek, Tomas ; Cunha, Italo ; Gilad, Yossi ; Herzberg, Amir; Katz-Bassett, Ethan ; Schapira, Michael ; Shulman, Haya: (2020) DISCO: Sidestepping RPKI's Deployment Barriers. Network and Distributed Systems Security Symposium (NDSS 2020), San Diego, USA, 23.-26. Febr., [Konferenzveröffentlichung]

 

Markus Brandt; Haya Shulman; Michael Waidner: (2019) Distributed Domain Validation (DDV). In: Cryptoday Matters 31, Berlin, Germany, 2019 [Article]

Anders Dalskov; Marcel Keller; Claudio Orlandi; Kris Shrishak; Haya Shulman: (2019) Securing DNSSEC Keys via Threshold ECDSA From Generic MPC. Cryptoday Matters 31, Berlin, Germany, 2019 [Article]

Markus Brandt; Claudio Orlandi; Kris Shrishak; Haya Shulman: (2019) Transputation: Transport Framework for Secure Computation. Cryptoday Matters 30, Berlin, Germany, 2019 [Article]

Brandt, M.; Shulman, H.; Waidner, M.: (2018) Internet as a source of randomness. In: HotNets 2018 - Proceedings of the 2018 ACM Workshop on Hot Topics in Networks, pp. 64-70, Association for Computing Machinery, Inc, ISBN: 9781450361200 DOI: 10.1145/3286062.3286072 [Conference Paper]

Brandt, M.; Dai, T.; Shulman, H.; Klein, A.; Waidner, M.: (2018) Domain Validation++ for MitM-resilient PKI. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 2060-2076, Association for Computing Machinery, ISSN: 15437221, ISBN: 9781450356930 DOI: 10.1145/3243734.3243790 [Conference Paper]

Göhring, M.; Shulman, H.; Waidner, M.: (2018) Path MTU discovery considered harmful. In: Proceedings - International Conference on Distributed Computing Systems, 2018-July, pp. 866-874, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781538668719 DOI: 10.1109/ICDCS.2018.00088 [Conference Paper]

Hlavacek, T.; Herzberg, A.; Shulman, H.; Waidner, M.: (2018) Practical experience: Methodologies for measuring route origin validation. In: Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018, art. no. 8416522, pp. 634-641, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781538655955 DOI: 10.1109/DSN.2018.00070 [Conference Paper]

Gilad, Y.; Hlavacek, T.; Herzberg, A.; Schapira, M.; Shulman, H.: (2018) Perfect is the enemy of good: Setting realistic goals for BGP security. In: HotNets 2018 - Proceedings of the 2018 ACM Workshop on Hot Topics in Networks, pp. 57-63, Association for Computing Machinery, Inc, ISBN: 9781450361200 DOI: 10.1145/3286062.3286071 [Conference Paper]

Haya Shulman; Elias Heftrig: (2018) Off-path Attacks Against PKI. In: Black Hat Europe, London, United Kingdom, December 2018. [Conference Paper]

Krish Shrishak; Haya Shulman; Michael Waidner: (2018) Poster: Removing the Bottleneck for Practical 2PC. In: ACM SIGSAG Conference on Computer and Communications Security (ACM CCS), Toronto, Canada, October 2018. [Conference Paper]

Tianxiang Dai; Haya Shulman; Michael Waidner: (2018) Poster: Off-path Attacks Against PKI. In: ACM SIGSAG Conference on Computer and Communications Security (ACM CCS), Toronto, Canada, October 2018. [Conference Paper]

Klein, A.; Kravtsov, V.; Perlmuter, A.; Shulman, H.; Waidner, M.: (2017) Poster: X-Ray your DNS. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 2519-2521, Association for Computing Machinery, ISSN: 15437221, ISBN: 9781450349468 DOI: 10.1145/3133956.3138821 [Conference Paper]

Klein, A.; Shulman, H.; Waidner, M.: (2017) Internet-wide study of DNS cache injections. In: Proceedings - IEEE INFOCOM, art. no. 8057202, Institute of Electrical and Electronics Engineers Inc., ISSN: 0743166X, ISBN: 9781509053360 DOI: 10.1109/INFOCOM.2017.8057202 [Conference Paper]

Klein, A.; Shulman, H.; Waidner, M.: (2017) Counting in the Dark: DNS Caches Discovery and Enumeration in the Internet. In: Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017, art. no. 8023137, pp. 367-378, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781538605417 DOI: 10.1109/DSN.2017.63 [Conference Paper]

Rotenberg, N.; Shulman, H.; Waidner, M.; Zeltser, B.: (2017) Authentication-bypass vulnerabilities in SOHO routers. In: SIGCOMM Posters and Demos 2017 - Proceedings of the 2017 SIGCOMM Posters and Demos, Part of SIGCOMM 2017, pp. 68-70, Association for Computing Machinery, Inc, ISBN: 9781450350570 DOI: 10.1145/3123878.3131989 [Conference Paper]

Shulman, H.; Waidner, M.: (2017) One key to sign them all considered vulnerable: Evaluation of DnSsec in the internet. In: Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017, pp. 131-144, USENIX Association, ISBN: 9781931971379 [Conference Paper]

Shulman, H.: (2017) Implications of vulnerable internet infrastructure. In: Digital Marketplaces Unleashed, pp. 921-935, Springer Berlin Heidelberg, ISBN: 9783662492758; 9783662492741 DOI: 10.1007/978-3-662-49275-8_81 [Book Chapter]

Ulmer, A.; Kohlhammer, J.; Shulman, H.: (2017) Towards enhancing the visual analysis of interdomain routing. In: VISIGRAPP 2017 - Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, 3, pp. 209-216, SciTePress, ISBN: 9789897582288 DOI: 10.5220/0006126702090216 [Conference Paper]

Feldmann, A.; Heyder, P.; Kreutzer, M.; Schmid, S.; Seifert, J.-P.; Shulman, H.; Thimmaraju, K.; Waidner, M.; Sieberg, J.: (2016) NetCo: Reliable Routing with Unreliable Routers. In: Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN-W 2016, art. no. 7575362, pp. 128-135, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781467388917 DOI: 10.1109/DSN-W.2016.38 [Conference Paper]

Borgwart, A.; Shulman, H.; Waidner, M.: (2016) Towards Automated Measurements of Internet's Naming Infrastructure. In: Proceedings - 2016 IEEE International Conference on Software Science, Technology and Engineering, SwSTE 2016, art. no. 7515419, pp. 117-124, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781509010189 DOI: 10.1109/SWSTE.2016.25 [Conference Paper].

Ghiglieri, M.; Waidner, M.: (2016) HbbTV Security and Privacy: Issues and Challenges. In: IEEE Security and Privacy, 14 (3), art. no. 7478585, pp. 61-67, Institute of Electrical and Electronics Engineers Inc., ISSN: 15407993 DOI: 10.1109/MSP.2016.54 [Article]

Waidner, M.; Kasper, M.: (2016) Security in industrie 4.0 - Challenges and solutions for the fourth industrial revolution. In: Proceedings of the 2016 Design, Automation and Test in Europe Conference and Exhibition, DATE 2016, art. no. 7459511, pp. 1303-1308, Institute of Electrical and Electronics Engineers Inc., ISBN: 9783981537062 DOI: 10.3850/9783981537079_1005 [Conference Paper]

Shulman, H.; Waidner, M.: (2016) Is the internet ready for DNSSEC evaluating pitfalls in the naming infrastructure. In: Traffic Monitoring and Analysis - 8th International Workshop, TMA 2016, International Federation for Information Processing, IFIP, ISBN: 9783901882920 [Conference Paper]

Dai, T.; Shulman, H.; Waidner, M.: (2016) DNSSEC Misconfigurations in popular domains. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10052 LNCS, pp. 651-660, Springer Verlag, ISSN: 03029743, ISBN: 9783319489643 DOI: 10.1007/978-3-319-48965-0_43 [Conference Paper]

Fischlin, M.; Herzberg, A.; Bin-Noon, H.; Shulman, H.: (2016) Obfuscation combiners. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9815, pp. 521-550, Springer Verlag, ISSN: 03029743, ISBN: 9783662530078 DOI: 10.1007/978-3-662-53008-5_18 [Conference Paper]

Shulman, H.; Waidner, M.: (2015) Towards security of internet naming infrastructure. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9326, pp. 3-22, Springer Verlag, ISSN: 03029743, ISBN: 9783319241739 DOI: 10.1007/978-3-319-24174-6_1 [Conference Paper]

Sadeghi, A.-R.; Wachsmann, C.; Waidner, M.: (2015) Security and privacy challenges in industrial Internet of Things. In: Proceedings - Design Automation Conference, 2015-July, art. no. 7167238, Institute of Electrical and Electronics Engineers Inc., ISSN: 0738100X, ISBN: 9781450335201 DOI: 10.1145/2744769.2747942 [Conference Paper]

Borgwart, A., Boukoros, S., Shulman, H., Van Rooyen, C., Waidner, M.: (2015) Detection and forensics of domains hijacking. In: 2015 IEEE Global Communications Conference, GLOBECOM 2015, art. no. 7417736, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781479959525 DOI: 10.1109/GLOCOM.2014.7417736 [Conference Paper]

Herzberg, A.; Shulman, H.: (2015) Cipher-suite negotiation for DNSSEC: Hop-by-hop or end-to-end? In: IEEE Internet Computing, 19 (1), art. no. 7031814, pp. 80-84, Institute of Electrical and Electronics Engineers Inc., ISSN: 10897801 DOI: 10.1109/MIC.2015.3 [Article]

Shulman, H.; Waidner, M.: (2014) DNSSEC for cyber forensics. In: EURASIP Journal on Information Security, 2014 (1), art. no. 16, pp. 1-14, SpringerOpen, ISSN: 22113037 DOI: 10.1186/s13635-014-0016-2 [Article]

Shulman, H.; Waidner, M.: (2014) Towards forensic analysis of attacks with DNSSEC. In: Proceedings - IEEE Symposium on Security and Privacy, 2014-January, art. no. 6957288, pp. 69-76, Institute of Electrical and Electronics Engineers Inc., ISSN: 10816011, ISBN: 9781479951031 DOI: 10.1109/SPW.2014.20 [Conference Paper]

Shulman, H.; Waidner, M.: (2014) Fragmentation considered leaking: Port inference for DNS poisoning. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8479 LNCS, pp. 531-548, Springer Verlag, ISSN: 03029743, ISBN: 9783319075358; 9783319075358 DOI: 10.1007/978-3-319-07536-5_31 [Conference Paper]

Ghiglieri, M.; Stopczynski, M.; Waidner, M.: (2014) Personal DLP for facebook. In: 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, PERCOM WORKSHOPS 2014, art. no. 6815279, pp. 629-634, IEEE Computer Society DOI: 10.1109/PerComW.2014.6815279 [Conference Paper]

Herzberg, A.; Shulman, H.: (2014) DNS authentication as a service: Preventing amplification attacks. In: ACM International Conference Proceeding Series, 2014-December (December), pp. 356-365, Association for Computing Machinery DOI: 10.1145/2664243.2664281 [Conference Paper]

Herzberg, A.; Shulman, H.; Crispo, B.: (2014) Less is more: Cipher-suite negotiation for DNSSEC. In: ACM International Conference Proceeding Series, 2014-December (December), pp. 346-355, Association for Computing Machinery DOI: 10.1145/2664243.2664283 [Conference Paper]

Shulman, H.: (2014) Pretty bad privacy: Pitfalls of DNS encryption. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 191-200, Association for Computing Machinery, ISSN: 15437221, ISBN: 9781450331487 DOI: 10.1145/2665943.2665959 [Conference Paper]

Herzberg, A.; Shulman, H.: (2014) Negotiating dnssec algorithms over legacy proxies. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8813, pp. 111-126, Springer Verlag, ISSN: 03029743, ISBN: 9783319122793 DOI: 10.1007/978-3-319-12280-9_8 [Conference Paper]

Shulman, H.; Ezra, S.: (2014) On the resilience of DNS infrastructure. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 1499-1501, Association for Computing Machinery, ISSN: 15437221, ISBN: 9781450329576; 9781450329576; 9781450331470; 9781450331500; 9781450331517; 9781450331524; 9781450331531; 9781450331548; 9781450331555; 9781450332392 DOI: 10.1145/2660267.2662376 [Conference Paper]

Herzberg, A.; Shulman, H.: (2014) Retrofitting security into network protocols: The case of DNSSEC. In: IEEE Internet Computing, 18 (1), art. no. 6756846, pp. 66-71, Institute of Electrical and Electronics Engineers Inc., ISSN: 10897801 DOI: 10.1109/MIC.2014.14 [Article]

Gilad, Y.; Herzberg, A.; Shulman, H.: (2014) Off-path hacking: The illusion of challenge-response authentication. In: IEEE Security and Privacy, 12 (5), art. no. 6627890, pp. 68-77, Institute of Electrical and Electronics Engineers Inc., ISSN: 15407993 DOI: 10.1109/MSP.2013.130 [Article]

Elovici, Y.; Fire, M.; Herzberg, A.; Shulman, H.: (2014) Ethical Considerations when Employing Fake Identities in Online Social Networks for Research. In: Science and Engineering Ethics, 20 (4), pp. 1027-1043, Kluwer Academic Publishers, ISSN: 13533452 DOI: 10.1007/s11948-013-9473-0 [Article]

SIT Research Group

michael.waidner(at)sit...
+49 6151 869-250

Prof. Dr. Michael Waidner
Rheinstraße 75
64295 Darmstadt

  • Drucken
  • Impressum
  • Kontakt
  • Datenschutzerklärung