Publications
Publications
RPKI: Not Perfect But Good Enough
Haya Schulmann and Niklas Vogel and Michael Waidner
CoRR, Vol.abs/2409.14518
[Journal Article]
Attacking with Something That Does Not Exist: ’Proof of Non-Existence’ Can Exhaust DNS Resolver CPU
Olivia Gruza and Elias Heftrig and Oliver Jacobsen and Haya Schulmann and Niklas Vogel and Michael Waidner
18th USENIX WOOT Conference on Offensive Technologies (WOOT 24), p.45–57
[Conference Proceedings]
Insights into SAV Implementations in the Internet
Haya Schulmann and Shujie Zhao
Passive and Active Measurement, p.69–87
[Conference Proceedings]
Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms
Jens Frieß and Tobias Gattermayer and Nethanel Gelernter and Haya Schulmann and Michael Waidner
21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24), p.1977–1994
[Conference Proceedings]
The CURE to Vulnerabilities in RPKI Validation
Donika Mirdita and Haya Schulmann and Niklas Vogel and Michael Waidner
31st Annual Network and Distributed System Security Symposium
[Conference Proceedings]
Crowdsourced Distributed Domain Validation
Jens Frieß and Haya Schulmann and Michael Waidner
Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, p.318–325
[Conference Proceedings]
Poster: From Fort to Foe: The Threat of RCE in RPKI
Oliver Jacobsen and Haya Schulmann and Niklas Vogel and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.5015–5017
[Conference Proceedings]
Poster: Patching NSEC3-Encloser: The Good, the Bad, and the Ugly
Oliver Jacobsen and Haya Schulmann
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4937–4939
[Conference Proceedings]
Poster: Security of Login Interfaces in Modern Organizations
Kevin Nsieyanji Tchokodeu and Haya Schulmann and Gil Sobol and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4925–4927
[Conference Proceedings]
Poster: Kill Krill or Proxy RPKI
Louis Cattepoel and Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4922–4924
[Conference Proceedings]
The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Elias Heftrig and Haya Schulmann and Niklas Vogel and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.497–510
[Conference Proceedings]
Byzantine-Secure Relying Party for Resilient RPKI
Jens Frieß and Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.49–63
[Conference Proceedings]
External Attack-Surface of Modern Organizations
Nethanel Gelernter and Haya Schulmann and Michael Waidner
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, p.589–604
[Conference Proceedings]
Protocol Fixes for KeyTrap Vulnerabilities
Elias Heftrig and Haya Schulmann and Niklas Vogel and Michael Waidner
Proceedings of the 2024 Applied Networking Research Workshop, p.74–80
[Conference Proceedings]
ZPredict: ML-Based IPID Side-channel Measurements
Haya Schulmann and Shujie Zhao
ACM Trans. Priv. Secur., Vol.27
[Journal Article]
Wie Deutschland zur Cybernation wird
Haya Schulmann and Michael Waidner
Datenschutz und Datensicherheit, Vol.48, p.11–15
[Journal Article]
Privacy Dashboards for Citizens and GDPR Services for Small Data Holders: A Literature Review
N. Puhlmann and A. Wiesmaier and P. Weber and A. Heinemann
Toward Next Generation Quantum-Safe eIDs and eMRTDs: A Survey
N. Alnahawi and N. Schmitt and A. Wiesmaier and C.M. Zok
ACM Trans. Embed. Comput. Syst. (Journal), Vol.23
[Journal Article]
On Criteria and Tooling for Cryptographic Inventories
N. Schmitt and J. Henrich and D. Heinz and N. Alnahawi and A. Wiesmaier
LNI Tagungsband GI Sicherheit 2024, p.49–63
[Conference Proceedings]
PMMP - PQC Migration Management Process
N. von Nethen and A. Wiesmaier and N. Alnahawi and J. Henrich
European Interdisciplinary Cybersecurity Conference (EICC'24), p.144–154
[Conference Proceedings]
One-Class Classification as GLRT for Jamming Detection in Private
5G Networks
Matteo Varotto and
Stefan Valentin and
Francesco Ardizzon and
Samuele Marzotto and
Stefano Tomasin
CoRR, Vol.abs/2405.09565
[Journal Article]
Detecting 5G Narrowband Jammers with CNN, k-nearest Neighbors, and
Support Vector Machines
Matteo Varotto and
Florian Heinrichs and
Timo Schuerg and
Stefano Tomasin and
Stefan Valentin
CoRR, Vol.abs/2405.09564
[Journal Article]
Detecting 5G Narrowband Jammers with CNN, k-nearest Neighbors, and
Support Vector Machines
Matteo Varotto and
Florian Heinrichs and
Timo Schuerg and
Stefano Tomasin and
Stefan Valentin
IEEE International Workshop on Information Forensics and Security,
WIFS 2024, Rome, Italy, December 2-5, 2024, p.1–6
[Conference Proceedings]
One-Class Classification as GLRT for Jamming Detection in Private
5G Networks
Matteo Varotto and
Stefan Valentin and
Francesco Ardizzon and
Samuele Marzotto and
Stefano Tomasin
25th IEEE International Workshop on Signal Processing Advances in
Wireless Communications, SPAWC 2024, Lucca, Italy, September 10-13,
2024, p.201–205
[Conference Proceedings]
Detecting 5G Signal Jammers Using Spectrograms with Supervised and
Unsupervised Learning
Matteo Varotto and
Stefan Valentin and
Stefano Tomasin
IEEE International Conference on Communications Workshops, ICC
2024 Workshops, Denver, CO, USA, June 9-13, 2024, p.767–772
[Conference Proceedings]
Self-sovereign Identity for Electric Vehicle Charging
Kailus, Adrian and Kern, Dustin and Krauß, Christoph
22nd International Conference on Applied Cryptography and Network Security (ACNS), p.137–162
[Conference Proceedings]
Penetration Testing of In-Vehicle Infotainment Systems in Connected Vehicles
Wieser, Hannah and Schäfer, Thomas and Krauß, Christoph
2024 IEEE Vehicular Networking Conference (VNC), p.156-163
[Conference Proceedings]
Security Protocols for Ethernet-Based In-Vehicle Communication
Lauser, Timm and Zelle, Daniel and Kern, Dustin and Krauß, Christoph and Völker, Lars
2024 IEEE Vehicular Networking Conference (VNC), p.148-155
[Conference Proceedings]
Attack Analysis and Detection for the Combined Electric Vehicle Charging and Power Grid Domains
Kern, Dustin and Krauß, Christoph and Hollick, Matthias
19th International Conference on Availability, Reliability and Security (ARES)
[Conference Proceedings]
(Un)authenticated Diagnostic Services: A Practical Evaluation of Vulnerabilities in the UDS Authentication Service
Lauser, Timm and Munoz Molto, Gideon and Krauß, Christoph
Proceedings of the 2024 Cyber Security in CarS Workshop, p.50–60
[Conference Proceedings]


