Publications
Publications
Pruning the Tree: Rethinking RPKI Architecture From The Ground Up
Schulmann, Haya; Vogel, Niklas
[Conference Proceedings]
All That Glitters Is Not Gold: RPKI’s Stumbling Speedrun To The Top
Mirdita, Donika; Schulmann, Haya; Waidner, Michael
IEEE Transactions on Dependable and Secure Computing, p.1-12
[Journal Article]
Learning to Identify Conflicts in RPKI
Schulmann, Haya; Zhao, Shujie
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, p.1490-1505
[Conference Proceedings]
ValidaTor: Domain Validation over Tor
Frieß, Jens; Schulmann, Haya; Waidner, Michael
22nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 25), p.1367-1380
[Conference Proceedings]
SoK: An Introspective Analysis of RPKI Security
Mirdita, Donika; Schulmann, Haya; Waidner, Michael
34th USENIX Security Symposium (USENIX Security 25), p.3649-3665
[Journal Article]
Stealth BGP Hijacks with uRPF Filtering
Schulmann, Haya; Zhao, Shujie
19th USENIX WOOT Conference on Offensive Technologies (WOOT 25), p.129-138
[Conference Proceedings]
Poster: Exploring the Landscape of RPKI Relying Parties
Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4773-4775
[Conference Proceedings]
Poster: We must talk about RPKI Repositories
Schulmann, Haya; Vogel, Niklas
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4755-4757
[Conference Proceedings]
Poster: The Rocky Road Towards RPKI Algorithm Agility
Miesch, Katharina; Schulmann, Haya; Vogel, Niklas
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4767-4769
[Conference Proceedings]
Demo: Stopping Production Testing: A Graphical RPKI Test-Suite
Kirsch, Tobias; Schulmann, Haya; Vogel, Niklas
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4722-4723
[Conference Proceedings]
RPKI: Not Perfect But Good Enough
Schulmann, Haya; Vogel, Niklas; Waidner, Michael
CoRR, Vol.abs/2409.14518
[Journal Article]
Attacking with Something That Does Not Exist: \textquoterightProof of Non-Existence\textquoteright Can Exhaust DNS Resolver CPU
Gruza, Olivia; Heftrig, Elias; Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
18th USENIX WOOT Conference on Offensive Technologies (WOOT 24), p.45-57
[Conference Proceedings]
Insights into SAV Implementations in the Internet
Schulmann, Haya; Zhao, Shujie
Passive and Active Measurement, p.69-87
[Conference Proceedings]
Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms
Frieß, Jens; Gattermayer, Tobias; Gelernter, Nethanel; Schulmann, Haya; Waidner, Michael
21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24), p.1977-1994
[Conference Proceedings]
The CURE to Vulnerabilities in RPKI Validation
Mirdita, Donika; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
31st Annual Network and Distributed System Security Symposium
[Conference Proceedings]
Crowdsourced Distributed Domain Validation
Frieß, Jens; Schulmann, Haya; Waidner, Michael
Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, p.318-325
[Conference Proceedings]
Poster: From Fort to Foe: The Threat of RCE in RPKI
Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.5015-5017
[Conference Proceedings]
Poster: Patching NSEC3-Encloser: The Good, the Bad, and the Ugly
Jacobsen, Oliver; Schulmann, Haya
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4937-4939
[Conference Proceedings]
Poster: Security of Login Interfaces in Modern Organizations
Tchokodeu, Kevin Nsieyanji; Schulmann, Haya; Sobol, Gil; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4925-4927
[Conference Proceedings]
Poster: Kill Krill or Proxy RPKI
Cattepoel, Louis; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4922-4924
[Conference Proceedings]
The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Heftrig, Elias; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.497-510
[Conference Proceedings]
Byzantine-Secure Relying Party for Resilient RPKI
Frieß, Jens; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.49-63
[Conference Proceedings]
External Attack-Surface of Modern Organizations
Gelernter, Nethanel; Schulmann, Haya; Waidner, Michael
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, p.589-604
[Conference Proceedings]
Protocol Fixes for KeyTrap Vulnerabilities
Heftrig, Elias; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2024 Applied Networking Research Workshop, p.74-80
[Conference Proceedings]
ZPredict: ML-Based IPID Side-channel Measurements
Schulmann, Haya; Zhao, Shujie
ACM Trans. Priv. Secur., Vol.27
[Journal Article]
Wie Deutschland zur Cybernation wird
Schulmann, Haya; Waidner, Michael
Datenschutz und Datensicherheit, Vol.48, p.11-15
[Journal Article]
Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones
Heftrig, Elias; Schulmann, Haya; Waidner, Michael
32nd USENIX Security Symposium (USENIX Security 23), p.7429-7444
[Conference Proceedings]
Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet
Hlavacek, Tomas; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
32nd USENIX Security Symposium (USENIX Security 23), p.4841-4858
[Conference Proceedings]
Poster: Off-Path DNSSEC Downgrade Attacks
Heftrig, Elias; Schulmann, Haya; Waidner, Michael
Proceedings of the ACM SIGCOMM 2023 Conference, p.1120-1122
[Conference Proceedings]
Poster: LeMon: Global Route Leak Monitoring Service
Schulmann, Haya; Zhao, Shujie
Proceedings of the ACM SIGCOMM 2023 Conference, p.1111-1113
[Conference Proceedings]


