Publications

Publications

Attacking with Something That Does Not Exist: \textquoterightProof of Non-Existence\textquoteright Can Exhaust DNS Resolver CPU
Gruza, Olivia; Heftrig, Elias; Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
18th USENIX WOOT Conference on Offensive Technologies (WOOT 24), p.45-57
[Conference Proceedings]


Insights into SAV Implementations in the Internet
Schulmann, Haya; Zhao, Shujie
Passive and Active Measurement, p.69-87
[Conference Proceedings]


Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms
Frieß, Jens; Gattermayer, Tobias; Gelernter, Nethanel; Schulmann, Haya; Waidner, Michael
21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24), p.1977-1994
[Conference Proceedings]


The CURE to Vulnerabilities in RPKI Validation
Mirdita, Donika; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
31st Annual Network and Distributed System Security Symposium
[Conference Proceedings]


Crowdsourced Distributed Domain Validation
Frieß, Jens; Schulmann, Haya; Waidner, Michael
Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, p.318-325
[Conference Proceedings]


Poster: From Fort to Foe: The Threat of RCE in RPKI
Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.5015-5017
[Conference Proceedings]


Poster: Patching NSEC3-Encloser: The Good, the Bad, and the Ugly
Jacobsen, Oliver; Schulmann, Haya
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4937-4939
[Conference Proceedings]


Poster: Security of Login Interfaces in Modern Organizations
Tchokodeu, Kevin Nsieyanji; Schulmann, Haya; Sobol, Gil; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4925-4927
[Conference Proceedings]


Poster: Kill Krill or Proxy RPKI
Cattepoel, Louis; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4922-4924
[Conference Proceedings]


The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Heftrig, Elias; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.497-510
[Conference Proceedings]


Byzantine-Secure Relying Party for Resilient RPKI
Frieß, Jens; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.49-63
[Conference Proceedings]


External Attack-Surface of Modern Organizations
Gelernter, Nethanel; Schulmann, Haya; Waidner, Michael
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, p.589-604
[Conference Proceedings]


Protocol Fixes for KeyTrap Vulnerabilities
Heftrig, Elias; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2024 Applied Networking Research Workshop, p.74-80
[Conference Proceedings]


The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Heftrig, Elias; Shulman, Haya; Vogel, Niklas; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]


Integrating Causality in Messaging Channels
Chen, Shan; Fischlin, Marc
Advances in Cryptology - EUROCRYPT 2024, p.251-282
[Conference Proceedings]


BUFFing FALCON Without Increasing the Signature Size
Düzlü, Samed; Fiedler, Rune; Fischlin, Marc
Selected Areas in Cryptography - SAC 2024, p.131-150
[Conference Proceedings]


Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication
Fischlin, Marc; Sanina, Olga
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4762-4776
[Conference Proceedings]


Post-Quantum Asynchronous Remote Key Generation for FIDO2
Brendel, Jacqueline; Clermont, Sebastian; Fischlin, Marc
Advances in Cryptology - ASIACRYPT 2024, p.465-493
[Conference Proceedings]


Detection and Mitigation of Bias in Under Exposure Estimation
Dörsch, A.; Rathgeb, C.; Grimmer, M.; Busch, C.
Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]


WAPITI - A Weighted Bayesian Method for Private Information Inference on Social Ego Networks
Simo Fhom, Hervais-Clemence; Kreutzer, Michael
International Conference on Trust, Security and Privacy in Computing and Communications 2024
[Conference Paper]


PMMP-PQC Migration Management Process
Von Nethen, Nils; Wiesmaier, Alexander; Alnahawi, Nouri; Henrich, Johanna
Proceedings of the 2024 European Interdisciplinary Cyber­security Conference, p.144–154
[Conference Proceedings]


How to Respect Bystanders Privacy in Smart Homes - A Co-Creation Study
Hahn, Sara; Al-Amrani, Nusaibah; Allagah, Sara; Huang, He Rong; Kircher, Eva; Rehs, Cornelia; Vogt, Joachim; Marky, Karola; Gerber, Nina
Proceedings of the 13th Nordic Conference on Human-Computer Interaction
[Conference Proceedings]


Double Trouble? Impact and Detection of Duplicates in Face Image Datasets
Schlett, T.; Rathgeb, C.; Tapia, J.; Busch, C.
13th Intl. Conf. on Pattern Recognition Applications and Methods (ICPRAM), p.801-808
[Conference Proceedings]


Testing the Performance of Face Recognition for People with Down Syndrome
Rathgeb, C.; Ibsen, M.; Hartmann, D.; Hradetzky, S.; ottir, B. \ Olafsd\
Intl. Conf. on Automatic Face and Gesture Recognition (FG), p.1-5
[Conference Proceedings]


On the Use of Synthetic Hand Images for Biometric Recognition
Nichols, R.; Gonzalez-Soler, L. J.; Rathgeb, C.
Proc. Intl. Conf. of the Special Interest Group on Biometrics (BIOSIG 2024), p.0-0
[Conference Proceedings]


FRCSyn Challenge at WACV 2024: Face Recognition Challenge in the Era of Synthetic Data
Melzi, P.; Tolosana, R.; Vera-Rodriguez, R.; Kim, M.; Rathgeb, C.; others
IEEE/CVF Winter Conf. on Applications of Computer Vision Workshops (WACVw), p.892-901
[Conference Proceedings, Journal Article]


FRCSyn-onGoing: Benchmarking and comprehensive evaluation of real and synthetic data to improve face recognition systems
Melzi, P.; Tolosana, R.; Vera-Rodriguez, R.; Kim, M.; Rathgeb, C.
ScienceDirect - Information Fusion
[Journal Article, Conference Proceedings]


SynChildFace: Fine-tuning Face Recognition for Children with Synthetic Data
Kouam, F. V. S.; Rathgeb, C.; Ibsen, M.; Busch, C.
Proc. IEEE Workshop on Information Forensics and Security (WIFS), p.1-6
[Conference Proceedings]


Demographic Variability in Face Image Quality Measures
Kabbani, W.; Raja, K.; Raghavendra, R.; Busch, C.
Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]


Deep Learning-based Compression Detection for explainable Face Image Quality Assessment
Jonientz, L.; Merkle, J.; Rathgeb, C.; Tams, B.; Merz, G.
Intl. Conf. on Pattern Recognition Workshops (ICPRW), p.1-14
[Conference Proceedings]