Publications

Publications

Pruning the Tree: Rethinking RPKI Architecture From The Ground Up
Schulmann, Haya; Vogel, Niklas
[Conference Proceedings]


Learning to Identify Conflicts in RPKI
Schulmann, Haya; Zhao, Shujie
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, p.1490-1505
[Conference Proceedings]


ValidaTor: Domain Validation over Tor
Frieß, Jens; Schulmann, Haya; Waidner, Michael
22nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 25), p.1367-1380
[Conference Proceedings]


Stealth BGP Hijacks with uRPF Filtering
Schulmann, Haya; Zhao, Shujie
19th USENIX WOOT Conference on Offensive Technologies (WOOT 25), p.129-138
[Conference Proceedings]


Poster: Exploring the Landscape of RPKI Relying Parties
Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4773-4775
[Conference Proceedings]


Poster: We must talk about RPKI Repositories
Schulmann, Haya; Vogel, Niklas
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4755-4757
[Conference Proceedings]


Poster: The Rocky Road Towards RPKI Algorithm Agility
Miesch, Katharina; Schulmann, Haya; Vogel, Niklas
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4767-4769
[Conference Proceedings]


Demo: Stopping Production Testing: A Graphical RPKI Test-Suite
Kirsch, Tobias; Schulmann, Haya; Vogel, Niklas
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4722-4723
[Conference Proceedings]


Attacking with Something That Does Not Exist: \textquoterightProof of Non-Existence\textquoteright Can Exhaust DNS Resolver CPU
Gruza, Olivia; Heftrig, Elias; Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
18th USENIX WOOT Conference on Offensive Technologies (WOOT 24), p.45-57
[Conference Proceedings]


Insights into SAV Implementations in the Internet
Schulmann, Haya; Zhao, Shujie
Passive and Active Measurement, p.69-87
[Conference Proceedings]


Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms
Frieß, Jens; Gattermayer, Tobias; Gelernter, Nethanel; Schulmann, Haya; Waidner, Michael
21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24), p.1977-1994
[Conference Proceedings]


The CURE to Vulnerabilities in RPKI Validation
Mirdita, Donika; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
31st Annual Network and Distributed System Security Symposium
[Conference Proceedings]


Crowdsourced Distributed Domain Validation
Frieß, Jens; Schulmann, Haya; Waidner, Michael
Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, p.318-325
[Conference Proceedings]


Poster: From Fort to Foe: The Threat of RCE in RPKI
Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.5015-5017
[Conference Proceedings]


Poster: Patching NSEC3-Encloser: The Good, the Bad, and the Ugly
Jacobsen, Oliver; Schulmann, Haya
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4937-4939
[Conference Proceedings]


Poster: Security of Login Interfaces in Modern Organizations
Tchokodeu, Kevin Nsieyanji; Schulmann, Haya; Sobol, Gil; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4925-4927
[Conference Proceedings]


Poster: Kill Krill or Proxy RPKI
Cattepoel, Louis; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4922-4924
[Conference Proceedings]


The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Heftrig, Elias; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.497-510
[Conference Proceedings]


Byzantine-Secure Relying Party for Resilient RPKI
Frieß, Jens; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.49-63
[Conference Proceedings]


External Attack-Surface of Modern Organizations
Gelernter, Nethanel; Schulmann, Haya; Waidner, Michael
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, p.589-604
[Conference Proceedings]


Protocol Fixes for KeyTrap Vulnerabilities
Heftrig, Elias; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2024 Applied Networking Research Workshop, p.74-80
[Conference Proceedings]


Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones
Heftrig, Elias; Schulmann, Haya; Waidner, Michael
32nd USENIX Security Symposium (USENIX Security 23), p.7429-7444
[Conference Proceedings]


Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet
Hlavacek, Tomas; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
32nd USENIX Security Symposium (USENIX Security 23), p.4841-4858
[Conference Proceedings]


Poster: Off-Path DNSSEC Downgrade Attacks
Heftrig, Elias; Schulmann, Haya; Waidner, Michael
Proceedings of the ACM SIGCOMM 2023 Conference, p.1120-1122
[Conference Proceedings]


Poster: LeMon: Global Route Leak Monitoring Service
Schulmann, Haya; Zhao, Shujie
Proceedings of the ACM SIGCOMM 2023 Conference, p.1111-1113
[Conference Proceedings]


Beyond Limits: How to Disable Validators in Secure Networks
Hlavacek, Tomas; Jeitner, Philipp; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the ACM SIGCOMM 2023 Conference, p.950-966
[Conference Proceedings]


Poster: Longitudinal Analysis of DoS Attacks
Kaiser, Fabian; Schulmann, Haya; Waidner, Michael
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, p.3573-3575
[Conference Proceedings]


XDRI Attacks - and - How to Enhance Resilience of Residential Routers
Jeitner, Philipp; Schulmann, Haya; Teichmann, Lucas; Waidner, Michael
31st USENIX Security Symposium (USENIX Security 22), p.4473-4490
[Conference Proceedings]


Stalloris: RPKI Downgrade Attack
Hlavacek, Tomas; Jeitner, Philipp; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
31st USENIX Security Symposium (USENIX Security 22), p.4455-4471
[Conference Proceedings]


Smart RPKI Validation: Avoiding Errors and Preventing Hijacks
Hlavacek, Tomas; Schulmann, Haya; Waidner, Michael
Computer Security — ESORICS 2022, p.509-530
[Conference Proceedings]