Publications

Publications

Attacking with Something That Does Not Exist: \textquoterightProof of Non-Existence\textquoteright Can Exhaust DNS Resolver CPU
Gruza, Olivia; Heftrig, Elias; Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
18th USENIX WOOT Conference on Offensive Technologies (WOOT 24), p.45-57
[Conference Proceedings]


Insights into SAV Implementations in the Internet
Schulmann, Haya; Zhao, Shujie
Passive and Active Measurement, p.69-87
[Conference Proceedings]


Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms
Frieß, Jens; Gattermayer, Tobias; Gelernter, Nethanel; Schulmann, Haya; Waidner, Michael
21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24), p.1977-1994
[Conference Proceedings]


The CURE to Vulnerabilities in RPKI Validation
Mirdita, Donika; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
31st Annual Network and Distributed System Security Symposium
[Conference Proceedings]


Crowdsourced Distributed Domain Validation
Frieß, Jens; Schulmann, Haya; Waidner, Michael
Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, p.318-325
[Conference Proceedings]


Poster: From Fort to Foe: The Threat of RCE in RPKI
Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.5015-5017
[Conference Proceedings]


Poster: Patching NSEC3-Encloser: The Good, the Bad, and the Ugly
Jacobsen, Oliver; Schulmann, Haya
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4937-4939
[Conference Proceedings]


Poster: Security of Login Interfaces in Modern Organizations
Tchokodeu, Kevin Nsieyanji; Schulmann, Haya; Sobol, Gil; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4925-4927
[Conference Proceedings]


Poster: Kill Krill or Proxy RPKI
Cattepoel, Louis; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4922-4924
[Conference Proceedings]


The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Heftrig, Elias; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.497-510
[Conference Proceedings]


Byzantine-Secure Relying Party for Resilient RPKI
Frieß, Jens; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.49-63
[Conference Proceedings]


External Attack-Surface of Modern Organizations
Gelernter, Nethanel; Schulmann, Haya; Waidner, Michael
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, p.589-604
[Conference Proceedings]


Protocol Fixes for KeyTrap Vulnerabilities
Heftrig, Elias; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2024 Applied Networking Research Workshop, p.74-80
[Conference Proceedings]