Publikationen
Publikationen
RPKI: Not Perfect But Good Enough
Schulmann, Haya; Vogel, Niklas; Waidner, Michael
CoRR, Vol.abs/2409.14518
[Journal Article]
Attacking with Something That Does Not Exist: \textquoterightProof of Non-Existence\textquoteright Can Exhaust DNS Resolver CPU
Gruza, Olivia; Heftrig, Elias; Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
18th USENIX WOOT Conference on Offensive Technologies (WOOT 24), p.45-57
[Conference Proceedings]
Insights into SAV Implementations in the Internet
Schulmann, Haya; Zhao, Shujie
Passive and Active Measurement, p.69-87
[Conference Proceedings]
Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms
Frieß, Jens; Gattermayer, Tobias; Gelernter, Nethanel; Schulmann, Haya; Waidner, Michael
21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24), p.1977-1994
[Conference Proceedings]
The CURE to Vulnerabilities in RPKI Validation
Mirdita, Donika; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
31st Annual Network and Distributed System Security Symposium
[Conference Proceedings]
Crowdsourced Distributed Domain Validation
Frieß, Jens; Schulmann, Haya; Waidner, Michael
Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, p.318-325
[Conference Proceedings]
Poster: From Fort to Foe: The Threat of RCE in RPKI
Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.5015-5017
[Conference Proceedings]
Poster: Patching NSEC3-Encloser: The Good, the Bad, and the Ugly
Jacobsen, Oliver; Schulmann, Haya
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4937-4939
[Conference Proceedings]
Poster: Security of Login Interfaces in Modern Organizations
Tchokodeu, Kevin Nsieyanji; Schulmann, Haya; Sobol, Gil; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4925-4927
[Conference Proceedings]
Poster: Kill Krill or Proxy RPKI
Cattepoel, Louis; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4922-4924
[Conference Proceedings]
The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Heftrig, Elias; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.497-510
[Conference Proceedings]
Byzantine-Secure Relying Party for Resilient RPKI
Frieß, Jens; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.49-63
[Conference Proceedings]
External Attack-Surface of Modern Organizations
Gelernter, Nethanel; Schulmann, Haya; Waidner, Michael
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, p.589-604
[Conference Proceedings]
Protocol Fixes for KeyTrap Vulnerabilities
Heftrig, Elias; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2024 Applied Networking Research Workshop, p.74-80
[Conference Proceedings]
ZPredict: ML-Based IPID Side-channel Measurements
Schulmann, Haya; Zhao, Shujie
ACM Trans. Priv. Secur., Vol.27
[Journal Article]
Wie Deutschland zur Cybernation wird
Schulmann, Haya; Waidner, Michael
Datenschutz und Datensicherheit, Vol.48, p.11-15
[Journal Article]
Privacy Dashboards for Citizens and GDPR Services for Small Data Holders: A Literature Review
Puhlmann, N.; Wiesmaier, A.; Weber, P.; Heinemann, A.
Toward Next Generation Quantum-Safe eIDs and eMRTDs: A Survey
Alnahawi, N.; Schmitt, N.; Wiesmaier, A.; Zok, C.M.
ACM Trans. Embed. Comput. Syst. (Journal), Vol.23
[Journal Article]
On Criteria and Tooling for Cryptographic Inventories
Schmitt, N.; Henrich, J.; Heinz, D.; Alnahawi, N.; Wiesmaier, A.
LNI Tagungsband GI Sicherheit 2024, p.49-63
[Conference Proceedings]
PMMP - PQC Migration Management Process
von Nethen, N.; Wiesmaier, A.; Alnahawi, N.; Henrich, J.
European Interdisciplinary Cybersecurity Conference (EICC 24), p.144-154
[Conference Proceedings]
One-Class Classification as GLRT for Jamming Detection in Private 5G Networks
Varotto, Matteo; Valentin, Stefan; Ardizzon, Francesco; Marzotto, Samuele; Tomasin, Stefano
CoRR, Vol.abs/2405.09565
[Journal Article]
Detecting 5G Narrowband Jammers with CNN, k-nearest Neighbors, and Support Vector Machines
Varotto, Matteo; Heinrichs, Florian; Schuerg, Timo; Tomasin, Stefano; Valentin, Stefan
CoRR, Vol.abs/2405.09564
[Journal Article]
Detecting 5G Narrowband Jammers with CNN, k-nearest Neighbors, and Support Vector Machines
Varotto, Matteo; Heinrichs, Florian; Schuerg, Timo; Tomasin, Stefano; Valentin, Stefan
IEEE International Workshop on Information Forensics and Security, WIFS 2024, Rome, Italy, December 2-5, 2024, p.1-6
[Conference Proceedings]
One-Class Classification as GLRT for Jamming Detection in Private 5G Networks
Varotto, Matteo; Valentin, Stefan; Ardizzon, Francesco; Marzotto, Samuele; Tomasin, Stefano
25th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2024, Lucca, Italy, September 10-13, 2024, p.201-205
[Conference Proceedings]
Detecting 5G Signal Jammers Using Spectrograms with Supervised and Unsupervised Learning
Varotto, Matteo; Valentin, Stefan; Tomasin, Stefano
IEEE International Conference on Communications Workshops, ICC 2024 Workshops, Denver, CO, USA, June 9-13, 2024, p.767-772
[Conference Proceedings]
Self-sovereign Identity for Electric Vehicle Charging
Kailus, Adrian; Kern, Dustin; Krauß, Christoph
22nd International Conference on Applied Cryptography and Network Security (ACNS), p.137-162
[Conference Proceedings]
Penetration Testing of In-Vehicle Infotainment Systems in Connected Vehicles
Wieser, Hannah; Schäfer, Thomas; Krauß, Christoph
2024 IEEE Vehicular Networking Conference (VNC), p.156-163
[Conference Proceedings]
Security Protocols for Ethernet-Based In-Vehicle Communication
Lauser, Timm; Zelle, Daniel; Kern, Dustin; Krauß, Christoph; Völker, Lars
2024 IEEE Vehicular Networking Conference (VNC), p.148-155
[Conference Proceedings]
Attack Analysis and Detection for the Combined Electric Vehicle Charging and Power Grid Domains
Kern, Dustin; Krauß, Christoph; Hollick, Matthias
19th International Conference on Availability, Reliability and Security (ARES)
[Conference Proceedings]
(Un)authenticated Diagnostic Services: A Practical Evaluation of Vulnerabilities in the UDS Authentication Service
Lauser, Timm; Munoz Molto, Gideon; Krauß, Christoph
Proceedings of the 2024 Cyber Security in CarS Workshop, p.50–60
[Conference Proceedings]


