Publikationen
Publikationen
RPKI: Not Perfect But Good Enough
Schulmann, Haya; Vogel, Niklas; Waidner, Michael
CoRR, Vol.abs/2409.14518
[Journal Article]
Attacking with Something That Does Not Exist: \textquoterightProof of Non-Existence\textquoteright Can Exhaust DNS Resolver CPU
Gruza, Olivia; Heftrig, Elias; Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
18th USENIX WOOT Conference on Offensive Technologies (WOOT 24), p.45-57
[Conference Proceedings]
Insights into SAV Implementations in the Internet
Schulmann, Haya; Zhao, Shujie
Passive and Active Measurement, p.69-87
[Conference Proceedings]
Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms
Frieß, Jens; Gattermayer, Tobias; Gelernter, Nethanel; Schulmann, Haya; Waidner, Michael
21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24), p.1977-1994
[Conference Proceedings]
The CURE to Vulnerabilities in RPKI Validation
Mirdita, Donika; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
31st Annual Network and Distributed System Security Symposium
[Conference Proceedings]
Crowdsourced Distributed Domain Validation
Frieß, Jens; Schulmann, Haya; Waidner, Michael
Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, p.318-325
[Conference Proceedings]
Poster: From Fort to Foe: The Threat of RCE in RPKI
Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.5015-5017
[Conference Proceedings]
Poster: Patching NSEC3-Encloser: The Good, the Bad, and the Ugly
Jacobsen, Oliver; Schulmann, Haya
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4937-4939
[Conference Proceedings]
Poster: Security of Login Interfaces in Modern Organizations
Tchokodeu, Kevin Nsieyanji; Schulmann, Haya; Sobol, Gil; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4925-4927
[Conference Proceedings]
Poster: Kill Krill or Proxy RPKI
Cattepoel, Louis; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4922-4924
[Conference Proceedings]
The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Heftrig, Elias; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.497-510
[Conference Proceedings]
Byzantine-Secure Relying Party for Resilient RPKI
Frieß, Jens; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.49-63
[Conference Proceedings]
External Attack-Surface of Modern Organizations
Gelernter, Nethanel; Schulmann, Haya; Waidner, Michael
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, p.589-604
[Conference Proceedings]
Protocol Fixes for KeyTrap Vulnerabilities
Heftrig, Elias; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2024 Applied Networking Research Workshop, p.74-80
[Conference Proceedings]
ZPredict: ML-Based IPID Side-channel Measurements
Schulmann, Haya; Zhao, Shujie
ACM Trans. Priv. Secur., Vol.27
[Journal Article]
Wie Deutschland zur Cybernation wird
Schulmann, Haya; Waidner, Michael
Datenschutz und Datensicherheit, Vol.48, p.11-15
[Journal Article]
The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Heftrig, Elias; Shulman, Haya; Vogel, Niklas; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]
Decision-based Data Distribution (D3): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios
Linsner, Sebastian; Demuth, Kilian; Fischlin, Marc; Reuter, Christian
Proceedings on Privacy Enhancing Technologies (PoPETs), p.185-208
[Journal Article]
Integrating Causality in Messaging Channels
Chen, Shan; Fischlin, Marc
Advances in Cryptology - EUROCRYPT 2024, p.251-282
[Conference Proceedings]
BUFFing FALCON Without Increasing the Signature Size
Düzlü, Samed; Fiedler, Rune; Fischlin, Marc
Selected Areas in Cryptography - SAC 2024, p.131-150
[Conference Proceedings]
Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication
Fischlin, Marc; Sanina, Olga
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4762-4776
[Conference Proceedings]
Post-Quantum Asynchronous Remote Key Generation for FIDO2
Brendel, Jacqueline; Clermont, Sebastian; Fischlin, Marc
Advances in Cryptology - ASIACRYPT 2024, p.465-493
[Conference Proceedings]
Detection and Mitigation of Bias in Under Exposure Estimation
Dörsch, A.; Rathgeb, C.; Grimmer, M.; Busch, C.
Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]
WAPITI - A Weighted Bayesian Method for Private Information Inference on Social Ego Networks
Simo Fhom, Hervais-Clemence; Kreutzer, Michael
International Conference on Trust, Security and Privacy in Computing and Communications 2024
[Conference Paper]
Wie stellen sich Nutzende ihren Privatsphäre-Assistenten vor?
Stöver, Alina; Hahn, Sara; Althaus, Simon; Zimmer, Ephraim; Gerber, Nina
Datenschutz und Datensicherheit - DuD, p.633-636
[Journal Article]
Toward Next Generation Quantum-Safe eIDs and eMRTDs: A Survey
Alnahawi, Nouri; Schmitt, Nicolai; Wiesmaier, Alexander; Zok, Chiara-Marie
ACM Trans. Embed. Comput. Syst., Vol.23
[Journal Article]
"On Criteria and Tooling for Cryptographic Inventories"
"Schmitt, Nicolai; Henrich, Johanna; Heinz, Dominik; Alnahawi, Nouri; Wiesmaier, Alexander"
"Sicherheit 2024", p.49-63
PMMP-PQC Migration Management Process
Von Nethen, Nils; Wiesmaier, Alexander; Alnahawi, Nouri; Henrich, Johanna
Proceedings of the 2024 European Interdisciplinary Cybersecurity Conference, p.144–154
[Conference Proceedings]
Hornung/Schallbruch (Hrsg.): IT-Sicherheitsrecht. Praxishandbuch. 2. Auflage
Margraf, Marian; Heinemann, Andreas
[Book Article]
""Pass auf!" - Child-Oriented Cyber Safety & Security Educational Content"
"Bopp, Karen; Heinemann, Andreas; Renaud, Karen"


