Publikationen
Publikationen
XDRI Attacks - and - How to Enhance Resilience of Residential Routers
Philipp Jeitner and Haya Schulmann and Lucas Teichmann and Michael Waidner
31st USENIX Security Symposium (USENIX Security 22), p.4473–4490
[Conference Proceedings]
Stalloris: RPKI Downgrade Attack
Tomas Hlavacek and Philipp Jeitner and Donika Mirdita and Haya Schulmann and Michael Waidner
31st USENIX Security Symposium (USENIX Security 22), p.4455–4471
[Conference Proceedings]
Smart RPKI Validation: Avoiding Errors and Preventing Hijacks
Tomas Hlavacek and Haya Schulmann and Michael Waidner
Computer Security – ESORICS 2022, p.509–530
[Conference Proceedings]
How (Not) to Deploy Cryptography on the Internet
Haya Schulmann
Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy, p.1
[Conference Proceedings]
Poster: DNS in Routers Considered Harmful
Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3471–3473
[Conference Proceedings]
Poster: Insights into Global Deployment of RPKI Validation
Haya Schulmann and Niklas Vogel and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3467–3469
[Conference Proceedings]
Poster: RPKI Kill Switch
Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3423–3425
[Conference Proceedings]
Poster: The Unintended Consequences of Algorithm Agility in DNSSEC
Elias Heftrig and Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3363–3365
[Conference Proceedings]
Behind the Scenes of RPKI
Tomas Hlavacek and Philipp Jeitner and Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.1413–1426
[Conference Proceedings]
Special issue ESORICS 2021
Elisa Bertino and Haya Schulmann and Michael Waidner
Journal of Computer Security, Vol.30, p.753–755
[Journal Article]


