Publikationen

Publikationen

Attacking with Something That Does Not Exist: ’Proof of Non-Existence’ Can Exhaust DNS Resolver CPU
Olivia Gruza and Elias Heftrig and Oliver Jacobsen and Haya Schulmann and Niklas Vogel and Michael Waidner
18th USENIX WOOT Conference on Offensive Technologies (WOOT 24), p.45–57
[Conference Proceedings]


Insights into SAV Implementations in the Internet
Haya Schulmann and Shujie Zhao
Passive and Active Measurement, p.69–87
[Conference Proceedings]


Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms
Jens Frieß and Tobias Gattermayer and Nethanel Gelernter and Haya Schulmann and Michael Waidner
21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24), p.1977–1994
[Conference Proceedings]


The CURE to Vulnerabilities in RPKI Validation
Donika Mirdita and Haya Schulmann and Niklas Vogel and Michael Waidner
31st Annual Network and Distributed System Security Symposium
[Conference Proceedings]


Crowdsourced Distributed Domain Validation
Jens Frieß and Haya Schulmann and Michael Waidner
Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, p.318–325
[Conference Proceedings]


Poster: From Fort to Foe: The Threat of RCE in RPKI
Oliver Jacobsen and Haya Schulmann and Niklas Vogel and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.5015–5017
[Conference Proceedings]


Poster: Patching NSEC3-Encloser: The Good, the Bad, and the Ugly
Oliver Jacobsen and Haya Schulmann
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4937–4939
[Conference Proceedings]


Poster: Security of Login Interfaces in Modern Organizations
Kevin Nsieyanji Tchokodeu and Haya Schulmann and Gil Sobol and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4925–4927
[Conference Proceedings]


Poster: Kill Krill or Proxy RPKI
Louis Cattepoel and Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4922–4924
[Conference Proceedings]


The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Elias Heftrig and Haya Schulmann and Niklas Vogel and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.497–510
[Conference Proceedings]


Byzantine-Secure Relying Party for Resilient RPKI
Jens Frieß and Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.49–63
[Conference Proceedings]


External Attack-Surface of Modern Organizations
Nethanel Gelernter and Haya Schulmann and Michael Waidner
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, p.589–604
[Conference Proceedings]


Protocol Fixes for KeyTrap Vulnerabilities
Elias Heftrig and Haya Schulmann and Niklas Vogel and Michael Waidner
Proceedings of the 2024 Applied Networking Research Workshop, p.74–80
[Conference Proceedings]


On Criteria and Tooling for Cryptographic Inventories
N. Schmitt and J. Henrich and D. Heinz and N. Alnahawi and A. Wiesmaier
LNI Tagungsband GI Sicherheit 2024, p.49–63
[Conference Proceedings]


PMMP - PQC Migration Management Process
N. von Nethen and A. Wiesmaier and N. Alnahawi and J. Henrich
European Interdisciplinary Cyber­security Conference (EICC'24), p.144–154
[Conference Proceedings]


Detecting 5G Narrowband Jammers with CNN, k-nearest Neighbors, and Support Vector Machines
Matteo Varotto and Florian Heinrichs and Timo Schuerg and Stefano Tomasin and Stefan Valentin
IEEE International Workshop on Information Forensics and Security, WIFS 2024, Rome, Italy, December 2-5, 2024, p.1–6
[Conference Proceedings]


One-Class Classification as GLRT for Jamming Detection in Private 5G Networks
Matteo Varotto and Stefan Valentin and Francesco Ardizzon and Samuele Marzotto and Stefano Tomasin
25th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2024, Lucca, Italy, September 10-13, 2024, p.201–205
[Conference Proceedings]


Detecting 5G Signal Jammers Using Spectrograms with Supervised and Unsupervised Learning
Matteo Varotto and Stefan Valentin and Stefano Tomasin
IEEE International Conference on Communications Workshops, ICC 2024 Workshops, Denver, CO, USA, June 9-13, 2024, p.767–772
[Conference Proceedings]


Self-sovereign Identity for Electric Vehicle Charging
Kailus, Adrian and Kern, Dustin and Krauß, Christoph
22nd International Conference on Applied Cryptography and Network Security (ACNS), p.137–162
[Conference Proceedings]


Penetration Testing of In-Vehicle Infotainment Systems in Connected Vehicles
Wieser, Hannah and Schäfer, Thomas and Krauß, Christoph
2024 IEEE Vehicular Networking Conference (VNC), p.156-163
[Conference Proceedings]


Security Protocols for Ethernet-Based In-Vehicle Communication
Lauser, Timm and Zelle, Daniel and Kern, Dustin and Krauß, Christoph and Völker, Lars
2024 IEEE Vehicular Networking Conference (VNC), p.148-155
[Conference Proceedings]


Attack Analysis and Detection for the Combined Electric Vehicle Charging and Power Grid Domains
Kern, Dustin and Krauß, Christoph and Hollick, Matthias
19th International Conference on Availability, Reliability and Security (ARES)
[Conference Proceedings]


(Un)authenticated Diagnostic Services: A Practical Evaluation of Vulnerabilities in the UDS Authentication Service
Lauser, Timm and Munoz Molto, Gideon and Krauß, Christoph
Proceedings of the 2024 Cyber Security in CarS Workshop, p.50–60
[Conference Proceedings]


Assessment of Automotive Attack Feasibility Methods in Comparison to Railway and Aviation Methods
von Richthofen, Johannes and Krauß, Christoph and Altgenug, Johann and Spychalski, Dominik and Hommel, Wolfgang
Information Security and Cryptology (ICISC)
[Conference Proceedings]


PMMP-PQC Migration Management Process
Von Nethen, Nils and Wiesmaier, Alexander and Alnahawi, Nouri and Henrich, Johanna
Proceedings of the 2024 European Interdisciplinary Cyber­security Conference, p.144–154
[Conference Proceedings]


How to Respect Bystanders' Privacy in Smart Homes - A Co-Creation Study
Hahn, Sara and Al-Amrani, Nusaibah and Allagah, Sara and Huang, He Rong and Kircher, Eva and Rehs, Cornelia and Vogt, Joachim and Marky, Karola and Gerber, Nina
Proceedings of the 13th Nordic Conference on Human-Computer Interaction
[Conference Proceedings]


Beauty Score Fusion for Morphing Attack Detection
J. Tapia and C. Busch
Intl. Workshop British Machine Computer Vision (BMCV)
[Conference Proceedings]


First Competition on Presentation Attack Detection on ID Card
Tapia, Juan E. and Damer, Naser and Busch, Christoph and Espin, Juan M. and Barrachina, Javier and Rocamora, Alvaro S. and Ocvirk, Krištof and Alessio, Leon and Batagelj, Borut and Patwardhan, Sushrut and Ramachandra, Raghavendra and Mudgalgundurao, Raghavendra and Raja, Kiran and Schulz, Daniel and Aravena, Carlos
International Joint Conference in Biometrics (IJCB) 2024
[Conference Proceedings]


Classifying Face Beauty Based on Retouched Images
P. Srock, J. Tapia and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]


Double Trouble? Impact and Detection of Duplicates in Face Image Datasets
T. Schlett and C. Rathgeb and J. Tapia and C. Busch
13th Intl. Conf. on Pattern Recognition Applications and Methods (ICPRAM), p.801–808
[Conference Proceedings]