Publikationen

Publikationen

Learning to Identify Conflicts in RPKI
Haya Schulmann and Shujie Zhao
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, p.1490–1505
[Conference Proceedings]


ValidaTor: Domain Validation over Tor
Jens Frieß and Haya Schulmann and Michael Waidner
22nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 25), p.1367–1380
[Conference Proceedings]


Stealth BGP Hijacks with uRPF Filtering
Haya Schulmann and Shujie Zhao
19th USENIX WOOT Conference on Offensive Technologies (WOOT 25), p.129–138
[Conference Proceedings]


Poster: Exploring the Landscape of RPKI Relying Parties
Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4773–4775
[Conference Proceedings]


Poster: We must talk about RPKI Repositories
Haya Schulmann and Niklas Vogel
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4755–4757
[Conference Proceedings]


Poster: The Rocky Road Towards RPKI Algorithm Agility
Katharina Miesch and Haya Schulmann and Niklas Vogel
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4767–4769
[Conference Proceedings]


Demo: Stopping Production Testing: A Graphical RPKI Test-Suite
Tobias Kirsch and Haya Schulmann and Niklas Vogel
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4722–4723
[Conference Proceedings]