default search action
Haya Schulmann
Person information
- affiliation: Goethe University Frankfurt, Frankfurt am Main, Germany
- affiliation: National Research Center for Applied Cybersecurity ATHENE, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Haya Schulmann, Michael Waidner:
Wie Deutschland zur Cybernation wird. Datenschutz und Datensicherheit (dud) 48(1): 11-15 (2024) - [j10]Haya Schulmann, Shujie Zhao:
ZPredict: ML-Based IPID Side-channel Measurements. ACM Trans. Priv. Secur. 27(4): 28:1-28:33 (2024) - [c102]Elias Heftrig, Haya Schulmann, Niklas Vogel, Michael Waidner:
Protocol Fixes for KeyTrap Vulnerabilities. ANRW 2024 - [c101]Nethanel Gelernter, Haya Schulmann, Michael Waidner:
External Attack-Surface of Modern Organizations. AsiaCCS 2024 - [c100]Donika Mirdita, Haya Schulmann, Niklas Vogel, Michael Waidner:
The CURE to Vulnerabilities in RPKI Validation. NDSS 2024 - [c99]Jens Frieß, Tobias Gattermayer, Nethanel Gelernter, Haya Schulmann, Michael Waidner:
Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms. NSDI 2024 - [c98]Haya Schulmann, Shujie Zhao:
Insights into SAV Implementations in the Internet. PAM (2) 2024: 69-87 - [c97]Olivia Gruza, Elias Heftrig, Oliver Jacobsen, Haya Schulmann, Niklas Vogel, Michael Waidner:
Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU. WOOT @ USENIX Security Symposium 2024: 45-57 - [e4]João P. Vilela, Haya Schulmann, Ninghui Li:
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2024, Porto, Portugal, June 19-21, 2024. ACM 2024 [contents] - [i35]Olivia Gruza, Elias Heftrig, Oliver Jacobsen, Haya Schulmann, Niklas Vogel, Michael Waidner:
Attacking with Something That Does Not Exist: Low-Rate Flood with 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU. CoRR abs/2403.15233 (2024) - [i34]Jens Frieß, Tobias Gattermayer, Nethanel Gelernter, Haya Schulmann, Michael Waidner:
Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms. CoRR abs/2403.19368 (2024) - [i33]Jens Friess, Donika Mirdita, Haya Schulmann, Michael Waidner:
Byzantine-Secure Relying Party for Resilient RPKI. CoRR abs/2405.00531 (2024) - [i32]Elias Heftrig, Haya Schulmann, Niklas Vogel, Michael Waidner:
The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC. CoRR abs/2406.03133 (2024) - [i31]Donika Mirdita, Haya Schulmann, Michael Waidner:
SoK: An Introspective Analysis of RPKI Security. CoRR abs/2408.12359 (2024) - [i30]Haya Schulmann, Niklas Vogel, Michael Waidner:
RPKI: Not Perfect But Good Enough. CoRR abs/2409.14518 (2024) - 2023
- [j9]Haya Schulmann, Michael Waidner:
Aktive Cyberabwehr. Datenschutz und Datensicherheit 47(8): 497-502 (2023) - [j8]Jens Friess, Haya Schulmann, Michael Waidner:
Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates. PACMNET 1(CoNEXT3): 26:1-26:20 (2023) - [c96]Fabian Kaiser, Haya Schulmann, Michael Waidner:
Poster: Longitudinal Analysis of DoS Attacks. CCS 2023: 3573-3575 - [c95]Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner:
Beyond Limits: How to Disable Validators in Secure Networks. SIGCOMM 2023: 950-966 - [c94]Haya Schulmann, Shujie Zhao:
Poster: LeMon: Global Route Leak Monitoring Service. SIGCOMM 2023: 1111-1113 - [c93]Elias Heftrig, Haya Schulmann, Michael Waidner:
Poster: Off-Path DNSSEC Downgrade Attacks. SIGCOMM 2023: 1120-1122 - [c92]Tomas Hlavacek, Haya Schulmann, Niklas Vogel, Michael Waidner:
Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet. USENIX Security Symposium 2023: 4841-4858 - [c91]Elias Heftrig, Haya Schulmann, Michael Waidner:
Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones. USENIX Security Symposium 2023: 7429-7444 - [i29]Tomas Hlavacek, Haya Schulmann, Niklas Vogel, Michael Waidner:
Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet. CoRR abs/2303.11772 (2023) - [i28]Donika Mirdita, Haya Schulmann, Niklas Vogel, Michael Waidner:
The CURE To Vulnerabilities in RPKI Validation. CoRR abs/2312.01872 (2023) - 2022
- [j7]Elisa Bertino, Haya Schulmann, Michael Waidner:
Special issue ESORICS 2021. J. Comput. Secur. 30(6): 753-755 (2022) - [c90]Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner:
Behind the Scenes of RPKI. CCS 2022: 1413-1426 - [c89]Elias Heftrig, Haya Schulmann, Michael Waidner:
Poster: The Unintended Consequences of Algorithm Agility in DNSSEC. CCS 2022: 3363-3365 - [c88]Donika Mirdita, Haya Schulmann, Michael Waidner:
Poster: RPKI Kill Switch. CCS 2022: 3423-3425 - [c87]Haya Schulmann, Niklas Vogel, Michael Waidner:
Poster: Insights into Global Deployment of RPKI Validation. CCS 2022: 3467-3469 - [c86]Haya Schulmann, Michael Waidner:
Poster: DNS in Routers Considered Harmful. CCS 2022: 3471-3473 - [c85]Haya Schulmann:
How (Not) to Deploy Cryptography on the Internet. CODASPY 2022: 1 - [c84]Tomas Hlavacek, Haya Schulmann, Michael Waidner:
Smart RPKI Validation: Avoiding Errors and Preventing Hijacks. ESORICS (1) 2022: 509-530 - [c83]Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner:
Stalloris: RPKI Downgrade Attack. USENIX Security Symposium 2022: 4455-4471 - [c82]Philipp Jeitner, Haya Schulmann, Lucas Teichmann, Michael Waidner:
XDRI Attacks - and - How to Enhance Resilience of Residential Routers. USENIX Security Symposium 2022: 4473-4490 - [i27]Philipp Jeitner, Haya Schulmann:
Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS. CoRR abs/2205.05439 (2022) - [i26]Tianxiang Dai, Philipp Jeitner, Haya Schulmann, Michael Waidner:
The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources. CoRR abs/2205.05473 (2022) - [i25]Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner:
Stalloris: RPKI Downgrade Attack. CoRR abs/2205.06064 (2022) - [i24]Tianxiang Dai, Philipp Jeitner, Haya Schulmann, Michael Waidner:
From IP to transport and beyond: cross-layer attacks against applications. CoRR abs/2205.06085 (2022) - [i23]Philipp Jeitner, Haya Schulmann, Lucas Teichmann, Michael Waidner:
XDRI Attacks - and - How to Enhance Resilience of Residential Routers. CoRR abs/2208.12003 (2022) - 2021
- [c81]Tianxiang Dai, Haya Schulmann:
SMap: Internet-wide Scanning for Spoofing. ACSAC 2021: 1039-1050 - [c80]Tianxiang Dai, Haya Schulmann, Michael Waidner:
DNS-over-TCP considered vulnerable. ANRW 2021: 76-81 - [c79]Tianxiang Dai, Haya Schulmann, Michael Waidner:
Let's Downgrade Let's Encrypt. CCS 2021: 1421-1440 - [c78]Elias Heftrig, Jean-Pierre Seifert, Haya Schulmann, Michael Waidner, Nils Wisiol:
Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers. CCS 2021: 2423-2425 - [c77]Markus Brandt, Haya Schulmann, Michael Waidner:
Evaluating Resilience of Domains in PKI. CCS 2021: 2444-2446 - [c76]Kris Shrishak, Haya Schulmann:
Negotiating PQC for DNSSEC. DSN (Supplements) 2021: 9-10 - [c75]Haya Schulmann, Shujie Zhao:
Machine Learning Analysis of IP ID Applications. DSN (Supplements) 2021: 15-16 - [c74]Lukas Baumann, Elias Heftrig, Haya Schulmann, Michael Waidner:
The Master and Parasite Attack. DSN 2021: 141-148 - [c73]Tianxiang Dai, Haya Schulmann, Michael Waidner:
Poster: Off-path VoIP Interception Attacks. ICDCS 2021: 1-2 - [c72]Tianxiang Dai, Haya Schulmann, Michael Waidner:
Poster: Fragmentation Attacks on DNS over TCP. ICDCS 2021: 1124-1125 - [c71]Haya Schulmann, Hervais Simo:
Poster: WallGuard - A Deep Learning Approach for Avoiding Regrettable Posts in Social Media. ICDCS 2021: 1142-1143 - [c70]Maxim Anikeev, Haya Schulmann, Hervais Simo:
Privacy Policies of Mobile Apps - A Usability Study. INFOCOM Workshops 2021: 1-2 - [c69]Markus Brandt, Haya Schulmann:
Optimized BGP Simulator for Evaluation of Internet Hijacks. INFOCOM Workshops 2021: 1-2 - [c68]Tomas Hlavacek, Haya Schulmann, Michael Waidner:
Not All Conflicts Are Created Equal: Automated Error Resolution in RPKI Deployments. INFOCOM Workshops 2021: 1-2 - [c67]Kris Shrishak, Haya Schulmann:
Privacy Preserving and Resilient RPKI. INFOCOM 2021: 1-10 - [c66]Haya Schulmann, Michael Waidner:
SSLChecker. INFOCOM Workshops 2021: 1-2 - [c65]Hervais Simo, Haya Schulmann, Marija Schufrin, Steven Lamarr Reynolds, Jörn Kohlhammer:
PrivInferVis: Towards Enhancing Transparency over Attribute Inference in Online Social Networks. INFOCOM Workshops 2021: 1-2 - [c64]Tianxiang Dai, Philipp Jeitner, Haya Schulmann, Michael Waidner:
From IP to transport and beyond: cross-layer attacks against applications. SIGCOMM 2021: 836-849 - [c63]Tianxiang Dai, Philipp Jeitner, Haya Schulmann, Michael Waidner:
The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources. USENIX Security Symposium 2021: 3147-3164 - [c62]Philipp Jeitner, Haya Schulmann:
Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS. USENIX Security Symposium 2021: 3165-3182 - [e3]Elisa Bertino, Haya Schulmann, Michael Waidner:
Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12972, Springer 2021, ISBN 978-3-030-88417-8 [contents] - [e2]Elisa Bertino, Haya Schulmann, Michael Waidner:
Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12973, Springer 2021, ISBN 978-3-030-88427-7 [contents] - [i22]Kris Shrishak, Haya Schulmann:
Privacy Preserving and Resilient RPKI. CoRR abs/2102.02456 (2021) - [i21]Lukas Baumann, Elias Heftrig, Haya Schulmann, Michael Waidner:
The Master and Parasite Attack. CoRR abs/2107.06415 (2021) - [i20]Kris Shrishak, Haya Schulmann:
Privacy Preserving and Resilient RPKI. IACR Cryptol. ePrint Arch. 2021: 125 (2021) - 2020
- [c61]Kris Shrishak, Haya Schulmann:
Limiting the Power of RPKI Authorities. ANRW 2020: 12-18 - [c60]Daniel Senf, Haya Schulmann, Michael Waidner:
Performance penalties of resilient SDN infrastructures. CoNEXT 2020: 528-529 - [c59]Amit Klein, Elias Heftrig, Haya Schulmann, Michael Waidner:
Black-box caches fingerprinting. CoNEXT 2020: 564-565 - [c58]Philipp Jeitner, Haya Schulmann, Michael Waidner:
Secure Consensus Generation with Distributed DoH. DSN (Supplements) 2020: 41-42 - [c57]Kris Shrishak, Haya Schulmann:
MPC for Securing Internet Infrastructure. DSN (Supplements) 2020: 47-48 - [c56]Philipp Jeitner, Haya Schulmann, Michael Waidner:
Pitfalls of Provably Secure Systems in Internet the Case of Chronos-NTP. DSN (Supplements) 2020: 49-50 - [c55]Philipp Jeitner, Haya Schulmann, Michael Waidner:
The Impact of DNS Insecurity on Time. DSN 2020: 266-277 - [c54]Markus Schneider, Haya Schulmann, Adi Sidis, Ravid Sidis, Michael Waidner:
Diving into Email Bomb Attack. DSN 2020: 286-293 - [c53]Anders P. K. Dalskov, Claudio Orlandi, Marcel Keller, Kris Shrishak, Haya Schulmann:
Securing DNSSEC Keys via Threshold ECDSA from Generic MPC. ESORICS (2) 2020: 654-673 - [c52]Amit Klein, Haya Schulmann, Michael Waidner:
Cryptanalysis of FNV-Based Cookies. GLOBECOM 2020: 1-6 - [c51]Markus Schneider, Haya Schulmann, Michael Waidner:
Blocking Email Bombs with EmailGlass. GLOBECOM 2020: 1-6 - [c50]Markus Brandt, Claudio Orlandi, Kris Shrishak, Haya Schulmann:
Optimal Transport Layer for Secure Computation. ICETE (2) 2020: 130-141 - [c49]Tomas Hlavacek, Ítalo Cunha, Yossi Gilad, Amir Herzberg, Ethan Katz-Bassett, Michael Schapira, Haya Schulmann:
DISCO: Sidestepping RPKI's Deployment Barriers. NDSS 2020 - [e1]Stephan Krenn, Haya Schulmann, Serge Vaudenay:
Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14-16, 2020, Proceedings. Lecture Notes in Computer Science 12579, Springer 2020, ISBN 978-3-030-65410-8 [contents] - [i19]Philipp Jeitner, Haya Schulmann, Michael Waidner:
Pitfalls of Provably Secure Systems in Internet The Case of Chronos-NTP. CoRR abs/2010.08460 (2020) - [i18]Philipp Jeitner, Haya Schulmann, Michael Waidner:
Secure Consensus Generation with Distributed DoH. CoRR abs/2010.09331 (2020) - [i17]Philipp Jeitner, Haya Schulmann, Michael Waidner:
The Impact of DNS Insecurity on Time. CoRR abs/2010.09338 (2020)
2010 – 2019
- 2019
- [c48]Markus Brandt, Claudio Orlandi, Kris Shrishak, Haya Schulmann:
Transputation: Transport Framework for Secure Computation. Krypto-Tag 2019 - [c47]Markus Brandt, Haya Schulmann, Michael Waidner:
Internet As a Source of Randomness. Krypto-Tag 2019 - [c46]Markus Brandt, Haya Schulmann, Michael Waidner:
Distributed Domain Validation (DDV). Krypto-Tag 2019 - [c45]Anders P. K. Dalskov, Marcel Keller, Claudio Orlandi, Kris Shrishak, Haya Schulmann:
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC. Krypto-Tag 2019 - [i16]Markus Brandt, Claudio Orlandi, Kris Shrishak, Haya Schulmann:
Optimizing Transport Layer for Secure Computation. IACR Cryptol. ePrint Arch. 2019: 836 (2019) - [i15]Anders P. K. Dalskov, Marcel Keller, Claudio Orlandi, Kris Shrishak, Haya Schulmann:
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC. IACR Cryptol. ePrint Arch. 2019: 889 (2019) - 2018
- [c44]Markus Brandt, Tianxiang Dai, Amit Klein, Haya Schulmann, Michael Waidner:
Domain Validation++ For MitM-Resilient PKI. CCS 2018: 2060-2076 - [c43]Tianxiang Dai, Haya Schulmann, Michael Waidner:
Off-Path Attacks Against PKI. CCS 2018: 2213-2215 - [c42]Kris Shrishak, Haya Schulmann, Michael Waidner:
Removing the Bottleneck for Practical 2PC. CCS 2018: 2300-2302 - [c41]Tomas Hlavacek, Amir Herzberg, Haya Schulmann, Michael Waidner:
Practical Experience: Methodologies for Measuring Route Origin Validation. DSN 2018: 634-641 - [c40]Yossi Gilad, Tomas Hlavacek, Amir Herzberg, Michael Schapira, Haya Schulmann:
Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security. HotNets 2018: 57-63 - [c39]Markus Brandt, Haya Schulmann, Michael Waidner:
Internet As a Source of Randomness. HotNets 2018: 64-70 - [c38]Matthias Gohring, Haya Schulmann, Michael Waidner:
Path MTU Discovery Considered Harmful. ICDCS 2018: 866-874 - 2017
- [c37]Amit Klein, Vladimir Kravtsov, Alon Perlmuter, Haya Schulmann, Michael Waidner:
POSTER: X-Ray Your DNS. CCS 2017: 2519-2521 - [c36]Amit Klein, Haya Schulmann, Michael Waidner:
Counting in the Dark: DNS Caches Discovery and Enumeration in the Internet. DSN 2017: 367-378 - [c35]Alex Ulmer, Jörn Kohlhammer, Haya Schulmann:
Towards Enhancing the Visual Analysis of Interdomain Routing. VISIGRAPP (3: IVAPP) 2017: 209-216 - [c34]Amit Klein, Haya Schulmann, Michael Waidner:
Internet-wide study of DNS cache injections. INFOCOM 2017: 1-9 - [c33]Yossi Gilad, Avichai Cohen, Amir Herzberg, Michael Schapira, Haya Schulmann:
Are We There Yet? On RPKI's Deployment and Security. NDSS 2017 - [c32]Haya Schulmann, Michael Waidner:
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet. NSDI 2017: 131-144 - [c31]Nadav Rotenberg, Haya Schulmann, Michael Waidner, Benjamin Zeltser:
Authentication-Bypass Vulnerabilities in SOHO Routers. SIGCOMM Posters and Demos 2017: 68-70 - 2016
- [c30]Tianxiang Dai, Haya Schulmann, Michael Waidner:
DNSSEC Misconfigurations in Popular Domains. CANS 2016: 651-660 - [c29]Amir Herzberg, Haya Schulmann, Michael Waidner:
Stratum Filtering: Cloud-based Detection of Attack Sources. CCSW 2016: 47-48 - [c28]Marc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Schulmann:
Obfuscation Combiners. CRYPTO (2) 2016: 521-550 - [c27]Anja Feldmann, Philipp Heyder, Michael Kreutzer, Stefan Schmid, Jean-Pierre Seifert, Haya Schulmann, Kashyap Thimmaraju, Michael Waidner, Jens Sieberg:
NetCo: Reliable Routing With Unreliable Routers. DSN Workshops 2016: 128-135 - [c26]Andreas Borgwart, Haya Schulmann, Michael Waidner:
Towards Automated Measurements of Internet's Naming Infrastructure. SwSTE 2016: 117-124 - [c25]Haya Schulmann, Michael Waidner:
Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure. TMA 2016 - [i14]Marc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Schulmann:
Obfuscation Combiners. IACR Cryptol. ePrint Arch. 2016: 289 (2016) - [i13]Yossi Gilad, Avichai Cohen, Amir Herzberg, Michael Schapira, Haya Schulmann:
Are We There Yet? On RPKI's Deployment and Security. IACR Cryptol. ePrint Arch. 2016: 1010 (2016) - 2015
- [j6]Amir Herzberg, Haya Schulmann:
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End? IEEE Internet Comput. 19(1): 80-84 (2015) - [c24]Haya Schulmann, Michael Waidner:
Towards Security of Internet Naming Infrastructure. ESORICS (1) 2015: 3-22 - [c23]Andreas Borgwart, Spyros Boukoros, Haya Schulmann, Carel van Rooyen, Michael Waidner:
Detection and Forensics of Domains Hijacking. GLOBECOM 2015: 1-6 - 2014
- [j5]Haya Schulmann, Michael Waidner:
DNSSEC for cyber forensics. EURASIP J. Inf. Secur. 2014: 16 (2014) - [j4]Yossi Gilad, Amir Herzberg, Haya Schulmann:
Off-Path Hacking: The Illusion of Challenge-Response Authentication. IEEE Secur. Priv. 12(5): 68-77 (2014) - [j3]Amir Herzberg, Haya Schulmann:
Retrofitting Security into Network Protocols: The Case of DNSSEC. IEEE Internet Comput. 18(1): 66-71 (2014) - [j2]Yuval Elovici, Michael Fire, Amir Herzberg, Haya Schulmann:
Ethical Considerations when Employing Fake Identities in Online Social Networks for Research. Sci. Eng. Ethics 20(4): 1027-1043 (2014) - [c22]Haya Schulmann, Michael Waidner:
Fragmentation Considered Leaking: Port Inference for DNS Poisoning. ACNS 2014: 531-548 - [c21]Amir Herzberg, Haya Schulmann, Bruno Crispo:
Less is more: cipher-suite negotiation for DNSSEC. ACSAC 2014: 346-355 - [c20]Amir Herzberg, Haya Schulmann:
DNS authentication as a service: preventing amplification attacks. ACSAC 2014: 356-365 - [c19]Amir Herzberg, Haya Schulmann:
Negotiating DNSSEC Algorithms over Legacy Proxies. CANS 2014: 111-126 - [c18]Haya Schulmann, Shiran Ezra:
POSTER: On the Resilience of DNS Infrastructure. CCS 2014: 1499-1501 - [c17]Haya Schulmann, Michael Waidner:
Towards Forensic Analysis of Attacks with DNSSEC. IEEE Symposium on Security and Privacy Workshops 2014: 69-76 - [c16]Haya Schulmann:
Pretty Bad Privacy: Pitfalls of DNS Encryption. WPES 2014: 191-200 - 2013
- [j1]Amir Herzberg, Haya Schulmann:
Oblivious and fair server-aided two-party computation. Inf. Secur. Tech. Rep. 17(4): 210-226 (2013) - [c15]Amir Herzberg, Haya Schulmann:
Limiting MitM to MitE Covert-Channels. ARES 2013: 236-241 - [c14]Amir Herzberg, Haya Schulmann:
DNSSEC: Interoperability Challenges and Transition Mechanisms. ARES 2013: 398-405 - [c13]Amir Herzberg, Haya Schulmann:
Socket overloading for fun and cache-poisoning. ACSAC 2013: 189-198 - [c12]Amir Herzberg, Haya Schulmann, Johanna Ullrich, Edgar R. Weippl:
Cloudoscopy: services discovery and topology mapping. CCSW 2013: 113-122 - [c11]Amir Herzberg, Haya Schulmann:
Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.org. CNS 2013: 224-232 - [c10]Amir Herzberg, Haya Schulmann:
DNSSEC: Security and availability challenges. CNS 2013: 365-366 - [c9]Christian S. Collberg, Aaron Gibson, Sam Martin, Nitin Shinde, Amir Herzberg, Haya Schulmann:
Provenance of exposure: Identifying sources of leaked documents. CNS 2013: 367-368 - [c8]Amir Herzberg, Haya Schulmann:
Vulnerable Delegation of DNS Resolution. ESORICS 2013: 219-236 - [i12]Yossi Gilad, Amir Herzberg, Haya Schulmann:
Off-Path Hacking: The Illusion of Challenge-Response Authentication. CoRR abs/1305.0854 (2013) - [i11]Yuval Elovici, Michael Fire, Amir Herzberg, Haya Schulmann:
Ethical Considerations when Employing Fake Identities in OSN for Research. CoRR abs/1310.1651 (2013) - [i10]Amir Herzberg, Haya Schulmann:
Towards Adoption of DNSSEC: Availability and Security Challenges. IACR Cryptol. ePrint Arch. 2013: 254 (2013) - [i9]Yossi Gilad, Amir Herzberg, Haya Schulmann:
Off-Path Hacking: The Illusion of Challenge-Response Authentication. IACR Cryptol. ePrint Arch. 2013: 623 (2013) - 2012
- [c7]Amir Herzberg, Haya Schulmann:
Oblivious and Fair Server-Aided Two-Party Computation. ARES 2012: 75-84 - [c6]Amir Herzberg, Haya Schulmann:
Antidotes for DNS Poisoning by Off-Path Adversaries. ARES 2012: 262-267 - [c5]Amir Herzberg, Haya Schulmann:
Security of Patched DNS. ESORICS 2012: 271-288 - [i8]Amir Herzberg, Haya Schulmann:
Fragmentation Considered Poisonous. CoRR abs/1205.4011 (2012) - [i7]Amir Herzberg, Haya Schulmann:
Security of Patched DNS. CoRR abs/1205.5190 (2012) - [i6]Amir Herzberg, Haya Schulmann:
Unilateral Antidotes to DNS Cache Poisoning. CoRR abs/1209.1482 (2012) - 2011
- [c4]Amir Herzberg, Haya Schulmann:
Unilateral Antidotes to DNS Poisoning. SecureComm 2011: 319-336 - 2010
- [c3]Amir Herzberg, Haya Schulmann:
Stealth DoS Attacks on Secure Channels. NDSS 2010 - [c2]Amir Herzberg, Haya Schulmann:
Robust Combiners for Software Hardening. TRUST 2010: 282-289 - [i5]Amir Herzberg, Haya Schulmann:
Robust Combiner for Obfuscators. IACR Cryptol. ePrint Arch. 2010: 202 (2010) - [i4]Amir Herzberg, Haya Schulmann:
Secure Guaranteed Computation. IACR Cryptol. ePrint Arch. 2010: 449 (2010)
2000 – 2009
- 2009
- [c1]Amir Herzberg, Haya Schulmann, Amitabh Saxena, Bruno Crispo:
Towards a Theory of White-Box Security. SEC 2009: 342-352 - [i3]Amir Herzberg, Haya Schulmann:
Stealth-MITM DoS Attacks on Secure Channels. CoRR abs/0910.3511 (2009) - 2008
- [i2]Amir Herzberg, Haya Schulmann, Amitabh Saxena, Bruno Crispo:
Towards a Theory of White-Box Security. IACR Cryptol. ePrint Arch. 2008: 87 (2008) - [i1]Amir Herzberg, Haya Schulmann:
Robust Combiners for Software Hardening. IACR Cryptol. ePrint Arch. 2008: 150 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint