Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2018Domain validation++ for MitM-resilient PKI
Brandt, Markus; Dai, Tiaxing; Klein, Amit; Shulman, Haya; Waidner, Michael
Conference Paper
2018Implications of vulnerable internet infrastructure
Shulman, Haya
Book Article
2018Internet As a Source of Randomness
Brandt, Markus; Shulman, Haya; Waidner, Michael
Conference Paper
2018Off-path attacks against PKI
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
Conference Paper
2018Path MTU discovery considered harmful
Göhring, Matthias; Shulman, Haya; Waidner, Michael
Conference Paper
2018Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security
Gilad, Yossi; Hlavacek, Tomas; Herzberg, Amir; Schapira, Michael; Shulman, Haya
Conference Paper
2018Practical experience: Methodologies for measuring route origin validation
Hlavacek, Tomas; Herzberg, Amir; Shulman, Haya; Waidner, Michael
Conference Paper
2018Removing the Bottleneck for Practical 2PC
Shrishak, Kris; Shulman, Haya; Waidner, Michael
Conference Paper
2017Are we there yet? On RPKI's deployment and security
Gilad, Yossi; Cohen, Avichai; Herzberg, Amir; Schapira, Michael; Shulman, Haya
Conference Paper
2017Authentication-bypass vulnerabilities in SOHO routers
Rotenberg, Nadav; Shulman, Haya; Waidner, Michael; Zeltser, Benjamin
Conference Paper
2017Counting in the dark: DNS caches discovery and enumeration in the internet
Klein, Amit; Shulman, Haya; Waidner, Michael
Conference Paper
2017One key to sign them all considered vulnerable: Evaluation of DNSSEC in the internet
Shulman, Haya; Waidner, Michael
Conference Paper
2017Poster: X-ray your DNS
Klein, Amit; Kravtsov, Vladimir; Perlmuter, Alon; Shulman, Haya; Waidner, Michael
Conference Paper
2017Towards enhancing the visual analysis of interdomain routing
Ulmer, Alex; Kohlhammer, Jörn; Shulman, Haya
Conference Paper
2016Are we there yet? On RPKI's deployment and security
Gilad, Yossi; Cohen, Avichai; Herzberg, Amir; Schapira, Michael; Shulman, Haya
Journal Article
2016DNSSEC misconfigurations in popular domains
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
Conference Paper
2016NetCo: Reliable routing with unreliable routers
Feldmann, Anja; Heyder, Philipp; Kreutzer, Michael; Schmid, Stefan; Seifert, Jean-Pierre; Shulman, Haya; Thimmaraju, Kashyap; Waidner, Michael; Sieberg, Jens
Conference Paper
2016Obfuscation combiners
Fischlin, Marc; Herzberg, Amir; Bin Noon, Hod; Shulman, Haya
Conference Paper
2016Obfuscation Combiners
Fischlin, Marc; Herzberg, Amir; Bin Noon, Hod; Shulman, Haya
Journal Article
2016Stratum filtering: Cloud-based detection of attack sources
Herzberg, Amir; Shulman, Haya; Waidner, Michael
Conference Paper
2016Towards automated measurements of internet's naming infrastructure
Borgwart, Andreas; Shulman, Haya; Waidner, Michael
Conference Paper
2015Cipher-suite negotiation for DNSSEC: Hop-by-hop or end-to-end?
Herzberg, Amir; Shulman, Haya
Journal Article
2015Detection and forensics of domains hijacking
Borgwart, Andreas; Boukoros, Spyros; Shulman, Haya; Royeen, Carel van; Waidner, Michael
Conference Paper
2015Towards security of internet naming infrastructure
Shulman, Haya; Waidner, Michael
Conference Paper
2014DNSSEC for cyber forensics
Shulman, Haya; Waidner, Michael
Journal Article
2014Fragmentation considered leaking: Port inference for DNS poisoning
Shulman, Haya; Waidner, Michael
Conference Paper
2014Towards forensic analysis of attacks with DNSSEC
Shulman, Haya; Waidner, Michael
Conference Paper