Im Folgenden sind einige unserer aktuellen Forschungsbereiche aufgeführt:
Donika Mirdita, Haya Schulmann, Michael Waidner: (2025) SoK: An Introspective Analysis of RPKI Security. 34th USENIX Security Symposium 2025, Seattle, USA, August 2025
Jens Frieß, Haya Schulmann, Michael Waidner: (2025) ValidaTor: Domain Validation over Tor. NSDI 2025: 1367-1380
Haya Schulmann, Michael Waidner: (2024) Wie Deutschland zur Cybernation wird. Datenschutz und Datensicherheit (dud) 48(1): 11-15, January 2024
Michael Kreutzer, Leonie Wolf, Michael Waidner: (2024) Kryptoagilität. Datenschutz und Datensicherheit (dud) 48(10): 667-672, January 2024
Donika Mirdita, Haya Schulmann, Niklas Vogel, Michael Waidner: (2024) The CURE to Vulnerabilities in RPKI Validation. NDSS 2024, February 2024
Jens Frieß, Tobias Gattermayer, Nethanel Gelernter, Haya Schulmann, Michael Waidner: (2024) Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms. NSDI 2024, April 2024
Elias Heftrig, Haya Schulmann, Niklas Vogel, Michael Waidner: (2024) Protocol Fixes for KeyTrap Vulnerabilities. ANRW 2024, July 2024
Nethanel Gelernter, Haya Schulmann, Michael Waidner: (2024) External Attack-Surface of Modern Organizations. AsiaCCS 2024, July 2024
Olivia Gruza, Elias Heftrig, Oliver Jacobsen, Haya Schulmann, Niklas Vogel, Michael Waidner: (2024) Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU. WOOT @ USENIX Security Symposium 2024: 45-57, August 2024
Jens Frieß, Donika Mirdita, Haya Schulmann, Michael Waidner: (2024) Byzantine-Secure Relying Party for Resilient RPKI. CCS 2024: 49-63, October 2024
Elias Heftrig, Haya Schulmann, Niklas Vogel, Michael Waidner: (2024) The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC. CCS 2024: 497-510, October 2024
Louis Cattepoel, Donika Mirdita, Haya Schulmann, Michael Waidner: (2024) Poster: Kill Krill or Proxy RPKI. CCS 2024: 4922-4924, October 2024
Kevin Nsieyanji Tchokodeu, Haya Schulmann, Gil Sobol, Michael Waidner: (2024) Poster: Security of Login Interfaces in Modern Organizations. CCS 2024: 4925-4927, October 2024
Oliver Jacobsen, Haya Schulmann, Niklas Vogel, Michael Waidner: (2024) Poster: From Fort to Foe: The Threat of RCE in RPKI. CCS 2024: 5015-5017, October 2024
Jens Frieß, Haya Schulmann, Michael Waidner: (2024) Crowdsourced Distributed Domain Validation. HotNets 2024: 318-325, November 2024
Haya Schulmann, Michael Waidner: (2023) Aktive Cyberabwehr., Datenschutz und Datensicherheit 47(8): 497-502, Aug 2023
Jens Friess, Haya Schulmann, Michael Waidner: (2023) Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates., PACMNET 1(CoNEXT3): 26:1-26:20, Dez 2023
Fabian Kaiser, Haya Schulmann, Michael Waidner: (2023) Poster: Longitudinal Analysis of DoS Attacks. CCS 2023: 3573-3575, Nov 2023
Elias Heftrig, Haya Schulmann, Michael Waidner: (2023) Poster: Off-Path DNSSEC Downgrade Attacks., SIGCOMM 2023: 1120-1122, Sep 2023
Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner: (2023) Beyond Limits: How to Disable Validators in Secure Networks., SIGCOMM 2023: 950-966, Sep 2023
Elias Heftrig, Haya Schulmann, Michael Waidner: (2023) Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones., USENIX Security Symposium 2023: 7429-7444, Aug 2023
Tomas Hlavacek, Haya Schulmann, Niklas Vogel, Michael Waidner: (2023) Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet., USENIX Security Symposium 2023: 4841-4858, Aug 2023
Haya Schulmann, Michael Waidner: (2023) Intermezzo. Welcher Technologie kann man vertrauen?, Zeitschriftenaufsatz Kursbuch 59
Elisa Bertino, Haya Schulmann, Michael Waidner: Special issue ESORICS 2021. J. Comput. Secur. 30(6): 753-755 (2022)
Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner: Behind the Scenes of RPKI. CCS 2022: 1413-1426
Elias Heftrig, Haya Schulmann, Michael Waidner: Poster: The Unintended Consequences of Algorithm Agility in DNSSEC. CCS 2022: 3363-3365
Donika Mirdita, Haya Schulmann, Michael Waidner: Poster: RPKI Kill Switch. CCS 2022: 3423-3425
Haya Schulmann, Niklas Vogel, Michael Waidner: Poster: Insights into Global Deployment of RPKI Validation. CCS 2022: 3467-3469
Haya Schulmann, Michael Waidner: Poster: DNS in Routers Considered Harmful. CCS 2022: 3471-3473
Tomas Hlavacek, Haya Schulmann, Michael Waidner: Smart RPKI Validation: Avoiding Errors and Preventing Hijacks. ESORICS (1) 2022: 509-530
Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner: Stalloris: RPKI Downgrade Attack. USENIX Security Symposium 2022: 4455-4471
Philipp Jeitner, Haya Schulmann, Lucas Teichmann, Michael Waidner: XDRI Attacks - and - How to Enhance Resilience of Residential Routers. USENIX Security Symposium 2022: 4473-4490
Tianxiang Dai, Haya Shulman, Michael Waidner: (2021) Let's Downgrade Let's Encrypt, Conference Paper, Nov 2021, DOI: 10.1145/3460120.3484815
Tianxiang Dai, Haya Shulman: (2021) SMap: Internet-wide Scanning for Spoofing, Conference Paper, Dec 2021, DOI: 10.1145/3485832.3485917
Kris Shrishak; Haya Shulman: (2021) Privacy Preserving and Resilient RPKI. IEEE International Conference on Computer Communications (INFOCOM), Virtual conference, 2021. [Conference Paper]
Philipp Jeitner; Haya Shulman: (2021) Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS. 30th USENIX Security Symposium (USENIX sec) , Virtual conference, August 2021. [Conference Paper]
Tianxiang Dai, Philipp Jeitner, Haya Shulman and Michael Waidner: (2021) The Hijackers Guide to the Galaxy: Off-Path Taking Over Internet Resources. 30th USENIX Security Symposium (USENIX Security), Virtual conference, August 2021.
Tianxiang Dai and Philipp Jeitner, Haya Shulman and Michael Waidner: (2021) From IP to Transport and Beyond: Cross Layer Attacks Against Applications, ACM SIGCOMM, Virtual conference, August 2021.
Lukas Baumann, Elias Heftrig, Haya Shulman and Michael Waidner: (2021) The Master and Parasite Attack, IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE DSN), June 2021.
Kris Shrishak and Haya Shulman: (2021) Privacy Preserving and Resilient RPKI. In IEEE International Conference on Computer Communications (INFOCOM), 2021.
Haya Shulman and Hervais Simo: (2021) WallGuard - A Deep Learning Approach for Avoiding Regrettable Posts in Social Media. In The 41th IEEE International Conference on Distributed Computing Systems (ICDCS). Poster Session, 2021.
Tianxing Dai, Haya Shulman, and Michael Waidner: (2021) Off-path VoIP Interception Attacks. In The 41th IEEE International Conference on Distributed Computing Systems (ICDCS). Poster Session, 2021.
Tianxing Dai, Haya Shulman, and Michael Waidner: (2021) Fragmentation Attacks on DNS over TCP. In The 41th IEEE International Conference on Distributed Computing Systems (ICDCS). Poster Session, 2021.
Haya Shulman and Shujie Zhao: (2021) Machine Learning Analysis of IP ID Applications. In The 51th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Poster Session, 2021.
Kris Shrishak and Haya Shulman: (2021) Negotiating PQC for DNSSEC. In The 51th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Poster Session, 2021.
Hervais Simo, Haya Shulman, Joern Kohlhammer, Marija Schufrin, and Steven Reynolds: (2021) PrivInfer-Vis: Towards Enhancing Transparency over Attribute Inference in Online Social Networks. In IEEE International Conference on Computer Communications (INFOCOM). Poster Session, 2021.
Haya Shulman and Michael Waidner: (2021) SSL Checker. In IEEE International Conference on Computer Communications (INFOCOM). Poster Session, 2021.
Tomas Hlavacek, Haya Shulman, and Michael Waidner: (2021) Not all Conflicts are Created Equal: Automated Error Resolution in RPKI Deployments. In IEEE International Conference on Computer Communica-tions (INFOCOM). Poster Session, 2021.
Markus Brandt and Haya Shulman: (2021) Optimized BGP Simulator for Evaluation of Internet Hijacks. In IEEE International Conference on Computer Communications (INFOCOM). Poster Session, 2021.
Tianxiang Dai, Haya Shulman, Michael Waidner: Let's Downgrade Let's Encrypt. CCS 2021: 1421-1440
Elias Heftrig, Jean-Pierre Seifert, Haya Shulman, Michael Waidner, Nils Wisiol: Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers. CCS 2021: 2423-2425
Markus Brandt, Haya Shulman, Michael Waidner: Evaluating Resilience of Domains in PKI. CCS 2021: 2444-2446
Haya Shulman, Michael Waidner: SSLChecker. INFOCOM Workshops 2021: 1-2
Elisa Bertino, Haya Shulman, Michael Waidner: Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12972, Springer 2021, ISBN 978-3-030-88417-8 [contents]
Elisa Bertino, Haya Shulman, Michael Waidner: Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12973, Springer 2021, ISBN 978-3-030-88427-7 [contents]
Schneider, M.; Shulman, H.; Waidner, M.: (2020) Blocking Email Bombs with EmailGlass. In: 2020 IEEE Global Communications Conference, GLOBECOM 2020 - Proceedings, art. no. 9322348, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781728182988, DOI: 10.1109/GLOBECOM42002.2020.9322348. [Conference Paper]
Senf, D.; Shulman, H.; Waidner, M.: (2020) Performance penalties of resilient SDN infrastructures. In: CoNEXT 2020 - Proceedings of the 16th International Conference on Emerging Networking EXperiments and Technologies, pp. 528-529, Association for Computing Machinery, Inc, ISBN: 9781450379489, DOI: 10.1145/3386367.3432351. [Conference Paper]
Klein, A.; Heftrig, E.; Shulman, H.; Waidner, M.: (2020) Black-box caches fingerprinting. In: CoNEXT 2020 - Proceedings of the 16th International Conference on Emerging Networking EXperiments and Technologies, pp. 564-565, Association for Computing Machinery, Inc, ISBN: 9781450379489, DOI: 10.1145/3386367.3432148. [Conference Paper]
Jeitner, P.; Shulman, H.; Waidner, M.: (2020) Pitfalls of provably secure systems in internet the case of chronos-NTP. In: Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks: Supplemental Volume, DSN-S 2020, art. no. 9159158, pp. 49-50, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781728172606, DOI: 10.1109/DSN-S50200.2020.00027. [Conference Paper]
Jeitner, P.; Shulman, H.; Waidner, M.: (2020) Secure consensus generation with distributed DoH. In: Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks: Supplemental Volume, DSN-S 2020, art. no. 9159155, pp. 41-42, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781728172606, DOI: 10.1109/DSN-S50200.2020.00023. [Conference Paper]
Jeitner, P.; Shulman, H.; Waidner, M.: (2020) The Impact of DNS Insecurity on Time. In: Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2020, art. no. 9153432, pp. 266-277, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781728158099, DOI: 10.1109/DSN48063.2020.00043 [Conference Paper]
Schneider, M.; Shulman, H.; Sidis, A.; Sidis, R.; Waidner, M.: (2020) Diving into Email Bomb Attack. In: Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2020, art. no. 9153420, pp. 286-293, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781728158099 DOI: 10.1109/DSN48063.2020.00045 [Conference Paper]
Shrishak, K.; Shulman, H.: (2020) Limiting the Power of RPKI Authorities. In: ANRW 2020 - Proceedings of the 2020 Applied Networking Research Workshop, pp. 12-18, Association for Computing Machinery, ISBN: 9781450380393 DOI: 10.1145/3404868.3406674 [Conference Paper]
Shrishak, K.; Shulman, H.: (2020) MPC for securing internet infrastructure. In: Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks: Supplemental Volume, DSN-S 2020, art. no. 9159160, pp. 47-48, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781728172606 DOI: 10.1109/DSN-S50200.2020.00026 [Conference Paper]
Dalskov, A.; Orlandi, C.; Keller, M.; Shrishak, K.; Shulman, H.: (2020) Securing dnssec keys via threshold ecdsa from generic mpc. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12309 LNCS, pp. 654-673, Springer Science and Business Media Deutschland GmbH, ISSN: 03029743, ISBN: 9783030590123 DOI: 10.1007/978-3-030-59013-0_32 [Conference Paper]
Brandt, Markus ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya: (2020) Optimal Transport Layer for Secure Computation. In: SECRYPT 2020-The 17th International Conference on Security and Cryptography, virtual Conference, 08.-10.07., [Konferenzveröffentlichung]
Hlavacek, Tomas ; Cunha, Italo ; Gilad, Yossi ; Herzberg, Amir; Katz-Bassett, Ethan ; Schapira, Michael ; Shulman, Haya: (2020) DISCO: Sidestepping RPKI's Deployment Barriers. Network and Distributed Systems Security Symposium (NDSS 2020), San Diego, USA, 23.-26. Febr., [Konferenzveröffentlichung]
Markus Brandt; Haya Shulman; Michael Waidner: (2019) Distributed Domain Validation (DDV). In: Cryptoday Matters 31, Berlin, Germany, 2019 [Article]
Anders Dalskov; Marcel Keller; Claudio Orlandi; Kris Shrishak; Haya Shulman: (2019) Securing DNSSEC Keys via Threshold ECDSA From Generic MPC. Cryptoday Matters 31, Berlin, Germany, 2019 [Article]
Markus Brandt; Claudio Orlandi; Kris Shrishak; Haya Shulman: (2019) Transputation: Transport Framework for Secure Computation. Cryptoday Matters 30, Berlin, Germany, 2019 [Article]
Brandt, M.; Shulman, H.; Waidner, M.: (2018) Internet as a source of randomness. In: HotNets 2018 - Proceedings of the 2018 ACM Workshop on Hot Topics in Networks, pp. 64-70, Association for Computing Machinery, Inc, ISBN: 9781450361200 DOI: 10.1145/3286062.3286072 [Conference Paper]
Brandt, M.; Dai, T.; Shulman, H.; Klein, A.; Waidner, M.: (2018) Domain Validation++ for MitM-resilient PKI. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 2060-2076, Association for Computing Machinery, ISSN: 15437221, ISBN: 9781450356930 DOI: 10.1145/3243734.3243790 [Conference Paper]
Göhring, M.; Shulman, H.; Waidner, M.: (2018) Path MTU discovery considered harmful. In: Proceedings - International Conference on Distributed Computing Systems, 2018-July, pp. 866-874, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781538668719 DOI: 10.1109/ICDCS.2018.00088 [Conference Paper]
Hlavacek, T.; Herzberg, A.; Shulman, H.; Waidner, M.: (2018) Practical experience: Methodologies for measuring route origin validation. In: Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018, art. no. 8416522, pp. 634-641, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781538655955 DOI: 10.1109/DSN.2018.00070 [Conference Paper]
Gilad, Y.; Hlavacek, T.; Herzberg, A.; Schapira, M.; Shulman, H.: (2018) Perfect is the enemy of good: Setting realistic goals for BGP security. In: HotNets 2018 - Proceedings of the 2018 ACM Workshop on Hot Topics in Networks, pp. 57-63, Association for Computing Machinery, Inc, ISBN: 9781450361200 DOI: 10.1145/3286062.3286071 [Conference Paper]
Krish Shrishak; Haya Shulman; Michael Waidner: (2018) Poster: Removing the Bottleneck for Practical 2PC. In: ACM SIGSAG Conference on Computer and Communications Security (ACM CCS), Toronto, Canada, October 2018. [Conference Paper]
Tianxiang Dai; Haya Shulman; Michael Waidner: (2018) Poster: Off-path Attacks Against PKI. In: ACM SIGSAG Conference on Computer and Communications Security (ACM CCS), Toronto, Canada, October 2018. [Conference Paper]
Klein, A.; Kravtsov, V.; Perlmuter, A.; Shulman, H.; Waidner, M.: (2017) Poster: X-Ray your DNS. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 2519-2521, Association for Computing Machinery, ISSN: 15437221, ISBN: 9781450349468 DOI: 10.1145/3133956.3138821 [Conference Paper]
Klein, A.; Shulman, H.; Waidner, M.: (2017) Internet-wide study of DNS cache injections. In: Proceedings - IEEE INFOCOM, art. no. 8057202, Institute of Electrical and Electronics Engineers Inc., ISSN: 0743166X, ISBN: 9781509053360 DOI: 10.1109/INFOCOM.2017.8057202 [Conference Paper]
Klein, A.; Shulman, H.; Waidner, M.: (2017) Counting in the Dark: DNS Caches Discovery and Enumeration in the Internet. In: Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017, art. no. 8023137, pp. 367-378, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781538605417 DOI: 10.1109/DSN.2017.63 [Conference Paper]
Rotenberg, N.; Shulman, H.; Waidner, M.; Zeltser, B.: (2017) Authentication-bypass vulnerabilities in SOHO routers. In: SIGCOMM Posters and Demos 2017 - Proceedings of the 2017 SIGCOMM Posters and Demos, Part of SIGCOMM 2017, pp. 68-70, Association for Computing Machinery, Inc, ISBN: 9781450350570 DOI: 10.1145/3123878.3131989 [Conference Paper]
Shulman, H.; Waidner, M.: (2017) One key to sign them all considered vulnerable: Evaluation of DnSsec in the internet. In: Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017, pp. 131-144, USENIX Association, ISBN: 9781931971379 [Conference Paper]
Feldmann, A.; Heyder, P.; Kreutzer, M.; Schmid, S.; Seifert, J.-P.; Shulman, H.; Thimmaraju, K.; Waidner, M.; Sieberg, J.: (2016) NetCo: Reliable Routing with Unreliable Routers. In: Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN-W 2016, art. no. 7575362, pp. 128-135, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781467388917 DOI: 10.1109/DSN-W.2016.38 [Conference Paper]
Borgwart, A.; Shulman, H.; Waidner, M.: (2016) Towards Automated Measurements of Internet's Naming Infrastructure. In: Proceedings - 2016 IEEE International Conference on Software Science, Technology and Engineering, SwSTE 2016, art. no. 7515419, pp. 117-124, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781509010189 DOI: 10.1109/SWSTE.2016.25 [Conference Paper].
Ghiglieri, M.; Waidner, M.: (2016) HbbTV Security and Privacy: Issues and Challenges. In: IEEE Security and Privacy, 14 (3), art. no. 7478585, pp. 61-67, Institute of Electrical and Electronics Engineers Inc., ISSN: 15407993 DOI: 10.1109/MSP.2016.54 [Article]
Waidner, M.; Kasper, M.: (2016) Security in industrie 4.0 - Challenges and solutions for the fourth industrial revolution. In: Proceedings of the 2016 Design, Automation and Test in Europe Conference and Exhibition, DATE 2016, art. no. 7459511, pp. 1303-1308, Institute of Electrical and Electronics Engineers Inc., ISBN: 9783981537062 DOI: 10.3850/9783981537079_1005 [Conference Paper]
Shulman, H.; Waidner, M.: (2016) Is the internet ready for DNSSEC evaluating pitfalls in the naming infrastructure. In: Traffic Monitoring and Analysis - 8th International Workshop, TMA 2016, International Federation for Information Processing, IFIP, ISBN: 9783901882920 [Conference Paper]
Dai, T.; Shulman, H.; Waidner, M.: (2016) DNSSEC Misconfigurations in popular domains. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10052 LNCS, pp. 651-660, Springer Verlag, ISSN: 03029743, ISBN: 9783319489643 DOI: 10.1007/978-3-319-48965-0_43 [Conference Paper]
Shulman, H.; Waidner, M.: (2015) Towards security of internet naming infrastructure. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9326, pp. 3-22, Springer Verlag, ISSN: 03029743, ISBN: 9783319241739 DOI: 10.1007/978-3-319-24174-6_1 [Conference Paper]
Sadeghi, A.-R.; Wachsmann, C.; Waidner, M.: (2015) Security and privacy challenges in industrial Internet of Things. In: Proceedings - Design Automation Conference, 2015-July, art. no. 7167238, Institute of Electrical and Electronics Engineers Inc., ISSN: 0738100X, ISBN: 9781450335201 DOI: 10.1145/2744769.2747942 [Conference Paper]
Borgwart, A., Boukoros, S., Shulman, H., Van Rooyen, C., Waidner, M.: (2015) Detection and forensics of domains hijacking. In: 2015 IEEE Global Communications Conference, GLOBECOM 2015, art. no. 7417736, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781479959525 DOI: 10.1109/GLOCOM.2014.7417736 [Conference Paper]
Herzberg, A.; Shulman, H.: (2015) Cipher-suite negotiation for DNSSEC: Hop-by-hop or end-to-end? In: IEEE Internet Computing, 19 (1), art. no. 7031814, pp. 80-84, Institute of Electrical and Electronics Engineers Inc., ISSN: 10897801 DOI: 10.1109/MIC.2015.3 [Article]
Shulman, H.; Waidner, M.: (2014) DNSSEC for cyber forensics. In: EURASIP Journal on Information Security, 2014 (1), art. no. 16, pp. 1-14, SpringerOpen, ISSN: 22113037 DOI: 10.1186/s13635-014-0016-2 [Article]
Shulman, H.; Waidner, M.: (2014) Towards forensic analysis of attacks with DNSSEC. In: Proceedings - IEEE Symposium on Security and Privacy, 2014-January, art. no. 6957288, pp. 69-76, Institute of Electrical and Electronics Engineers Inc., ISSN: 10816011, ISBN: 9781479951031 DOI: 10.1109/SPW.2014.20 [Conference Paper]
Shulman, H.; Waidner, M.: (2014) Fragmentation considered leaking: Port inference for DNS poisoning. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8479 LNCS, pp. 531-548, Springer Verlag, ISSN: 03029743, ISBN: 9783319075358; 9783319075358 DOI: 10.1007/978-3-319-07536-5_31 [Conference Paper]
Ghiglieri, M.; Stopczynski, M.; Waidner, M.: (2014) Personal DLP for facebook. In: 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, PERCOM WORKSHOPS 2014, art. no. 6815279, pp. 629-634, IEEE Computer Society DOI: 10.1109/PerComW.2014.6815279 [Conference Paper]
Herzberg, A.; Shulman, H.; Crispo, B.: (2014) Less is more: Cipher-suite negotiation for DNSSEC. In: ACM International Conference Proceeding Series, 2014-December (December), pp. 346-355, Association for Computing Machinery DOI: 10.1145/2664243.2664283 [Conference Paper]
Michael Kreutzer, Michael Waidner, Johannes Buchmann: IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung. Prax. Inf.verarb. Kommun. 35(4): 305-308 (2012)
Neeraj Suri, Michael Waidner: Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 7.-9. März 2012 in Darmstadt. LNI P-195, GI 2012, ISBN 978-3-88579-289-5
Rüdiger Kapitza, Matthias Schunter, Marc Shapiro, Paulo Veríssimo, Michael Waidner: Security and Dependability for Federated Cloud Platforms (Dagstuhl Seminar 12281). Dagstuhl Reports 2(7): 56-72 (2012)
Simone Fischer-Hübner, Chris Jay Hoofnagle, Ioannis Krontiris, Kai Rannenberg, Michael Waidner: Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061). Dagstuhl Manifestos 1(1): 1-20 (2011)
Hannes Federrath, Marit Hansen, Michael Waidner: Andreas Pfitzmann 1958 - 2010. it Inf. Technol. 53(1): 5-7 (2011)
Simone Fischer-Hübner, Chris Jay Hoofnagle, Kai Rannenberg, Michael Waidner, Ioannis Krontiris, Michael Marhöfer: Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061). Dagstuhl Reports 1(2): 1-15 (2011)
Hannes Federrath, Marit Hansen, Michael Waidner: Andreas Pfitzmann 1958-2010: Pioneer of Technical Privacy Protection in the Information Society. PrimeLife 2010: 349-352
Michael Backes, Birgit Pfitzmann, Michael Waidner: The reactive simulatability (RSIM) framework for asynchronous systems. Inf. Comput. 205(12): 1685-1720 (2007)
Michael Backes, David A. Basin, Michael Waidner: Preface. J. Comput. Secur. 15(6): 561 (2007)
Matthias Schunter, Michael Waidner: Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data. Privacy Enhancing Technologies 2007: 218-232
Christoph Sprenger , Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner: Cryptographically Sound Theorem Proving. CSFW 2006: 153-166
Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner: Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. ESAS 2006: 165-178
Michael Backes, Birgit Pfitzmann, Michael Waidner: Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. ESORICS 2006: 404-423
Michael Backes, Birgit Pfitzmann, Michael Waidner: Formal Methods and Cryptography. FM 2006: 612-616
Günter Karjoth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Service-oriented Assurance - Comprehensive Security by Explicit Assurances. Quality of Protection 2006: 13-24
Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Reactively Simulatable Certified Mail. IACR Cryptol. ePrint Arch. 2006: 41 (2006)
Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner: Cryptographically Sound Theorem Proving. IACR Cryptol. ePrint Arch. 2006: 47 (2006)
Michael Backes, Birgit Pfitzmann, Michael Waidner: Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes. IACR Cryptol. ePrint Arch. 2006: 68 (2006)
Michael Backes, Birgit Pfitzmann, Michael Waidner: Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. Int. J. Inf. Sec. 4(3): 135-154 (2005)
Michael Backes, Birgit Pfitzmann, Michael Waidner: Reactively secure signature schemes. Int. J. Inf. Sec. 4(4): 242-252 (2005)
Vern Paxson, Michael Waidner: Guest Editor's Introduction: 2005 IEEE Symposium on Security and Privacy. IEEE Trans. Dependable Secur. Comput. 2(2): 81 (2005)
Günter Karjoth, Matthias Schunter, Michael Waidner: Privacy-enabled Management of Customer Data. IEEE Data Eng. Bull. 27(1): 3-9 (2004)
Michael Waidner: Preface. Int. J. Inf. Sec. 3(1): 1 (2004)
Marit Hansen, Peter Berlich, Jan Camenisch, Sebastian Clauß, Andreas Pfitzmann, Michael Waidner: Privacy-enhancing identity management. Inf. Secur. Tech. Rep. 9(1): 35-44 (2004)
Michael Backes, Birgit Pfitzmann, Michael Waidner: Polynomial liveness. J. Comput. Secur. 12(3-4): 589-617 (2004)
Michael Backes, Birgit Pfitzmann, Michael Waidner: Justifying a Dolev-Yao Model Under Active Attacks. FOSAD 2004: 1-41
Michael Backes, Birgit Pfitzmann, Michael Waidner: Low-Level Ideal Signatures and General Integrity Idealization. ISC 2004: 39-51
Michael Backes, Birgit Pfitzmann, Michael Waidner: A General Composition Theorem for Secure Reactive Systems. TCC 2004: 336-354
Vijayalakshmi Atluri, Michael Backes, David A. Basin, Michael Waidner: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004. ACM 2004, ISBN 1-58113-971-3
Michael Backes, Birgit Pfitzmann, Michael Waidner: The Reactive Simulatability (RSIM) Framework for Asynchronous Systems. IACR Cryptol. ePrint Arch. 2004: 82 (2004)
Birgit Pfitzmann, Michael Waidner: Analysis of Liberty Single-Sign-on with Enabled Clients. IEEE Internet Comput. 7(6): 38-44 (2003)
Michael Backes, Birgit Pfitzmann, Michael Waidner: Security in Business Process Engineering. Business Process Management 2003: 168-183
Michael Backes, Birgit Pfitzmann, Michael Waidner: A composable cryptographic library with nested operations. CCS 2003: 220-230
Günter Karjoth, Matthias Schunter, Els Van Herreweghen, Michael Waidner: Amending P3P for Clearer Privacy Promises. DEXA Workshops 2003: 445-449
Michael Backes, Birgit Pfitzmann, Michael Waidner: Symmetric Authentication within a Simulatable Cryptographic Library. ESORICS 2003: 271-290
Michael Backes, Birgit Pfitzmann, Michael Waidner: Reactively Secure Signature Schemes. ISC 2003: 84-95
Birgit Pfitzmann, Michael Waidner: Federated Identity-Management Protocols. Security Protocols Workshop 2003: 153-174
Michael Backes, Birgit Pfitzmann, Michael Waidner: A Universally Composable Cryptographic Library. IACR Cryptol. ePrint Arch. 2003: 15 (2003)
Michael Backes, Birgit Pfitzmann, Michael Waidner: Symmetric Authentication Within a Simulatable Cryptographic Library. IACR Cryptol. ePrint Arch. 2003: 145 (2003)
Michael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner: Polynomial Fairness and Liveness. CSFW 2002: 160-174
Günter Karjoth, Matthias Schunter, Michael Waidner: Privacy-Enabled Services for Enterprises. DEXA Workshops 2002: 483-487
Günter Karjoth, Matthias Schunter, Michael Waidner: Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data. Privacy Enhancing Technologies 2002: 69-84
Birgit Pfitzmann, Michael Waidner: Privacy in browser-based attribute exchange. WPES 2002: 52-62
Dieter Gollmann, Günter Karjoth, Michael Waidner: Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings. Lecture Notes in Computer Science 2502, Springer 2002, ISBN 3-540-44345-2
Michael Steiner, Peter Buhler, Thomas Eirich, Michael Waidner: Secure password-based cipher suite for TLS. ACM Trans. Inf. Syst. Secur. 4(2): 134-157 (2001)
Andre Scedrov, Ran Canetti, Joshua D. Guttman, David A. Wagner, Michael Waidner: Relating Cryptography and Cryptographic Protocols. CSFW 2001: 111-114
Birgit Pfitzmann, Michael Waidner: A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. S&P 2001: 184-200
Birgit Pfitzmann, James Riordan, Christian Stüble, Michael Waidner, Arnd Weber: Die PERSEUS Systemarchitektur. VIS 2001: 1-17
N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner: State of the art in electronic payment systems. Adv. Comput. 53: 425-449 (2000)
Simon Field, Michael Waidner: Electronic Commerce. Comput. Networks 32(6): 667-668 (2000)
N. Asokan, Victor Shoup, Michael Waidner: Optimistic fair exchange of digital signatures. IEEE J. Sel. Areas Commun. 18(4): 593-610 (2000)
Mihir Bellare, Juan A. Garay, Ralf C. Hauser, Amir Herzberg, Hugo Krawczyk, Michael Steiner, Gene Tsudik, Els Van Herreweghen, Michael Waidner: Design, implementation, and deployment of the iKP secure electronic payment system. IEEE J. Sel. Areas Commun. 18(4): 611-627 (2000)
Michael Steiner, Gene Tsudik, Michael Waidner: Key Agreement in Dynamic Peer Groups. IEEE Trans. Parallel Distributed Syst. 11(8): 769-780 (2000)
Birgit Pfitzmann, Michael Waidner: Composition and integrity preservation of secure reactive systems. CCS 2000: 245-254
Birgit Baum-Waidner, Michael Waidner: Round-Optimal and Abuse Free Optimistic Multi-party Contract Signing. ICALP 2000: 524-535
Peter Buhler, Thomas Eirich, Michael Waidner, Michael Steiner: Secure Password-Based Cipher Suite for TLS. NDSS 2000
Gérard Lacoste, Birgit Pfitzmann, Michael Steiner, Michael Waidner: SEMPER - Secure Electronic Marketplace for Europe. Lecture Notes in Computer Science 1854, Springer 2000, ISBN 3-540-67825-5
Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner: Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings. Lecture Notes in Computer Science 1895, Springer 2000, ISBN 3-540-41031-7
Birgit Pfitzmann, Michael Waidner: A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. IACR Cryptol. ePrint Arch. 2000: 66 (2000)
N. Asokan, Hervé Debar, Michael Steiner, Michael Waidner: Authenticating public terminals. Comput. Networks 31(8): 861-870 (1999)
Matthias Schunter, Michael Waidner, Dale Whinnett: The SEMPER Framework for Secure Electronic Commerce. Wirtschaftsinf. 41(3): 238-247 (1999)
Matthias Schunter, Michael Waidner, Dale Whinnett: The SEMPER Framework for Secure Electronic Commerce. Wirtschaftsinformatik 1999: 11
Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Cryptographic Security of Reactive Systems. Workshop on Secure Architectures and Information Flow 1999: 59-77
Matthias Schunter, Michael Waidner, Dale Whinnett: A Status Report on the SEMPER Framework for Secure Electronic Commerce. Comput. Networks 30(16-18): 1501-1510 (1998)
José L. Abad Peiro, N. Asokan, Michael Steiner, Michael Waidner: Designing a Generic Payment Service. IBM Syst. J. 37(1): 72-88 (1998)
Anja Jerichow, Jan Müller, Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Real-time mixes: a bandwidth-efficient anonymity protocol. IEEE J. Sel. Areas Commun. 16(4): 495-509 (1998)
Birgit Pfitzmann, Michael Waidner: How to Break Fraud-Detectable Key Recovery. ACM SIGOPS Oper. Syst. Rev. 32(1): 23-28 (1998)
N. Asokan, Victor Shoup, Michael Waidner: Optimistic Fair Exchange of Digital Signatures (Extended Abstract). EUROCRYPT 1998: 591-606
Michael Steiner, Gene Tsudik, Michael Waidner: CLIQUES: A New Approach to Group Key Agreement. ICDCS 1998: 380-387
Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Optimal Efficiency of Optimistic Contract Signing. PODC 1998: 113-122 [c25] N. Asokan, Victor Shoup, Michael Waidner: Asynchronous Protocols for Optimistic Fair Exchange. S&P 1998: 86-99
Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Trusting Mobile User Devices and Security Modules. Computer 30(2): 61-68 (1997)
N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner: The State of the Art in Electronic Payment Systems. Computer 30(9): 28-35 (1997)
N. Asokan, Gene Tsudik, Michael Waidner: Server-Supported Signatures. J. Comput. Secur. 5(1): 91-108 (1997)
Birgit Pfitzmann, Michael Waidner: Strong Loss Tolerance of Electronic Coin Systems. ACM Trans. Comput. Syst. 15(2): 194-213 (1997)
N. Asokan, Matthias Schunter, Michael Waidner: Optimistic Protocols for Fair Exchange. CCS 1997: 7-17
Birgit Pfitzmann, Michael Waidner: Asymmetric Fingerprinting for Larger Collusions. CCS 1997: 151-160
Birgit Pfitzmann, Michael Waidner: Anonymous Fingerprinting. EUROCRYPT 1997: 88-102
Birgit Pfitzmann, Michael Waidner: Kopierschutz durch asymmetrische Schlüsselkennzeichnung mit Signeten. Verläßliche IT-Systeme 1997: 17-32
N. Asokan, Victor Shoup, Michael Waidner: Optimistic fair Exchange of Digital Signatures. IACR Cryptol. ePrint Arch. 1997: 15 (1997)
Prof. Dr. Michael Waidner
michael.waidner@ tu-darmstadt.de
+49 6151 869-250
S2|02 B201
Hochschulstraße 10
64289 Darmstadt