Haya Shulman
Haya Shulman
Fraunhofer Institute for Secure Information Technology
Verified email at sit.fraunhofer.de - Homepage
Title
Cited by
Cited by
Year
Fragmentation considered poisonous, or: One-domain-to-rule-them-all. org
A Herzberg, H Shulman
2013 IEEE Conference on Communications and Network Security (CNS), 224-232, 2013
932013
Security of patched DNS
A Herzberg, H Shulman
European Symposium on Research in Computer Security, 271-288, 2012
602012
Ethical considerations when employing fake identities in online social networks for research
Y Elovici, M Fire, A Herzberg, H Shulman
Science and engineering ethics 20 (4), 1027-1043, 2014
362014
Pretty bad privacy: Pitfalls of DNS encryption
H Shulman
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 191-200, 2014
362014
Socket overloading for fun and cache-poisoning
A Herzberg, H Shulman
Proceedings of the 29th Annual Computer Security Applications Conference …, 2013
362013
Are We There Yet? On RPKI's Deployment and Security.
Y Gilad, A Cohen, A Herzberg, M Schapira, H Shulman
NDSS, 2017
322017
Retrofitting security into network protocols: The case of dnssec
A Herzberg, H Shulman
IEEE Internet Computing 18 (1), 66-71, 2014
302014
Cloudoscopy: Services discovery and topology mapping
A Herzberg, H Shulman, J Ullrich, E Weippl
Proceedings of the 2013 ACM workshop on Cloud computing security workshop …, 2013
282013
Vulnerable delegation of DNS resolution
A Herzberg, H Shulman
European Symposium on Research in Computer Security, 219-236, 2013
282013
Internet-wide study of dns cache injections
A Klein, H Shulman, M Waidner
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
262017
DNSSEC: Security and availability challenges
A Herzberg, H Shulman
2013 IEEE Conference on Communications and Network Security (CNS), 365-366, 2013
252013
Fragmentation considered leaking: port inference for dns poisoning
H Shulman, M Waidner
International Conference on Applied Cryptography and Network Security, 531-548, 2014
212014
Off-path hacking: The illusion of challenge-response authentication
Y Gilad, A Herzberg, H Shulman
IEEE Security & Privacy 12 (5), 68-77, 2013
202013
Off-path hacking: The illusion of challenge-response authentication
Y Gilad, A Herzberg, H Shulman
IEEE Security & Privacy 12 (5), 68-77, 2013
202013
Stealth dos attacks on secure channels
A Herzberg, H Shulman
Proceedings of the 17th Annual Network and Distributed System Security …, 2010
20*2010
Towards a theory of white-box security
A Herzberg, H Shulman, A Saxena, B Crispo
IFIP International Information Security Conference, 342-352, 2009
202009
Towards forensic analysis of attacks with DNSSEC
H Shulman, M Waidner
2014 IEEE Security and Privacy Workshops, 69-76, 2014
182014
Domain validation++ for mitm-resilient pki
M Brandt, T Dai, A Klein, H Shulman, M Waidner
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
172018
Towards security of internet naming infrastructure
H Shulman, M Waidner
European Symposium on Research in Computer Security, 3-22, 2015
162015
DNS authentication as a service: preventing amplification attacks
A Herzberg, H Shulman
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
162014
The system can't perform the operation now. Try again later.
Articles 1–20