Search Results - "Shulman, Haya"
-
1
Optimized BGP Simulator for Evaluation of Internet Hijacks
Published in IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (10-05-2021)“…Simulating network experiments is critical for inferring insights on the large scale Internet attacks and defences. In this work, we develop a new network…”
Get full text
Conference Proceeding -
2
Poster: WallGuard - A Deep Learning Approach for Avoiding Regrettable Posts in Social Media
Published in 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS) (01-07-2021)“…We develop WallGuard for helping users in online social networks (OSNs) avoid regrettable posts and disclosure of sensitive information. Using WallGuard the…”
Get full text
Conference Proceeding -
3
Retrofitting Security into Network Protocols: The Case of DNSSEC
Published in IEEE internet computing (01-01-2014)“…DNS Security Extensions (DNSSEC) became standardized more than 15 years ago, but its adoption is still limited. The recent publication of several new, off-path…”
Get full text
Journal Article -
4
Negotiating PQC for DNSSEC
Published in 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S) (01-06-2021)“…Domain Name System Security Extensions (DNSSEC) provides authentication and integrity to Domain Name System (DNS) through the use of digital signatures based…”
Get full text
Conference Proceeding -
5
Machine Learning Analysis of IP ID Applications
Published in 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S) (01-06-2021)“…The IP identifier (IP ID) in the IP header has become enormously popular as a side channel leaking valuable information on destinations. In the recent decades,…”
Get full text
Conference Proceeding -
6
Privacy Preserving and Resilient RPKI
Published in IEEE INFOCOM 2021 - IEEE Conference on Computer Communications (10-05-2021)“…Resource Public Key Infrastructure (RPKI) is vital to the security of inter-domain routing. However, RPKI enables Regional Internet Registries (RIRs) to…”
Get full text
Conference Proceeding -
7
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
Published in IEEE internet computing (01-01-2015)“…To ensure the best security and efficiency, cryptographic protocols such as Transport Layer Security and IPsec should let parties negotiate the use of the…”
Get full text
Journal Article -
8
The Impact of DNS Insecurity on Time
Published in 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01-06-2020)“…We demonstrate the first practical off-path time shifting attacks against NTP as well as against Man-in-the-Middle (MitM) secure Chronos-enhanced NTP. Our…”
Get full text
Conference Proceeding -
9
MPC for Securing Internet Infrastructure
Published in 2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S) (01-06-2020)“…Secure multiparty computation (MPC) allows multiple entities to perform joint computation over their private inputs, revealing only the output. Although it was…”
Get full text
Conference Proceeding -
10
Internet-wide study of DNS cache injections
Published in IEEE INFOCOM 2017 - IEEE Conference on Computer Communications (01-05-2017)“…DNS caches are an extremely important tool, providing services for DNS as well as for a multitude of applications, systems and security mechanisms, such as…”
Get full text
Conference Proceeding -
11
DNSSEC: Security and availability challenges
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01-10-2013)“…DNSSEC was proposed more than 15 years ago but its (correct) adoption is still very limited. Recent cache poisoning attacks motivate deployment of DNSSEC. In…”
Get full text
Conference Proceeding -
12
Secure Consensus Generation with Distributed DoH
Published in 2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S) (01-06-2020)“…Many applications and protocols depend on the ability to generate a pool of servers to conduct majority-based consensus mechanisms and often this is done by…”
Get full text
Conference Proceeding -
13
Poster: Off-path VoIP Interception Attacks
Published in 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS) (01-07-2021)“…The proliferation of Voice-over-IP (VoIP) technologies make them a lucrative target of attacks. While many attack vectors have been uncovered, one critical…”
Get full text
Conference Proceeding -
14
Poster: Fragmentation Attacks on DNS over TCP
Published in 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS) (01-07-2021)“…The research and operational community believe that TCP provides protection against IP fragmentation based attacks and recommend that servers avoid sending…”
Get full text
Conference Proceeding -
15
Pitfalls of Provably Secure Systems in Internet the Case of Chronos-NTP
Published in 2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S) (01-06-2020)“…The critical role that Network Time Protocol (NTP) plays in the Internet led to multiple efforts to secure it against time-shifting attacks. A recent proposal…”
Get full text
Conference Proceeding -
16
Practical Experience: Methodologies for Measuring Route Origin Validation
Published in 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01-06-2018)“…Performing Route Origin Validation (ROV) to filter BGP announcements, which contradict Route Origin Authorizations (ROAs) is critical for protection against…”
Get full text
Conference Proceeding -
17
Towards Forensic Analysis of Attacks with DNSSEC
Published in 2014 IEEE Security and Privacy Workshops (01-05-2014)“…DNS cache poisoning is a stepping stone towards advanced (cyber) attacks, and can be used to monitor users' activities, for censorship, to distribute malware…”
Get full text
Conference Proceeding -
18
Counting in the Dark: DNS Caches Discovery and Enumeration in the Internet
Published in 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01-06-2017)“…Domain Name System (DNS) is a fundamental element of the Internet providing lookup services for end users as well as for a multitude of applications, systems…”
Get full text
Conference Proceeding -
19
The Master and Parasite Attack
Published in 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01-06-2021)“…We explore a new type of malicious script attacks: the persistent parasite attack. Persistent parasites are stealthy scripts, which persist for a long time in…”
Get full text
Conference Proceeding -
20
Diving into Email Bomb Attack
Published in 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01-06-2020)“…We explore Email Bomb - a particularly devastating type of Denial of Service (DOS) attack that recently gained traction. During the attack Email account of a…”
Get full text
Conference Proceeding