Search Results - "Shulman, Haya"

Refine Results
  1. 1

    Optimized BGP Simulator for Evaluation of Internet Hijacks by Brandt, Markus, Shulman, Haya

    “…Simulating network experiments is critical for inferring insights on the large scale Internet attacks and defences. In this work, we develop a new network…”
    Get full text
    Conference Proceeding
  2. 2

    Poster: WallGuard - A Deep Learning Approach for Avoiding Regrettable Posts in Social Media by Shulman, Haya, Simo, Hervais

    “…We develop WallGuard for helping users in online social networks (OSNs) avoid regrettable posts and disclosure of sensitive information. Using WallGuard the…”
    Get full text
    Conference Proceeding
  3. 3

    Retrofitting Security into Network Protocols: The Case of DNSSEC by Herzberg, Amir, Shulman, Haya

    Published in IEEE internet computing (01-01-2014)
    “…DNS Security Extensions (DNSSEC) became standardized more than 15 years ago, but its adoption is still limited. The recent publication of several new, off-path…”
    Get full text
    Journal Article
  4. 4

    Negotiating PQC for DNSSEC by Shrishak, Kris, Shulman, Haya

    “…Domain Name System Security Extensions (DNSSEC) provides authentication and integrity to Domain Name System (DNS) through the use of digital signatures based…”
    Get full text
    Conference Proceeding
  5. 5

    Machine Learning Analysis of IP ID Applications by Shulman, Haya, Zhao, Shujie

    “…The IP identifier (IP ID) in the IP header has become enormously popular as a side channel leaking valuable information on destinations. In the recent decades,…”
    Get full text
    Conference Proceeding
  6. 6

    Privacy Preserving and Resilient RPKI by Shrishak, Kris, Shulman, Haya

    “…Resource Public Key Infrastructure (RPKI) is vital to the security of inter-domain routing. However, RPKI enables Regional Internet Registries (RIRs) to…”
    Get full text
    Conference Proceeding
  7. 7

    Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End? by Herzberg, Amir, Shulman, Haya

    Published in IEEE internet computing (01-01-2015)
    “…To ensure the best security and efficiency, cryptographic protocols such as Transport Layer Security and IPsec should let parties negotiate the use of the…”
    Get full text
    Journal Article
  8. 8

    The Impact of DNS Insecurity on Time by Jeitner, Philipp, Shulman, Haya, Waidner, Michael

    “…We demonstrate the first practical off-path time shifting attacks against NTP as well as against Man-in-the-Middle (MitM) secure Chronos-enhanced NTP. Our…”
    Get full text
    Conference Proceeding
  9. 9

    MPC for Securing Internet Infrastructure by Shrishak, Kris, Shulman, Haya

    “…Secure multiparty computation (MPC) allows multiple entities to perform joint computation over their private inputs, revealing only the output. Although it was…”
    Get full text
    Conference Proceeding
  10. 10

    Internet-wide study of DNS cache injections by Klein, Amit, Shulman, Haya, Waidner, Michael

    “…DNS caches are an extremely important tool, providing services for DNS as well as for a multitude of applications, systems and security mechanisms, such as…”
    Get full text
    Conference Proceeding
  11. 11

    DNSSEC: Security and availability challenges by Herzberg, Amir, Shulman, Haya

    “…DNSSEC was proposed more than 15 years ago but its (correct) adoption is still very limited. Recent cache poisoning attacks motivate deployment of DNSSEC. In…”
    Get full text
    Conference Proceeding
  12. 12

    Secure Consensus Generation with Distributed DoH by Jeitner, Philipp, Shulman, Haya, Waidner, Michael

    “…Many applications and protocols depend on the ability to generate a pool of servers to conduct majority-based consensus mechanisms and often this is done by…”
    Get full text
    Conference Proceeding
  13. 13

    Poster: Off-path VoIP Interception Attacks by Dai, Tianxiang, Shulman, Haya, Waidner, Michael

    “…The proliferation of Voice-over-IP (VoIP) technologies make them a lucrative target of attacks. While many attack vectors have been uncovered, one critical…”
    Get full text
    Conference Proceeding
  14. 14

    Poster: Fragmentation Attacks on DNS over TCP by Dai, Tianxiang, Shulman, Haya, Waidner, Michael

    “…The research and operational community believe that TCP provides protection against IP fragmentation based attacks and recommend that servers avoid sending…”
    Get full text
    Conference Proceeding
  15. 15

    Pitfalls of Provably Secure Systems in Internet the Case of Chronos-NTP by Jeitner, Philipp, Shulman, Haya, Waidner, Michael

    “…The critical role that Network Time Protocol (NTP) plays in the Internet led to multiple efforts to secure it against time-shifting attacks. A recent proposal…”
    Get full text
    Conference Proceeding
  16. 16

    Practical Experience: Methodologies for Measuring Route Origin Validation by Hlavacek, Tomas, Herzberg, Amir, Shulman, Haya, Waidner, Michael

    “…Performing Route Origin Validation (ROV) to filter BGP announcements, which contradict Route Origin Authorizations (ROAs) is critical for protection against…”
    Get full text
    Conference Proceeding
  17. 17

    Towards Forensic Analysis of Attacks with DNSSEC by Shulman, Haya, Waidner, Michael

    Published in 2014 IEEE Security and Privacy Workshops (01-05-2014)
    “…DNS cache poisoning is a stepping stone towards advanced (cyber) attacks, and can be used to monitor users' activities, for censorship, to distribute malware…”
    Get full text
    Conference Proceeding
  18. 18

    Counting in the Dark: DNS Caches Discovery and Enumeration in the Internet by Klein, Amit, Shulman, Haya, Waidner, Michael

    “…Domain Name System (DNS) is a fundamental element of the Internet providing lookup services for end users as well as for a multitude of applications, systems…”
    Get full text
    Conference Proceeding
  19. 19

    The Master and Parasite Attack by Baumann, Lukas, Heftrig, Elias, Shulman, Haya, Waidner, Michael

    “…We explore a new type of malicious script attacks: the persistent parasite attack. Persistent parasites are stealthy scripts, which persist for a long time in…”
    Get full text
    Conference Proceeding
  20. 20

    Diving into Email Bomb Attack by Schneider, Markus, Shulman, Haya, Sidis, Adi, Sidis, Ravid, Waidner, Michael

    “…We explore Email Bomb - a particularly devastating type of Denial of Service (DOS) attack that recently gained traction. During the attack Email account of a…”
    Get full text
    Conference Proceeding