Fragmentation considered poisonous, or: One-domain-to-rule-them-all. org A Herzberg, H Shulman 2013 IEEE Conference on Communications and Network Security (CNS), 224-232, 2013 | 178 | 2013 |
Are we there yet? On RPKI's deployment and security Y Gilad, A Cohen, A Herzberg, M Schapira, H Shulman Cryptology ePrint Archive, 2016 | 128 | 2016 |
Security of patched DNS A Herzberg, H Shulman Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 101 | 2012 |
Domain validation++ for mitm-resilient pki M Brandt, T Dai, A Klein, H Shulman, M Waidner Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 89* | 2018 |
Securing DNSSEC keys via threshold ECDSA from generic MPC A Dalskov, C Orlandi, M Keller, K Shrishak, H Shulman Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 88 | 2020 |
Ethical considerations when employing fake identities in online social networks for research Y Elovici, M Fire, A Herzberg, H Shulman Science and engineering ethics 20, 1027-1043, 2014 | 73 | 2014 |
Pretty bad privacy: Pitfalls of DNS encryption H Shulman Proceedings of the 13th Workshop on Privacy in the Electronic Society, 191-200, 2014 | 73 | 2014 |
Internet-wide study of DNS cache injections A Klein, H Shulman, M Waidner IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | 68 | 2017 |
One key to sign them all considered vulnerable: Evaluation of {DNSSEC} in the internet H Shulman, M Waidner 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2017 | 56* | 2017 |
Socket overloading for fun and cache-poisoning A Herzberg, H Shulman Proceedings of the 29th Annual Computer Security Applications Conference …, 2013 | 50 | 2013 |
Vulnerable delegation of DNS resolution A Herzberg, H Shulman Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 49 | 2013 |
DNSSEC: Security and availability challenges A Herzberg, H Shulman 2013 IEEE Conference on Communications and Network Security (CNS), 365-366, 2013 | 45 | 2013 |
DISCO: Sidestepping RPKI's deployment barriers T Hlavacek, I Cunha, Y Gilad, A Herzberg, E Katz-Bassett, M Schapira, ... Network and Distributed System Security Symposium (NDSS), 2020 | 44 | 2020 |
Dnssec misconfigurations in popular domains T Dai, H Shulman, M Waidner Cryptology and Network Security: 15th International Conference, CANS 2016 …, 2016 | 44* | 2016 |
Off-path hacking: The illusion of challenge-response authentication Y Gilad, A Herzberg, H Shulman IEEE Security & Privacy 12 (5), 68-77, 2013 | 44 | 2013 |
Fragmentation considered leaking: port inference for dns poisoning H Shulman, M Waidner Applied Cryptography and Network Security: 12th International Conference …, 2014 | 43 | 2014 |
Practical experience: Methodologies for measuring route origin validation T Hlavacek, A Herzberg, H Shulman, M Waidner 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018 | 39 | 2018 |
Towards security of internet naming infrastructure H Shulman, M Waidner Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 39 | 2015 |
Injection Attacks Reloaded: Tunnelling Malicious Payloads over {DNS} P Jeitner, H Shulman 30th USENIX Security Symposium (USENIX Security 21), 3165-3182, 2021 | 38 | 2021 |
Towards adoption of dnssec: Availability and security challenges A Herzberg, H Shulman Cryptology ePrint Archive, 2013 | 36* | 2013 |