Adrian Perrig

Orcid: 0000-0002-5280-5412

Affiliations:
  • ETH Zürich, Switzerland


According to our database1, Adrian Perrig authored at least 307 papers between 1997 and 2024.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2016, "For contributions in protocols for network and system security".

IEEE Fellow

IEEE Fellow 2022, "for contributions to network and system security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Quality Competition Among Internet Service Providers.
SIGMETRICS Perform. Evaluation Rev., February, 2024

Charting Censorship Resilience & Global Internet Reachability: A Quantitative Approach.
CoRR, 2024

2023
Inter-Domain Routing with Extensible Criteria.
CoRR, 2023

Hummingbird: A Flexible and Lightweight Inter-Domain Bandwidth-Reservation System.
CoRR, 2023

Quality Competition Among Internet Service Providers in a Path-Aware Internet.
CoRR, 2023

Hey Kimya, Is My Smart Speaker Spying on Me? Taking Control of Sensor Privacy Through Isolation and Amnesia.
Proceedings of the 32nd USENIX Security Symposium, 2023

Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool's Monitoring System.
Proceedings of the 32nd USENIX Security Symposium, 2023

FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks.
Proceedings of the 32nd USENIX Security Symposium, 2023

SAGE: Software-based Attestation for GPU Execution.
Proceedings of the 2023 USENIX Annual Technical Conference, 2023

ALBUS: a Probabilistic Monitoring Algorithm to Counter Burst-Flood Attacks.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023

Determining an Economic Value of High Assurance for Commodity Software Security (Transcript of Discussion).
Proceedings of the Security Protocols XXVIII, 2023

Trusted Introductions for Secure Messaging.
Proceedings of the Security Protocols XXVIII, 2023

Determining an Economic Value of High Assurance for Commodity Software Security.
Proceedings of the Security Protocols XXVIII, 2023

A Formal Framework for End-to-End DNS Resolution.
Proceedings of the ACM SIGCOMM 2023 Conference, 2023

Qualitative Intention-aware Attribute-based Access Control Policy Refinement.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

RHINE: Robust and High-performance Internet Naming with E2E Authenticity.
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023

DMTP: Deadline-aware Multipath Transport Protocol.
Proceedings of the IFIP Networking Conference, 2023

Hercules: High-Speed Bulk-Transfer over SCION.
Proceedings of the IFIP Networking Conference, 2023

Demystifying Web3 Centralization: The Case of Off-Chain NFT Hijacking.
Proceedings of the Financial Cryptography and Data Security, 2023

Carbon-Aware Global Routing in Path-Aware Networks.
Proceedings of the 14th ACM International Conference on Future Energy Systems, 2023

2022
The Complete Guide to SCION - From Design Principles to Formal Verification
Information Security and Cryptography, Springer, ISBN: 978-3-031-05288-0, 2022

Ubiquitous Secure Communication in a Future Internet Architecture.
SN Comput. Sci., 2022

An Axiomatic Perspective on the Performance Effects of End-Host Path Selection.
SIGMETRICS Perform. Evaluation Rev., 2022

Bayesian Sketches for Volume Estimation in Data Streams.
Proc. VLDB Endow., 2022

Carbon Footprints on Inter-Domain Paths: Uncovering CO2 Tracks on Global Networks.
CoRR, 2022

Tango or Square Dance? How Tightly Should we Integrate Network Functionality in Browsers?
CoRR, 2022

QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework.
Proceedings of the 31st USENIX Security Symposium, 2022

Creating a Secure Underlay for the Internet.
Proceedings of the 31st USENIX Security Symposium, 2022

G-SINC: Global Synchronization Infrastructure for Network Clocks.
Proceedings of the 41st International Symposium on Reliable Distributed Systems, 2022

Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

DoCile: Taming Denial-of-Capability Attacks in Inter-Domain Communications.
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022

Data-Plane Energy Efficiency of a Next-Generation Internet Architecture.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Model-based insights on the performance, fairness, and stability of BBR.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Consent Routing: Towards Bilaterally Trusted Communication Paths.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Tango or square dance?: how tightly should we integrate network functionality in browsers?
Proceedings of the 21st ACM Workshop on Hot Topics in Networks, 2022

N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet Architectures.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

Protecting Critical Inter-Domain Communication through Flyover Reservations.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

NeVerMore: Exploiting RDMA Mistakes in NVMe-oF Storage Applications.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Hopper: Per-Device Nano Segmentation for the Industrial IoT.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Website Fingerprinting in the Age of QUIC.
Proc. Priv. Enhancing Technol., 2021

ReDMArk: Bypassing RDMA Security Mechanisms.
Proceedings of the 30th USENIX Security Symposium, 2021

ICARUS: Attacking low Earth orbit satellite networks.
Proceedings of the 2021 USENIX Annual Technical Conference, 2021

Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

GMA: A Pareto Optimal Distributed Resource-Allocation Algorithm.
Proceedings of the Structural Information and Communication Complexity, 2021

Global Distributed Secure Mapping of Network Addresses.
Proceedings of the TAURIN'21: Proceedings of the ACM SIGCOMM 2021 Workshop on Technologies, 2021

Linc: low-cost inter-domain connectivity for industrial systems.
Proceedings of the SIGCOMM '21: ACM SIGCOMM 2021 Conference, 2021

Mondrian: Comprehensive Inter-domain Network Zoning Architecture.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Secure and Scalable QoS for Critical Applications.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

New Directions for High-throughput and High-security Communication.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Pervasive Internet-Wide Low-Latency Authentication.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

Speed Records in Network Flow Measurement on FPGA.
Proceedings of the 31st International Conference on Field-Programmable Logic and Applications, 2021

Enabling Novel Interconnection Agreements with Path-Aware Networking Architectures.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Tableau: Future-Proof Zoning for OT Networks.
Proceedings of the Critical Information Infrastructures Security, 2021

Deployment and scalability of an inter-domain multi-path routing infrastructure.
Proceedings of the CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7, 2021

Colibri: a cooperative lightweight inter-domain bandwidth-reservation infrastructure.
Proceedings of the CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7, 2021

2020
Incentivizing Stable Path Selection in Future Internet Architectures.
SIGMETRICS Perform. Evaluation Rev., 2020

Internet backbones in space.
Comput. Commun. Rev., 2020

EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet.
Proceedings of the 29th USENIX Security Symposium, 2020

sRDMA - Efficient NIC-based Authentication and Encryption for Remote Direct Memory Access.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020

A Formally Verified Protocol for Log Replication with Byzantine Fault Tolerance.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

The Value of Information in Selfish Routing.
Proceedings of the Structural Information and Communication Complexity, 2020

SVLAN: Secure & Scalable Network Virtualization.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

SCIONLAB: A Next-Generation Internet Testbed.
Proceedings of the 28th IEEE International Conference on Network Protocols, 2020

SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

PISKES: Pragmatic Internet-Scale Key-Establishment System.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Global Communication Guarantees in the Presence of Adversaries.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Network Transparency for Better Internet Security.
IEEE/ACM Trans. Netw., 2019

Retroactive Packet Sampling for Traffic Receipts.
Proc. ACM Meas. Anal. Comput. Syst., 2019

Proxy Certificates: The Missing Link in the Web's Chain of Trust.
CoRR, 2019

Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come.
Proceedings of the Security Protocols XXVII, 2019

Liam: An Architectural Framework for Decentralized IoT Networks.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2019

2018
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure.
IEEE Trans. Dependable Secur. Comput., 2018

Adding Path Awareness to the Internet Architecture.
IEEE Internet Comput., 2018

Secure Routing for the Internet (Dagstuhl Seminar 18242).
Dagstuhl Reports, 2018

CLEF: Limiting the Damage Caused by Large Flows in the Internet Core (Technical Report).
CoRR, 2018

Bootstrapping privacy services in today's internet.
Comput. Commun. Rev., 2018

BlockPKI: An Automated, Resilient, and Transparent Public-Key Infrastructure.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

Networking in Heaven as on Earth.
Proceedings of the 17th ACM Workshop on Hot Topics in Networks, 2018

TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Alcatraz: Data Exfiltration-Resilient Corporate Network Architecture.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

Towards Sustainable Evolution for the TLS Public-Key Infrastructure.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

CLEF: Limiting the Damage Caused by Large Flows in the Internet Core.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2017
SCION: A Secure Internet Architecture
Information Security and Cryptography, Springer, ISBN: 978-3-319-67079-9, 2017

Authentication Challenges in a Global Environment.
ACM Trans. Priv. Secur., 2017

PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer.
Proc. Priv. Enhancing Technol., 2017

Toward a Taxonomy and Attacker Model for Secure Routing Protocols.
Comput. Commun. Rev., 2017

The SCION internet architecture.
Commun. ACM, 2017

Short Paper: On Deployment of DNS-Based Security Enhancements.
Proceedings of the Financial Cryptography and Data Security, 2017

Internet Kill Switches Demystified.
Proceedings of the 10th European Workshop on Systems Security, 2017

Deadline-Aware Multipath Communication: An Optimization Problem.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

The Case for In-Network Replay Suppression.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

A Paged Domain Name System for Query Privacy.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
Coordination of anti-spoofing mechanisms in partial deployments.
J. Commun. Networks, 2016

Tumbler: Adaptable link access in the bots-infested Internet.
Comput. Networks, 2016

PsyBoG: A scalable botnet detection method for large-scale DNS traffic.
Comput. Networks, 2016

High-Speed Inter-Domain Fault Localization.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Control-plane isolation and recovery for a secure SDN architecture.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016

SIBRA: Scalable Internet Bandwidth Reservation Architecture.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Communication based on per-packet One-Time Addresses.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

RITM: Revocation in the Middle.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

SDNsec: Forwarding Accountability for the SDN Data Plane.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Source Accountability with Domain-brokered Privacy.
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016

Modeling Data-Plane Power Consumption of Future Internet Architectures.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

DEMO: Easy Deployment of a Secure Internet Architecture for the 21st Century: How hard can it be to build a secure Internet?
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

CICADAS: Congesting the Internet with Coordinated and Decentralized Pulsating Attacks.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

On the implementation of path-based dynamic pricing in edge-directed routing.
Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), 2016

CASTLE: CA signing in a touch-less environment.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Secure Routing for Future Communication Networks (Dagstuhl Seminar 15102).
Dagstuhl Reports, 2015

Designing a Global Authentication Infrastructure.
CoRR, 2015

Bootstrapping Real-world Deployment of Future Internet Architectures.
CoRR, 2015

SCION Five Years Later: Revisiting Scalability, Control, and Isolation on Next-Generation Networks.
CoRR, 2015

An incrementally deployable anti-spoofing mechanism for software-defined networks.
Comput. Commun., 2015

Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Forwarding Accountability: A Challenging Necessity of the Future Data Plane.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2015

On Building Onion Routing into Future Internet Architectures.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2015

FAIR: Forwarding Accountability for Internet Reputability.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

ECO-DNS: Expected Consistency Optimization for DNS.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Transparency Instead of Neutrality.
Proceedings of the 14th ACM Workshop on Hot Topics in Networks, Philadelphia, PA, USA, November 16, 2015

Deployment challenges in log-based PKI enhancements.
Proceedings of the Eighth European Workshop on System Security, 2015

Efficient gossip protocols for verifying the consistency of Certificate logs.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Source-Based Path Selection: The Data Plane Perspective.
Proceedings of the 10th International Conference on Future Internet, 2015

Lightweight Protection of Group Content Distribution.
Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, 2015

HORNET: High-speed Onion Routing at the Network Layer.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
DFL: Secure and Practical Fault Localization for Datacenter Networks.
IEEE/ACM Trans. Netw., 2014

XIA: architecting a more trustworthy and evolvable internet.
Comput. Commun. Rev., 2014

Accountability in future internet architectures.
Commun. ACM, 2014

Short paper: MVSec: secure and easy-to-use pairing of mobile devices with vehicles.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

MiniBox: A Two-Way Sandbox for x86 Native Code.
Proceedings of the 2014 USENIX Annual Technical Conference, 2014

Fleet: defending SDNs from malicious administrators.
Proceedings of the third workshop on Hot topics in software defined networking, 2014

Lightweight source authentication and path validation.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

PsyBoG: Power spectral density analysis for detecting botnet groups.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

Mechanized Network Origin and Path Authenticity Proofs.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

PoliCert: Secure and Flexible TLS Certificate Management.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Exciting Security Research Opportunity: Next-generation Internet.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

ARPKI: Attack Resilient Public-Key Infrastructure.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks.
Comput. Secur., 2013

Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure.
Proceedings of the 22nd International World Wide Web Conference, 2013

Towards verifiable resource accounting for outsourced computation.
Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (co-located with ASPLOS 2013), 2013

KISS: "Key It Simple and Secure" Corporate Key Management.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets.
Proceedings of the Security Protocols XXI, 2013

SafeSlinger: easy-to-use and secure public-key exchange.
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

UAS: Universal anti-spoofing by incorporating existing mechanisms.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication.
Proceedings of the Financial Cryptography and Data Security, 2013

Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference.
Proceedings of the Financial Cryptography and Data Security, 2013

OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

STRIDE: sanctuary trail - refuge from internet DDoS entrapment.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Jamming-Resilient Multipath Routing.
IEEE Trans. Dependable Secur. Comput., 2012

Cyber-Physical Security of a Smart Grid Infrastructure.
Proc. IEEE, 2012

Mobile encryption for laptop data protection (MELP).
IET Inf. Secur., 2012

ACCessory: password inference using accelerometers on smartphones.
Proceedings of the 2012 Workshop on Mobile Computing Systems and Applications, 2012

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

Street-Level Trust Semantics for Attribute Authentication.
Proceedings of the Security Protocols XX, 2012

Secure and Scalable Fault Localization under Dynamic Traffic Patterns.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

LAP: Lightweight Anonymity and Privacy.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

ShortMAC: Efficient Data-Plane Fault Localization.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

GeoPKI: Converting Spatial Trust into Certificate Trust.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012

ACComplice: Location inference using accelerometers on smartphones.
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012

CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

OTO: online trust oracle for user-centric trust establishment.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Bootstrapping Trust in Modern Computers.
Springer Briefs in Computer Science 10, Springer, ISBN: 978-1-4614-1460-5, 2011

Access right assignment mechanisms for secure home networks.
J. Commun. Networks, 2011

Secure Distributed Data Aggregation.
Found. Trends Databases, 2011

SAKE: Software attestation for key establishment in sensor networks.
Ad Hoc Networks, 2011

Short paper: Jamming-resilient multipath routing leveraging availability-based correlation.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Efficient and secure threshold-based event validation for VANETs.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

SCION: Scalability, Control, and Isolation on Next-Generation Networks.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Flooding-resilient broadcast authentication for VANETs.
Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, 2011

PFS: Probabilistic filter scheduling against distributed denial-of-service attacks.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Network fault localization with small TCB.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

A Picture is Worth a Thousand Words: Improving Usability and Robustness of Online Recommendation Systems.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

VIPER: verifying the integrity of PERipherals' firmware.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
SPATE: Small-Group PKI-Less Authenticated Trust Establishment.
IEEE Trans. Mob. Comput., 2010

Mobile user location-specific encryption (MULE): using your office as your password.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Challenges in Access Right Assignment for Secure Home Networks.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

SBAP: Software-Based Attestation for Peripherals.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Bootstrapping Trust in Commodity Computers.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

TrustVisor: Efficient TCB Reduction and Attestation.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

VANET alert endorsement using multi-source filters.
Proceedings of the Seventh International Workshop on Vehicular Ad Hoc Networks, 2010

Remote Attestation for HDD Files Using Kernel Protection Mechanism.
Proceedings of IEEE International Conference on Communications, 2010

Correlation-Resilient Path Selection in Multi-Path Routing.
Proceedings of the Global Communications Conference, 2010

Dependable connection setup for network capabilities.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

CRAFT: a new secure congestion control architecture.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

LSM-Based Secure System Monitoring Using Kernel Protection Schemes.
Proceedings of the ARES 2010, 2010

2009
SEAR: a secure efficient <i>ad hoc</i> on demand routing protocol for wireless networks.
Secur. Commun. Networks, 2009

Flexible, extensible, and efficient VANET authentication.
J. Commun. Networks, 2009

Secure wireless networking.
J. Commun. Networks, 2009

Seeing-Is-Believing: using camera phones for human-verifiable authentication.
Int. J. Secur. Networks, 2009

Designing user studies for security applications: a case study with wireless network configuration.
Int. J. Secur. Networks, 2009

Brief Encounters with a Random Key Graph.
Proceedings of the Security Protocols XVII, 2009

CLAMP: Practical Prevention of Large-Scale Data Leaks.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Safe Passage for Passwords and Other Sensitive Data.
Proceedings of the Network and Distributed System Security Symposium, 2009

SPATE: small-group PKI-less authenticated trust establishment.
Proceedings of the 7th International Conference on Mobile Systems, 2009

Securing VANETs: industry approaches and current research directions.
Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, 2009

Centaur: A Hybrid Approach for Reliable Policy-Based Routing.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

The Coremelt Attack.
Proceedings of the Computer Security, 2009

Building Secure Networked Systems with Code Attestation.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

Privacy-Preserving Relationship Path Discovery in Social Networks.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

A Trustable Reputation Scheme Based on Private Relationships.
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009

A Study of User-Friendly Hash Comparison Schemes.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Towards Sound Detection of Virtual Machines.
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008

Securing user-controlled routing infrastructures.
IEEE/ACM Trans. Netw., 2008

Mind your manners: socially appropriate wireless key establishment for groups.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Combining TLS and TPMs to Achieve Device and User Authentication for Wi-Fi and WiMAX Citywide Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

<i>Perspectives: </i> Improving SSH-style Host Authentication with Multi-Path Probing.
Proceedings of the 2008 USENIX Annual Technical Conference, 2008

Use Your Illusion: secure authentication usable anywhere.
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008

Multi-Layer Encryption for Multi-Level Access Control in Wireless Sensor Networks.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

GAnGS: gather, authenticate 'n group securely.
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008

Secure wireless communications: Secret keys through multipath.
Proceedings of the IEEE International Conference on Acoustics, 2008

Countermeasures against Government-Scale Monetary Forgery.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Flicker: an execution infrastructure for tcb minimization.
Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, 2008

Packet-dropping adversary identification for data plane security.
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008

SNAPP: stateless network-authenticated path pinning.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Efficient security primitives derived from a secure aggregation algorithm.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

How low can you go?: recommendations for hardware-supported minimal TCB code execution.
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008

2007
Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems.
Proceedings of the Malware Detection, 2007

Rapid Trust Establishment for Pervasive Personal Computing.
IEEE Pervasive Comput., 2007

SIA: Secure information aggregation in sensor networks.
J. Comput. Secur., 2007

Pervasive Personal Computing in an Internet Suspend/Resume System.
IEEE Internet Comput., 2007

Turtles All the Way Down: Research Challenges in User-Based Attestation.
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007

Multi-Dimensional Range Query over Encrypted Data.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Minimal TCB Code Execution.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes.
Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, 2007

Portcullis: protecting connection setup from denial-of-capability attacks.
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007

Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes.
Proceedings of the 5th International Conference on Embedded Networked Sensor Systems, 2007

Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

VANET-based approach for parking space availability.
Proceedings of the Fourth International Workshop on Vehicular Ad Hoc Networks, 2007

MiniSec: a secure sensor network communication architecture.
Proceedings of the 6th International Conference on Information Processing in Sensor Networks, 2007

Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup.
Proceedings of the Financial Cryptography and Data Security, 2007

BASE: an incrementally deployable mechanism for viable IP spoofing prevention.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

An inquiry into the nature and causes of the wealth of internet miscreants.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Intrusion Detection for Encrypted Web Accesses.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense.
IEEE J. Sel. Areas Commun., 2006

Wormhole attacks in wireless networks.
IEEE J. Sel. Areas Commun., 2006

Designing an evaluation method for security user interfaces: lessons from studying secure wireless network configuration.
Interactions, 2006

Externally verifiable code execution.
Commun. ACM, 2006

SCUBA: Secure Code Update By Attestation in sensor networks.
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006

Bump in the Ether: A Framework for Securing Sensitive User Input.
Proceedings of the 2006 USENIX Annual Technical Conference, Boston, MA, USA, May 30, 2006

Modeling adoptability of secure BGP protocols.
Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, 2006

Modeling adoptability of secure BGP protocol.
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006

A Distributed Stealthy Coordination Mechanism for Worm Synchronization.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Seven cardinal properties of sensor network broadcast authentication.
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006

Security in sensor networks: industry trends, present and future research directions.
Proceedings of the Fifth International Conference on Information Processing in Sensor Networks, 2006

(R)Evolutionary Bootstrapping of a Global PKI for Securing BGP.
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006

Phoolproof Phishing Prevention.
Proceedings of the Financial Cryptography and Data Security, 2006

Secure sensor network routing: a clean-slate approach.
Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology, 2006

Secure hierarchical in-network aggregation in sensor networks.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction.
RFC, June, 2005

Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks.
Wirel. Networks, 2005

On the Distribution and Revocation of Cryptographic Keys in Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2005

BIND: A Fine-Grained Attestation Service for Secure Distributed Systems.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Distributed Detection of Node Replication Attacks in Sensor Networks.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Detection of Denial-of-Message Attacks on Sensor Network Broadcasts.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems.
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, 2005

FIT: fast Internet traceback.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

PIKE: peer intermediaries for key establishment in sensor networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Using Clustering Information for Sensor Network Localization.
Proceedings of the Distributed Computing in Sensor Systems, 2005

Efficient Constructions for One-Way Hash Chains.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
Designing secure sensor networks.
IEEE Wirel. Commun., 2004

Tree-based group key agreement.
ACM Trans. Inf. Syst. Secur., 2004

Group Key Agreement Efficient in Communication.
IEEE Trans. Computers, 2004

A Survey of Secure Wireless Ad Hoc Routing.
IEEE Secur. Priv., 2004

Taming IP packet flooding attacks.
Comput. Commun. Rev., 2004

Security in wireless sensor networks.
Commun. ACM, 2004

SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

SWATT: SoftWare-based ATTestation for Embedded Devices.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

SPV: secure path vector routing for securing BGP.
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004

Brief announcement: towards a secure indirection infrastructure.
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004

Distillation Codes and Applications to DoS Resistant Multicast Authentication.
Proceedings of the Network and Distributed System Security Symposium, 2004

The sybil attack in sensor networks: analysis & defenses.
Proceedings of the Third International Symposium on Information Processing in Sensor Networks, 2004

Key Infection: Smart Trust for Smart Dust.
Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), 2004

ACE: An Emergent Algorithm for Highly Uniform Cluster Formation.
Proceedings of the Wireless Sensor Networks, First European Workshop, 2004

2003
Security and Privacy in Sensor Networks.
Computer, 2003

SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks.
Ad Hoc Networks, 2003

Rushing attacks and defense in wireless ad hoc network routing protocols.
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003

Opportunistic Use of Content Addressable Storage for Distributed File Systems.
Proceedings of the General Track: 2003 USENIX Annual Technical Conference, 2003

Pi: A Path Identification Mechanism to Defend against DDoS Attack.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

Random Key Predistribution Schemes for Sensor Networks.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

SIA: secure information aggregation in sensor networks.
Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003

Efficient Security Mechanisms for Routing Protocolsa.
Proceedings of the Network and Distributed System Security Symposium, 2003

Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

Secure broadcast communication in wired and wireless networks.
Springer, ISBN: 978-0-7923-7650-7, 2003

2002
SPINS: Security Protocols for Sensor Networks.
Wirel. Networks, 2002

2001
Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis.
J. Comput. Secur., 2001

ELK, A New Protocol for Efficient Large-Group Key Distribution.
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001

Communication-Efficient Group Key Agreement.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Efficient and Secure Source Authentication for Multicast.
Proceedings of the Network and Distributed System Security Symposium, 2001

SPINS: security protocols for sensor netowrks.
Proceedings of the MOBICOM 2001, 2001

SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

Advanced and Authenticated Marking Schemes for IP Traceback.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

The BiBa one-time signature and broadcast authentication protocol.
Proceedings of the CCS 2001, 2001

AGVI - Automatic Generation, Verification, and Implementation of Security Protocols.
Proceedings of the Computer Aided Verification, 13th International Conference, 2001

2000
Deja Vu-A User Study: Using Images for Authentication.
Proceedings of the 9th USENIX Security Symposium, 2000

Practical Techniques for Searches on Encrypted Data.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

Efficient Authentication and Signing of Multicast Streams over Lossy Channels.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

A First Step Towards the Automatic Generation of Security Protocols.
Proceedings of the Network and Distributed System Security Symposium, 2000

Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

Simple and fault-tolerant key agreement for dynamic collaborative groups.
Proceedings of the CCS 2000, 2000

1997
A Copyright Protection Environment for Digital Images.
Proceedings of the Verläßliche IT-Systeme - Zwischen Key Escrow und elektronischem Geld, 1997


  Loading...