Haya Shulman

Affiliations:
  • National Research Center for Applied Cybersecurity ATHENE, Germany
  • Goethe Universität Frankfurt, Germany
  • Fraunhofer-Institut für sichere Informationstechnologie SIT, Germany


According to our database1, Haya Shulman authored at least 96 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
XDRI Attacks - and - How to Enhance Resilience of Residential Routers.
CoRR, 2022

Stalloris: RPKI Downgrade Attack.
CoRR, 2022

How (Not) to Deploy Cryptography on the Internet.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2021
Privacy Preserving and Resilient RPKI.
IACR Cryptol. ePrint Arch., 2021

Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS.
Proceedings of the 30th USENIX Security Symposium, 2021

The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources.
Proceedings of the 30th USENIX Security Symposium, 2021

From IP to transport and beyond: cross-layer attacks against applications.
Proceedings of the ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021., 2021

PrivInferVis: Towards Enhancing Transparency over Attribute Inference in Online Social Networks.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

SSLChecker.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Not All Conflicts Are Created Equal: Automated Error Resolution in RPKI Deployments.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Optimized BGP Simulator for Evaluation of Internet Hijacks.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Privacy Policies of Mobile Apps - A Usability Study.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Poster: WallGuard - A Deep Learning Approach for Avoiding Regrettable Posts in Social Media.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Poster: Fragmentation Attacks on DNS over TCP.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Poster: Off-path VoIP Interception Attacks.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Machine Learning Analysis of IP ID Applications.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Negotiating PQC for DNSSEC.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

The Master and Parasite Attack.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Let's Downgrade Let's Encrypt.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Evaluating Resilience of Domains in PKI.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

DNS-over-TCP considered vulnerable.
Proceedings of the ANRW '21: Applied Networking Research Workshop, 2021

SMap: Internet-wide Scanning for Spoofing.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
SMap: Internet-wide Scanning for Ingress Filtering.
CoRR, 2020

DISCO: Sidestepping RPKI's Deployment Barriers.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Optimal Transport Layer for Secure Computation.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Blocking Email Bombs with EmailGlass.
Proceedings of the IEEE Global Communications Conference, 2020

Cryptanalysis of FNV-Based Cookies.
Proceedings of the IEEE Global Communications Conference, 2020

MPC for Securing Internet Infrastructure.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

Diving into Email Bomb Attack.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Pitfalls of Provably Secure Systems in Internet the Case of Chronos-NTP.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

Secure Consensus Generation with Distributed DoH.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

The Impact of DNS Insecurity on Time.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Performance penalties of resilient SDN infrastructures.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

Black-box caches fingerprinting.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

Limiting the Power of RPKI Authorities.
Proceedings of the ANRW '20: Applied Networking Research Workshop, 2020

2019
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.
IACR Cryptol. ePrint Arch., 2019

Optimizing Transport Layer for Secure Computation.
IACR Cryptol. ePrint Arch., 2019

Distributed Domain Validation (DDV).
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019

Transputation: Transport Framework for Secure Computation.
Proceedings of the 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019, 2019

2018
Path MTU Discovery Considered Harmful.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security.
Proceedings of the 17th ACM Workshop on Hot Topics in Networks, 2018

Internet As a Source of Randomness.
Proceedings of the 17th ACM Workshop on Hot Topics in Networks, 2018

Practical Experience: Methodologies for Measuring Route Origin Validation.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Removing the Bottleneck for Practical 2PC.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Off-Path Attacks Against PKI.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Domain Validation++ For MitM-Resilient PKI.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Authentication-Bypass Vulnerabilities in SOHO Routers.
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet.
Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, 2017

Internet-wide study of DNS cache injections.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Towards Enhancing the Visual Analysis of Interdomain Routing.
Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017) - Volume 3: IVAPP, Porto, Portugal, February 27, 2017

Counting in the Dark: DNS Caches Discovery and Enumeration in the Internet.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

POSTER: X-Ray Your DNS.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Are We There Yet? On RPKI's Deployment and Security.
IACR Cryptol. ePrint Arch., 2016

Obfuscation Combiners.
IACR Cryptol. ePrint Arch., 2016

Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure.
Proceedings of the Traffic Monitoring and Analysis - 8th International Workshop, 2016

Towards Automated Measurements of Internet's Naming Infrastructure.
Proceedings of the 2016 IEEE International Conference on Software Science, 2016

NetCo: Reliable Routing With Unreliable Routers.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

Stratum Filtering: Cloud-based Detection of Attack Sources.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

DNSSEC Misconfigurations in Popular Domains.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
IEEE Internet Comput., 2015

Detection and Forensics of Domains Hijacking.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Towards Security of Internet Naming Infrastructure.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Ethical Considerations when Employing Fake Identities in Online Social Networks for Research.
Sci. Eng. Ethics, 2014

Retrofitting Security into Network Protocols: The Case of DNSSEC.
IEEE Internet Comput., 2014

Off-Path Hacking: The Illusion of Challenge-Response Authentication.
IEEE Secur. Priv., 2014

DNSSEC for cyber forensics.
EURASIP J. Inf. Secur., 2014

Pretty Bad Privacy: Pitfalls of DNS Encryption.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Towards Forensic Analysis of Attacks with DNSSEC.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

POSTER: On the Resilience of DNS Infrastructure.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Negotiating DNSSEC Algorithms over Legacy Proxies.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

Less is more: cipher-suite negotiation for DNSSEC.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

DNS authentication as a service: preventing amplification attacks.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

Fragmentation Considered Leaking: Port Inference for DNS Poisoning.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Oblivious and fair server-aided two-party computation.
Inf. Secur. Tech. Rep., 2013

Towards Adoption of DNSSEC: Availability and Security Challenges.
IACR Cryptol. ePrint Arch., 2013

Ethical Considerations when Employing Fake Identities in OSN for Research.
CoRR, 2013

Vulnerable Delegation of DNS Resolution.
Proceedings of the Computer Security - ESORICS 2013, 2013

DNSSEC: Security and availability challenges.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.org.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Provenance of exposure: Identifying sources of leaked documents.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Cloudoscopy: services discovery and topology mapping.
Proceedings of the CCSW'13, 2013

Socket overloading for fun and cache-poisoning.
Proceedings of the Annual Computer Security Applications Conference, 2013

DNSSEC: Interoperability Challenges and Transition Mechanisms.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

Limiting MitM to MitE Covert-Channels.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Unilateral Antidotes to DNS Cache Poisoning
CoRR, 2012

Fragmentation Considered Poisonous
CoRR, 2012

Security of Patched DNS.
Proceedings of the Computer Security - ESORICS 2012, 2012

Antidotes for DNS Poisoning by Off-Path Adversaries.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Unilateral Antidotes to DNS Poisoning.
Proceedings of the Security and Privacy in Communication Networks, 2011

2010
Secure Guaranteed Computation.
IACR Cryptol. ePrint Arch., 2010

Robust Combiner for Obfuscators.
IACR Cryptol. ePrint Arch., 2010

Stealth DoS Attacks on Secure Channels.
Proceedings of the Network and Distributed System Security Symposium, 2010

2009
Stealth-MITM DoS Attacks on Secure Channels
CoRR, 2009

2008
Towards a Theory of White-Box Security.
IACR Cryptol. ePrint Arch., 2008

Robust Combiners for Software Hardening.
IACR Cryptol. ePrint Arch., 2008


  Loading...