Johanna Amann

Affiliations:
  • International Computer Science Institute, Berkeley, CA, USA
  • Technical University of Munich, Germany (PhD 2011)


According to our database1, Johanna Amann authored at least 29 papers between 2008 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

2020
Tracking the deployment of TLS 1.3 on the web: a story of experimentation and centralization.
Comput. Commun. Rev., 2020

A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web.
Proceedings of the 4th Network Traffic Measurement and Analysis Conference, 2020

The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
The Era of TLS 1.3: Measuring Deployment and Use with Active and Passive Methods.
CoRR, 2019

2018
The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem.
Proceedings of the Internet Measurement Conference 2018, 2018

Coming of Age: A Longitudinal Study of TLS Deployment.
Proceedings of the Internet Measurement Conference 2018, 2018

Measuring Adoption of Security Additions to the HTTPS Ecosystem.
Proceedings of the Applied Networking Research Workshop, 2018

2017
Mission accomplished?: HTTPS security after diginotar.
Proceedings of the 2017 Internet Measurement Conference, 2017

Studying TLS Usage in Android Apps.
Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, 2017

Viable Protection of High-Performance Networks through Hardware/Software Co-Design.
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017

2016
Specification Mining for Intrusion Detection in Networked Control Systems.
Proceedings of the 25th USENIX Security Symposium, 2016

Measuring the Latency and Pervasiveness of TLS Certificate Revocation.
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016

Exploring Tor's Activity Through Long-Term Passive TLS Traffic Measurement.
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016

TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Towards a Complete View of the Certificate Ecosystem.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Spicy: a unified deep packet inspection framework for safely dissecting all your data.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
To Trust, or not to Trust, that is the Question: Structural Properties of X.509 Certificates.
Tiny Trans. Comput. Sci., 2015

Providing Dynamic Control to Passive Network Security Monitoring.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

2014
Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

The Matter of Heartbleed.
Proceedings of the 2014 Internet Measurement Conference, 2014

A Tangled Mass: The Android Root Certificate Stores.
Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014

2013
Here's my cert, so trust me, maybe?: understanding TLS errors on the web.
Proceedings of the 22nd International World Wide Web Conference, 2013

No attack necessary: the surprising dynamics of SSL trust relationships.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

2011
Redundancy and access permissions in decentralized file systems.
PhD thesis, 2011

2010
A Quantitative Analysis of Redundancy Schemes for Peer-to-Peer Storage Systems.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2010

Cryptographically Enforced Permissions for Fully Decentralized File Systems.
Proceedings of the IEEE Tenth International Conference on Peer-to-Peer Computing, 2010

2008
IgorFs: A Distributed P2P File System.
Proceedings of the Proceedings P2P'08, 2008


  Loading...