Max Schuchard

According to our database1, Max Schuchard authored at least 23 papers between 2010 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Flexsealing BGP Against Route Leaks: Peerlock Active Measurement and Analysis.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
Peerlock: Flexsealing BGP.
CoRR, 2020

PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems.
Proceedings of the 29th USENIX Security Symposium, 2020

The Maestro Attack: Orchestrating Malicious Flows with BGP.
Proceedings of the Security and Privacy in Communication Networks, 2020

Withdrawing the BGP Re-Routing Curtain: Understanding the Security Impact of BGP Poisoning through Real-World Measurements.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

An Evaluation of Caching in Nation Scale, Normally Isolated Mobile Ad Hoc Networks.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

2019
Measuring Irregular Geographic Exposure on the Internet.
CoRR, 2019

Blind Bernoulli Trials: A Noninteractive Protocol For Hidden-Weight Coin Flips.
Proceedings of the 28th USENIX Security Symposium, 2019

Nation Scale Mobile Ad Hoc Network for Normally Isolated Topologies.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

2018
An Internet-Scale Feasibility Study of BGP Poisoning as a Security Primitive.
CoRR, 2018

Routing Around Congestion: Defeating DDoS Attacks and Adverse Network Conditions via Reactive BGP Routing.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Not So Predictable Mining Pools: Attacking Solo Mining Pools by Bagging Blocks and Conning Competitors.
Proceedings of the Financial Cryptography and Data Security, 2018

2017
POSTER: Why Are You Going That Way? Measuring Unnecessary Exposure of Network Traffic to Nation States.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
E-Embargoes: Discouraging the Deployment of Traffic Manipulating Boxes With Economic Incentives.
CoRR, 2016

The Cost of the Path Not Taken.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2013
Peer Pressure: Exerting Malicious Influence on Routers at a Distance.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Cover your ACKs: pitfalls of covert channel censorship circumvention.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Routing around decoys.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Protecting access privacy of cached contents in information centric networks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2010
Balancing the shadows.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Losing control of the internet: using the data plane to attack the control plane.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Secure encounter-based social networks: requirements, challenges, and designs.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010


  Loading...