Ralph Holz

Orcid: 0000-0001-9614-2377

Affiliations:
  • University of Sydney, School of IT, NSW, Australia
  • TU Munich, Faculty of Computer Science, Germany


According to our database1, Ralph Holz authored at least 47 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Packed to the Brim: Investigating the Impact of Highly Responsive Prefixes on Internet-wide Measurement Campaigns.
PACMNET, 2023

Hazardous Echoes: The DNS Resolvers that Should Be Put on Mute.
Proceedings of the 7th Network Traffic Measurement and Analysis Conference, 2023

Quantifying Security Risks in Cloud Infrastructures: A Data-driven Approach.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023

DNS Dependencies as an Expression of the Digital Divide: The Example of Australia.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Towards Security Transparency of Autonomous Systems on the Internet.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2022
On the Asymmetry of Internet eXchange Points -Why Should IXPs and CDNs Care?
Proceedings of the 18th International Conference on Network and Service Management, 2022

2020
A Responsible Internet to Increase Trust in the Digital World.
J. Netw. Syst. Manag., 2020

An empirical study of availability and reliability properties of the Bitcoin Lightning Network.
CoRR, 2020

Update on ACM SIGCOMM CCR reviewing process: towards a more open review process.
Comput. Commun. Rev., 2020

Tracking the deployment of TLS 1.3 on the web: a story of experimentation and centralization.
Comput. Commun. Rev., 2020

<i>LoRadar</i>: LoRa sensor network monitoring through passive packet sniffing.
Comput. Commun. Rev., 2020

A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web.
Proceedings of the 4th Network Traffic Measurement and Analysis Conference, 2020

Triplet Mining-based Phishing Webpage Detection.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

On the Origin of Scanning: The Impact of Location on Internet-Wide Scans.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

2019
The Era of TLS 1.3: Measuring Deployment and Use with Active and Passive Methods.
CoRR, 2019

Open collaborative hyperpapers: a call to action.
Comput. Commun. Rev., 2019

2018
Vandal: A Scalable Security Analysis Framework for Smart Contracts.
CoRR, 2018

A First Look at Certification Authority Authorization (CAA).
Comput. Commun. Rev., 2018

In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements.
Proceedings of the Passive and Active Measurement - 19th International Conference, 2018

The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem.
Proceedings of the Internet Measurement Conference 2018, 2018

Measuring Adoption of Security Additions to the HTTPS Ecosystem.
Proceedings of the Applied Networking Research Workshop, 2018

2017
On Availability for Blockchain-Based Systems.
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017

Mission accomplished?: HTTPS security after diginotar.
Proceedings of the 2017 Internet Measurement Conference, 2017

Automated Analysis of Secure Internet of Things Protocols.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
HEAP: Reliable Assessment of BGP Hijacking Attacks.
IEEE J. Sel. Areas Commun., 2016

New kids on the block: an analysis of modern blockchains.
CoRR, 2016

TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Endpoint-Transparent Multipath Transport with Software-Defined Networks.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

2015
Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS).
RFC, May, 2015

Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS).
RFC, February, 2015

Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks.
Proceedings of the Traffic Monitoring and Analysis - 7th International Workshop, 2015

An Early Look at Multipath TCP Deployment in the Wild.
Proceedings of the 6th International Workshop on Hot Topics in Planet-Scale Measurement, 2015

Securing a Deployment Pipeline.
Proceedings of the 3rd IEEE/ACM International Workshop on Release Engineering, 2015

2014
Empirical analysis of Public Key Infrastructures and Investigation of Improvements.
PhD thesis, 2014

A deeper understanding of SSH: Results from Internet-wide scans.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

2012
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
On Using TPM for Secure Identities in Future Home Networks.
Future Internet, 2011

The SSL landscape: a thorough analysis of the x.509 PKI using active and passive measurements.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

Investigating the OpenPGP Web of Trust.
Proceedings of the Computer Security - ESORICS 2011, 2011

2010
Towards Measurement Consolidation for Overlay Optimization and Service Placement.
Prax. Inf.verarb. Kommun., 2010

Pr2-P2PSIP: privacy preserving P2P signaling for VoIP and IM.
Proceedings of the Principles, 2010

2009
CLIO - A Cross-Layer Information Service for Overlay Network Optimization.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2009

On Using Home Networks and Cloud Computing for a Future Internet of Things.
Proceedings of the Future Internet - FIS 2009, Second Future Internet Symposium, 2009

2008
Spontaneous Virtual Networks: On the Road Towards the Internet's Next Generation.
it Inf. Technol., 2008

Trust-Rated Authentication for Domain-Structured Distributed Systems.
Proceedings of the Public Key Infrastructure, 2008

08102 Outcome Working Group -- Situational Awareness.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

08102 Working Group -- Intrusion and Fraud Detection for Web Services.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008


  Loading...