Fragmentation considered poisonous, or: One-domain-to-rule-them-all. org A Herzberg, H Shulman 2013 IEEE Conference on Communications and Network Security (CNS), 224-232, 2013 | 167 | 2013 |
Are we there yet? On RPKI's deployment and security Y Gilad, A Cohen, A Herzberg, M Schapira, H Shulman Cryptology ePrint Archive, 2016 | 108 | 2016 |
Security of patched DNS A Herzberg, H Shulman Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 93 | 2012 |
Domain validation++ for mitm-resilient pki M Brandt, T Dai, A Klein, H Shulman, M Waidner Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 79 | 2018 |
Securing DNSSEC keys via threshold ECDSA from generic MPC A Dalskov, C Orlandi, M Keller, K Shrishak, H Shulman Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 75 | 2020 |
Pretty bad privacy: Pitfalls of DNS encryption H Shulman Proceedings of the 13th Workshop on Privacy in the Electronic Society, 191-200, 2014 | 69 | 2014 |
Ethical considerations when employing fake identities in online social networks for research Y Elovici, M Fire, A Herzberg, H Shulman Science and engineering ethics 20, 1027-1043, 2014 | 68 | 2014 |
Internet-wide study of DNS cache injections A Klein, H Shulman, M Waidner IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | 63 | 2017 |
One key to sign them all considered vulnerable: Evaluation of {DNSSEC} in the internet H Shulman, M Waidner 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2017 | 54* | 2017 |
Socket overloading for fun and cache-poisoning A Herzberg, H Shulman Proceedings of the 29th Annual Computer Security Applications Conference …, 2013 | 48 | 2013 |
Vulnerable delegation of DNS resolution A Herzberg, H Shulman Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 47 | 2013 |
Dnssec misconfigurations in popular domains T Dai, H Shulman, M Waidner Cryptology and Network Security: 15th International Conference, CANS 2016 …, 2016 | 42* | 2016 |
Fragmentation considered leaking: port inference for dns poisoning H Shulman, M Waidner Applied Cryptography and Network Security: 12th International Conference …, 2014 | 42 | 2014 |
Off-path hacking: The illusion of challenge-response authentication Y Gilad, A Herzberg, H Shulman IEEE Security & Privacy 12 (5), 68-77, 2013 | 41 | 2013 |
DNSSEC: Security and availability challenges A Herzberg, H Shulman 2013 IEEE Conference on Communications and Network Security (CNS), 365-366, 2013 | 40 | 2013 |
Towards security of internet naming infrastructure H Shulman, M Waidner Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 38 | 2015 |
DISCO: Sidestepping RPKI's deployment barriers T Hlavacek, I Cunha, Y Gilad, A Herzberg, E Katz-Bassett, M Schapira, ... Network and Distributed System Security Symposium (NDSS), 2020 | 34 | 2020 |
Antidotes for DNS poisoning by off-path adversaries A Herzberg, H Shulman 2012 Seventh International Conference on Availability, Reliability and …, 2012 | 34* | 2012 |
Retrofitting security into network protocols: The case of dnssec A Herzberg, H Shulman IEEE Internet Computing 18 (1), 66-71, 2014 | 33 | 2014 |
Cloudoscopy: Services discovery and topology mapping A Herzberg, H Shulman, J Ullrich, E Weippl Proceedings of the 2013 ACM workshop on Cloud computing security workshop …, 2013 | 33 | 2013 |