Haya Shulman
Haya Shulman
Fraunhofer Institute for Secure Information Technology
Verified email at sit.fraunhofer.de - Homepage
Title
Cited by
Cited by
Year
Fragmentation considered poisonous, or: One-domain-to-rule-them-all. org
A Herzberg, H Shulman
2013 IEEE Conference on Communications and Network Security (CNS), 224-232, 2013
1002013
Security of patched DNS
A Herzberg, H Shulman
European Symposium on Research in Computer Security, 271-288, 2012
622012
Ethical considerations when employing fake identities in online social networks for research
Y Elovici, M Fire, A Herzberg, H Shulman
Science and engineering ethics 20 (4), 1027-1043, 2014
432014
Socket overloading for fun and cache-poisoning
A Herzberg, H Shulman
Proceedings of the 29th Annual Computer Security Applications Conference …, 2013
382013
Are We There Yet? On RPKI's Deployment and Security.
Y Gilad, A Cohen, A Herzberg, M Schapira, H Shulman
NDSS, 2017
362017
Pretty bad privacy: Pitfalls of DNS encryption
H Shulman
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 191-200, 2014
362014
Retrofitting security into network protocols: The case of dnssec
A Herzberg, H Shulman
IEEE Internet Computing 18 (1), 66-71, 2014
322014
Internet-wide study of dns cache injections
A Klein, H Shulman, M Waidner
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
312017
Cloudoscopy: Services discovery and topology mapping
A Herzberg, H Shulman, J Ullrich, E Weippl
Proceedings of the 2013 ACM workshop on Cloud computing security workshop …, 2013
302013
Vulnerable delegation of DNS resolution
A Herzberg, H Shulman
European Symposium on Research in Computer Security, 219-236, 2013
302013
DNSSEC: Security and availability challenges
A Herzberg, H Shulman
2013 IEEE Conference on Communications and Network Security (CNS), 365-366, 2013
272013
Towards Adoption of DNSSEC: Availability and Security Challenges.
A Herzberg, H Shulman
IACR Cryptol. ePrint Arch. 2013, 254, 2013
26*2013
DNSSEC for cyber forensics
H Shulman, M Waidner
EURASIP Journal on Information Security 2014 (1), 16, 2014
25*2014
Domain validation++ for mitm-resilient pki
M Brandt, T Dai, A Klein, H Shulman, M Waidner
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
242018
Dnssec misconfigurations in popular domains
T Dai, H Shulman, M Waidner
International Conference on Cryptology and Network Security, 651-660, 2016
22*2016
Stealth dos attacks on secure channels
A Herzberg, H Shulman
Proceedings of the 17th Annual Network and Distributed System Security …, 2010
22*2010
Fragmentation considered leaking: port inference for dns poisoning
H Shulman, M Waidner
International Conference on Applied Cryptography and Network Security, 531-548, 2014
212014
Off-path hacking: The illusion of challenge-response authentication
Y Gilad, A Herzberg, H Shulman
IEEE Security & Privacy 12 (5), 68-77, 2013
212013
Towards a theory of white-box security
A Herzberg, H Shulman, A Saxena, B Crispo
IFIP International Information Security Conference, 342-352, 2009
212009
One Key to Sign Them All Considered Vulnerable: Evaluation of {DNSSEC} in the Internet
H Shulman, M Waidner
14th {USENIX} Symposium on Networked Systems Design and Implementation …, 2017
20*2017
The system can't perform the operation now. Try again later.
Articles 1–20