Fragmentation considered poisonous, or: One-domain-to-rule-them-all. org A Herzberg, H Shulman 2013 IEEE Conference on Communications and Network Security (CNS), 224-232, 2013 | 107 | 2013 |
Security of patched DNS A Herzberg, H Shulman European Symposium on Research in Computer Security, 271-288, 2012 | 62 | 2012 |
Ethical considerations when employing fake identities in online social networks for research Y Elovici, M Fire, A Herzberg, H Shulman Science and engineering ethics 20 (4), 1027-1043, 2014 | 48 | 2014 |
Are We There Yet? On RPKI's Deployment and Security. Y Gilad, A Cohen, A Herzberg, M Schapira, H Shulman NDSS, 2017 | 42 | 2017 |
Pretty bad privacy: Pitfalls of DNS encryption H Shulman Proceedings of the 13th Workshop on Privacy in the Electronic Society, 191-200, 2014 | 42 | 2014 |
Socket overloading for fun and cache-poisoning A Herzberg, H Shulman Proceedings of the 29th Annual Computer Security Applications Conference …, 2013 | 38 | 2013 |
Internet-wide study of dns cache injections A Klein, H Shulman, M Waidner IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | 33 | 2017 |
Retrofitting security into network protocols: The case of dnssec A Herzberg, H Shulman IEEE Internet Computing 18 (1), 66-71, 2014 | 33 | 2014 |
Vulnerable delegation of DNS resolution A Herzberg, H Shulman European Symposium on Research in Computer Security, 219-236, 2013 | 32 | 2013 |
Domain validation++ for mitm-resilient pki M Brandt, T Dai, A Klein, H Shulman, M Waidner Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 29 | 2018 |
Cloudoscopy: Services discovery and topology mapping A Herzberg, H Shulman, J Ullrich, E Weippl Proceedings of the 2013 ACM workshop on Cloud computing security workshop …, 2013 | 28 | 2013 |
DNSSEC: Security and availability challenges A Herzberg, H Shulman 2013 IEEE Conference on Communications and Network Security (CNS), 365-366, 2013 | 27 | 2013 |
DNSSEC for cyber forensics H Shulman, M Waidner EURASIP Journal on Information Security 2014 (1), 1-14, 2014 | 26* | 2014 |
Towards Adoption of DNSSEC: Availability and Security Challenges. A Herzberg, H Shulman IACR Cryptol. ePrint Arch. 2013, 254, 2013 | 26* | 2013 |
Antidotes for DNS poisoning by off-path adversaries A Herzberg, H Shulman 2012 Seventh International Conference on Availability, Reliability and …, 2012 | 26* | 2012 |
One Key to Sign Them All Considered Vulnerable: Evaluation of {DNSSEC} in the Internet H Shulman, M Waidner 14th {USENIX} Symposium on Networked Systems Design and Implementation …, 2017 | 23* | 2017 |
Dnssec misconfigurations in popular domains T Dai, H Shulman, M Waidner International Conference on Cryptology and Network Security, 651-660, 2016 | 22* | 2016 |
Fragmentation considered leaking: port inference for dns poisoning H Shulman, M Waidner International Conference on Applied Cryptography and Network Security, 531-548, 2014 | 22 | 2014 |
Stealth dos attacks on secure channels A Herzberg, H Shulman Proceedings of the 17th Annual Network and Distributed System Security …, 2010 | 22* | 2010 |
Off-path hacking: The illusion of challenge-response authentication Y Gilad, A Herzberg, H Shulman IEEE Security & Privacy 12 (5), 68-77, 2013 | 21 | 2013 |