Fragmentation considered poisonous, or: One-domain-to-rule-them-all. org A Herzberg, H Shulman 2013 IEEE Conference on Communications and Network Security (CNS), 224-232, 2013 | 141 | 2013 |
Are we there yet? On RPKI's deployment and security Y Gilad, A Cohen, A Herzberg, M Schapira, H Shulman Cryptology ePrint Archive, 2016 | 81 | 2016 |
Security of patched DNS A Herzberg, H Shulman European Symposium on Research in Computer Security, 271-288, 2012 | 80 | 2012 |
Pretty bad privacy: Pitfalls of DNS encryption H Shulman Proceedings of the 13th Workshop on Privacy in the Electronic Society, 191-200, 2014 | 57 | 2014 |
Ethical considerations when employing fake identities in online social networks for research Y Elovici, M Fire, A Herzberg, H Shulman Science and engineering ethics 20 (4), 1027-1043, 2014 | 56 | 2014 |
Domain validation++ for mitm-resilient pki M Brandt, T Dai, A Klein, H Shulman, M Waidner Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 55 | 2018 |
Internet-wide study of DNS cache injections A Klein, H Shulman, M Waidner IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | 52 | 2017 |
One key to sign them all considered vulnerable: Evaluation of {DNSSEC} in the internet H Shulman, M Waidner 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2017 | 45* | 2017 |
Socket overloading for fun and cache-poisoning A Herzberg, H Shulman Proceedings of the 29th Annual Computer Security Applications Conference …, 2013 | 43 | 2013 |
Vulnerable delegation of DNS resolution A Herzberg, H Shulman European Symposium on Research in Computer Security, 219-236, 2013 | 40 | 2013 |
Dnssec misconfigurations in popular domains T Dai, H Shulman, M Waidner International Conference on Cryptology and Network Security, 651-660, 2016 | 39* | 2016 |
DNSSEC: Security and availability challenges A Herzberg, H Shulman 2013 IEEE Conference on Communications and Network Security (CNS), 365-366, 2013 | 36 | 2013 |
Securing DNSSEC keys via threshold ECDSA from generic MPC A Dalskov, C Orlandi, M Keller, K Shrishak, H Shulman European Symposium on Research in Computer Security, 654-673, 2020 | 34 | 2020 |
Fragmentation considered leaking: port inference for dns poisoning H Shulman, M Waidner International Conference on Applied Cryptography and Network Security, 531-548, 2014 | 34 | 2014 |
Off-path hacking: The illusion of challenge-response authentication Y Gilad, A Herzberg, H Shulman IEEE Security & Privacy 12 (5), 68-77, 2013 | 34 | 2013 |
Towards security of internet naming infrastructure H Shulman, M Waidner European Symposium on Research in Computer Security, 3-22, 2015 | 33 | 2015 |
Retrofitting security into network protocols: The case of dnssec A Herzberg, H Shulman IEEE Internet Computing 18 (1), 66-71, 2014 | 32 | 2014 |
Cloudoscopy: Services discovery and topology mapping A Herzberg, H Shulman, J Ullrich, E Weippl Proceedings of the 2013 ACM workshop on Cloud computing security workshop …, 2013 | 31 | 2013 |
Antidotes for DNS poisoning by off-path adversaries A Herzberg, H Shulman 2012 Seventh International Conference on Availability, Reliability and …, 2012 | 29* | 2012 |
DNSSEC for cyber forensics H Shulman, M Waidner EURASIP Journal on Information Security 2014 (1), 1-14, 2014 | 28* | 2014 |