Fragmentation considered poisonous, or: One-domain-to-rule-them-all. org A Herzberg, H Shulman 2013 IEEE Conference on Communications and Network Security (CNS), 224-232, 2013 | 147 | 2013 |
Are we there yet? On RPKI's deployment and security Y Gilad, A Cohen, A Herzberg, M Schapira, H Shulman Cryptology ePrint Archive, 2016 | 86 | 2016 |
Security of patched DNS A Herzberg, H Shulman Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 81 | 2012 |
Domain validation++ for mitm-resilient pki M Brandt, T Dai, A Klein, H Shulman, M Waidner Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 62 | 2018 |
Pretty bad privacy: Pitfalls of DNS encryption H Shulman Proceedings of the 13th Workshop on Privacy in the Electronic Society, 191-200, 2014 | 61 | 2014 |
Ethical considerations when employing fake identities in online social networks for research Y Elovici, M Fire, A Herzberg, H Shulman Science and engineering ethics 20, 1027-1043, 2014 | 58 | 2014 |
Internet-wide study of DNS cache injections A Klein, H Shulman, M Waidner IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | 52 | 2017 |
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet. H Shulman, M Waidner NSDI 17, 131-144, 2017 | 48* | 2017 |
Socket overloading for fun and cache-poisoning A Herzberg, H Shulman Proceedings of the 29th Annual Computer Security Applications Conference …, 2013 | 44 | 2013 |
Securing DNSSEC keys via threshold ECDSA from generic MPC A Dalskov, C Orlandi, M Keller, K Shrishak, H Shulman Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 42 | 2020 |
Vulnerable delegation of DNS resolution A Herzberg, H Shulman Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 42 | 2013 |
Dnssec misconfigurations in popular domains T Dai, H Shulman, M Waidner Cryptology and Network Security: 15th International Conference, CANS 2016 …, 2016 | 41* | 2016 |
DNSSEC: Security and availability challenges A Herzberg, H Shulman 2013 IEEE Conference on Communications and Network Security (CNS), 365-366, 2013 | 37 | 2013 |
Towards security of internet naming infrastructure H Shulman, M Waidner Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 36 | 2015 |
Fragmentation considered leaking: port inference for dns poisoning H Shulman, M Waidner Applied Cryptography and Network Security: 12th International Conference …, 2014 | 35 | 2014 |
Off-path hacking: The illusion of challenge-response authentication Y Gilad, A Herzberg, H Shulman IEEE Security & Privacy 12 (5), 68-77, 2013 | 34 | 2013 |
Retrofitting security into network protocols: The case of dnssec A Herzberg, H Shulman IEEE Internet Computing 18 (1), 66-71, 2014 | 33 | 2014 |
Towards adoption of dnssec: Availability and security challenges A Herzberg, H Shulman Cryptology ePrint Archive, 2013 | 33* | 2013 |
Cloudoscopy: Services discovery and topology mapping A Herzberg, H Shulman, J Ullrich, E Weippl Proceedings of the 2013 ACM workshop on Cloud computing security workshop …, 2013 | 31 | 2013 |
Antidotes for DNS poisoning by off-path adversaries A Herzberg, H Shulman 2012 Seventh International Conference on Availability, Reliability and …, 2012 | 30* | 2012 |