USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 9 results:
Filters: Author is Michael Waidner [Clear All Filters]
Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU. 18th USENIX WOOT Conference on Offensive Technologies (WOOT 24). :45--57.
.
2024. Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1977--1994.
.
2024. Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones. 32nd USENIX Security Symposium (USENIX Security 23). :7429--7444.
.
2023. Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet. 32nd USENIX Security Symposium (USENIX Security 23). :4841--4858.
.
2023. Stalloris: RPKI Downgrade Attack. 31st USENIX Security Symposium (USENIX Security 22). :4455--4471.
.
2022. XDRI Attacks - and - How to Enhance Resilience of Residential Routers. 31st USENIX Security Symposium (USENIX Security 22). :4473--4490.
.
2022. The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources. 30th USENIX Security Symposium (USENIX Security 21). :3147--3164.
.
2021. One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet. 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). :131--144.
.
2017. iKP - A Family of Secure Electronic Payment Protocols. First USENIX Workshop on Electronic Commerce ( First USENIX Workshop on Electronic Commerce).
.
1995.