Biblio

Export 9 results:
Filters: Author is Michael Waidner  [Clear All Filters]
2024
Gruza O, Heftrig E, Jacobsen O, Schulmann H, Vogel N, Waidner M.  2024.  Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU. 18th USENIX WOOT Conference on Offensive Technologies (WOOT 24). :45--57.
Frieß J, Gattermayer T, Gelernter N, Schulmann H, Waidner M.  2024.  Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1977--1994.
2022
Hlavacek T, Jeitner P, Mirdita D, Shulman H, Waidner M.  2022.  Stalloris: RPKI Downgrade Attack. 31st USENIX Security Symposium (USENIX Security 22). :4455--4471.
Jeitner P, Shulman H, Teichmann L, Waidner M.  2022.  XDRI Attacks - and - How to Enhance Resilience of Residential Routers. 31st USENIX Security Symposium (USENIX Security 22). :4473--4490.
2021
Dai T, Jeitner P, Shulman H, Waidner M.  2021.  The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources. 30th USENIX Security Symposium (USENIX Security 21). :3147--3164.
2017
Shulman H, Waidner M.  2017.  One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet. 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). :131--144.
1995
Bellare M, Garay JA, Hauser R, Herzberg A, Krawczyk H, Steiner M, Tsudik G, Waidner M.  1995.  iKP - A Family of Secure Electronic Payment Protocols. First USENIX Workshop on Electronic Commerce ( First USENIX Workshop on Electronic Commerce).