


default search action
Tobias Fiebig
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c29]Florian Steurer
, Anja Feldmann
, Tobias Fiebig
:
A Tree in a Tree: Measuring Biases of Partial DNS Tree Exploration. PAM 2025: 106-136 - 2024
- [c28]Florian Steurer
, Daniel Wagner
, Danny Lachos
, Anja Feldmann
, Tobias Fiebig
:
The Roots Go Deep: Measuring '.' Under Change. IMC 2024: 441-453 - [c27]Alexandra Dirksen
, Sebastian Giessler
, Hendrik Erz
, Martin Johns
, Tobias Fiebig
:
Don't Patch the Researcher, Patch the Game: A Systematic Approach for Responsible Research via Federated Ethics Boards. NSPW 2024: 126-141 - [c26]Md. Ishtiaq Ashiq, Weitong Li, Tobias Fiebig, Taejoong Chung:
SPF Beyond the Standard: Management and Operational Challenges in Practice and Practical Recommendations. USENIX Security Symposium 2024 - 2023
- [j6]Bernardus Jansen, Natalia Kadenko, Dennis Broeders, Michel van Eeten, Kevin Borgolte, Tobias Fiebig
:
Pushing boundaries: An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions. Gov. Inf. Q. 40(4): 101862 (2023) - [j5]Mannat Kaur
, Harshini Sri Ramulu
, Yasemin Acar
, Tobias Fiebig
:
"Oh yes! over-preparing for meetings is my jam :)": The Gendered Experiences of System Administrators. Proc. ACM Hum. Comput. Interact. 7(CSCW1): 1-38 (2023) - [j4]Tobias Fiebig
, Seda F. Gürses, Carlos Gañán, Erna Kotkamp, Fernando Kuipers, Martina Lindorfer, Menghua Prisse, Taritha Sari:
Heads in the Clouds? Measuring Universities' Migration to Public Clouds: Implications for Privacy & Academic Freedom. Proc. Priv. Enhancing Technol. 2023(2): 117-150 (2023) - [c25]Tobias Fiebig
:
Crisis, Ethics, Reliability & a measurement.network: Reflections on Active Network Measurements in Academia. ANRW 2023: 44-50 - [c24]Stijn Pletinckx
, Thanh-Dat Nguyen, Tobias Fiebig
, Christopher Kruegel, Giovanni Vigna:
Certifiably Vulnerable: Using Certificate Transparency Logs for Target Reconnaissance. EuroS&P 2023: 817-831 - [c23]Gerhard Jungwirth, Aakanksha Saha, Michael Schröder, Tobias Fiebig
, Martina Lindorfer, Jürgen Cito:
Connecting the .dotfiles: Checked-In Secret Exposure with Extra (Lateral Movement) Steps. MSR 2023: 322-333 - [c22]Florian Streibelt, Martina Lindorfer, Seda F. Gürses, Carlos Hernandez Gañán, Tobias Fiebig
:
Back-to-the-Future Whois: An IP Address Attribution Service for Working with Historic Datasets. PAM 2023: 209-226 - [c21]Florian Streibelt, Patrick Sattler, Franziska Lichtblau, Carlos Hernandez Gañán, Anja Feldmann, Oliver Gasser, Tobias Fiebig
:
How Ready is DNS for an IPv6-Only World? PAM 2023: 525-549 - [c20]Md. Ishtiaq Ashiq, Weitong Li, Tobias Fiebig, Taejoong Chung:
You've Got Report: Measurement and Security Implications of DMARC Reporting. USENIX Security Symposium 2023: 4123-4137 - [i7]Florian Streibelt, Patrick Sattler, Franziska Lichtblau, Carlos Hernandez Gañán, Anja Feldmann
, Oliver Gasser, Tobias Fiebig
:
How Ready Is DNS for an IPv6-Only World? CoRR abs/2302.11393 (2023) - 2022
- [j3]Daiki Chiba
, Mitsuaki Akiyama
, Yuto Otsuki, Hiroki Hada, Takeshi Yagi, Tobias Fiebig
, Michel van Eeten
:
DomainPrio: Prioritizing Domain Name Investigations to Improve SOC Efficiency. IEEE Access 10: 34352-34368 (2022) - [j2]Mannat Kaur
, Simon Parkin, Marijn Janssen, Tobias Fiebig
:
"I needed to solve their overwhelmness": How System Administration Work was Affected by COVID-19. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-30 (2022) - [c19]Florian Holzbauer, Johanna Ullrich, Martina Lindorfer, Tobias Fiebig:
Not that Simple: Email Delivery in the 21st Century. USENIX ATC 2022: 295-308 - [c18]Veroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters, Katsiaryna Labunets:
Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context. USENIX Security Symposium 2022: 3433-3450 - [i6]Florian Streibelt, Martina Lindorfer, Seda F. Gürses, Carlos Hernandez Gañán, Tobias Fiebig
:
We have to go back: A Historic IP Attribution Service for Network Measurement. CoRR abs/2211.06537 (2022) - 2021
- [c17]Stijn Pletinckx
, Kevin Borgolte, Tobias Fiebig
:
Out of Sight, Out of Mind: Detecting Orphaned Web Pages at Internet-Scale. CCS 2021: 21-35 - [c16]Mathew Vermeer
, Jonathan West
, Alejandro Cuevas, Shuonan Niu, Nicolas Christin
, Michel van Eeten
, Tobias Fiebig
, Carlos Gañán, Tyler Moore
:
SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations. EuroS&P 2021: 440-456 - [i5]Mannat Kaur
, Michel van Eeten, Marijn Janssen, Kevin Borgolte, Tobias Fiebig:
Human Factors in Security Research: Lessons Learned from 2008-2018. CoRR abs/2103.13287 (2021) - [i4]Tobias Fiebig, Seda F. Gürses, Carlos Hernandez Gañán, Erna Kotkamp, Fernando Kuipers, Martina Lindorfer, Menghua Prisse, Taritha Sari:
Heads in the Clouds: Measuring the Implications of Universities Migrating to Public Clouds. CoRR abs/2104.09462 (2021) - 2020
- [j1]Pierantonia Sterlini
, Fabio Massacci
, Natalia Kadenko
, Tobias Fiebig
, Michel van Eeten
:
Governance Challenges for European Cybersecurity Policies: Stakeholder Views. IEEE Secur. Priv. 18(1): 46-54 (2020) - [c15]Tobias Fiebig
:
How to stop crashing more than twice: A Clean-Slate Governance Approach to IT Security. EuroS&P Workshops 2020: 67-74 - [c14]Olivier van der Toorn, Roland van Rijswijk-Deij
, Tobias Fiebig
, Martina Lindorfer, Anna Sperotto:
TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records. EuroS&P Workshops 2020: 544-549
2010 – 2019
- 2019
- [c13]Lydia Kraus, Martin Ukrop
, Vashek Matyas, Tobias Fiebig
:
Evolution of SSL/TLS Indicators and Warnings in Web Browsers. Security Protocols Workshop 2019: 267-280 - [i3]Tobias Fiebig:
Moving Fast and Breaking Things: How to stop crashing more than twice. CoRR abs/1911.12139 (2019) - 2018
- [c12]Kevin Borgolte, Tobias Fiebig, Shuang Hao, Christopher Kruegel, Giovanni Vigna:
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates. ANRW 2018: 4 - [c11]Constanze Dietrich, Katharina Krombholz, Kevin Borgolte, Tobias Fiebig
:
Investigating System Operators' Perspective on Security Misconfigurations. CCS 2018: 1272-1289 - [c10]Kevin Borgolte, Tobias Fiebig, Shuang Hao, Christopher Kruegel, Giovanni Vigna:
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates. NDSS 2018 - [c9]Tobias Fiebig
, Kevin Borgolte, Shuang Hao, Christopher Kruegel, Giovanni Vigna, Anja Feldmann:
In rDNS We Trust: Revisiting a Common Data-Source's Reliability. PAM 2018: 131-145 - [c8]Kashyap Thimmaraju, Bhargava Shastry, Tobias Fiebig
, Felicitas Hetzelt, Jean-Pierre Seifert, Anja Feldmann
, Stefan Schmid
:
Taking Control of SDN-based Cloud Systems via the Data Plane. SOSR 2018: 1:1-1:15 - [c7]Kevin Borgolte, Shuang Hao, Tobias Fiebig
, Giovanni Vigna:
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones. IEEE Symposium on Security and Privacy 2018: 770-784 - 2017
- [b1]Tobias Fiebig:
An empirical evaluation of misconfiguration in Internet services. Technical University of Berlin, Germany, 2017 - [c6]Kashyap Thimmaraju, Bhargava Shastry, Tobias Fiebig
, Felicitas Hetzelt, Jean-Pierre Seifert, Anja Feldmann
, Stefan Schmid
:
The vAMP Attack: Taking Control of Cloud Systems via the Unified Packet Parser. CCSW 2017: 11-15 - [c5]Tobias Fiebig
, Kevin Borgolte, Shuang Hao, Christopher Kruegel, Giovanni Vigna:
Something from Nothing (There): Collecting Global IPv6 Datasets from DNS. PAM 2017: 30-43 - [c4]Bhargava Shastry, Markus Leutner, Tobias Fiebig
, Kashyap Thimmaraju, Fabian Yamaguchi, Konrad Rieck, Stefan Schmid
, Jean-Pierre Seifert, Anja Feldmann:
Static Program Analysis as a Fuzzing Aid. RAID 2017: 26-47 - 2016
- [c3]Tobias Fiebig
, Anja Feldmann
, Matthias Petschick:
A One-Year Perspective on Exposed In-memory Key-Value Stores. SafeConfig@CCS 2016: 17-22 - [i2]Tobias Fiebig, Franziska Lichtblau, Florian Streibelt, Thorben Krueger, Pieter Lexis, Randy Bush, Anja Feldmann:
SoK: An Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment. CoRR abs/1610.05531 (2016) - [i1]Kashyap Thimmaraju, Bhargava Shastry, Tobias Fiebig, Felicitas Hetzelt, Jean-Pierre Seifert, Anja Feldmann, Stefan Schmid:
Reigns to the Cloud: Compromising Cloud Systems via the Data Plane. CoRR abs/1610.08717 (2016) - 2014
- [c2]Tobias Fiebig, Janis Danisevskis, Marta Piekarska:
A Metric for the Evaluation and Comparison of Keylogger Performance. CSET 2014 - [c1]Tobias Fiebig, Jan Krissler, Ronny Hänsch:
Security Impact of High Resolution Smartphone Cameras. WOOT 2014
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-09 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint